Changeset 988 for vendor/current/docs
- Timestamp:
- Nov 24, 2016, 1:14:11 PM (9 years ago)
- Location:
- vendor/current/docs
- Files:
-
- 22 added
- 16 deleted
- 73 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/docs/manpages/dbwrap_tool.1
r860 r988 2 2 .\" Title: dbwrap_tool 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "DBWRAP_TOOL" "1" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "DBWRAP_TOOL" "1" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 dbwrap_tool {<database>} {<operation>} [<key>\ [<type>\ [<value>]\]]34 dbwrap_tool [\-\-persistent] [\-\-non\-persistent] [\-d\ <debug\ level>] [\-s\ <config\ file>] [\-l\ <log\ file\ base>] [\-V] [\-\-option=<name>=<value>] {<database>} {<operation>} [<key>\ [<type>\ [<value>]]] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 84 84 .IP \(bu 2.3 85 85 .\} 86 exists: test for existence of a record 87 .RE 88 .sp 89 .RS 4 90 .ie n \{\ 91 \h'-04'\(bu\h'+03'\c 92 .\} 93 .el \{\ 94 .sp -1 95 .IP \(bu 2.3 96 .\} 86 97 erase: remove all records 87 98 .RE … … 98 109 .RE 99 110 .sp 111 .RS 4 112 .ie n \{\ 113 \h'-04'\(bu\h'+03'\c 114 .\} 115 .el \{\ 116 .sp -1 117 .IP \(bu 2.3 118 .\} 119 listwatchers: list processes, which are waiting for changes in a record 120 .RE 121 .sp 100 122 .RE 101 123 .PP … … 135 157 .RE 136 158 .sp 159 .RS 4 160 .ie n \{\ 161 \h'-04'\(bu\h'+03'\c 162 .\} 163 .el \{\ 164 .sp -1 165 .IP \(bu 2.3 166 .\} 167 hex: hex strings like "68656C6C6F20776F726C6400" ("hello world") 168 .RE 169 .sp 137 170 .RE 138 171 .SH "OPTIONS" 139 172 .PP 140 None\&. 173 \-\-persistent 174 .RS 4 175 Open the database as a persistent database\&. 176 .sp 177 Exactly one of \-\-persistent and \-\-non\-persistent must be specified\&. 178 .RE 179 .PP 180 \-\-non\-persistent 181 .RS 4 182 Open the database as a non\-persistent database\&. 183 .sp 184 Caveat: opening a database as non\-persistent when there is currently no other opener will wipe the database\&. 185 .sp 186 Exactly one of \-\-persistent and \-\-non\-persistent must be specified\&. 187 .RE 141 188 .SH "COMMANDS" 142 189 .SS "fetch" … … 152 199 dbwrap_tool <database> delete <key> 153 200 201 .SS "exists" 202 .HP \w'\ 'u 203 dbwrap_tool <database> exists <key> 204 154 205 .SS "erase" 155 206 .HP \w'\ 'u 156 dbwrap_tool <database> erase 157 207 dbwrap_tool <database> erase 158 208 .SS "listkeys" 159 209 .HP \w'\ 'u 160 210 dbwrap_tool <database> listkeys 161 211 212 .SS "listwatchers" 213 .HP \w'\ 'u 214 dbwrap_tool <database> listwatchers 215 162 216 .SH "EXAMPLES" 163 217 .PP … … 165 219 .RS 4 166 220 dbwrap_tool 167 winbindd_idmap\&.tdb listkeys221 \-\-persistent winbindd_idmap\&.tdb listkeys 168 222 .RE 169 223 .PP … … 171 225 .RS 4 172 226 dbwrap_tool 173 winbindd_idmap\&.tdb fetch "USER HWM" uint32227 \-\-persistent winbindd_idmap\&.tdb fetch "USER HWM" uint32 174 228 .RE 175 229 .PP … … 177 231 .RS 4 178 232 dbwrap_tool 179 winbindd_idmap\&.tdb remove "USER HWM"233 \-\-persistent winbindd_idmap\&.tdb remove "USER HWM" 180 234 .RE 181 235 .PP 182 236 Store and overwrite record "USER HWM" with value 214 183 237 .RS 4 184 dbwrap_tool 185 winbindd_idmap\&.tdb store "USER HWM" uint32 214 238 uint32: 239 dbwrap_tool 240 \-\-persistent winbindd_idmap\&.tdb store "USER HWM" uint32 214 241 hex: 242 dbwrap_tool 243 \-\-persistent winbindd_idmap\&.tdb store "USER HWM" hex D6000000 186 244 .RE 187 245 .SH "NOTES" -
vendor/current/docs/manpages/eventlogadm.8
r860 r988 2 2 .\" Title: eventlogadm 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "EVENTLOGADM" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "EVENTLOGADM" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 106 106 .IP \(bu 2.3 107 107 .\} 108 109 108 LEN 110 109 \- This field should be 0, since … … 121 120 .IP \(bu 2.3 122 121 .\} 123 124 122 RS1 125 123 \- This must be the value 1699505740\&. … … 134 132 .IP \(bu 2.3 135 133 .\} 136 137 134 RCN 138 135 \- This field should be 0\&. … … 147 144 .IP \(bu 2.3 148 145 .\} 149 150 146 TMG 151 147 \- The time the eventlog record was generated; format is the number of seconds since 00:00:00 January 1, 1970, UTC\&. … … 160 156 .IP \(bu 2.3 161 157 .\} 162 163 158 TMW 164 159 \- The time the eventlog record was written; format is the number of seconds since 00:00:00 January 1, 1970, UTC\&. … … 173 168 .IP \(bu 2.3 174 169 .\} 175 176 170 EID 177 171 \- The eventlog ID\&. … … 186 180 .IP \(bu 2.3 187 181 .\} 188 189 182 ETP 190 183 \- The event type \-\- one of "INFO", "ERROR", "WARNING", "AUDIT SUCCESS" or "AUDIT FAILURE"\&. … … 199 192 .IP \(bu 2.3 200 193 .\} 201 202 194 ECT 203 195 \- The event category; this depends on the message file\&. It is primarily used as a means of filtering in the eventlog viewer\&. … … 212 204 .IP \(bu 2.3 213 205 .\} 214 215 206 RS2 216 207 \- This field should be 0\&. … … 225 216 .IP \(bu 2.3 226 217 .\} 227 228 218 CRN 229 219 \- This field should be 0\&. … … 238 228 .IP \(bu 2.3 239 229 .\} 240 241 230 USL 242 231 \- This field should be 0\&. … … 251 240 .IP \(bu 2.3 252 241 .\} 253 254 242 SRC 255 243 \- This field contains the source name associated with the event log\&. If a message file is used with an event log, there will be a registry entry for associating this source name with a message file DLL\&. … … 264 252 .IP \(bu 2.3 265 253 .\} 266 267 254 SRN 268 255 \- The name of the machine on which the eventlog was generated\&. This is typically the host name\&. … … 277 264 .IP \(bu 2.3 278 265 .\} 279 280 266 STR 281 267 \- The text associated with the eventlog\&. There may be more than one string in a record\&. … … 290 276 .IP \(bu 2.3 291 277 .\} 292 293 278 DAT 294 279 \- This field should be left unset\&. -
vendor/current/docs/manpages/findsmb.1
r860 r988 2 2 .\" Title: findsmb 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "FINDSMB" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "FINDSMB" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/idmap_ad.8
r860 r988 2 2 .\" Title: idmap_ad 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "IDMAP_AD" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "IDMAP_AD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 34 34 The idmap_ad plugin provides a way for Winbind to read id mappings from an AD server that uses RFC2307/SFU schema extensions\&. This module implements only the "idmap" API, and is READONLY\&. Mappings must be provided in advance by the administrator by adding the uidNumber attributes for users and gidNumber attributes for groups in the AD\&. Winbind will only map users that have a uidNumber and whose primary group have a gidNumber attribute set\&. It is however recommended that all groups in use have gidNumber attributes assigned, otherwise they are not working\&. 35 35 .PP 36 Note that the idmap_ad module has changed considerably since Samba versions 3\&.0 and 3\&.2\&.Currently, the36 Currently, the 37 37 \fIad\fR 38 backend does not work as the thedefault idmap backend, but one has to configure it separately for each domain for which one wants to use it, using disjoint ranges\&. One usually needs to configure a writeable default idmap range, using for example the38 backend does not work as the default idmap backend, but one has to configure it separately for each domain for which one wants to use it, using disjoint ranges\&. One usually needs to configure a writeable default idmap range, using for example the 39 39 \fItdb\fR 40 40 or … … 49 49 .RE 50 50 .PP 51 schema_mode = <rfc2307 | sfu >51 schema_mode = <rfc2307 | sfu | sfu20> 52 52 .RS 4 53 Defines the schema that idmap_ad should use when querying Active Directory regarding user and group information\&. This can be either the RFC2307 schema support included in Windows 2003 R2 or the Service for Unix (SFU) schema\&. 53 Defines the schema that idmap_ad should use when querying Active Directory regarding user and group information\&. This can be either the RFC2307 schema support included in Windows 2003 R2 or the Service for Unix (SFU) schema\&. For SFU 3\&.0 or 3\&.5 please choose "sfu", for SFU 2\&.0 please choose "sfu20"\&. Please note that primary group membership is currently always calculated via the "primaryGroupID" LDAP attribute\&. 54 54 .RE 55 55 .SH "EXAMPLES" … … 62 62 .nf 63 63 [global] 64 workgroup = CORP 65 64 66 idmap config * : backend = tdb 65 67 idmap config * : range = 1000000\-1999999 -
vendor/current/docs/manpages/idmap_autorid.8
r860 r988 2 2 .\" Title: idmap_autorid 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "IDMAP_AUTORID" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "IDMAP_AUTORID" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 41 41 .SH "IDMAP OPTIONS" 42 42 .PP 43 range = low \- high 44 .RS 4 45 Defines the available matching uid and gid range for which the backend is authoritative\&. Note that the range acts as a filter\&. If algorithmically determined UID or GID fall outside the range, they are ignored and the corresponding map is discarded\&. It is intended as a way to avoid accidental UID/GID overlaps between local and remotely defined IDs\&. 46 .RE 47 .PP 43 48 rangesize = numberofidsperdomain 44 49 .RS 4 45 Defines the available number of uids/gids per domain\&. The minimum needed value is 2000\&. SIDs with RIDs larger than this value cannot be mapped, are ignored and the corresponding map is discarded\&. Choose this value carefully, as this should not be changed after the first ranges for domains have been defined, otherwise mappings between domains will get intermixed leading to unpredictable results\&. Please note that RIDs in Windows Domains usually start with 500 for builtin users and 1000 for regular users\&. As the parameter cannot be changed later, please plan accordingly for your expected number of users in a domain with safety margins\&.50 Defines the number of uids/gids available per domain range\&. The minimum needed value is 2000\&. SIDs with RIDs larger than this value will be mapped into extension ranges depending upon number of available ranges\&. If the autorid backend runs out of available ranges, mapping requests for new domains (or new extension ranges for domains already known) are ignored and the corresponding map is discarded\&. 46 51 .sp 47 One range will be used for local users and groups\&. Thus the number of local users and groups that can be created is limited by this option as well\&. If you plan to create a large amount of local users or groups, you will need set this parameter accordingly\&. 52 Example: with rangesize set to 10000, users/groups with a RID up to 10000 will be put into the first range for the domain\&. When attempting to map the an object with a RID of 25000, an extension range will be allocated that will then be used to map all RIDs from 20000\-29999\&. 53 .sp 54 One range will be used for local users and groups and for non\-domain well\-known SIDs like Everyone (S\-1\-1\-0) or Creator Owner (S\-1\-3\-0)\&. A chosen list of well\-known SIDs will be preallocated on first start to create deterministic mappings for those\&. 55 .sp 56 Thus the number of local users and groups that can be created is limited by this option as well\&. If you plan to create a large amount of local users or groups, you will need set this parameter accordingly\&. 48 57 .sp 49 58 The default value is 100000\&. 59 .RE 60 .PP 61 read only = [ yes | no ] 62 .RS 4 63 Turn the module into read\-only mode\&. No new ranges will be allocated nor will new mappings be created in the idmap pool\&. Defaults to no\&. 64 .RE 65 .PP 66 ignore builtin = [ yes | no ] 67 .RS 4 68 Ignore any mapping requests for the BUILTIN domain\&. Defaults to no\&. 50 69 .RE 51 70 .SH "THE MAPPING FORMULAS" … … 57 76 .\} 58 77 .nf 59 ID = IDMAP UID LOW VALUE + DOMAINRANGENUMBER * RANGESIZE + RID78 ID = REDUCED RID + IDMAP RANGE LOW VALUE + RANGE NUMBER * RANGE SIZE 60 79 61 80 .fi … … 63 82 .RE 64 83 .\} 84 .sp 85 where REDUCED RID = RID % RANGE_SIZE and a DOMAIN RANGE INDEX = RID / RANGE_SIZE is used together with the domain sid to determine the RANGE NUMBER (stored in the database)\&. 65 86 .PP 66 87 Correspondingly, the formula for calculating the RID for a given Unix ID is this: … … 70 91 .\} 71 92 .nf 72 RID = ID \- IDMAP UID LOW VALUE \- DOMAINRANGENUMBER * RANGESIZE93 RID = (ID \- LOW ID) % RANGE SIZE + DOMAIN RANGE INDEX * RANGE SIZE 73 94 74 95 .fi … … 77 98 .\} 78 99 .sp 100 Where the DOMAIN RANGE INDEX is retrieved from the database along with the domain sid by the RANGE NUMBER = (ID \- LOW ID) / RANGE SIZE \&. 79 101 .SH "EXAMPLES" 80 102 .PP 81 This example shows you the minimal configuration that will work for the princip ial domain and 19 trusted domains\&.103 This example shows you the minimal configuration that will work for the principal domain and 19 trusted domains / range extensions\&. 82 104 .sp 83 105 .if n \{\ -
vendor/current/docs/manpages/idmap_hash.8
r860 r988 2 2 .\" Title: idmap_hash 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "IDMAP_HASH" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "IDMAP_HASH" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/idmap_ldap.8
r860 r988 2 2 .\" Title: idmap_ldap 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "IDMAP_LDAP" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "IDMAP_LDAP" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/idmap_nss.8
r860 r988 2 2 .\" Title: idmap_nss 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "IDMAP_NSS" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "IDMAP_NSS" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/idmap_rid.8
r860 r988 2 2 .\" Title: idmap_rid 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "IDMAP_RID" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "IDMAP_RID" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 34 34 The idmap_rid backend provides a way to use an algorithmic mapping scheme to map UIDs/GIDs and SIDs\&. No database is required in this case as the mapping is deterministic\&. 35 35 .PP 36 Note that the idmap_rid module has changed considerably since Samba versions 3\&.0\&. and 3\&.2\&. Currently, there should to be an explicit idmap configuration for each domain that should use the idmap_rid backend, using disjoint ranges\&. One usually needs to define a writeable default idmap range, using a backen tlike36 Note that the idmap_rid module has changed considerably since Samba versions 3\&.0\&. and 3\&.2\&. Currently, there should to be an explicit idmap configuration for each domain that should use the idmap_rid backend, using disjoint ranges\&. One usually needs to define a writeable default idmap range, using a backend like 37 37 \fItdb\fR 38 38 or … … 52 52 base_rid = INTEGER 53 53 .RS 4 54 Defines the base integer used to build SIDs out of a UID or a GID, and to rebase the UID or GID to be obtained from a SID\&. This means SIDs with a RID less than the base rid are filtered\&. The default is not to restrict the allowed rids at all, i\&.e\&. a base_rid value of 0\&. A good value for the base_rid can be 1000, since user RIDs by default start at 1000 (512 hexadecimal)\&.54 Defines the base integer used to build SIDs out of a UID or a GID, and to rebase the UID or GID to be obtained from a SID\&. This means SIDs with a RID less than the base rid are filtered\&. The default is not to restrict the allowed rids at all, i\&.e\&. a base_rid value of 0\&. 55 55 .sp 56 56 Use of this parameter is deprecated\&. … … 104 104 idmap config TRUSTED : backend = rid 105 105 idmap config TRUSTED : range = 50000 \- 99999 106 idmap config TRUSTED : base_rid = 1000107 106 108 107 .fi -
vendor/current/docs/manpages/idmap_tdb.8
r860 r988 2 2 .\" Title: idmap_tdb 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "IDMAP_TDB" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "IDMAP_TDB" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/idmap_tdb2.8
r860 r988 2 2 .\" Title: idmap_tdb2 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "IDMAP_TDB2" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "IDMAP_TDB2" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/libsmbclient.7
r860 r988 2 2 .\" Title: libsmbclient 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: 7 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "LIBSMBCLIENT" "7" "0 9/18/2013" "Samba 3\&.6" "7"10 .TH "LIBSMBCLIENT" "7" "05/02/2016" "Samba 4\&.4" "7" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 41 41 suite\&. 42 42 .PP 43 44 43 libsmbclient 45 44 is a library toolset that permits applications to manipulate CIFS/SMB network resources using many of the standards POSIX functions available for manipulating local UNIX/Linux files\&. It permits much more than just browsing, files can be opened and read or written, permissions changed, file times modified, attributes and ACL\*(Aqs can be manipulated, and so on\&. Of course, its functionality includes all the capabilities commonly called browsing\&. 46 45 .PP 47 48 46 libsmbclient 49 47 can not be used directly from the command line, instead it provides an extension of the capabilities of tools such as file managers and browsers\&. This man page describes the configuration options for this tool so that the user may obtain greatest utility of use\&. … … 78 76 to it\&. 79 77 .PP 80 81 78 libsmbclient 82 79 will check the users shell environment for the -
vendor/current/docs/manpages/lmhosts.5
r860 r988 2 2 .\" Title: lmhosts 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: File Formats and Conventions 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "LMHOSTS" "5" "0 9/18/2013" "Samba 3\&.6" "File Formats and Conventions"10 .TH "LMHOSTS" "5" "05/02/2016" "Samba 4\&.4" "File Formats and Conventions" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/log2pcap.1
r860 r988 2 2 .\" Title: log2pcap 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "LOG2PCAP" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "LOG2PCAP" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 74 74 Name of the output file to write the pcap (or hexdump) data to\&. If this argument is not specified, output data will be written to stdout\&. 75 75 .RE 76 .PP77 \-h|\-\-help78 .RS 479 Print a summary of command line options\&.80 .RE81 76 .SH "EXAMPLES" 82 77 .PP -
vendor/current/docs/manpages/net.8
r860 r988 2 2 .\" Title: net 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "NET" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "NET" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 net {<ads|rap|rpc>} [\-h ] [\-w\ workgroup] [\-W\ myworkgroup] [\-U\ user] [\-I\ ip\-address] [\-p\ port] [\-n\ myname] [\-s\ conffile] [\-S\ server] [\-l] [\-P] [\-d\ debuglevel] [\-V] [\-\-request\-timeout\ seconds]34 net {<ads|rap|rpc>} [\-h|\-\-help] [\-w|\-\-workgroup\ workgroup] [\-W|\-\-myworkgroup\ myworkgroup] [\-U|\-\-user\ user] [\-I|\-\-ipaddress\ ip\-address] [\-p|\-\-port\ port] [\-n\ myname] [\-s\ conffile] [\-S|\-\-server\ server] [\-l|\-\-long] [\-v|\-\-verbose] [\-f|\-\-force] [\-P|\-\-machine\-pass] [\-d\ debuglevel] [\-V] [\-\-request\-timeout\ seconds] [\-t|\-\-timeout\ seconds] [\-i|\-\-stdin] [\-\-tallocreport] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 42 42 .SH "OPTIONS" 43 43 .PP 44 \-h|\-\-help 45 .RS 4 46 Print a summary of command line options\&. 47 .RE 48 .PP 49 \-k|\-\-kerberos 50 .RS 4 51 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&. 52 .RE 53 .PP 54 \-w target\-workgroup 44 \-w|\-\-workgroup target\-workgroup 55 45 .RS 4 56 46 Sets target workgroup or domain\&. You have to specify either this option or the IP address or the name of a server\&. 57 47 .RE 58 48 .PP 59 \-W workgroup49 \-W|\-\-myworkgroup workgroup 60 50 .RS 4 61 51 Sets client workgroup or domain 62 52 .RE 63 53 .PP 64 \-U user54 \-U|\-\-user user 65 55 .RS 4 66 56 User name to use 67 57 .RE 68 58 .PP 69 \-I ip\-address59 \-I|\-\-ipaddress ip\-address 70 60 .RS 4 71 61 IP address of target server to use\&. You have to specify either this option or a target workgroup or a target server\&. 72 62 .RE 73 63 .PP 74 \-p port64 \-p|\-\-port port 75 65 .RS 4 76 66 Port on the target server to connect to (usually 139 or 445)\&. Defaults to trying 445 first, then 139\&. 77 67 .RE 78 68 .PP 79 \-n|\-\-netbiosname <primary NetBIOS name> 80 .RS 4 81 This option allows you to override the NetBIOS name that Samba uses for itself\&. This is identical to setting the 82 \m[blue]\fBnetbios name\fR\m[] 83 parameter in the 84 smb\&.conf 85 file\&. However, a command line setting will take precedence over settings in 86 smb\&.conf\&. 87 .RE 88 .PP 89 \-s|\-\-configfile <configuration file> 90 .RS 4 91 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 92 smb\&.conf 93 for more information\&. The default configuration file name is determined at compile time\&. 94 .RE 95 .PP 96 \-S server 69 \-S|\-\-server server 97 70 .RS 4 98 71 Name of target server\&. You should specify either this option or a target workgroup or a target IP address\&. 99 72 .RE 100 73 .PP 101 \-l 74 \-l|\-\-long 102 75 .RS 4 103 76 When listing data, give more information on each item\&. 104 77 .RE 105 78 .PP 106 \-P 79 \-v|\-\-verbose 80 .RS 4 81 When listing data, give more verbose information on each item\&. 82 .RE 83 .PP 84 \-f|\-\-force 85 .RS 4 86 Enforcing a net command\&. 87 .RE 88 .PP 89 \-P|\-\-machine\-pass 107 90 .RS 4 108 91 Make queries to the external server using the machine account of the local server\&. … … 114 97 .RE 115 98 .PP 116 \-d|\-\-debuglevel=level 117 .RS 4 118 \fIlevel\fR 119 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&. 120 .sp 121 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&. 122 .sp 123 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&. 124 .sp 125 Note that specifying this parameter here will override the 126 \m[blue]\fBlog level\fR\m[] 127 parameter in the 128 smb\&.conf 129 file\&. 99 \-t|\-\-timeout 30 100 .RS 4 101 Set timeout for client operations to 30 seconds\&. 102 .RE 103 .PP 104 \-\-use\-ccache 105 .RS 4 106 Try to use the credentials cached by winbind\&. 107 .RE 108 .PP 109 \-i|\-\-stdin 110 .RS 4 111 Take input for net commands from standard input\&. 112 .RE 113 .PP 114 \-\-tallocreport 115 .RS 4 116 Generate a talloc report while processing a net command\&. 117 .RE 118 .PP 119 \-T|\-\-test 120 .RS 4 121 Only test command sequence, dry\-run\&. 122 .RE 123 .PP 124 \-F|\-\-flags FLAGS 125 .RS 4 126 Pass down integer flags to a net subcommand\&. 127 .RE 128 .PP 129 \-C|\-\-comment COMMENT 130 .RS 4 131 Pass down a comment string to a net subcommand\&. 132 .RE 133 .PP 134 \-n|\-\-myname MYNAME 135 .RS 4 136 Use MYNAME as a requester name for a net subcommand\&. 137 .RE 138 .PP 139 \-c|\-\-container CONTAINER 140 .RS 4 141 Use a specific AD container for net ads operations\&. 142 .RE 143 .PP 144 \-M|\-\-maxusers MAXUSERS 145 .RS 4 146 Fill in the maxusers field in net rpc share operations\&. 147 .RE 148 .PP 149 \-r|\-\-reboot 150 .RS 4 151 Reboot a remote machine after a command has been successfully executed (e\&.g\&. in remote join operations)\&. 152 .RE 153 .PP 154 \-\-force\-full\-repl 155 .RS 4 156 When calling "net rpc vampire keytab" this option enforces a full re\-creation of the generated keytab file\&. 157 .RE 158 .PP 159 \-\-single\-obj\-repl 160 .RS 4 161 When calling "net rpc vampire keytab" this option allows one to replicate just a single object to the generated keytab file\&. 162 .RE 163 .PP 164 \-\-clean\-old\-entries 165 .RS 4 166 When calling "net rpc vampire keytab" this option allows one to cleanup old entries from the generated keytab file\&. 167 .RE 168 .PP 169 \-\-db 170 .RS 4 171 Define dbfile for "net idmap" commands\&. 172 .RE 173 .PP 174 \-\-lock 175 .RS 4 176 Activates locking of the dbfile for "net idmap check" command\&. 177 .RE 178 .PP 179 \-a|\-\-auto 180 .RS 4 181 Activates noninteractive mode in "net idmap check"\&. 182 .RE 183 .PP 184 \-\-repair 185 .RS 4 186 Activates repair mode in "net idmap check"\&. 187 .RE 188 .PP 189 \-\-acls 190 .RS 4 191 Includes ACLs to be copied in "net rpc share migrate"\&. 192 .RE 193 .PP 194 \-\-attrs 195 .RS 4 196 Includes file attributes to be copied in "net rpc share migrate"\&. 197 .RE 198 .PP 199 \-\-timestamps 200 .RS 4 201 Includes timestamps to be copied in "net rpc share migrate"\&. 202 .RE 203 .PP 204 \-X|\-\-exclude DIRECTORY 205 .RS 4 206 Allows one to exclude directories when copying with "net rpc share migrate"\&. 207 .RE 208 .PP 209 \-\-destination SERVERNAME 210 .RS 4 211 Defines the target servername of migration process (defaults to localhost)\&. 212 .RE 213 .PP 214 \-L|\-\-local 215 .RS 4 216 Sets the type of group mapping to local (used in "net groupmap set")\&. 217 .RE 218 .PP 219 \-D|\-\-domain 220 .RS 4 221 Sets the type of group mapping to domain (used in "net groupmap set")\&. 222 .RE 223 .PP 224 \-N|\-\-ntname NTNAME 225 .RS 4 226 Sets the ntname of a group mapping (used in "net groupmap set")\&. 227 .RE 228 .PP 229 \-R|\-\-rid RID 230 .RS 4 231 Sets the rid of a group mapping (used in "net groupmap set")\&. 232 .RE 233 .PP 234 \-\-reg\-version REG_VERSION 235 .RS 4 236 Assume database version {n|1,2,3} (used in "net registry check")\&. 237 .RE 238 .PP 239 \-o|\-\-output FILENAME 240 .RS 4 241 Output database file (used in "net registry check")\&. 242 .RE 243 .PP 244 \-\-wipe 245 .RS 4 246 Create a new database from scratch (used in "net registry check")\&. 247 .RE 248 .PP 249 \-\-precheck PRECHECK_DB_FILENAME 250 .RS 4 251 Defines filename for database prechecking (used in "net registry import")\&. 252 .RE 253 .PP 254 \-\-no\-dns\-updates 255 .RS 4 256 Do not perform DNS updates as part of "net ads join"\&. 130 257 .RE 131 258 .SH "COMMANDS" … … 142 269 Without any options, the 143 270 NET TIME 144 command displays the time on the remote server\&. 271 command displays the time on the remote server\&. The remote server must be specified with the \-S option\&. 145 272 .SS "TIME SYSTEM" 146 273 .PP 147 274 Displays the time on the remote server in a format ready for 148 /bin/date\&. 275 /bin/date\&. The remote server must be specified with the \-S option\&. 149 276 .SS "TIME SET" 150 277 .PP 151 278 Tries to set the date and time of the local server to that on the remote server using 152 /bin/date\&. 279 /bin/date\&. The remote server must be specified with the \-S option\&. 153 280 .SS "TIME ZONE" 154 281 .PP 155 Displays the timezone in hours from GMT on the remote computer\&.156 .SS "[RPC|ADS] JOIN [TYPE] [\- U username[%password]] [createupn=UPN] [createcomputer=OU] [options]"282 Displays the timezone in hours from GMT on the remote server\&. The remote server must be specified with the \-S option\&. 283 .SS "[RPC|ADS] JOIN [TYPE] [\-\-no\-dns\-updates] [\-U username[%password]] [createupn=UPN] [createcomputer=OU] [machinepass=PASS] [osName=string osVer=string] [options]" 157 284 .PP 158 285 Join a domain\&. If the account already exists on the server, and [TYPE] is MEMBER, the machine will attempt to join automatically\&. (Assuming that the machine has been created in server manager) Otherwise, a password will be prompted for, and a new account may be created\&. … … 163 290 .PP 164 291 [OU] (ADS only) Precreate the computer account in a specific OU\&. The OU string reads from top to bottom without RDNs, and is delimited by a \*(Aq/\*(Aq\&. Please note that \*(Aq\e\*(Aq is used for escape by both the shell and ldap, so it may need to be doubled or quadrupled to pass through, and it is not used as a delimiter\&. 292 .PP 293 [PASS] (ADS only) Set a specific password on the computer account being created by the join\&. 294 .PP 295 [osName=string osVer=String] (ADS only) Set the operatingSystem and operatingSystemVersion attribute during the join\&. Both parameters must be specified for either to take effect\&. 165 296 .SS "[RPC] OLDJOIN [options]" 166 297 .PP … … 249 380 .PP 250 381 Validate whether the specified user can log in to the remote server\&. If the password is not specified on the commandline, it will be prompted\&. 251 .if n \{\252 .sp253 .\}254 .RS 4255 .it 1 an-trap256 .nr an-no-space-flag 1257 .nr an-break-flag 1258 .br259 .ps +1260 \fBNote\fR261 .ps -1262 .br263 .PP264 Currently NOT implemented\&.265 .sp .5v266 .RE267 382 .SS "RAP GROUPMEMBER" 268 383 .SS "RAP GROUPMEMBER LIST GROUP" … … 280 395 \fIcommand\fR 281 396 on the remote server\&. Only works with OS/2 servers\&. 282 .if n \{\283 .sp284 .\}285 .RS 4286 .it 1 an-trap287 .nr an-no-space-flag 1288 .nr an-break-flag 1289 .br290 .ps +1291 \fBNote\fR292 .ps -1293 .br294 .PP295 Currently NOT implemented\&.296 .sp .5v297 .RE298 397 .SS "RAP SERVICE" 299 398 .SS "RAP SERVICE START NAME [arguments...]" 300 399 .PP 301 400 Start the specified service on the remote server\&. Not implemented yet\&. 302 .if n \{\303 .sp304 .\}305 .RS 4306 .it 1 an-trap307 .nr an-no-space-flag 1308 .nr an-break-flag 1309 .br310 .ps +1311 \fBNote\fR312 .ps -1313 .br314 .PP315 Currently NOT implemented\&.316 .sp .5v317 .RE318 401 .SS "RAP SERVICE STOP" 319 402 .PP 320 403 Stop the specified service on the remote server\&. 321 .if n \{\322 .sp323 .\}324 .RS 4325 .it 1 an-trap326 .nr an-no-space-flag 1327 .nr an-break-flag 1328 .br329 .ps +1330 \fBNote\fR331 .ps -1332 .br333 .PP334 Currently NOT implemented\&.335 .sp .5v336 .RE337 404 .SS "RAP PASSWORD \fIUSER\fR \fIOLDPASS\fR \fINEWPASS\fR" 338 405 .PP … … 508 575 .SS "GROUPMAP MODIFY" 509 576 .PP 510 Update en existing group entry\&. 511 .PP 512 513 .sp 577 Update an existing group entry\&. 578 .PP 514 579 .if n \{\ 515 580 .RS 4 … … 565 630 .PP 566 631 List all interdomain trust relationships\&. 567 .SS "RPC TRUSTDOM LIST"568 .PP569 List all interdomain trust relationships\&.570 632 .SS "RPC TRUST" 571 633 .SS "RPC TRUST CREATE" 572 634 .PP 573 Create a trust trustobject by calling lsaCreateTrustedDomainEx2\&. The can be done on a single server or on two servers at once with the possibility to use a random trust password\&.635 Create a trust object by calling lsaCreateTrustedDomainEx2\&. The can be done on a single server or on two servers at once with the possibility to use a random trust password\&. 574 636 .PP 575 637 \fBOptions:\fR … … 644 706 .SS "RPC TRUST DELETE" 645 707 .PP 646 Delete a trust trustobject by calling lsaDeleteTrustedDomain\&. The can be done on a single server or on two servers at once\&.708 Delete a trust object by calling lsaDeleteTrustedDomain\&. The can be done on a single server or on two servers at once\&. 647 709 .PP 648 710 \fBOptions:\fR … … 735 797 .SS "RPC VAMPIRE" 736 798 .PP 737 Export users, aliases and groups from remote server to local server\&. You need to run this against the PDC, from a Samba machine joined as a BDC\&. 799 Export users, aliases and groups from remote server to local server\&. You need to run this against the PDC, from a Samba machine joined as a BDC\&. This vampire command cannot be used against an Active Directory, only against an NT4 Domain Controller\&. 738 800 .SS "RPC VAMPIRE KEYTAB" 739 801 .PP … … 781 843 .PP 782 844 Print out workgroup name for specified kerberos realm\&. 845 .SS "ADS ENCTYPES" 846 .PP 847 List, modify or delete the value of the "msDS\-SupportedEncryptionTypes" attribute of an account in AD\&. 848 .PP 849 This attribute allows one to control which Kerberos encryption types are used for the generation of initial and service tickets\&. The value consists of an integer bitmask with the following values: 850 .PP 851 0x00000001 DES\-CBC\-CRC 852 .PP 853 0x00000002 DES\-CBC\-MD5 854 .PP 855 0x00000004 RC4\-HMAC 856 .PP 857 0x00000008 AES128\-CTS\-HMAC\-SHA1\-96 858 .PP 859 0x00000010 AES256\-CTS\-HMAC\-SHA1\-96 860 .SS "ADS ENCTYPES LIST \fI<ACCOUNTNAME>\fR" 861 .PP 862 List the value of the "msDS\-SupportedEncryptionTypes" attribute of a given account\&. 863 .PP 864 Example: 865 \fBnet ads enctypes list Computername\fR 866 .SS "ADS ENCTYPES SET \fI<ACCOUNTNAME>\fR \fI[enctypes]\fR" 867 .PP 868 Set the value of the "msDS\-SupportedEncryptionTypes" attribute of the LDAP object of ACCOUNTNAME to a given value\&. If the value is omitted, the value is set to 31 which enables all the currently supported encryption types\&. 869 .PP 870 Example: 871 \fBnet ads enctypes set Computername 24\fR 872 .SS "ADS ENCTYPES DELETE \fI<ACCOUNTNAME>\fR" 873 .PP 874 Deletes the "msDS\-SupportedEncryptionTypes" attribute of the LDAP object of ACCOUNTNAME\&. 875 .PP 876 Example: 877 \fBnet ads enctypes set Computername 24\fR 783 878 .SS "SAM CREATEBUILTINGROUP <NAME>" 784 879 .PP … … 874 969 .PP 875 970 Restore the mappings from the specified file or stdin\&. 876 .SS "IDMAP SE CRET <DOMAIN> <secret>"971 .SS "IDMAP SET SECRET <DOMAIN> <secret>" 877 972 .PP 878 973 Store a secret for the specified domain, used primarily for domains that use idmap_ldap as a backend\&. In this case the secret is used as the password for the user DN used to bind to the ldap server\&. 879 .SS "IDMAP DELETE [\-f] [\-\-db=<DB>] <ID>" 974 .SS "IDMAP SET RANGE <RANGE> <SID> [index] [\-\-db=<DB>]" 975 .PP 976 Store a domain\-range mapping for a given domain (and index) in autorid database\&. 977 .SS "IDMAP SET CONFIG <config> [\-\-db=<DB>]" 978 .PP 979 Update CONFIG entry in autorid database\&. 980 .SS "IDMAP GET RANGE <SID> [index] [\-\-db=<DB>]" 981 .PP 982 Get the range for a given domain and index from autorid database\&. 983 .SS "IDMAP GET RANGES [<SID>] [\-\-db=<DB>]" 984 .PP 985 Get ranges for all domains or for one identified by given SID\&. 986 .SS "IDMAP GET CONFIG [\-\-db=<DB>]" 987 .PP 988 Get CONFIG entry from autorid database\&. 989 .SS "IDMAP DELETE MAPPING [\-f] [\-\-db=<DB>] <ID>" 880 990 .PP 881 991 Delete a mapping sid <\-> gid or sid <\-> uid from the IDMAP database\&. The mapping is given by <ID> which may either be a sid: S\-x\-\&.\&.\&., a gid: "GID number" or a uid: "UID number"\&. Use \-f to delete an invalid partial mapping <ID> \-> xx … … 884 994 \fBsmbcontrol\fR(1) 885 995 manpage for details\&. 996 .SS "IDMAP DELETE RANGE [\-f] [\-\-db=<TDB>] <RANGE>|(<SID> [<INDEX>])" 997 .PP 998 Delete a domain range mapping identified by \*(AqRANGE\*(Aq or "domain SID and INDEX" from autorid database\&. Use \-f to delete invalid mappings\&. 999 .SS "IDMAP DELETE RANGES [\-f] [\-\-db=<TDB>] <SID>" 1000 .PP 1001 Delete all domain range mappings for a domain identified by SID\&. Use \-f to delete invalid mappings\&. 886 1002 .SS "IDMAP CHECK [\-v] [\-r] [\-a] [\-T] [\-f] [\-l] [\-\-db=<DB>]" 887 1003 .PP … … 1001 1117 .PP 1002 1118 net usershare list on its own list out the names of the user defined shares that were created by the current user, or restricts the list to share names that match the given wildcard pattern (\*(Aq*\*(Aq matches one or more characters, \*(Aq?\*(Aq matches only one character)\&. If the \*(Aq\-l\*(Aq or \*(Aq\-\-long\*(Aq option is also given, it includes the names of user defined shares created by other users\&. 1003 .SS " CONF"1004 .PP 1005 Starting with version 3\&.2\&.0, a Samba server can be configured by data stored in registry\&. This configuration data can be edited with the new "net conf" commands\&. 1119 .SS "[RPC] CONF" 1120 .PP 1121 Starting with version 3\&.2\&.0, a Samba server can be configured by data stored in registry\&. This configuration data can be edited with the new "net conf" commands\&. There is also the possibility to configure a remote Samba server by enabling the RPC conf mode and specifying the address of the remote server\&. 1006 1122 .PP 1007 1123 The deployment of this configuration data can be activated in two levels from the … … 1021 1137 The conf commands are: 1022 1138 .RS 4 1023 net conf list \- Dump the complete configuration in smb\&.conf like1139 net [rpc] conf list \- Dump the complete configuration in smb\&.conf like 1024 1140 format\&. 1025 1141 .RE 1026 1142 .RS 4 1027 net conf import \- Import configuration from file in smb\&.conf1143 net [rpc] conf import \- Import configuration from file in smb\&.conf 1028 1144 format\&. 1029 1145 .RE 1030 1146 .RS 4 1031 net conf listshares \- List the registry shares\&.1032 .RE 1033 .RS 4 1034 net conf drop \- Delete the complete configuration from1147 net [rpc] conf listshares \- List the registry shares\&. 1148 .RE 1149 .RS 4 1150 net [rpc] conf drop \- Delete the complete configuration from 1035 1151 registry\&. 1036 1152 .RE 1037 1153 .RS 4 1038 net conf showshare \- Show the definition of a registry share\&.1039 .RE 1040 .RS 4 1041 net conf addshare \- Create a new registry share\&.1042 .RE 1043 .RS 4 1044 net conf delshare \- Delete a registry share\&.1045 .RE 1046 .RS 4 1047 net conf setparm \- Store a parameter\&.1048 .RE 1049 .RS 4 1050 net conf getparm \- Retrieve the value of a parameter\&.1051 .RE 1052 .RS 4 1053 net conf delparm \- Delete a parameter\&.1054 .RE 1055 .RS 4 1056 net conf getincludes \- Show the includes of a share definition\&.1057 .RE 1058 .RS 4 1059 net conf setincludes \- Set includes for a share\&.1060 .RE 1061 .RS 4 1062 net conf delincludes \- Delete includes from a share definition\&.1063 .RE 1064 .SS " CONF LIST"1154 net [rpc] conf showshare \- Show the definition of a registry share\&. 1155 .RE 1156 .RS 4 1157 net [rpc] conf addshare \- Create a new registry share\&. 1158 .RE 1159 .RS 4 1160 net [rpc] conf delshare \- Delete a registry share\&. 1161 .RE 1162 .RS 4 1163 net [rpc] conf setparm \- Store a parameter\&. 1164 .RE 1165 .RS 4 1166 net [rpc] conf getparm \- Retrieve the value of a parameter\&. 1167 .RE 1168 .RS 4 1169 net [rpc] conf delparm \- Delete a parameter\&. 1170 .RE 1171 .RS 4 1172 net [rpc] conf getincludes \- Show the includes of a share definition\&. 1173 .RE 1174 .RS 4 1175 net [rpc] conf setincludes \- Set includes for a share\&. 1176 .RE 1177 .RS 4 1178 net [rpc] conf delincludes \- Delete includes from a share definition\&. 1179 .RE 1180 .SS "[RPC] CONF LIST" 1065 1181 .PP 1066 1182 Print the configuration data stored in the registry in a smb\&.conf\-like format to standard output\&. 1067 .SS " CONF IMPORT [--test|-T] filename [section]"1183 .SS "[RPC] CONF IMPORT [--test|-T] filename [section]" 1068 1184 .PP 1069 1185 This command imports configuration from a file in smb\&.conf format\&. If a section encountered in the input file is present in registry, its contents is replaced\&. Sections of registry configuration that have no counterpart in the input file are not affected\&. If you want to delete these, you will have to use the "net conf drop" or "net conf delshare" commands\&. Optionally, a section may be specified to restrict the effect of the import command to that specific section\&. A test mode is enabled by specifying the parameter "\-T" on the commandline\&. In test mode, no changes are made to the registry, and the resulting configuration is printed to standard output instead\&. 1070 .SS " CONF LISTSHARES"1186 .SS "[RPC] CONF LISTSHARES" 1071 1187 .PP 1072 1188 List the names of the shares defined in registry\&. 1073 .SS " CONF DROP"1189 .SS "[RPC] CONF DROP" 1074 1190 .PP 1075 1191 Delete the complete configuration data from registry\&. 1076 .SS " CONF SHOWSHARE sharename"1192 .SS "[RPC] CONF SHOWSHARE sharename" 1077 1193 .PP 1078 1194 Show the definition of the share or section specified\&. It is valid to specify "global" as sharename to retrieve the global configuration options from registry\&. 1079 .SS " CONF ADDSHARE sharename path [writeable={y|N} [guest_ok={y|N} [comment]]] "1195 .SS "[RPC] CONF ADDSHARE sharename path [writeable={y|N} [guest_ok={y|N} [comment]]] " 1080 1196 .PP 1081 1197 Create a new share definition in registry\&. The sharename and path have to be given\&. The share name may 1082 1198 \fInot\fR 1083 1199 be "global"\&. Optionally, values for the very common options "writeable", "guest ok" and a "comment" may be specified\&. The same result may be obtained by a sequence of "net conf setparm" commands\&. 1084 .SS " CONF DELSHARE sharename"1200 .SS "[RPC] CONF DELSHARE sharename" 1085 1201 .PP 1086 1202 Delete a share definition from registry\&. 1087 .SS " CONF SETPARM section parameter value"1203 .SS "[RPC] CONF SETPARM section parameter value" 1088 1204 .PP 1089 1205 Store a parameter in registry\&. The section may be global or a sharename\&. The section is created if it does not exist yet\&. 1090 .SS " CONF GETPARM section parameter"1206 .SS "[RPC] CONF GETPARM section parameter" 1091 1207 .PP 1092 1208 Show a parameter stored in registry\&. 1093 .SS " CONF DELPARM section parameter"1209 .SS "[RPC] CONF DELPARM section parameter" 1094 1210 .PP 1095 1211 Delete a parameter stored in registry\&. 1096 .SS " CONF GETINCLUDES section"1212 .SS "[RPC] CONF GETINCLUDES section" 1097 1213 .PP 1098 1214 Get the list of includes for the provided section (global or share)\&. … … 1101 1217 .PP 1102 1218 Further note that currently, only files can be included from registry configuration\&. In the future, there will be the ability to include configuration data from other registry keys\&. 1103 .SS " CONF SETINCLUDES section [filename]+"1219 .SS "[RPC] CONF SETINCLUDES section [filename]+" 1104 1220 .PP 1105 1221 Set the list of includes for the provided section (global or share) to the given list of one or more filenames\&. The filenames may contain the usual smb\&.conf macros like %I\&. 1106 .SS " CONF DELINCLUDES section"1222 .SS "[RPC] CONF DELINCLUDES section" 1107 1223 .PP 1108 1224 Delete the list of includes from the provided section (global or share)\&. … … 1160 1276 .RS 4 1161 1277 net registry convert \- Convert a registration entries (\&.reg) file\&. 1278 .RE 1279 .RS 4 1280 net registry check \- Check and repair a registry database\&. 1162 1281 .RE 1163 1282 .SS "REGISTRY ENUMERATE key " … … 1209 1328 or 1210 1329 \fIdword\fR\&. In case of 1211 \fImulti_sz\fR 1212 \fIvalue\fR 1330 \fImulti_sz\fR\fIvalue\fR 1213 1331 may be given multiple times\&. 1214 1332 .SS "REGISTRY INCREMENT key name [inc]" … … 1244 1362 from a Security Descriptor Definition Language (SDDL) string 1245 1363 \fIsd\fR\&. 1246 .SS "REGISTRY IMPORT file [opt]"1364 .SS "REGISTRY IMPORT file [--precheck <check-file>] [opt]" 1247 1365 .PP 1248 1366 Import a registration entries (\&.reg) 1249 1367 \fIfile\fR\&. 1368 .PP 1369 The following options are available: 1370 .PP 1371 \-\-precheck \fIcheck\-file\fR 1372 .RS 4 1373 This is a mechanism to check the existence or non\-existence of certain keys or values specified in a precheck file before applying the import file\&. The import file will only be applied if the precheck succeeds\&. 1374 .sp 1375 The check\-file follows the normal registry file syntax with the following semantics: 1376 .sp 1377 .RS 4 1378 .ie n \{\ 1379 \h'-04'\(bu\h'+03'\c 1380 .\} 1381 .el \{\ 1382 .sp -1 1383 .IP \(bu 2.3 1384 .\} 1385 <value name>=<value> checks whether the value exists and has the given value\&. 1386 .RE 1387 .sp 1388 .RS 4 1389 .ie n \{\ 1390 \h'-04'\(bu\h'+03'\c 1391 .\} 1392 .el \{\ 1393 .sp -1 1394 .IP \(bu 2.3 1395 .\} 1396 <value name>=\- checks whether the value does not exist\&. 1397 .RE 1398 .sp 1399 .RS 4 1400 .ie n \{\ 1401 \h'-04'\(bu\h'+03'\c 1402 .\} 1403 .el \{\ 1404 .sp -1 1405 .IP \(bu 2.3 1406 .\} 1407 [key] checks whether the key exists\&. 1408 .RE 1409 .sp 1410 .RS 4 1411 .ie n \{\ 1412 \h'-04'\(bu\h'+03'\c 1413 .\} 1414 .el \{\ 1415 .sp -1 1416 .IP \(bu 2.3 1417 .\} 1418 [\-key] checks whether the key does not exist\&. 1419 .RE 1420 .sp 1421 .RE 1422 .RE 1250 1423 .SS "REGISTRY EXPORT keyfile[opt]" 1251 1424 .PP … … 1258 1431 Convert a registration entries (\&.reg) file 1259 1432 \fIin\fR\&. 1433 .SS "REGISTRY CHECK [-ravTl] [-o <ODB>] [--wipe] [<DB>]" 1434 .PP 1435 Check and repair the registry database\&. If no option is given a read only check of the database is done\&. Among others an interactive or automatic repair mode may be chosen with one of the following options 1436 .PP 1437 \-r|\-\-repair 1438 .RS 4 1439 Interactive repair mode, ask a lot of questions\&. 1440 .RE 1441 .PP 1442 \-a|\-\-auto 1443 .RS 4 1444 Noninteractive repair mode, use default answers\&. 1445 .RE 1446 .PP 1447 \-v|\-\-verbose 1448 .RS 4 1449 Produce more output\&. 1450 .RE 1451 .PP 1452 \-T|\-\-test 1453 .RS 4 1454 Dry run, show what changes would be made but don\*(Aqt touch anything\&. 1455 .RE 1456 .PP 1457 \-l|\-\-lock 1458 .RS 4 1459 Lock the database while doing the check\&. 1460 .RE 1461 .PP 1462 \-\-reg\-version={1,2,3} 1463 .RS 4 1464 Specify the format of the registry database\&. If not given it defaults to the value of the binary or, if an registry\&.tdb is explizitly stated at the commandline, to the value found in the INFO/version record\&. 1465 .RE 1466 .PP 1467 [\-\-db] <DB> 1468 .RS 4 1469 Check the specified database\&. 1470 .RE 1471 .PP 1472 \-o|\-\-output <ODB> 1473 .RS 4 1474 Create a new registry database <ODB> instead of modifying the input\&. If <ODB> is already existing \-\-wipe may be used to overwrite it\&. 1475 .RE 1476 .PP 1477 \-\-wipe 1478 .RS 4 1479 Replace the registry database instead of modifying the input or overwrite an existing output database\&. 1480 .RE 1481 .PP 1482 .RS 4 1483 .RE 1260 1484 .SS "EVENTLOG" 1261 1485 .PP -
vendor/current/docs/manpages/nmbd.8
r860 r988 2 2 .\" Title: nmbd 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "NMBD" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "NMBD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 nmbd [\-D ] [\-F] [\-S] [\-a] [\-i] [\-o] [\-h] [\-V] [\-d\ <debug\ level>] [\-H\ <lmhosts\ file>] [\-l\ <log\ directory>] [\-p\ <port\ number>] [\-s\ <configuration\ file>]34 nmbd [\-D|\-\-daemon] [\-F|\-\-foreground] [\-S|\-\-log\-stdout] [\-i|\-\-interactive] [\-V] [\-d\ <debug\ level>] [\-H|\-\-hosts\ <lmhosts\ file>] [\-l\ <log\ directory>] [\-p|\-\-port\ <port\ number>] [\-s\ <configuration\ file>] [\-\-no\-process\-group] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 48 48 will listen for such requests, and if its own NetBIOS name is specified it will respond with the IP number of the host it is running on\&. Its "own NetBIOS name" is by default the primary DNS name of the host it is running on, but this can be overridden by the 49 49 \m[blue]\fBnetbios name\fR\m[] 50 in 51 smb\&.conf\&. Thus 50 in \&. Thus 52 51 nmbd 53 52 will reply to broadcast queries for its own name(s)\&. Additional names for … … 65 64 .SH "OPTIONS" 66 65 .PP 67 \-D 66 \-D|\-\-daemon 68 67 .RS 4 69 68 If specified, this parameter causes … … 76 75 .RE 77 76 .PP 78 \-F 77 \-F|\-\-foreground 79 78 .RS 4 80 79 If specified, this parameter causes the main … … 91 90 .RE 92 91 .PP 93 \-S 92 \-S|\-\-log\-stdout 94 93 .RS 4 95 94 If specified, this parameter causes … … 98 97 .RE 99 98 .PP 100 \-i 99 \-i|\-\-interactive 101 100 .RS 4 102 101 If this parameter is specified it causes the server to run "interactively", not as a daemon, even if the server is executed on the command line of a shell\&. Setting this parameter negates the implicit daemon mode when run from the command line\&. … … 107 106 .RE 108 107 .PP 109 \-h|\-\-help 110 .RS 4 111 Print a summary of command line options\&. 112 .RE 113 .PP 114 \-H <filename> 108 \-H|\-\-hosts <filename> 115 109 .RS 4 116 110 NetBIOS lmhosts file\&. The lmhosts file is a list of NetBIOS names to IP addresses that is loaded by the nmbd server and used via the name resolution mechanism … … 134 128 .RE 135 129 .PP 136 \-d|\-\-debuglevel=level 137 .RS 4 138 \fIlevel\fR 139 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&. 140 .sp 141 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&. 142 .sp 143 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&. 144 .sp 145 Note that specifying this parameter here will override the 146 \m[blue]\fBlog level\fR\m[] 147 parameter in the 148 smb\&.conf 149 file\&. 150 .RE 151 .PP 152 \-V|\-\-version 153 .RS 4 154 Prints the program version number\&. 155 .RE 156 .PP 157 \-s|\-\-configfile <configuration file> 158 .RS 4 159 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 160 smb\&.conf 161 for more information\&. The default configuration file name is determined at compile time\&. 162 .RE 163 .PP 164 \-l|\-\-log\-basename=logdirectory 165 .RS 4 166 Base directory name for log/debug files\&. The extension 167 \fB"\&.progname"\fR 168 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&. 169 .RE 170 .PP 171 \-p <UDP port number> 130 \-p|\-\-port <UDP port number> 172 131 .RS 4 173 132 UDP port number is a positive integer value\&. This option changes the default UDP port number (normally 137) that 174 133 nmbd 175 134 responds to name queries on\&. Don\*(Aqt use this option unless you are an expert, in which case you won\*(Aqt need help! 135 .RE 136 .PP 137 \-\-no\-process\-group 138 .RS 4 139 Do not create a new process group for nmbd\&. 176 140 .RE 177 141 .SH "FILES" … … 265 229 .SH "SEE ALSO" 266 230 .PP 267 268 231 \fBinetd\fR(8), 269 232 \fBsmbd\fR(8), 270 233 \fBsmb.conf\fR(5), 271 234 \fBsmbclient\fR(1), 272 \fBtestparm\fR(1), 273 \fBtestprns\fR(1), and the Internet RFC\*(Aqs 235 \fBtestparm\fR(1), and the Internet RFC\*(Aqs 274 236 rfc1001\&.txt, 275 237 rfc1002\&.txt\&. In addition the CIFS (formerly SMB) specification is available as a link from the Web page -
vendor/current/docs/manpages/nmblookup.1
r860 r988 2 2 .\" Title: nmblookup 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "NMBLOOKUP" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "NMBLOOKUP" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 nmblookup [\-M ] [\-R] [\-S] [\-r] [\-A] [\-h] [\-B\ <broadcast\ address>] [\-U\ <unicast\ address>] [\-d\ <debug\ level>] [\-s\ <smb\ config\ file>] [\-i\ <NetBIOS\ scope>] [\-T] [\-f] {name}34 nmblookup [\-M|\-\-master\-browser] [\-R|\-\-recursion] [\-S|\-\-status] [\-r|\-\-root\-port] [\-A|\-\-lookup\-by\-ip] [\-B|\-\-broadcast\ <broadcast\ address>] [\-U|\-\-unicast\ <unicast\ address>] [\-d\ <debug\ level>] [\-s\ <smb\ config\ file>] [\-i\ <NetBIOS\ scope>] [\-T|\-\-translate] [\-f|\-\-flags] {name} 35 35 .SH "DESCRIPTION" 36 36 .PP … … 43 43 .SH "OPTIONS" 44 44 .PP 45 \-M 45 \-M|\-\-master\-browser 46 46 .RS 4 47 Searches for a master browser by looking up the NetBIOS name47 Searches for a master browser by looking up the NetBIOS 48 48 \fIname\fR 49 49 with a type of … … 55 55 .RE 56 56 .PP 57 \-R 57 \-R|\-\-recursion 58 58 .RS 4 59 59 Set the recursion desired bit in the packet to do a recursive lookup\&. This is used when sending a name query to a machine running a WINS server and the user wishes to query the names in the WINS server\&. If this bit is unset the normal (broadcast responding) NetBIOS processing code on a machine is used instead\&. See RFC1001, RFC1002 for details\&. 60 60 .RE 61 61 .PP 62 \-S 62 \-S|\-\-status 63 63 .RS 4 64 64 Once the name query has returned an IP address then do a node status query as well\&. A node status query returns the NetBIOS names registered by a host\&. 65 65 .RE 66 66 .PP 67 \-r 67 \-r|\-\-root\-port 68 68 .RS 4 69 69 Try and bind to UDP port 137 to send and receive UDP datagrams\&. The reason for this option is a bug in Windows 95 where it ignores the source port of the requesting packet and only replies to UDP port 137\&. Unfortunately, on most UNIX systems root privilege is needed to bind to this port, and in addition, if the … … 72 72 .RE 73 73 .PP 74 \-A 74 \-A|\-\-lookup\-by\-ip 75 75 .RS 4 76 76 Interpret … … 79 79 .RE 80 80 .PP 81 \-n|\-\-netbiosname <primary NetBIOS name> 82 .RS 4 83 This option allows you to override the NetBIOS name that Samba uses for itself\&. This is identical to setting the 84 \m[blue]\fBnetbios name\fR\m[] 85 parameter in the 86 smb\&.conf 87 file\&. However, a command line setting will take precedence over settings in 88 smb\&.conf\&. 89 .RE 90 .PP 91 \-i|\-\-scope <scope> 92 .RS 4 93 This specifies a NetBIOS scope that 94 nmblookup 95 will use to communicate with when generating NetBIOS names\&. For details on the use of NetBIOS scopes, see rfc1001\&.txt and rfc1002\&.txt\&. NetBIOS scopes are 96 \fIvery\fR 97 rarely used, only set this parameter if you are the system administrator in charge of all the NetBIOS systems you communicate with\&. 98 .RE 99 .PP 100 \-W|\-\-workgroup=domain 101 .RS 4 102 Set the SMB domain of the username\&. This overrides the default domain which is the domain defined in smb\&.conf\&. If the domain specified is the same as the servers NetBIOS name, it causes the client to log on using the servers local SAM (as opposed to the Domain SAM)\&. 103 .RE 104 .PP 105 \-O|\-\-socket\-options socket options 106 .RS 4 107 TCP socket options to set on the client socket\&. See the socket options parameter in the 108 smb\&.conf 109 manual page for the list of valid options\&. 110 .RE 111 .PP 112 \-h|\-\-help 113 .RS 4 114 Print a summary of command line options\&. 115 .RE 116 .PP 117 \-B <broadcast address> 81 \-B|\-\-broadcast <broadcast address> 118 82 .RS 4 119 83 Send the query to the given broadcast address\&. Without this option the default behavior of nmblookup is to send the query to the broadcast address of the network interfaces as either auto\-detected or defined in the … … 124 88 .RE 125 89 .PP 126 \-U <unicast address>90 \-U|\-\-unicast <unicast address> 127 91 .RS 4 128 92 Do a unicast query to the specified address or host … … 132 96 .RE 133 97 .PP 134 \-d|\-\-debuglevel=level 135 .RS 4 136 \fIlevel\fR 137 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&. 138 .sp 139 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&. 140 .sp 141 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&. 142 .sp 143 Note that specifying this parameter here will override the 144 \m[blue]\fBlog level\fR\m[] 145 parameter in the 146 smb\&.conf 147 file\&. 148 .RE 149 .PP 150 \-V|\-\-version 151 .RS 4 152 Prints the program version number\&. 153 .RE 154 .PP 155 \-s|\-\-configfile <configuration file> 156 .RS 4 157 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 158 smb\&.conf 159 for more information\&. The default configuration file name is determined at compile time\&. 160 .RE 161 .PP 162 \-l|\-\-log\-basename=logdirectory 163 .RS 4 164 Base directory name for log/debug files\&. The extension 165 \fB"\&.progname"\fR 166 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&. 167 .RE 168 .PP 169 \-T 98 \-T|\-\-translate 170 99 .RS 4 171 100 This causes any IP addresses found in the lookup to be looked up via a reverse DNS lookup into a DNS name, and printed out before each … … 176 105 .RE 177 106 .PP 178 \-f 107 \-f|\-\-flags 179 108 .RS 4 180 109 Show which flags apply to the name that has been looked up\&. Possible answers are zero or more of: Response, Authoritative, Truncated, Recursion_Desired, Recursion_Available, Broadcast\&. -
vendor/current/docs/manpages/ntlm_auth.1
r860 r988 2 2 .\" Title: ntlm_auth 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "NTLM_AUTH" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "NTLM_AUTH" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 ntlm_auth [\-d\ debuglevel] [\-l\ logdir] [\-s\ <smb\ config\ file>]34 ntlm_auth 35 35 .SH "DESCRIPTION" 36 36 .PP … … 313 313 .RE 314 314 .PP 315 \-d|\-\-debuglevel=level 316 .RS 4 317 \fIlevel\fR 318 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&. 319 .sp 320 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&. 321 .sp 322 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&. 323 .sp 324 Note that specifying this parameter here will override the 325 \m[blue]\fBlog level\fR\m[] 326 parameter in the 327 smb\&.conf 328 file\&. 329 .RE 330 .PP 331 \-V|\-\-version 332 .RS 4 333 Prints the program version number\&. 334 .RE 335 .PP 336 \-s|\-\-configfile <configuration file> 337 .RS 4 338 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 339 smb\&.conf 340 for more information\&. The default configuration file name is determined at compile time\&. 341 .RE 342 .PP 343 \-l|\-\-log\-basename=logdirectory 344 .RS 4 345 Base directory name for log/debug files\&. The extension 346 \fB"\&.progname"\fR 347 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&. 348 .RE 349 .PP 350 \-h|\-\-help 351 .RS 4 352 Print a summary of command line options\&. 315 \-\-pam\-winbind\-conf=FILENAME 316 .RS 4 317 Define the path to the pam_winbind\&.conf file\&. 318 .RE 319 .PP 320 \-\-target\-hostname=HOSTNAME 321 .RS 4 322 Define the target hostname\&. 323 .RE 324 .PP 325 \-\-target\-service=SERVICE 326 .RS 4 327 Define the target service\&. 328 .RE 329 .PP 330 \-\-use\-cached\-creds 331 .RS 4 332 Whether to use credentials cached by winbindd\&. 333 .RE 334 .PP 335 \-\-offline\-logon 336 .RS 4 337 Allow offline logons for plain text auth\&. 338 .RE 339 .PP 340 \-\-configfile=<configuration file> 341 .RS 4 342 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See for more information\&. The default configuration file name is determined at compile time\&. 353 343 .RE 354 344 .SH "EXAMPLE SETUP" -
vendor/current/docs/manpages/pam_winbind.8
r860 r988 2 2 .\" Title: pam_winbind 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: 8 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "PAM_WINBIND" "8" "0 9/18/2013" "Samba 3\&.6" "8"10 .TH "PAM_WINBIND" "8" "05/02/2016" "Samba 4\&.4" "8" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 88 88 \fIMYDOMAIN\e\emyuser\fR\&. pam_winbind will, in that case, lookup the SID internally\&. Note that NAME may not contain any spaces\&. It is thus recommended to only use SIDs\&. You can verify the list of SIDs a user is a member of with 89 89 wbinfo \-\-user\-sids=SID\&. 90 .sp 91 This option must only be specified on a auth module declaration, as it only operates in conjunction with password authentication\&. 90 92 .RE 91 93 .PP … … 121 123 cached_login 122 124 .RS 4 123 Winbind allows to logon using cached credentials when125 Winbind allows one to logon using cached credentials when 124 126 \fIwinbind offline logon\fR 125 127 is enabled\&. To use this feature from the PAM module this option must be set\&. -
vendor/current/docs/manpages/pam_winbind.conf.5
r860 r988 2 2 .\" Title: pam_winbind.conf 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: 5 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "PAM_WINBIND\&.CONF" "5" "0 9/18/2013" "Samba 3\&.6" "5"10 .TH "PAM_WINBIND\&.CONF" "5" "05/02/2016" "Samba 4\&.4" "5" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 64 64 \fIMYDOMAIN\e\emyuser\fR\&. pam_winbind will, in that case, lookup the SID internally\&. Note that NAME may not contain any spaces\&. It is thus recommended to only use SIDs\&. You can verify the list of SIDs a user is a member of with 65 65 wbinfo \-\-user\-sids=SID\&. This setting is empty by default\&. 66 .sp 67 This option only operates during password authentication, and will not restrict access if a password is not required for any reason (such as SSH key\-based login)\&. 66 68 .RE 67 69 .PP … … 81 83 When pam_winbind is configured to try kerberos authentication by enabling the 82 84 \fIkrb5_auth\fR 83 option, it can store the retrieved Ticket Granting Ticket (TGT) in a credential cache\&. The type of credential cache can be set with this option\&. Currently the only supported value is: 84 \fIFILE\fR\&. In that case a credential cache in the form of /tmp/krb5cc_UID will be created, where UID is replaced with the numeric user id\&. Leave empty to just do kerberos authentication without having a ticket cache after the logon has succeeded\&. This setting is empty by default\&. 85 option, it can store the retrieved Ticket Granting Ticket (TGT) in a credential cache\&. The type of credential cache can be controlled with this option\&. The supported values are: 86 \fIKEYRING\fR 87 (when supported by the system\*(Aqs Kerberos library and Kernel), 88 \fIFILE\fR 89 and 90 \fIDIR\fR 91 (when the DIR type is supported by the system\*(Aqs Kerberos library)\&. In case of FILE a credential cache in the form of /tmp/krb5cc_UID will be created \- in case of DIR you NEED to specify a directory\&. UID is replaced with the numeric user id\&. 92 .sp 93 When using the KEYRING type, the supported mechanism is 94 \(lqKEYRING:persistent:UID\(rq, which uses the Linux kernel keyring to store credentials on a per\-UID basis\&. This is the recommended choice on latest Linux distributions, as it is the most secure and predictable method\&. 95 .sp 96 It is also possible to define custom filepaths and use the "%u" pattern in order to substitue the numeric user id\&. Examples: 97 .PP 98 krb5_ccache_type = DIR:/run/user/%u/krb5cc 99 .RS 4 100 This will create a credential cache file in the specified directory\&. 101 .RE 102 .PP 103 krb5_ccache_type = FILE:/tmp/krb5cc_%u 104 .RS 4 105 This will create a credential cache file\&. 106 .RE 107 .sp 108 Leave empty to just do kerberos authentication without having a ticket cache after the logon has succeeded\&. This setting is empty by default\&. 85 109 .RE 86 110 .PP 87 111 cached_login = yes|no 88 112 .RS 4 89 Winbind allows to logon using cached credentials when113 Winbind allows one to logon using cached credentials when 90 114 \fIwinbind offline logon\fR 91 115 is enabled\&. To use this feature from the PAM module this option must be set\&. Defaults to "no"\&. -
vendor/current/docs/manpages/pdbedit.8
r860 r988 2 2 .\" Title: pdbedit 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "PDBEDIT" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "PDBEDIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 pdbedit [\-a] [\-b\ passdb\-backend] [\-c\ account\-control] [\-C\ value] [\-d\ debuglevel] [\-D\ drive] [\-e\ passdb\-backend] [\-f\ fullname] [\-\-force\-initialized\-passwords] [\-g] [\-h\ homedir] [\-i\ passdb\-backend] [\-I\ domain] [\-K] [\-L] [\-m] [\-M\ SID|RID] [\-N\ description] [\-P\ account\-policy] [\-p\ profile] [\-\-policies\-reset] [\-r] [\-s\ configfile] [\-S\ script] [\- t] [\-\-time\-format] [\-u\ username] [\-U\ SID|RID] [\-v] [\-V] [\-w] [\-x] [\-y] [\-z] [\-Z]34 pdbedit [\-a] [\-b\ passdb\-backend] [\-c\ account\-control] [\-C\ value] [\-d\ debuglevel] [\-D\ drive] [\-e\ passdb\-backend] [\-f\ fullname] [\-\-force\-initialized\-passwords] [\-g] [\-h\ homedir] [\-i\ passdb\-backend] [\-I\ domain] [\-K] [\-L] [\-m] [\-M\ SID|RID] [\-N\ description] [\-P\ account\-policy] [\-p\ profile] [\-\-policies\-reset] [\-r] [\-s\ configfile] [\-S\ script] [\-\-set\-nt\-hash] [\-t] [\-\-time\-format] [\-u\ username] [\-U\ SID|RID] [\-v] [\-V] [\-w] [\-x] [\-y] [\-z] [\-Z] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 67 67 \-v|\-\-verbose 68 68 .RS 4 69 This option enables the verbose listing format\&. It causes pdbedit to list the users in the database, printing out the account fields in a descriptive format\&. 69 This option enables the verbose listing format\&. It causes pdbedit to list the users in the database, printing out the account fields in a descriptive format\&. Used together with \-w also shows passwords hashes\&. 70 70 .sp 71 71 Example: … … 106 106 file format\&. (see the 107 107 \fBsmbpasswd\fR(5) 108 for details) 108 for details)\&. Instead used together with (\-v) displays the passwords hashes in verbose output\&. 109 109 .sp 110 110 Example: … … 168 168 .RE 169 169 .PP 170 \-\-set\-nt\-hash 171 .RS 4 172 This option can be used while modifying a user account\&. It will set the user\*(Aqs password using the nt\-hash value given as hexadecimal string\&. Useful to synchronize passwords\&. 173 .sp 174 Example: 175 \-\-set\-nt\-hash 8846F7EAEE8FB117AD06BDD830B7586C 176 .RE 177 .PP 170 178 \-p|\-\-profile profile 171 179 .RS 4 … … 204 212 .RS 4 205 213 This option can be used while adding or modifying a user account\&. It will specify the users\*(Aq account control property\&. Possible flags are listed below\&. 206 .sp207 208 214 .sp 209 215 .RS 4 … … 372 378 .ps -1 373 379 .br 374 pdbedit does not call the unix password sync ronisation script if380 pdbedit does not call the unix password synchronization script if 375 381 \m[blue]\fBunix password sync\fR\m[] 376 382 has been set\&. It only updates the data in the Samba user database\&. … … 500 506 applies to the account policies instead of the user database\&. 501 507 .sp 502 This option will allow to migrate account policies from their default tdb\-store into a passdb backend, e\&.g\&. an LDAP directory server\&.508 This option will allow one to migrate account policies from their default tdb\-store into a passdb backend, e\&.g\&. an LDAP directory server\&. 503 509 .sp 504 510 Example: … … 554 560 .RS 4 555 561 This option is currently not being used\&. 556 .RE557 .PP558 \-h|\-\-help559 .RS 4560 Print a summary of command line options\&.561 .RE562 .PP563 \-d|\-\-debuglevel=level564 .RS 4565 \fIlevel\fR566 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.567 .sp568 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.569 .sp570 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.571 .sp572 Note that specifying this parameter here will override the573 \m[blue]\fBlog level\fR\m[]574 parameter in the575 smb\&.conf576 file\&.577 .RE578 .PP579 \-V|\-\-version580 .RS 4581 Prints the program version number\&.582 .RE583 .PP584 \-s|\-\-configfile <configuration file>585 .RS 4586 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See587 smb\&.conf588 for more information\&. The default configuration file name is determined at compile time\&.589 .RE590 .PP591 \-l|\-\-log\-basename=logdirectory592 .RS 4593 Base directory name for log/debug files\&. The extension594 \fB"\&.progname"\fR595 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.596 562 .RE 597 563 .SH "NOTES" -
vendor/current/docs/manpages/profiles.1
r860 r988 2 2 .\" Title: profiles 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "PROFILES" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "PROFILES" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 profiles [\-v] [\-c \ SID] [\-n\ SID] {file}34 profiles [\-v] [\-c|\-\-change\-sid\ SID] [\-n|\-\-new\-sid\ SID] {file} 35 35 .SH "DESCRIPTION" 36 36 .PP … … 53 53 .RE 54 54 .PP 55 \-c SID1 \-n SID2 55 \-c SID1 \-n SID2, \-\-change\-sid SID1 \-\-new\-sid SID2 56 56 .RS 4 57 57 Change all occurrences of SID1 in 58 58 file 59 59 by SID2\&. 60 .RE61 .PP62 \-h|\-\-help63 .RS 464 Print a summary of command line options\&.65 60 .RE 66 61 .SH "VERSION" -
vendor/current/docs/manpages/rpcclient.1
r860 r988 2 2 .\" Title: rpcclient 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "RPCCLIENT" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "RPCCLIENT" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 rpcclient [\-A\ authfile] [\-c\ <command\ string>] [\-d\ debuglevel] [\- h] [\-l\ logdir] [\-N] [\-s\ <smb\ config\ file>] [\-U\ username[%password]] [\-W\ workgroup] [\-I\ destinationIP] {server}34 rpcclient [\-A\ authfile] [\-c\ <command\ string>] [\-d\ debuglevel] [\-l\ logdir] [\-N] [\-s\ <smb\ config\ file>] [\-U\ username[%password]] [\-W\ workgroup] [\-I\ destinationIP] {server} 35 35 .SH "DESCRIPTION" 36 36 .PP … … 72 72 This number is the TCP port number that will be used when making connections to the server\&. The standard (well\-known) TCP port number for an SMB/CIFS server is 139, which is the default\&. 73 73 .RE 74 .PP75 \-d|\-\-debuglevel=level76 .RS 477 \fIlevel\fR78 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.79 .sp80 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.81 .sp82 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.83 .sp84 Note that specifying this parameter here will override the85 \m[blue]\fBlog level\fR\m[]86 parameter in the87 smb\&.conf88 file\&.89 .RE90 .PP91 \-V|\-\-version92 .RS 493 Prints the program version number\&.94 .RE95 .PP96 \-s|\-\-configfile <configuration file>97 .RS 498 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See99 smb\&.conf100 for more information\&. The default configuration file name is determined at compile time\&.101 .RE102 .PP103 \-l|\-\-log\-basename=logdirectory104 .RS 4105 Base directory name for log/debug files\&. The extension106 \fB"\&.progname"\fR107 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.108 .RE109 .PP110 \-N|\-\-no\-pass111 .RS 4112 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.113 .sp114 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.115 .sp116 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.117 .RE118 .PP119 \-k|\-\-kerberos120 .RS 4121 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.122 .RE123 .PP124 \-C|\-\-use\-ccache125 .RS 4126 Try to use the credentials cached by winbind\&.127 .RE128 .PP129 \-A|\-\-authentication\-file=filename130 .RS 4131 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is132 .sp133 .if n \{\134 .RS 4135 .\}136 .nf137 username = <value>138 password = <value>139 domain = <value>140 .fi141 .if n \{\142 .RE143 .\}144 .sp145 Make certain that the permissions on the file restrict access from unwanted users\&.146 .RE147 .PP148 \-U|\-\-user=username[%password]149 .RS 4150 Sets the SMB username or username and password\&.151 .sp152 If %password is not specified, the user will be prompted\&. The client will first check the153 \fBUSER\fR154 environment variable, then the155 \fBLOGNAME\fR156 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username157 \fBGUEST\fR158 is used\&.159 .sp160 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the161 \fI\-A\fR162 for more details\&.163 .sp164 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the165 ps166 command\&. To be safe always allow167 rpcclient168 to prompt for a password and type it in directly\&.169 .RE170 .PP171 \-n|\-\-netbiosname <primary NetBIOS name>172 .RS 4173 This option allows you to override the NetBIOS name that Samba uses for itself\&. This is identical to setting the174 \m[blue]\fBnetbios name\fR\m[]175 parameter in the176 smb\&.conf177 file\&. However, a command line setting will take precedence over settings in178 smb\&.conf\&.179 .RE180 .PP181 \-i|\-\-scope <scope>182 .RS 4183 This specifies a NetBIOS scope that184 nmblookup185 will use to communicate with when generating NetBIOS names\&. For details on the use of NetBIOS scopes, see rfc1001\&.txt and rfc1002\&.txt\&. NetBIOS scopes are186 \fIvery\fR187 rarely used, only set this parameter if you are the system administrator in charge of all the NetBIOS systems you communicate with\&.188 .RE189 .PP190 \-W|\-\-workgroup=domain191 .RS 4192 Set the SMB domain of the username\&. This overrides the default domain which is the domain defined in smb\&.conf\&. If the domain specified is the same as the servers NetBIOS name, it causes the client to log on using the servers local SAM (as opposed to the Domain SAM)\&.193 .RE194 .PP195 \-O|\-\-socket\-options socket options196 .RS 4197 TCP socket options to set on the client socket\&. See the socket options parameter in the198 smb\&.conf199 manual page for the list of valid options\&.200 .RE201 .PP202 \-h|\-\-help203 .RS 4204 Print a summary of command line options\&.205 .RE206 74 .SH "COMMANDS" 207 75 .SS "LSARPC" … … 222 90 .RE 223 91 .PP 224 enumtrust s92 enumtrust 225 93 .RS 4 226 94 Enumerate trusted domains … … 333 201 .RE 334 202 .PP 203 netshareenumall 204 .RS 4 205 Enumerate all shares 206 .RE 207 .PP 208 netsharegetinfo 209 .RS 4 210 Get Share Info 211 .RE 212 .PP 213 netsharesetinfo 214 .RS 4 215 Set Share Info 216 .RE 217 .PP 218 netsharesetdfsflags 219 .RS 4 220 Set DFS flags 221 .RE 222 .PP 335 223 netfileenum 336 224 .RS 4 … … 341 229 .RS 4 342 230 Fetch remote time of day 231 .RE 232 .PP 233 netnamevalidate 234 .RS 4 235 Validate sharename 236 .RE 237 .PP 238 netfilegetsec 239 .RS 4 240 Get File security 241 .RE 242 .PP 243 netsessdel 244 .RS 4 245 Delete Session 246 .RE 247 .PP 248 netsessenum 249 .RS 4 250 Enumerate Sessions 251 .RE 252 .PP 253 netdiskenum 254 .RS 4 255 Enumerate Disks 256 .RE 257 .PP 258 netconnenum 259 .RS 4 260 Enumerate Connections 261 .RE 262 .PP 263 netshareadd 264 .RS 4 265 Add share 266 .RE 267 .PP 268 netsharedel 269 .RS 4 270 Delete share 343 271 .RE 344 272 .SS "SAMR" … … 445 373 .\} 446 374 .nf 447 Long Printer Name:\e375 Long Driver Name:\e 448 376 Driver File Name:\e 449 377 Data File Name:\e … … 480 408 .RE 481 409 .PP 482 deldriverex <driver> [architecture] [version] 483 .RS 4 484 Delete the specified printer driver including driver files\&. You can limit this action to a specific architecture and a specific version\&. If no architecure is given, all driver files of that driver will be deleted\&. 410 deldriverex <driver> [architecture] [version] [flags] 411 .RS 4 412 Delete the specified printer driver and optionally files associated with the driver\&. You can limit this action to a specific architecture and a specific version\&. If no architecture is given, all driver files of that driver will be deleted\&. 413 \fIflags\fR 414 correspond to numeric DPD_* values, i\&.e\&. a value of 3 requests (DPD_DELETE_UNUSED_FILES | DPD_DELETE_SPECIFIC_VERSION)\&. 485 415 .RE 486 416 .PP … … 640 570 Sam Logon 641 571 .RE 572 .SS "FSRVP" 573 .PP 574 fss_is_path_sup <share> 575 .RS 4 576 Check whether a share supports shadow\-copy requests 577 .RE 578 .PP 579 fss_get_sup_version 580 .RS 4 581 Get supported FSRVP version from server 582 .RE 583 .PP 584 fss_create_expose <context> <[ro|rw]> <share1> [share2] \&.\&.\&. [shareN] 585 .RS 4 586 Request shadow\-copy creation and exposure as a new share 587 .RE 588 .PP 589 fss_delete <base_share> <shadow_copy_set_id> <shadow_copy_id> 590 .RS 4 591 Request shadow\-copy share deletion 592 .RE 593 .PP 594 fss_has_shadow_copy <base_share> 595 .RS 4 596 Check for an associated share shadow\-copy 597 .RE 598 .PP 599 fss_get_mapping <base_share> <shadow_copy_set_id> <shadow_copy_id> 600 .RS 4 601 Get shadow\-copy share mapping information 602 .RE 603 .PP 604 fss_recovery_complete <shadow_copy_set_id> 605 .RS 4 606 Flag read\-write shadow\-copy as recovery complete, allowing further shadow\-copy requests 607 .RE 642 608 .SS "GENERAL COMMANDS" 643 609 .PP -
vendor/current/docs/manpages/samba.7
r860 r988 2 2 .\" Title: samba 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: Miscellanea 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SAMBA" "7" "0 9/18/2013" "Samba 3\&.6" "Miscellanea"10 .TH "SAMBA" "7" "05/02/2016" "Samba 4\&.4" "Miscellanea" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 29 29 .\" ----------------------------------------------------------------- 30 30 .SH "NAME" 31 samba \- A Windows SMB/CIFS fileserver for UNIX31 samba \- A Windows AD and SMB/CIFS fileserver for UNIX 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u … … 35 35 .SH "DESCRIPTION" 36 36 .PP 37 The Samba software suite is a collection of programs that implements the Server Message Block (commonly abbreviated as SMB) protocol for UNIX systems \&. This protocol is sometimes also referred to as the Common Internet File System (CIFS)\&. For a more thorough description, see37 The Samba software suite is a collection of programs that implements the Server Message Block (commonly abbreviated as SMB) protocol for UNIX systems and provides Active Directory services\&. This protocol is sometimes also referred to as the Common Internet File System (CIFS)\&. For a more thorough description, see 38 38 http://www\&.ubiqx\&.org/cifs/\&. Samba also implements the NetBIOS protocol in nmbd\&. 39 .PP 40 \fBsamba\fR(8) 41 .RS 4 42 The 43 samba 44 daemon provides the Active Directory services and file and print services to SMB clients\&. The configuration file for this daemon is described in 45 \fBsmb.conf\fR(5)\&. 46 .RE 39 47 .PP 40 48 \fBsmbd\fR(8) … … 43 51 smbd 44 52 daemon provides the file and print services to SMB clients, such as Windows 95/98, Windows NT, Windows for Workgroups or LanManager\&. The configuration file for this daemon is described in 45 \fBsmb.conf\fR(5) 53 \fBsmb.conf\fR(5)\&. 46 54 .RE 47 55 .PP … … 51 59 nmbd 52 60 daemon provides NetBIOS nameservice and browsing support\&. The configuration file for this daemon is described in 53 \fBsmb.conf\fR(5) 61 \fBsmb.conf\fR(5)\&. 62 .RE 63 .PP 64 \fBwinbindd\fR(8) 65 .RS 4 66 winbindd 67 is a daemon that is used for integrating authentication and the user database into unix\&. 54 68 .RE 55 69 .PP … … 59 73 smbclient 60 74 program implements a simple ftp\-like client\&. This is useful for accessing SMB shares on other compatible servers (such as Windows NT), and can also be used to allow a UNIX box to print to a printer attached to any SMB server (such as a PC running Windows NT)\&. 75 .RE 76 .PP 77 \fBsamba-tool\fR(8) 78 .RS 4 79 The 80 samba\-tool 81 is the main Samba Administration tool regarding Active Directory services\&. 61 82 .RE 62 83 .PP … … 70 91 .RE 71 92 .PP 72 \fBtestprns\fR(1)73 .RS 474 The75 testprns76 utility supports testing printer names defined in your77 printcap78 file used by Samba\&.79 .RE80 .PP81 93 \fBsmbstatus\fR(1) 82 94 .RS 4 … … 108 120 .RE 109 121 .PP 110 \fBsmbsh\fR(1)111 .RS 4112 The113 smbsh114 command is a program that allows you to run a unix shell with with an overloaded VFS\&.115 .RE116 .PP117 122 \fBsmbtree\fR(1) 118 123 .RS 4 … … 138 143 .RS 4 139 144 smbcontrol 140 is a utility that can change the behaviour of running samba daemons\&. 145 is a utility that can change the behaviour of running 146 smbd, 147 nmbd 148 and 149 winbindd 150 daemons\&. 141 151 .RE 142 152 .PP … … 168 178 .RE 169 179 .PP 170 \fBswat\fR(8)171 .RS 4172 swat173 is a web\-based interface to configuring174 smb\&.conf\&.175 .RE176 .PP177 \fBwinbindd\fR(8)178 .RS 4179 winbindd180 is a daemon that is used for integrating authentication and the user database into unix\&.181 .RE182 .PP183 180 \fBwbinfo\fR(1) 184 181 .RS 4 … … 209 206 ntlm_auth 210 207 is a helper\-utility for external programs wanting to do NTLM\-authentication\&. 211 .RE212 .PP213 \fBsmbmount\fR(8), \fBsmbumount\fR(8), \fBsmbmnt\fR(8)214 .RS 4215 smbmount,smbumount216 and217 smbmnt218 are commands that can be used to mount CIFS/SMB shares on Linux\&.219 208 .RE 220 209 .PP … … 247 236 .SH "VERSION" 248 237 .PP 249 This man page is correct for version 3of the Samba suite\&.238 This man page is correct for version 4 of the Samba suite\&. 250 239 .SH "CONTRIBUTIONS" 251 240 .PP … … 256 245 http://devel\&.samba\&.org/ 257 246 for information on how to do it properly\&. We prefer patches in 258 diff \-u 247 git format\-patch 259 248 format\&. 260 249 .SH "CONTRIBUTORS" … … 263 252 change\-log 264 253 in the source package for the pre\-CVS changes and at 265 http:// cvs\&.samba\&.org/266 for the contributors to Samba post\- CVS\&. CVSis the Open Source source code control system used by the Samba Team to develop Samba\&. The project would have been unmanageable without it\&.254 http://git\&.samba\&.org/ 255 for the contributors to Samba post\-GIT\&. GIT is the Open Source source code control system used by the Samba Team to develop Samba\&. The project would have been unmanageable without it\&. 267 256 .SH "AUTHOR" 268 257 .PP -
vendor/current/docs/manpages/sharesec.1
r860 r988 2 2 .\" Title: sharesec 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SHARESEC" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "SHARESEC" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 sharesec {sharename} [\-r,\ \-\-remove=ACL] [\-m,\ \-\-modify=ACL] [\-a,\ \-\-add=ACL] [\-R,\ \-\-replace=ACLs] [\-D,\ \-\-delete] [\-v,\ \-\-view] [\- M,\ \-\-machine\-sid] [\-F,\ \-\-force] [\-d,\ \-\-debuglevel=DEBUGLEVEL] [\-s,\ \-\-configfile=CONFIGFILE] [\-l,\ \-\-log\-basename=LOGFILEBASE] [\-V,\ \-\-version] [\-?,\ \-\-help] [\-\-usage]34 sharesec {sharename} [\-r,\ \-\-remove=ACL] [\-m,\ \-\-modify=ACL] [\-a,\ \-\-add=ACL] [\-R,\ \-\-replace=ACLs] [\-D,\ \-\-delete] [\-v,\ \-\-view] [\-\-view\-all] [\-M,\ \-\-machine\-sid] [\-F,\ \-\-force] [\-d,\ \-\-debuglevel=DEBUGLEVEL] [\-s,\ \-\-configfile=CONFIGFILE] [\-l,\ \-\-log\-basename=LOGFILEBASE] [\-\-version] [\-?,\ \-\-help] [\-\-usage] [\-S,\ \-\-setsddl=STRING] [\-V,\ \-\-viewsddl] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 83 83 .RE 84 84 .PP 85 \-h|\-\-help 86 .RS 4 87 Print a summary of command line options\&. 88 .RE 89 .PP 90 \-d|\-\-debuglevel=level 91 .RS 4 92 \fIlevel\fR 93 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&. 94 .sp 95 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&. 96 .sp 97 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&. 98 .sp 99 Note that specifying this parameter here will override the 100 \m[blue]\fBlog level\fR\m[] 101 parameter in the 102 smb\&.conf 103 file\&. 104 .RE 105 .PP 106 \-V|\-\-version 107 .RS 4 108 Prints the program version number\&. 109 .RE 110 .PP 111 \-s|\-\-configfile <configuration file> 112 .RS 4 113 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 114 smb\&.conf 115 for more information\&. The default configuration file name is determined at compile time\&. 116 .RE 117 .PP 118 \-l|\-\-log\-basename=logdirectory 119 .RS 4 120 Base directory name for log/debug files\&. The extension 121 \fB"\&.progname"\fR 122 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&. 85 \-v|\-\-view 86 .RS 4 87 List a share acl 88 .RE 89 .PP 90 \-\-view\-all 91 .RS 4 92 List all share acls 93 .RE 94 .PP 95 \-S|\-\-setsddl=STRING 96 .RS 4 97 Set security descriptor by providing ACL in SDDL format\&. 98 .RE 99 .PP 100 \-V|\-\-viewsddl 101 .RS 4 102 List a share acl in SDDL format\&. 123 103 .RE 124 104 .SH "ACL FORMAT" … … 142 122 The revision of the ACL specifies the internal Windows NT ACL revision for the security descriptor\&. If not specified it defaults to 1\&. Using values other than 1 may cause strange behaviour\&. 143 123 .PP 144 The owner and group specify the owner and group SIDs for the object\&. If a SID in the format S\-1\-x\-y\-z is specified this is used, otherwise the name specified is resolved using the server on which the file or directory resides\&.124 The owner and group specify the owner and group SIDs for the object\&. Share ACLs do not specify an owner or a group, so these fields are empty\&. 145 125 .PP 146 126 ACLs specify permissions granted to the SID\&. This SID can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\&. The type, flags and mask values determine the type of access granted to the SID\&. … … 297 277 host:~ # sharesec share \-v 298 278 REVISION:1 299 OWNER:(NULL SID) 300 GROUP:(NULL SID) 301 ACL:S\-1\-1\-0:ALLOWED/0/0x101f01ff 302 ACL:S\-1\-5\-21\-1866488690\-1365729215\-3963860297\-17724:ALLOWED/0/FULL 279 CONTROL:SR|DP 280 OWNER: 281 GROUP: 282 ACL:S\-1\-1\-0:ALLOWED/0x0/FULL 283 ACL:S\-1\-5\-21\-1866488690\-1365729215\-3963860297\-17724:ALLOWED/0x0/FULL 303 284 304 285 .fi -
vendor/current/docs/manpages/smb.conf.5
r860 r988 2 2 .\" Title: smb.conf 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: File Formats and Conventions 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMB\&.CONF" "5" "0 9/18/2013" "Samba 3\&.6" "File Formats and Conventions"10 .TH "SMB\&.CONF" "5" "05/02/2016" "Samba 4\&.4" "File Formats and Conventions" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 36 36 file is a configuration file for the Samba suite\&. 37 37 smb\&.conf 38 contains runtime configuration information for the Samba programs\&. The 39 smb\&.conf 40 file is designed to be configured and administered by the 41 \fBswat\fR(8) 42 program\&. The complete description of the file format and possible parameters held within are here for reference purposes\&. 38 contains runtime configuration information for the Samba programs\&. The complete description of the file format and possible parameters held within are here for reference purposes\&. 43 39 .SH "FILE FORMAT" 44 40 .PP … … 457 453 %R 458 454 .RS 4 459 the selected protocol level after protocol negotiation\&. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2 or NT1\&.455 the selected protocol level after protocol negotiation\&. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2, NT1, SMB2_02, SMB2_10, SMB2_22, SMB2_24, SMB3_00, SMB3_02, SMB3_10, SMB3_11 or SMB2_FF\&. 460 456 .RE 461 457 .PP … … 475 471 the IP address of the client machine\&. 476 472 .sp 477 Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.473 Before 4\&.0\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&. 478 474 .RE 479 475 .PP … … 482 478 the local IP address to which a client connected\&. 483 479 .sp 484 Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.480 Before 4\&.0\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&. 485 481 .RE 486 482 .PP … … 598 594 .PP 599 595 By default, Samba 3\&.0 has the same semantics as a Windows NT server, in that it is case insensitive but case preserving\&. As a special case for directories with large numbers of files, if the case options are set as follows, "case sensitive = yes", "case preserve = no", "short preserve case = no" then the "default case" option will be applied and will modify all filenames sent from the client when accessing this share\&. 600 .SH "NOTE ABOUT USERNAME/PASSWORD VALIDATION"601 .PP602 There are a number of ways in which a user can connect to a service\&. The server uses the following steps in determining if it will allow a connection to a specified service\&. If all the steps fail, the connection request is rejected\&. However, if one of the steps succeeds, the following steps are not checked\&.603 .PP604 If the service is marked605 \(lqguest only = yes\(rq606 and the server is running with share\-level security (\(lqsecurity = share\(rq, steps 1 to 5 are skipped\&.607 .sp608 .RS 4609 .ie n \{\610 \h'-04' 1.\h'+01'\c611 .\}612 .el \{\613 .sp -1614 .IP " 1." 4.2615 .\}616 If the client has passed a username/password pair and that username/password pair is validated by the UNIX system\*(Aqs password programs, the connection is made as that username\&. This includes the617 \e\eserver\eservice%\fIusername\fR618 method of passing a username\&.619 .RE620 .sp621 .RS 4622 .ie n \{\623 \h'-04' 2.\h'+01'\c624 .\}625 .el \{\626 .sp -1627 .IP " 2." 4.2628 .\}629 If the client has previously registered a username with the system and now supplies a correct password for that username, the connection is allowed\&.630 .RE631 .sp632 .RS 4633 .ie n \{\634 \h'-04' 3.\h'+01'\c635 .\}636 .el \{\637 .sp -1638 .IP " 3." 4.2639 .\}640 The client\*(Aqs NetBIOS name and any previously used usernames are checked against the supplied password\&. If they match, the connection is allowed as the corresponding user\&.641 .RE642 .sp643 .RS 4644 .ie n \{\645 \h'-04' 4.\h'+01'\c646 .\}647 .el \{\648 .sp -1649 .IP " 4." 4.2650 .\}651 If the client has previously validated a username/password pair with the server and the client has passed the validation token, that username is used\&.652 .RE653 .sp654 .RS 4655 .ie n \{\656 \h'-04' 5.\h'+01'\c657 .\}658 .el \{\659 .sp -1660 .IP " 5." 4.2661 .\}662 If a663 user =664 field is given in the665 smb\&.conf666 file for the service and the client has supplied a password, and that password matches (according to the UNIX system\*(Aqs password checking) with one of the usernames from the667 user =668 field, the connection is made as the username in the669 user =670 line\&. If one of the usernames in the671 user =672 list begins with a673 @, that name expands to a list of names in the group of the same name\&.674 .RE675 .sp676 .RS 4677 .ie n \{\678 \h'-04' 6.\h'+01'\c679 .\}680 .el \{\681 .sp -1682 .IP " 6." 4.2683 .\}684 If the service is a guest service, a connection is made as the username given in the685 guest account =686 for the service, irrespective of the supplied password\&.687 .RE688 596 .SH "REGISTRY-BASED CONFIGURATION" 689 597 .PP … … 769 677 \m[blue]\fBshutdown script\fR\m[]\&. 770 678 .sp 771 If the connected user posses es the679 If the connected user possesses the 772 680 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as root\&. 773 681 .sp … … 785 693 If this parameter is 786 694 \fByes\fR 787 for a service, then the share hosted by the service will only be visible to users who have read or write access to the share during share enumeration (for example net view \e\esambaserver)\&. This has parallels to access based enumeration, the main difference being that only share permissions are evaluated, and security descriptors on files contained on the share are not used in computing enumeration access rights\&. 695 for a service, then the share hosted by the service will only be visible to users who have read or write access to the share during share enumeration (for example net view \e\esambaserver)\&. The share ACLs which allow or deny the access to the share can be modified using for example the 696 sharesec 697 command or using the appropriate Windows tools\&. This has parallels to access based enumeration, the main difference being that only share permissions are evaluated, and security descriptors on files contained on the share are not used in computing enumeration access rights\&. 788 698 .sp 789 699 Default: 790 700 \fI\fIaccess based share enum\fR\fR\fI = \fR\fIno\fR\fI \fR 701 .RE 702 703 acl allow execute always (S) 704 .\" acl allow execute always 705 .PP 706 .RS 4 707 This boolean parameter controls the behaviour of 708 \fBsmbd\fR(8) 709 when receiving a protocol request of "open for execution" from a Windows client\&. With Samba 3\&.6 and older, the execution right in the ACL was not checked, so a client could execute a file even if it did not have execute rights on the file\&. In Samba 4\&.0, this has been fixed, so that by default, i\&.e\&. when this parameter is set to "False", "open for execution" is now denied when execution permissions are not present\&. 710 .sp 711 If this parameter is set to "True", Samba does not check execute permissions on "open for execution", thus re\-establishing the behaviour of Samba 3\&.6\&. This can be useful to smoothen upgrades from older Samba versions to 4\&.0 and newer\&. This setting is not meant to be used as a permanent setting, but as a temporary relief: It is recommended to fix the permissions in the ACLs and reset this parameter to the default after a certain transition period\&. 712 .sp 713 Default: 714 \fI\fIacl allow execute always\fR\fR\fI = \fR\fIno\fR\fI \fR 791 715 .RE 792 716 … … 795 719 .PP 796 720 .RS 4 721 Please note this parameter is now deprecated in Samba 3\&.6\&.2 and will be removed in a future version of Samba\&. 722 .sp 797 723 This boolean parameter controls what 798 \fBsmbd\fR(8)does on receiving a protocol request of "open for delete" from a Windows client\&. If a Windows client doesn\*(Aqt have permissions to delete a file then they expect this to be denied at open time\&. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\&. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\&. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\&. This is not perfect, as it\*(Aqs possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\&. Samba will correctly check POSIX ACL semantics in this case\&. 724 \fBsmbd\fR(8) 725 does on receiving a protocol request of "open for delete" from a Windows client\&. If a Windows client doesn\*(Aqt have permissions to delete a file then they expect this to be denied at open time\&. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\&. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\&. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\&. This is not perfect, as it\*(Aqs possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\&. Samba will correctly check POSIX ACL semantics in this case\&. 799 726 .sp 800 727 If this parameter is set to "false" Samba doesn\*(Aqt check permissions on "open for delete" and allows the open\&. If the user doesn\*(Aqt have permission to delete the file this will only be discovered at close time, which is too late for the Windows user tools to display an error message to the user\&. The symptom of this is files that appear to have been deleted "magically" re\-appearing on a Windows explorer refresh\&. This is an extremely advanced protocol option which should not need to be changed\&. This parameter was introduced in its final form in 3\&.0\&.21, an earlier version with slightly different semantics was introduced in 3\&.0\&.20\&. That older version is not documented here\&. 801 728 .sp 802 729 Default: 803 \fI\fIacl check permissions\fR\fR\fI = \fR\fITrue\fR\fI \fR 804 .RE 805 806 acl compatibility (G) 807 .\" acl compatibility 808 .PP 809 .RS 4 810 This parameter specifies what OS ACL semantics should be compatible with\&. Possible values are 811 \fIwinnt\fR 812 for Windows NT 4, 813 \fIwin2k\fR 814 for Windows 2000 and above and 815 \fIauto\fR\&. If you specify 816 \fIauto\fR, the value for this parameter will be based upon the version of the client\&. There should be no reason to change this parameter from the default\&. 817 .sp 818 Default: 819 \fI\fIacl compatibility\fR\fR\fI = \fR\fIAuto\fR\fI \fR 820 .sp 821 Example: 822 \fI\fIacl compatibility\fR\fR\fI = \fR\fIwin2k\fR\fI \fR 730 \fI\fIacl check permissions\fR\fR\fI = \fR\fIyes\fR\fI \fR 823 731 .RE 824 732 … … 831 739 of a file or directory to modify the permissions and ACLs on that file\&. 832 740 .sp 833 On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\&. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\&. This means there are multiple people with permissions to modify ACLs on a file or directory, easing manag ability\&.741 On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\&. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\&. This means there are multiple people with permissions to modify ACLs on a file or directory, easing manageability\&. 834 742 .sp 835 743 This parameter allows Samba to also permit delegation of the control over a point in the exported directory hierarchy in much the same way as Windows\&. This allows all members of a UNIX group to control the permissions on a file or directory they have group ownership on\&. … … 837 745 This parameter is best used with the 838 746 \m[blue]\fBinherit owner\fR\m[] 839 option and also on ona share containing directories with the UNIX747 option and also on a share containing directories with the UNIX 840 748 \fIsetgid bit\fR 841 749 set on them, which causes new files and directories created within it to inherit the group ownership from the containing directory\&. 842 750 .sp 843 This is parameter has beenwas deprecated in Samba 3\&.0\&.23, but re\-activated in Samba 3\&.0\&.31 and above, as it now only controls permission changes if the user is in the owning primary group\&. It is now no longer equivalent to the751 This parameter was deprecated in Samba 3\&.0\&.23, but re\-activated in Samba 3\&.0\&.31 and above, as it now only controls permission changes if the user is in the owning primary group\&. It is now no longer equivalent to the 844 752 \fIdos filemode\fR 845 753 option\&. … … 858 766 .sp 859 767 Default: 860 \fI\fIacl map full control\fR\fR\fI = \fR\fI True\fR\fI \fR768 \fI\fIacl map full control\fR\fR\fI = \fR\fIyes\fR\fI \fR 861 769 .RE 862 770 … … 898 806 .RE 899 807 900 add 901 .\" add 808 addport command (G) 809 .\" addport command 902 810 .PP 903 811 .RS 4 … … 930 838 .sp 931 839 Default: 932 \fI\fIadd 933 .sp 934 Example: 935 \fI\fIadd 840 \fI\fIaddport command\fR\fR\fI = \fR\fI\fR\fI \fR 841 .sp 842 Example: 843 \fI\fIaddport command\fR\fR\fI = \fR\fI/etc/samba/scripts/addport\&.sh\fR\fI \fR 936 844 .RE 937 845 … … 1152 1060 \fION DEMAND\fR 1153 1061 when a user accesses the Samba server\&. 1154 .sp1155 In order to use this option,1156 \fBsmbd\fR(8)1157 must1158 \fINOT\fR1159 be set to1160 \m[blue]\fBsecurity = share\fR\m[]1161 and1162 \m[blue]\fBadd user script\fR\m[]1163 must be set to a full pathname for a script that will create a UNIX user given one argument of1164 \fI%u\fR, which expands into the UNIX user name to create\&.1165 1062 .sp 1166 1063 When the Windows user attempts to access the Samba server, at login (session setup in the SMB protocol) time, … … 1200 1097 .RS 4 1201 1098 Full path to the script that will be called when a user is added to a group using the Windows NT domain administration tools\&. It will be run by 1202 \fBsmbd\fR(8) 1203 \fIAS ROOT\fR\&. Any 1099 \fBsmbd\fR(8)\fIAS ROOT\fR\&. Any 1204 1100 \fI%g\fR 1205 1101 will be replaced with the group name and any … … 1242 1138 You should use this option very carefully, as any user in this list will be able to do anything they like on the share, irrespective of file permissions\&. 1243 1139 .sp 1244 This parameter will not work with the1245 \m[blue]\fBsecurity = share\fR\m[]1246 in Samba 3\&.0\&. This is by design\&.1247 .sp1248 1140 Default: 1249 1141 \fI\fIadmin users\fR\fR\fI = \fR\fI\fR\fI \fR … … 1265 1157 .RE 1266 1158 1159 afs token lifetime (G) 1160 .\" afs token lifetime 1161 .PP 1162 .RS 4 1163 This parameter controls the lifetime of tokens that the AFS fake\-kaserver claims\&. In reality these never expire but this lifetime controls when the afs client will forget the token\&. 1164 .sp 1165 Set this parameter to 0 to get 1166 \fBNEVERDATE\fR\&. 1167 .sp 1168 Default: 1169 \fI\fIafs token lifetime\fR\fR\fI = \fR\fI604800\fR\fI \fR 1170 .RE 1171 1267 1172 afs username map (G) 1268 1173 .\" afs username map … … 1278 1183 Example: 1279 1184 \fI\fIafs username map\fR\fR\fI = \fR\fI%u@afs\&.samba\&.org\fR\fI \fR 1185 .RE 1186 1187 aio max threads (G) 1188 .\" aio max threads 1189 .PP 1190 .RS 4 1191 The integer parameter specifies the maximum number of threads each smbd process will create when doing parallel asynchronous IO calls\&. If the number of outstanding calls is greater than this number the requests will not be refused but go onto a queue and will be scheduled in turn as outstanding requests complete\&. 1192 .sp 1193 Related command: 1194 \m[blue]\fBaio read size\fR\m[] 1195 .sp 1196 Related command: 1197 \m[blue]\fBaio write size\fR\m[] 1198 .sp 1199 Default: 1200 \fI\fIaio max threads\fR\fR\fI = \fR\fI100\fR\fI \fR 1280 1201 .RE 1281 1202 … … 1345 1266 This determines how Samba will use its algorithmic mapping from uids/gid to the RIDs needed to construct NT Security Identifiers\&. 1346 1267 .sp 1347 Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with sy tem users etc\&.1268 Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with system users etc\&. 1348 1269 .sp 1349 1270 All UIDs and GIDs must be able to be resolved into SIDs for the correct operation of ACLs on the server\&. As such the algorithmic mapping can\*(Aqt be \*(Aqturned off\*(Aq, but pushing it \*(Aqout of the way\*(Aq should resolve the issues\&. Users and groups can then be assigned \*(Aqlow\*(Aq RIDs in arbitrary\-rid supporting backends\&. … … 1369 1290 Example: 1370 1291 \fI\fIallocation roundup size\fR\fR\fI = \fR\fI0 # (to disable roundups)\fR\fI \fR 1292 .RE 1293 1294 allow dcerpc auth level connect (G) 1295 .\" allow dcerpc auth level connect 1296 .PP 1297 .RS 4 1298 This option controls whether DCERPC services are allowed to be used with DCERPC_AUTH_LEVEL_CONNECT, which provides authentication, but no per message integrity nor privacy protection\&. 1299 .sp 1300 Some interfaces like samr, lsarpc and netlogon have a hard\-coded default of 1301 \fBno\fR 1302 and epmapper, mgmt and rpcecho have a hard\-coded default of 1303 \fByes\fR\&. 1304 .sp 1305 The behavior can be overwritten per interface name (e\&.g\&. lsarpc, netlogon, samr, srvsvc, winreg, wkssvc \&.\&.\&.) by using \*(Aqallow dcerpc auth level connect:interface = yes\*(Aq as option\&. 1306 .sp 1307 This option yields precedence to the implementation specific restrictions\&. E\&.g\&. the drsuapi and backupkey protocols require DCERPC_AUTH_LEVEL_PRIVACY\&. The dnsserver protocol requires DCERPC_AUTH_LEVEL_INTEGRITY\&. 1308 .sp 1309 Default: 1310 \fI\fIallow dcerpc auth level connect\fR\fR\fI = \fR\fIno\fR\fI \fR 1311 .sp 1312 Example: 1313 \fI\fIallow dcerpc auth level connect\fR\fR\fI = \fR\fIyes\fR\fI \fR 1314 .RE 1315 1316 allow dns updates (G) 1317 .\" allow dns updates 1318 .PP 1319 .RS 4 1320 This option determines what kind of updates to the DNS are allowed\&. 1321 .sp 1322 DNS updates can either be disallowed completely by setting it to 1323 \fBdisabled\fR, enabled over secure connections only by setting it to 1324 \fBsecure only\fR 1325 or allowed in all cases by setting it to 1326 \fBnonsecure\fR\&. 1327 .sp 1328 Default: 1329 \fI\fIallow dns updates\fR\fR\fI = \fR\fIsecure only\fR\fI \fR 1330 .sp 1331 Example: 1332 \fI\fIallow dns updates\fR\fR\fI = \fR\fIdisabled\fR\fI \fR 1371 1333 .RE 1372 1334 … … 1397 1359 .RE 1398 1360 1361 allow nt4 crypto (G) 1362 .\" allow nt4 crypto 1363 .PP 1364 .RS 4 1365 This option controls whether the netlogon server (currently only in \*(Aqactive directory domain controller\*(Aq mode), will reject clients which does not support NETLOGON_NEG_STRONG_KEYS nor NETLOGON_NEG_SUPPORTS_AES\&. 1366 .sp 1367 This option was added with Samba 4\&.2\&.0\&. It may lock out clients which worked fine with Samba versions up to 4\&.1\&.x\&. as the effective default was "yes" there, while it is "no" now\&. 1368 .sp 1369 If you have clients without RequireStrongKey = 1 in the registry, you may need to set "allow nt4 crypto = yes", until you have fixed all clients\&. 1370 .sp 1371 "allow nt4 crypto = yes" allows weak crypto to be negotiated, maybe via downgrade attacks\&. 1372 .sp 1373 This option yields precedence to the \*(Aqreject md5 clients\*(Aq option\&. 1374 .sp 1375 Default: 1376 \fI\fIallow nt4 crypto\fR\fR\fI = \fR\fIno\fR\fI \fR 1377 .RE 1378 1399 1379 allow trusted domains (G) 1400 1380 .\" allow trusted domains … … 1413 1393 Default: 1414 1394 \fI\fIallow trusted domains\fR\fR\fI = \fR\fIyes\fR\fI \fR 1415 .RE1416 1417 announce as (G)1418 .\" announce as1419 .PP1420 .RS 41421 This specifies what type of server1422 \fBnmbd\fR(8)1423 will announce itself as, to a network neighborhood browse list\&. By default this is set to Windows NT\&. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, Windows NT Workstation, Windows 95 and Windows for Workgroups respectively\&. Do not change this parameter unless you have a specific need to stop Samba appearing as an NT server as this may prevent Samba servers from participating as browser servers correctly\&.1424 .sp1425 Default:1426 \fI\fIannounce as\fR\fR\fI = \fR\fINT Server\fR\fI \fR1427 .sp1428 Example:1429 \fI\fIannounce as\fR\fR\fI = \fR\fIWin95\fR\fI \fR1430 .RE1431 1432 announce version (G)1433 .\" announce version1434 .PP1435 .RS 41436 This specifies the major and minor version numbers that nmbd will use when announcing itself as a server\&. The default is 4\&.9\&. Do not change this parameter unless you have a specific need to set a Samba server to be a downlevel server\&.1437 .sp1438 Default:1439 \fI\fIannounce version\fR\fR\fI = \fR\fI4\&.9\fR\fI \fR1440 .sp1441 Example:1442 \fI\fIannounce version\fR\fR\fI = \fR\fI2\&.0\fR\fI \fR1443 1395 .RE 1444 1396 … … 1481 1433 Example: 1482 1434 \fI\fIauth methods\fR\fR\fI = \fR\fIguest sam winbind\fR\fI \fR 1435 .RE 1436 1437 preload 1438 .\" preload 1439 .PP 1440 .RS 4 1441 This parameter is a synonym for 1442 auto services\&. 1443 .RE 1444 1445 auto services (G) 1446 .\" auto services 1447 .PP 1448 .RS 4 1449 This is a list of services that you want to be automatically added to the browse lists\&. This is most useful for homes and printers services that would otherwise not be visible\&. 1450 .sp 1451 Note that if you just want all printers in your printcap file loaded then the 1452 \m[blue]\fBload printers\fR\m[] 1453 option is easier\&. 1454 .sp 1455 Default: 1456 \fI\fIauto services\fR\fR\fI = \fR\fI\fR\fI \fR 1457 .sp 1458 Example: 1459 \fI\fIauto services\fR\fR\fI = \fR\fIfred lp colorlp\fR\fI \fR 1483 1460 .RE 1484 1461 … … 1543 1520 parameter list 1544 1521 \fBsmbpasswd\fR(8) 1545 and1546 \fBswat\fR(8)1547 1522 may not work as expected due to the reasons covered below\&. 1548 1523 .sp … … 1562 1537 smbpasswd 1563 1538 can be forced to use the primary IP interface of the local host by using its 1564 \fBsmbpasswd\fR(8) 1565 \fI\-r \fR\fI\fIremote machine\fR\fR 1539 \fBsmbpasswd\fR(8)\fI\-r \fR\fI\fIremote machine\fR\fR 1566 1540 parameter, with 1567 1541 \fIremote machine\fR 1568 1542 set to the IP name of the primary interface of the local host\&. 1569 .sp1570 The1571 swat1572 status page tries to connect with1573 smbd1574 and1575 nmbd1576 at the address1577 \fI127\&.0\&.0\&.1\fR1578 to determine if they are running\&. Not adding1579 \fI127\&.0\&.0\&.1\fR1580 will cause1581 smbd1582 and1583 nmbd1584 to always show "not running" even if they really are\&. This can prevent1585 swat1586 from starting/stopping/restarting1587 smbd1588 and1589 nmbd\&.1590 1543 .sp 1591 1544 Default: … … 1676 1629 .sp 1677 1630 Default: 1678 \fI\fIcache directory\fR\fR\fI = \fR\fI${prefix}/var/ locks\fR\fI \fR1631 \fI\fIcache directory\fR\fR\fI = \fR\fI${prefix}/var/cache\fR\fI \fR 1679 1632 .sp 1680 1633 Example: … … 1701 1654 .RE 1702 1655 1703 change notify ( S)1656 change notify (G) 1704 1657 .\" change notify 1705 1658 .PP … … 1734 1687 will automatically invoke the 1735 1688 \fIchange share command\fR 1736 with fiveparameters\&.1689 with six parameters\&. 1737 1690 .sp 1738 1691 .RS 4 … … 1798 1751 .RE 1799 1752 .sp 1753 .RS 4 1754 .ie n \{\ 1755 \h'-04'\(bu\h'+03'\c 1756 .\} 1757 .el \{\ 1758 .sp -1 1759 .IP \(bu 2.3 1760 .\} 1761 \fICSC policy\fR 1762 \- client side caching policy in string form\&. Valid values are: manual, documents, programs, disable\&. 1763 .RE 1764 .sp 1800 1765 .RE 1801 1766 This parameter is only used to modify existing file share definitions\&. To modify printer shares, use the "Printers\&.\&.\&." folder as seen when browsing the Samba host\&. … … 1821 1786 .sp 1822 1787 Default: 1823 \fI\fIcheck password script\fR\fR\fI = \fR\fI Disabled\fR\fI \fR1788 \fI\fIcheck password script\fR\fR\fI = \fR\fI # Disabled\fR\fI \fR 1824 1789 .sp 1825 1790 Example: 1826 1791 \fI\fIcheck password script\fR\fR\fI = \fR\fI/usr/local/sbin/crackcheck\fR\fI \fR 1792 .RE 1793 1794 cldap port (G) 1795 .\" cldap port 1796 .PP 1797 .RS 4 1798 This option controls the port used by the CLDAP protocol\&. 1799 .sp 1800 Default: 1801 \fI\fIcldap port\fR\fR\fI = \fR\fI389\fR\fI \fR 1802 .sp 1803 Example: 1804 \fI\fIcldap port\fR\fR\fI = \fR\fI3389\fR\fI \fR 1805 .RE 1806 1807 client ipc max protocol (G) 1808 .\" client ipc max protocol 1809 .PP 1810 .RS 4 1811 The value of the parameter (a string) is the highest protocol level that will be supported for IPC$ connections as DCERPC transport\&. 1812 .sp 1813 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 1814 .sp 1815 The value 1816 \fBdefault\fR 1817 refers to the latest supported protocol, currently 1818 \fBSMB3_11\fR\&. 1819 .sp 1820 See 1821 \m[blue]\fBclient max protocol\fR\m[] 1822 for a full list of available protocols\&. The values CORE, COREPLUS, LANMAN1, LANMAN2 are silently upgraded to NT1\&. 1823 .sp 1824 Default: 1825 \fI\fIclient ipc max protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR 1826 .sp 1827 Example: 1828 \fI\fIclient ipc max protocol\fR\fR\fI = \fR\fISMB2_10\fR\fI \fR 1829 .RE 1830 1831 client ipc min protocol (G) 1832 .\" client ipc min protocol 1833 .PP 1834 .RS 4 1835 This setting controls the minimum protocol version that the will be attempted to use for IPC$ connections as DCERPC transport\&. 1836 .sp 1837 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 1838 .sp 1839 The value 1840 \fBdefault\fR 1841 refers to the higher value of 1842 \fBNT1\fR 1843 and the effective value of 1844 \m[blue]\fBclient min protocol\fR\m[]\&. 1845 .sp 1846 See 1847 \m[blue]\fBclient max protocol\fR\m[] 1848 for a full list of available protocols\&. The values CORE, COREPLUS, LANMAN1, LANMAN2 are silently upgraded to NT1\&. 1849 .sp 1850 Default: 1851 \fI\fIclient ipc min protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR 1852 .sp 1853 Example: 1854 \fI\fIclient ipc min protocol\fR\fR\fI = \fR\fISMB3_11\fR\fI \fR 1855 .RE 1856 1857 client ipc signing (G) 1858 .\" client ipc signing 1859 .PP 1860 .RS 4 1861 This controls whether the client is allowed or required to use SMB signing for IPC$ connections as DCERPC transport\&. Possible values are 1862 \fIauto\fR, 1863 \fImandatory\fR 1864 and 1865 \fIdisabled\fR\&. 1866 .sp 1867 When set to mandatory or default, SMB signing is required\&. 1868 .sp 1869 When set to auto, SMB signing is offered, but not enforced and if set to disabled, SMB signing is not offered either\&. 1870 .sp 1871 Connections from winbindd to Active Directory Domain Controllers always enforce signing\&. 1872 .sp 1873 Default: 1874 \fI\fIclient ipc signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR 1827 1875 .RE 1828 1876 … … 1867 1915 are only available if Samba has been compiled against a modern OpenLDAP version (2\&.3\&.x or higher)\&. 1868 1916 .sp 1869 This option is needed in the case of Domain Controllers enforcing the usage of signed LDAP connections (e\&.g\&. Windows 2000 SP3 or higher)\&. LDAP sign and seal can be controlled with the registry key "HKLM\eSystem\eCurrentControlSet\eServices\e 1870 NTDS\eParameters\eLDAPServerIntegrity" on the Windows server side\&. 1917 This option is needed in the case of Domain Controllers enforcing the usage of signed LDAP connections (e\&.g\&. Windows 2000 SP3 or higher)\&. LDAP sign and seal can be controlled with the registry key "HKLM\eSystem\eCurrentControlSet\eServices\eNTDS\eParameters\eLDAPServerIntegrity" on the Windows server side\&. 1871 1918 .sp 1872 1919 Depending on the used KRB5 library (MIT and older Heimdal versions) it is possible that the message "integrity only" is not supported\&. In this case, … … 1876 1923 .sp 1877 1924 The default value is 1878 \fIplain\fR 1879 which is not irritable to KRB5 clock skew errors\&. That implies synchronizing the time with the KDC in the case of using 1880 \fIsign\fR 1881 or 1882 \fIseal\fR\&. 1883 .sp 1884 Default: 1885 \fI\fIclient ldap sasl wrapping\fR\fR\fI = \fR\fIplain\fR\fI \fR 1886 .RE 1887 1888 client ntlmv2 auth (G) 1889 .\" client ntlmv2 auth 1925 \fIsign\fR\&. That implies synchronizing the time with the KDC in the case of using 1926 \fIKerberos\fR\&. 1927 .sp 1928 Default: 1929 \fI\fIclient ldap sasl wrapping\fR\fR\fI = \fR\fIsign\fR\fI \fR 1930 .RE 1931 1932 client max protocol (G) 1933 .\" client max protocol 1934 .PP 1935 .RS 4 1936 The value of the parameter (a string) is the highest protocol level that will be supported by the client\&. 1937 .sp 1938 Possible values are : 1939 .sp 1940 .RS 4 1941 .ie n \{\ 1942 \h'-04'\(bu\h'+03'\c 1943 .\} 1944 .el \{\ 1945 .sp -1 1946 .IP \(bu 2.3 1947 .\} 1948 \fBCORE\fR: Earliest version\&. No concept of user names\&. 1949 .RE 1950 .sp 1951 .RS 4 1952 .ie n \{\ 1953 \h'-04'\(bu\h'+03'\c 1954 .\} 1955 .el \{\ 1956 .sp -1 1957 .IP \(bu 2.3 1958 .\} 1959 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency\&. 1960 .RE 1961 .sp 1962 .RS 4 1963 .ie n \{\ 1964 \h'-04'\(bu\h'+03'\c 1965 .\} 1966 .el \{\ 1967 .sp -1 1968 .IP \(bu 2.3 1969 .\} 1970 \fBLANMAN1\fR: First 1971 \fImodern\fR 1972 version of the protocol\&. Long filename support\&. 1973 .RE 1974 .sp 1975 .RS 4 1976 .ie n \{\ 1977 \h'-04'\(bu\h'+03'\c 1978 .\} 1979 .el \{\ 1980 .sp -1 1981 .IP \(bu 2.3 1982 .\} 1983 \fBLANMAN2\fR: Updates to Lanman1 protocol\&. 1984 .RE 1985 .sp 1986 .RS 4 1987 .ie n \{\ 1988 \h'-04'\(bu\h'+03'\c 1989 .\} 1990 .el \{\ 1991 .sp -1 1992 .IP \(bu 2.3 1993 .\} 1994 \fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&. 1995 .RE 1996 .sp 1997 .RS 4 1998 .ie n \{\ 1999 \h'-04'\(bu\h'+03'\c 2000 .\} 2001 .el \{\ 2002 .sp -1 2003 .IP \(bu 2.3 2004 .\} 2005 \fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and later versions of Windows\&. SMB2 has sub protocols available\&. 2006 .sp 2007 .RS 4 2008 .ie n \{\ 2009 \h'-04'\(bu\h'+03'\c 2010 .\} 2011 .el \{\ 2012 .sp -1 2013 .IP \(bu 2.3 2014 .\} 2015 \fBSMB2_02\fR: The earliest SMB2 version\&. 2016 .RE 2017 .sp 2018 .RS 4 2019 .ie n \{\ 2020 \h'-04'\(bu\h'+03'\c 2021 .\} 2022 .el \{\ 2023 .sp -1 2024 .IP \(bu 2.3 2025 .\} 2026 \fBSMB2_10\fR: Windows 7 SMB2 version\&. 2027 .RE 2028 .sp 2029 .RS 4 2030 .ie n \{\ 2031 \h'-04'\(bu\h'+03'\c 2032 .\} 2033 .el \{\ 2034 .sp -1 2035 .IP \(bu 2.3 2036 .\} 2037 \fBSMB2_22\fR: Early Windows 8 SMB2 version\&. 2038 .RE 2039 .sp 2040 .RS 4 2041 .ie n \{\ 2042 \h'-04'\(bu\h'+03'\c 2043 .\} 2044 .el \{\ 2045 .sp -1 2046 .IP \(bu 2.3 2047 .\} 2048 \fBSMB2_24\fR: Windows 8 beta SMB2 version\&. 2049 .RE 2050 .sp 2051 .RE 2052 By default SMB2 selects the SMB2_10 variant\&. 2053 .RE 2054 .sp 2055 .RS 4 2056 .ie n \{\ 2057 \h'-04'\(bu\h'+03'\c 2058 .\} 2059 .el \{\ 2060 .sp -1 2061 .IP \(bu 2.3 2062 .\} 2063 \fBSMB3\fR: The same as SMB2\&. Used by Windows 8\&. SMB3 has sub protocols available\&. 2064 .sp 2065 .RS 4 2066 .ie n \{\ 2067 \h'-04'\(bu\h'+03'\c 2068 .\} 2069 .el \{\ 2070 .sp -1 2071 .IP \(bu 2.3 2072 .\} 2073 \fBSMB3_00\fR: Windows 8 SMB3 version\&. (mostly the same as SMB2_24) 2074 .RE 2075 .sp 2076 .RS 4 2077 .ie n \{\ 2078 \h'-04'\(bu\h'+03'\c 2079 .\} 2080 .el \{\ 2081 .sp -1 2082 .IP \(bu 2.3 2083 .\} 2084 \fBSMB3_02\fR: Windows 8\&.1 SMB3 version\&. 2085 .RE 2086 .sp 2087 .RS 4 2088 .ie n \{\ 2089 \h'-04'\(bu\h'+03'\c 2090 .\} 2091 .el \{\ 2092 .sp -1 2093 .IP \(bu 2.3 2094 .\} 2095 \fBSMB3_10\fR: early Windows 10 technical preview SMB3 version\&. 2096 .RE 2097 .sp 2098 .RS 4 2099 .ie n \{\ 2100 \h'-04'\(bu\h'+03'\c 2101 .\} 2102 .el \{\ 2103 .sp -1 2104 .IP \(bu 2.3 2105 .\} 2106 \fBSMB3_11\fR: Windows 10 technical preview SMB3 version (maybe final)\&. 2107 .RE 2108 .sp 2109 .RE 2110 By default SMB3 selects the SMB3_11 variant\&. 2111 .RE 2112 .sp 2113 .RE 2114 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 2115 .sp 2116 The value 2117 \fBdefault\fR 2118 refers to 2119 \fBNT1\fR\&. 2120 .sp 2121 IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the 2122 \m[blue]\fBclient ipc max protocol\fR\m[] 2123 option\&. 2124 .sp 2125 Default: 2126 \fI\fIclient max protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR 2127 .sp 2128 Example: 2129 \fI\fIclient max protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR 2130 .RE 2131 2132 client min protocol (G) 2133 .\" client min protocol 2134 .PP 2135 .RS 4 2136 This setting controls the minimum protocol version that the client will attempt to use\&. 2137 .sp 2138 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 2139 .sp 2140 See 2141 Related command: \m[blue]\fBclient max protocol\fR\m[] 2142 for a full list of available protocols\&. 2143 .sp 2144 IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the 2145 \m[blue]\fBclient ipc min protocol\fR\m[] 2146 option\&. 2147 .sp 2148 Default: 2149 \fI\fIclient min protocol\fR\fR\fI = \fR\fICORE\fR\fI \fR 2150 .sp 2151 Example: 2152 \fI\fIclient min protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR 2153 .RE 2154 2155 client NTLMv2 auth (G) 2156 .\" client NTLMv2 auth 1890 2157 .PP 1891 2158 .RS 4 … … 1907 2174 Note that Windows Vista and later versions already use NTLMv2 by default, and some sites (particularly those following \*(Aqbest practice\*(Aq security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\&. 1908 2175 .sp 1909 Default: 1910 \fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 2176 When 2177 \m[blue]\fBclient use spnego\fR\m[] 2178 is also set to 2179 \fByes\fR 2180 extended security (SPNEGO) is required in order to use NTLMv2 only within NTLMSSP\&. This behavior was introduced with the patches for CVE\-2016\-2111\&. 2181 .sp 2182 Default: 2183 \fI\fIclient NTLMv2 auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 1911 2184 .RE 1912 2185 … … 1933 2206 denies access if the server is not able to speak netlogon schannel\&. 1934 2207 .sp 2208 Note that for active directory domains this is hardcoded to 2209 \m[blue]\fBclient schannel = yes\fR\m[]\&. 2210 .sp 2211 This option yields precedence to the 2212 \m[blue]\fBrequire strong key\fR\m[] 2213 option\&. 2214 .sp 1935 2215 Default: 1936 2216 \fI\fIclient schannel\fR\fR\fI = \fR\fIauto\fR\fI \fR … … 1950 2230 \fIdisabled\fR\&. 1951 2231 .sp 1952 When set to auto, SMB signing is offered, but not enforced\&. When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\&. 1953 .sp 1954 Default: 1955 \fI\fIclient signing\fR\fR\fI = \fR\fIauto\fR\fI \fR 2232 When set to auto or default, SMB signing is offered, but not enforced\&. 2233 .sp 2234 When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\&. 2235 .sp 2236 IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the 2237 \m[blue]\fBclient ipc signing\fR\m[] 2238 option\&. 2239 .sp 2240 Default: 2241 \fI\fIclient signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR 1956 2242 .RE 1957 2243 … … 1966 2252 If enabled, Samba can attempt to use Kerberos to contact servers known only by IP address\&. Kerberos relies on names, so ordinarily cannot function in this situation\&. 1967 2253 .sp 2254 This is a VERY BAD IDEA for security reasons, and so this parameter SHOULD NOT BE USED\&. It will be removed in a future version of Samba\&. 2255 .sp 1968 2256 If disabled, Samba will use the name used to look up the server when asking the KDC for a ticket\&. This avoids situations where a server may impersonate another, soliciting authentication as one principal while being known on the network as another\&. 1969 2257 .sp 1970 2258 Note that Windows XP SP2 and later versions already follow this behaviour, and Windows Vista and later servers no longer supply this \*(Aqrfc4178 hint\*(Aq principal on the server side\&. 2259 .sp 2260 This parameter is deprecated in Samba 4\&.2\&.1 and will be removed (along with the functionality) in a later release of Samba\&. 1971 2261 .sp 1972 2262 Default: … … 1979 2269 .RS 4 1980 2270 This variable controls whether Samba clients will try to use Simple and Protected NEGOciation (as specified by rfc2478) with supporting servers (including WindowsXP, Windows2000 and Samba 3\&.0) to agree upon an authentication mechanism\&. This enables Kerberos authentication in particular\&. 2271 .sp 2272 When 2273 \m[blue]\fBclient NTLMv2 auth\fR\m[] 2274 is also set to 2275 \fByes\fR 2276 extended security (SPNEGO) is required in order to use NTLMv2 only within NTLMSSP\&. This behavior was introduced with the patches for CVE\-2016\-2111\&. 1981 2277 .sp 1982 2278 Default: … … 2092 2388 .PP 2093 2389 .RS 4 2094 Setting this param ter to2390 Setting this parameter to 2095 2391 no 2096 2392 prevents winbind from creating custom krb5\&.conf files\&. Winbind normally does this because the krb5 libraries are not AD\-site\-aware and thus would pick any domain controller out of potentially very many\&. Winbind is site\-aware and makes the krb5 libraries use a local DC by creating its own krb5\&.conf files\&. … … 2132 2428 for details\&. 2133 2429 .sp 2134 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\&. If the administrator wishes to enforce a mask on access control lists also, they need to set the2135 \m[blue]\fBsecurity mask\fR\m[]\&.2136 .sp2137 2430 Default: 2138 2431 \fI\fIcreate mask\fR\fR\fI = \fR\fI0744\fR\fI \fR … … 2193 2486 .PP 2194 2487 .RS 4 2195 This parameter specifies a timeout in seconds for the connection between Samba and ctdb\&. It is only valid if you have compiled Samba with clustering and if you have set2488 This parameter specifies a timeout in milliseconds for the connection between Samba and ctdb\&. It is only valid if you have compiled Samba with clustering and if you have set 2196 2489 \fIclustering=yes\fR\&. 2197 2490 .sp 2198 2491 When something in the cluster blocks, it can happen that we wait indefinitely long for ctdb, just adding to the blocking condition\&. In a well\-running cluster this should never happen, but there are too many components in a cluster that might have hickups\&. Choosing the right balance for this value is very tricky, because on a busy cluster long service times to transfer something across the cluster might be valid\&. Setting it too short will degrade the service your cluster presents, setting it too long might make the cluster itself not recover from something severely broken for too long\&. 2199 2492 .sp 2200 Be aware that if you set this parameter, this needs to be in the file smb\&.conf, it is not really helpful to put this into a registry configuration (typical on a cluster), because to access the registry contact to ctdb is requ red\&.2493 Be aware that if you set this parameter, this needs to be in the file smb\&.conf, it is not really helpful to put this into a registry configuration (typical on a cluster), because to access the registry contact to ctdb is required\&. 2201 2494 .sp 2202 2495 Setting 2203 2496 \fIctdb timeout\fR 2204 to n makes any process waiting longer than n seconds for a reply by the cluster panic\&. Setting it to 0 (the default) makes Samba block forever, which is the highly recommended default\&.2497 to n makes any process waiting longer than n milliseconds for a reply by the cluster panic\&. Setting it to 0 (the default) makes Samba block forever, which is the highly recommended default\&. 2205 2498 .sp 2206 2499 Default: … … 2243 2536 .sp 2244 2537 Default: 2245 \fI\fIcups encrypt\fR\fR\fI = \fR\fI "no"\fR\fI \fR2538 \fI\fIcups encrypt\fR\fR\fI = \fR\fIno\fR\fI \fR 2246 2539 .RE 2247 2540 … … 2295 2588 .RE 2296 2589 2590 dcerpc endpoint servers (G) 2591 .\" dcerpc endpoint servers 2592 .PP 2593 .RS 4 2594 Specifies which DCE/RPC endpoint servers should be run\&. 2595 .sp 2596 Default: 2597 \fI\fIdcerpc endpoint servers\fR\fR\fI = \fR\fIepmapper, wkssvc, rpcecho, samr, netlogon, lsarpc, spoolss, drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver\fR\fI \fR 2598 .sp 2599 Example: 2600 \fI\fIdcerpc endpoint servers\fR\fR\fI = \fR\fIrpcecho\fR\fI \fR 2601 .RE 2602 2297 2603 deadtime (G) 2298 2604 .\" deadtime … … 2372 2678 Default: 2373 2679 \fI\fIdebug prefix timestamp\fR\fR\fI = \fR\fIno\fR\fI \fR 2374 .RE2375 2376 timestamp logs2377 .\" timestamp logs2378 .PP2379 .RS 42380 This parameter is a synonym for2381 debug timestamp\&.2382 .RE2383 2384 debug timestamp (G)2385 .\" debug timestamp2386 .PP2387 .RS 42388 Samba debug log messages are timestamped by default\&. If you are running at a high2389 \m[blue]\fBdebug level\fR\m[]2390 these timestamps can be distracting\&. This boolean parameter allows timestamping to be turned off\&.2391 .sp2392 Default:2393 \fI\fIdebug timestamp\fR\fR\fI = \fR\fIyes\fR\fI \fR2394 2680 .RE 2395 2681 … … 2504 2790 .sp 2505 2791 Default: 2506 \fI\fIdefer sharing violations\fR\fR\fI = \fR\fI True\fR\fI \fR2792 \fI\fIdefer sharing violations\fR\fR\fI = \fR\fIyes\fR\fI \fR 2507 2793 .RE 2508 2794 … … 2512 2798 .RS 4 2513 2799 This is the full pathname to a script that will be run 2514 \fIAS ROOT\fR 2515 \fBsmbd\fR(8) 2800 \fIAS ROOT\fR\fBsmbd\fR(8) 2516 2801 when a group is requested to be deleted\&. It will expand any 2517 2802 \fI%g\fR … … 2632 2917 .RS 4 2633 2918 Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration tools\&. It will be run by 2634 \fBsmbd\fR(8) 2635 \fIAS ROOT\fR\&. Any 2919 \fBsmbd\fR(8)\fIAS ROOT\fR\&. Any 2636 2920 \fI%g\fR 2637 2921 will be replaced with the group name and any … … 2705 2989 .sp 2706 2990 Example: 2707 \fI\fIdfree cache time\fR\fR\fI = \fR\fI dfree cache time =60\fR\fI \fR2991 \fI\fIdfree cache time\fR\fR\fI = \fR\fI60\fR\fI \fR 2708 2992 .RE 2709 2993 … … 2767 3051 .RE 2768 3052 3053 dgram port (G) 3054 .\" dgram port 3055 .PP 3056 .RS 4 3057 Specifies which ports the server should listen on for NetBIOS datagram traffic\&. 3058 .sp 3059 Default: 3060 \fI\fIdgram port\fR\fR\fI = \fR\fI138\fR\fI \fR 3061 .RE 3062 2769 3063 directory mode 2770 3064 .\" directory mode … … 2791 3085 parameter\&. This parameter is set to 000 by default (i\&.e\&. no extra mode bits are added)\&. 2792 3086 .sp 2793 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\&. If the administrator wishes to enforce a mask on access control lists also, they need to set the2794 \m[blue]\fBdirectory security mask\fR\m[]\&.2795 .sp2796 3087 Default: 2797 3088 \fI\fIdirectory mask\fR\fR\fI = \fR\fI0755\fR\fI \fR … … 2805 3096 .PP 2806 3097 .RS 4 2807 This parameter specifies the thesize of the directory name cache\&. It will be needed to turn this off for *BSD systems\&.3098 This parameter specifies the size of the directory name cache\&. It will be needed to turn this off for *BSD systems\&. 2808 3099 .sp 2809 3100 Default: … … 2815 3106 .PP 2816 3107 .RS 4 2817 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\&. 2818 .sp 2819 This parameter is applied as a mask (AND\*(Aqed with) to the incoming permission bits, thus resetting any bits not in this mask\&. Make sure not to mix up this parameter with 2820 \m[blue]\fBforce directory security mode\fR\m[], which works similar like this one but uses logical OR instead of AND\&. Essentially, zero bits in this mask are a set of bits that will always be set to zero\&. 2821 .sp 2822 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\&. 2823 .sp 2824 If not set explicitly this parameter is set to 0777 meaning a user is allowed to set all the user/group/world permissions on a directory\&. 2825 .sp 2826 \fINote\fR 2827 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it as the default of 2828 \fB0777\fR\&. 2829 .sp 2830 Default: 2831 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI0777\fR\fI \fR 2832 .sp 2833 Example: 2834 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI0700\fR\fI \fR 3108 This parameter has been removed for Samba 4\&.0\&.0\&. 3109 .sp 3110 \fINo default\fR 2835 3111 .RE 2836 3112 … … 2870 3146 .RE 2871 3147 2872 display charset (G)2873 .\" display charset2874 .PP2875 .RS 42876 Specifies the charset that samba will use to print messages to stdout and stderr\&. The default value is "LOCALE", which means automatically set, depending on the current locale\&. The value should generally be the same as the value of the parameter2877 \m[blue]\fBunix charset\fR\m[]\&.2878 .sp2879 Default:2880 \fI\fIdisplay charset\fR\fR\fI = \fR\fI"LOCALE" or "ASCII" (depending on the system)\fR\fI \fR2881 .sp2882 Example:2883 \fI\fIdisplay charset\fR\fR\fI = \fR\fIUTF8\fR\fI \fR2884 .RE2885 2886 3148 dmapi support (S) 2887 3149 .\" dmapi support … … 2896 3158 Default: 2897 3159 \fI\fIdmapi support\fR\fR\fI = \fR\fIno\fR\fI \fR 3160 .RE 3161 3162 dns forwarder (G) 3163 .\" dns forwarder 3164 .PP 3165 .RS 4 3166 This option specifies the DNS server that DNS requests will be forwarded to if they can not be handled by Samba itself\&. 3167 .sp 3168 The DNS forwarder is only used if the internal DNS server in Samba is used\&. 3169 .sp 3170 Default: 3171 \fI\fIdns forwarder\fR\fR\fI = \fR\fI\fR\fI \fR 3172 .sp 3173 Example: 3174 \fI\fIdns forwarder\fR\fR\fI = \fR\fI192\&.168\&.0\&.1\fR\fI \fR 2898 3175 .RE 2899 3176 … … 2913 3190 Default: 2914 3191 \fI\fIdns proxy\fR\fR\fI = \fR\fIyes\fR\fI \fR 3192 .RE 3193 3194 dns update command (G) 3195 .\" dns update command 3196 .PP 3197 .RS 4 3198 This option sets the command that is called when there are DNS updates\&. It should update the local machines DNS names using TSIG\-GSS\&. 3199 .sp 3200 Default: 3201 \fI\fIdns update command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_dnsupdate\fR\fI \fR 3202 .sp 3203 Example: 3204 \fI\fIdns update command\fR\fR\fI = \fR\fI/usr/local/sbin/dnsupdate\fR\fI \fR 2915 3205 .RE 2916 3206 … … 3033 3323 .PP 3034 3324 .RS 4 3035 Under DOS and Windows, if a user can write to a file they can change the timestamp on it\&. Under POSIX semantics, only the owner of the file or root may change the timestamp\&. By default, Samba emulates the DOS semantics and allows to change the timestamp on a file if the user3325 Under DOS and Windows, if a user can write to a file they can change the timestamp on it\&. Under POSIX semantics, only the owner of the file or root may change the timestamp\&. By default, Samba emulates the DOS semantics and allows one to change the timestamp on a file if the user 3036 3326 smbd 3037 3327 is acting on behalf has write permissions\&. Due to changes in Microsoft Office 2000 and beyond, the default for this parameter has been changed from "no" to "yes" in Samba 3\&.0\&.14 and above\&. Microsoft Excel will display dialog box warnings about the file being changed by another user if this parameter is not set to "yes" and files are being shared between users\&. … … 3039 3329 Default: 3040 3330 \fI\fIdos filetimes\fR\fR\fI = \fR\fIyes\fR\fI \fR 3331 .RE 3332 3333 durable handles (S) 3334 .\" durable handles 3335 .PP 3336 .RS 4 3337 This boolean parameter controls whether Samba can grant SMB2 durable file handles on a share\&. 3338 .sp 3339 Note that durable handles are only enabled if 3340 \m[blue]\fBkernel oplocks = no\fR\m[], 3341 \m[blue]\fBkernel share modes = no\fR\m[], and 3342 \m[blue]\fBposix locking = no\fR\m[], i\&.e\&. if the share is configured for CIFS/SMB2 only access, not supporting interoperability features with local UNIX processes or NFS operations\&. 3343 .sp 3344 Also note that, for the time being, durability is not granted for a handle that has the delete on close flag set\&. 3345 .sp 3346 Default: 3347 \fI\fIdurable handles\fR\fR\fI = \fR\fIyes\fR\fI \fR 3041 3348 .RE 3042 3349 … … 3057 3364 .PP 3058 3365 .RS 4 3059 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builtin [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$ }file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&.3366 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builtin [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$] file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&. 3060 3367 .sp 3061 3368 Default: … … 3121 3428 \fBsmbpasswd\fR(8) 3122 3429 program for information on how to set up and maintain this file), or set the 3123 \m[blue]\fBsecurity = [ server|domain|ads]\fR\m[]3430 \m[blue]\fBsecurity = [domain|ads]\fR\m[] 3124 3431 parameter which causes 3125 3432 smbd … … 3168 3475 .RS 4 3169 3476 This option defines a list of log names that Samba will report to the Microsoft EventViewer utility\&. The listed eventlogs will be associated with tdb file on disk in the 3170 $( lockdir)/eventlog\&.3477 $(statedir)/eventlog\&. 3171 3478 .sp 3172 3479 The administrator must use an external process to parse the normal Unix logs such as … … 3189 3496 This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\&. Visual C++ generated makefiles have the object directory as a dependency for each object file, and a make rule to create the directory\&. Also, when NMAKE compares timestamps it uses the creation time when examining a directory\&. Thus the object directory will be created if it does not exist, but once it does exist it will always have an earlier timestamp than the object files it contains\&. 3190 3497 .sp 3191 However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or ordeleted in the directory\&. NMAKE finds all object files in the object directory\&. The timestamp of the last one built is then compared to the timestamp of the object directory\&. If the directory\*(Aqs timestamp if newer, then all object files will be rebuilt\&. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\&.3498 However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or deleted in the directory\&. NMAKE finds all object files in the object directory\&. The timestamp of the last one built is then compared to the timestamp of the object directory\&. If the directory\*(Aqs timestamp if newer, then all object files will be rebuilt\&. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\&. 3192 3499 .sp 3193 3500 Default: … … 3249 3556 .sp 3250 3557 Default: 3251 \fI\fIforce create mode\fR\fR\fI = \fR\fI000 \fR\fI \fR3558 \fI\fIforce create mode\fR\fR\fI = \fR\fI0000\fR\fI \fR 3252 3559 .sp 3253 3560 Example: … … 3268 3575 .sp 3269 3576 Default: 3270 \fI\fIforce directory mode\fR\fR\fI = \fR\fI000 \fR\fI \fR3577 \fI\fIforce directory mode\fR\fR\fI = \fR\fI0000\fR\fI \fR 3271 3578 .sp 3272 3579 Example: … … 3278 3585 .PP 3279 3586 .RS 4 3280 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\&. 3281 .sp 3282 This parameter is applied as a mask (OR\*(Aqed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\&. Make sure not to mix up this parameter with 3283 \m[blue]\fBdirectory security mask\fR\m[], which works in a similar manner to this one, but uses a logical AND instead of an OR\&. 3284 .sp 3285 Essentially, this mask may be treated as a set of bits that, when modifying security on a directory, to will enable (1) any flags that are off (0) but which the mask has set to on (1)\&. 3286 .sp 3287 If not set explicitly this parameter is 0000, which allows a user to modify all the user/group/world permissions on a directory without restrictions\&. 3288 .if n \{\ 3289 .sp 3290 .\} 3291 .RS 4 3292 .it 1 an-trap 3293 .nr an-no-space-flag 1 3294 .nr an-break-flag 1 3295 .br 3296 .ps +1 3297 \fBNote\fR 3298 .ps -1 3299 .br 3300 Users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it set as 0000\&. 3301 .sp .5v 3302 .RE 3303 Default: 3304 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI0\fR\fI \fR 3305 .sp 3306 Example: 3307 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI700\fR\fI \fR 3587 This parameter has been removed for Samba 4\&.0\&.0\&. 3588 .sp 3589 \fINo default\fR 3308 3590 .RE 3309 3591 … … 3365 3647 .PP 3366 3648 .RS 4 3367 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\&. 3368 .sp 3369 This parameter is applied as a mask (OR\*(Aqed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\&. Make sure not to mix up this parameter with 3370 \m[blue]\fBsecurity mask\fR\m[], which works similar like this one but uses logical AND instead of OR\&. 3371 .sp 3372 Essentially, one bits in this mask may be treated as a set of bits that, when modifying security on a file, the user has always set to be on\&. 3373 .sp 3374 If not set explicitly this parameter is set to 0, and allows a user to modify all the user/group/world permissions on a file, with no restrictions\&. 3375 .sp 3376 \fI Note\fR 3377 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave this set to 0000\&. 3378 .sp 3379 Default: 3380 \fI\fIforce security mode\fR\fR\fI = \fR\fI0\fR\fI \fR 3381 .sp 3382 Example: 3383 \fI\fIforce security mode\fR\fR\fI = \fR\fI700\fR\fI \fR 3649 This parameter has been removed for Samba 4\&.0\&.0\&. 3650 .sp 3651 \fINo default\fR 3384 3652 .RE 3385 3653 … … 3413 3681 Example: 3414 3682 \fI\fIforce user\fR\fR\fI = \fR\fIauser\fR\fI \fR 3683 .RE 3684 3685 fss: prune stale (G) 3686 .\" fss: prune stale 3687 .PP 3688 .RS 4 3689 When enabled, Samba\*(Aqs File Server Remove VSS Protocol (FSRVP) server checks all FSRVP initiated snapshots on startup, and removes any corresponding state (including share definitions) for nonexistent snapshot paths\&. 3690 .sp 3691 Default: 3692 \fI\fIfss: prune stale\fR\fR\fI = \fR\fIno\fR\fI \fR 3693 .sp 3694 Example: 3695 \fI\fIfss: prune stale\fR\fR\fI = \fR\fIyes\fR\fI \fR 3696 .RE 3697 3698 fss: sequence timeout (G) 3699 .\" fss: sequence timeout 3700 .PP 3701 .RS 4 3702 The File Server Remove VSS Protocol (FSRVP) server includes a message sequence timer to ensure cleanup on unexpected client disconnect\&. This parameter overrides the default timeout between FSRVP operations\&. FSRVP timeouts can be completely disabled via a value of 0\&. 3703 .sp 3704 Default: 3705 \fI\fIfss: sequence timeout\fR\fR\fI = \fR\fI180 or 1800, depending on operation\fR\fI \fR 3706 .sp 3707 Example: 3708 \fI\fIfss: sequence timeout\fR\fR\fI = \fR\fI0\fR\fI \fR 3415 3709 .RE 3416 3710 … … 3444 3738 should only be used whenever there is no operating system API available from the OS that samba can use\&. 3445 3739 .sp 3446 This option is only available you have compiled Samba with the 3447 \-\-with\-sys\-quotas 3448 option or on Linux with 3449 \-\-with\-quotas 3450 and a working quota api was found in the system\&. 3740 This option is only available Samba was compiled with quotas support\&. 3451 3741 .sp 3452 3742 This parameter should specify the path to a script that queries the quota information for the specified user/group for the partition that the specified directory is on\&. 3453 3743 .sp 3454 Such a script should take3 arguments:3744 Such a script is being given 3 arguments: 3455 3745 .sp 3456 3746 .RS 4 … … 3488 3778 .sp 3489 3779 .RE 3490 The type of query can be one of : 3780 The directory is actually mostly just "\&." \- It needs to be treated relatively to the current working directory that the script can also query\&. 3781 .sp 3782 The type of query can be one of: 3491 3783 .sp 3492 3784 .RS 4 … … 3535 3827 .sp 3536 3828 .RE 3537 This script should print one line as output with spaces between the arguments\&. The arguments are:3538 .sp 3539 .RS 4 3540 .ie n \{\ 3541 \h'-04'\(bu\h'+03'\c 3542 .\} 3543 .el \{\ 3544 .sp -1 3545 .IP \(bu 2.3 3546 .\} 3547 Arg1 \- quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced)3548 .RE 3549 .sp 3550 .RS 4 3551 .ie n \{\ 3552 \h'-04'\(bu\h'+03'\c 3553 .\} 3554 .el \{\ 3555 .sp -1 3556 .IP \(bu 2.3 3557 .\} 3558 Arg2 \- number of currently used blocks3559 .RE 3560 .sp 3561 .RS 4 3562 .ie n \{\ 3563 \h'-04'\(bu\h'+03'\c 3564 .\} 3565 .el \{\ 3566 .sp -1 3567 .IP \(bu 2.3 3568 .\} 3569 Arg3 \- the softlimit number of blocks3570 .RE 3571 .sp 3572 .RS 4 3573 .ie n \{\ 3574 \h'-04'\(bu\h'+03'\c 3575 .\} 3576 .el \{\ 3577 .sp -1 3578 .IP \(bu 2.3 3579 .\} 3580 Arg4 \- the hardlimit number of blocks3581 .RE 3582 .sp 3583 .RS 4 3584 .ie n \{\ 3585 \h'-04'\(bu\h'+03'\c 3586 .\} 3587 .el \{\ 3588 .sp -1 3589 .IP \(bu 2.3 3590 .\} 3591 Arg5 \- currently used number of inodes3592 .RE 3593 .sp 3594 .RS 4 3595 .ie n \{\ 3596 \h'-04'\(bu\h'+03'\c 3597 .\} 3598 .el \{\ 3599 .sp -1 3600 .IP \(bu 2.3 3601 .\} 3602 Arg6 \- the softlimit number of inodes3603 .RE 3604 .sp 3605 .RS 4 3606 .ie n \{\ 3607 \h'-04'\(bu\h'+03'\c 3608 .\} 3609 .el \{\ 3610 .sp -1 3611 .IP \(bu 2.3 3612 .\} 3613 Arg7 \- the hardlimit number of inodes3614 .RE 3615 .sp 3616 .RS 4 3617 .ie n \{\ 3618 \h'-04'\(bu\h'+03'\c 3619 .\} 3620 .el \{\ 3621 .sp -1 3622 .IP \(bu 2.3 3623 .\} 3624 Arg 8(optional) \- the number of bytes in a block(default is 1024)3829 This script should print one line as output with spaces between the columns\&. The printed columns should be: 3830 .sp 3831 .RS 4 3832 .ie n \{\ 3833 \h'-04'\(bu\h'+03'\c 3834 .\} 3835 .el \{\ 3836 .sp -1 3837 .IP \(bu 2.3 3838 .\} 3839 1 \- quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced) 3840 .RE 3841 .sp 3842 .RS 4 3843 .ie n \{\ 3844 \h'-04'\(bu\h'+03'\c 3845 .\} 3846 .el \{\ 3847 .sp -1 3848 .IP \(bu 2.3 3849 .\} 3850 2 \- number of currently used blocks 3851 .RE 3852 .sp 3853 .RS 4 3854 .ie n \{\ 3855 \h'-04'\(bu\h'+03'\c 3856 .\} 3857 .el \{\ 3858 .sp -1 3859 .IP \(bu 2.3 3860 .\} 3861 3 \- the softlimit number of blocks 3862 .RE 3863 .sp 3864 .RS 4 3865 .ie n \{\ 3866 \h'-04'\(bu\h'+03'\c 3867 .\} 3868 .el \{\ 3869 .sp -1 3870 .IP \(bu 2.3 3871 .\} 3872 4 \- the hardlimit number of blocks 3873 .RE 3874 .sp 3875 .RS 4 3876 .ie n \{\ 3877 \h'-04'\(bu\h'+03'\c 3878 .\} 3879 .el \{\ 3880 .sp -1 3881 .IP \(bu 2.3 3882 .\} 3883 5 \- currently used number of inodes 3884 .RE 3885 .sp 3886 .RS 4 3887 .ie n \{\ 3888 \h'-04'\(bu\h'+03'\c 3889 .\} 3890 .el \{\ 3891 .sp -1 3892 .IP \(bu 2.3 3893 .\} 3894 6 \- the softlimit number of inodes 3895 .RE 3896 .sp 3897 .RS 4 3898 .ie n \{\ 3899 \h'-04'\(bu\h'+03'\c 3900 .\} 3901 .el \{\ 3902 .sp -1 3903 .IP \(bu 2.3 3904 .\} 3905 7 \- the hardlimit number of inodes 3906 .RE 3907 .sp 3908 .RS 4 3909 .ie n \{\ 3910 \h'-04'\(bu\h'+03'\c 3911 .\} 3912 .el \{\ 3913 .sp -1 3914 .IP \(bu 2.3 3915 .\} 3916 8 (optional) \- the number of bytes in a block(default is 1024) 3625 3917 .RE 3626 3918 .sp … … 3784 4076 This parameter prevents clients from seeing the existance of files that cannot be read\&. Defaults to off\&. 3785 4077 .sp 4078 Please note that enabling this can slow down listing large directories significantly\&. Samba has to evaluate the ACLs of all directory members, which can be a lot of effort\&. 4079 .sp 3786 4080 Default: 3787 4081 \fI\fIhide unreadable\fR\fR\fI = \fR\fIno\fR\fI \fR … … 3793 4087 .RS 4 3794 4088 This parameter prevents clients from seeing the existance of files that cannot be written to\&. Defaults to off\&. Note that unwriteable directories are shown as usual\&. 4089 .sp 4090 Please note that enabling this can slow down listing large directories significantly\&. Samba has to evaluate the ACLs of all directory members, which can be a lot of effort\&. 3795 4091 .sp 3796 4092 Default: … … 3998 4294 .PP 3999 4295 .RS 4 4000 This parameter specifies the number of seconds that Winbind\*(Aqs idmap interface will cache positive SID/uid/gid query results\&. 4001 .sp 4002 Default: 4003 \fI\fIidmap cache time\fR\fR\fI = \fR\fI604800 (one week)\fR\fI \fR4004 .RE 4005 4006 idmap config (G)4007 .\" idmap config 4296 This parameter specifies the number of seconds that Winbind\*(Aqs idmap interface will cache positive SID/uid/gid query results\&. By default, Samba will cache these results for one week\&. 4297 .sp 4298 Default: 4299 \fI\fIidmap cache time\fR\fR\fI = \fR\fI604800\fR\fI \fR 4300 .RE 4301 4302 idmap config DOMAIN : OPTION (G) 4303 .\" idmap config DOMAIN : OPTION 4008 4304 .PP 4009 4305 .RS 4 … … 4014 4310 prefix, followed by a domain name or the asterisk character (*), a colon, and the name of an idmap setting for the chosen domain\&. 4015 4311 .sp 4016 The idmap configuration is hence divided into groups, one group for each domain to be configured, and one group with the the asterisk instead of a proper domain name, which speifies the default configuration that is used to catch all domains that do not have an explicit idmap configuration of their own\&.4312 The idmap configuration is hence divided into groups, one group for each domain to be configured, and one group with the asterisk instead of a proper domain name, which specifies the default configuration that is used to catch all domains that do not have an explicit idmap configuration of their own\&. 4017 4313 .sp 4018 4314 There are three general options available: … … 4020 4316 backend = backend_name 4021 4317 .RS 4 4022 This specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. The standard backends are tdb (\fBidmap_tdb\fR(8)), tdb2 (\fBidmap_tdb2\fR(8)), ldap (\fBidmap_ldap\fR(8)), , rid (\fBidmap_rid\fR(8)), , hash (\fBidmap_hash\fR(8)), , autorid (\fBidmap_autorid\fR(8)), , ad (\fBidmap_ad\fR(8)), , adex (\fBidmap_adex\fR(8)), , and nss\&. (\fBidmap_nss\fR(8)),The corresponding manual pages contain the details, but here is a summary\&.4023 .sp 4024 The first three of these create mappings of their own using internal unixid counters and store the mappings in a database\&. These are suitable for use in the default idmap configuration\&. The rid and hash backends use a pure algorithmic calculation to determine the unixid for a SID\&. The autorid module is a mixture of the tdb and rid backend\&. It creates ranges for each domain encountered and then uses the rid algorithm for each of these automatically configured domains individually\&. The ad and adex backends both use unix IDs stored in Active Directory via the standard schema extensions\&. The nss backend reverses the standard winbindd setup and gets the unixids via names from nsswitch which can be useful in an ldap setup\&.4318 This specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. The standard backends are tdb (\fBidmap_tdb\fR(8)), tdb2 (\fBidmap_tdb2\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), hash (\fBidmap_hash\fR(8)), autorid (\fBidmap_autorid\fR(8)), ad (\fBidmap_ad\fR(8)) and nss (\fBidmap_nss\fR(8))\&. The corresponding manual pages contain the details, but here is a summary\&. 4319 .sp 4320 The first three of these create mappings of their own using internal unixid counters and store the mappings in a database\&. These are suitable for use in the default idmap configuration\&. The rid and hash backends use a pure algorithmic calculation to determine the unixid for a SID\&. The autorid module is a mixture of the tdb and rid backend\&. It creates ranges for each domain encountered and then uses the rid algorithm for each of these automatically configured domains individually\&. The ad backend uses unix ids stored in Active Directory via the standard schema extensions\&. The nss backend reverses the standard winbindd setup and gets the unix ids via names from nsswitch which can be useful in an ldap setup\&. 4025 4321 .RE 4026 4322 .PP 4027 4323 range = low \- high 4028 4324 .RS 4 4029 Defines the available matching uid and gid range for which the backend is authoritative\&. For allocating backends, this also defines the start and the end of the range for allocating new uni dIDs\&.4325 Defines the available matching uid and gid range for which the backend is authoritative\&. For allocating backends, this also defines the start and the end of the range for allocating new unique IDs\&. 4030 4326 .sp 4031 4327 winbind uses this parameter to find the backend that is authoritative for a unix ID to SID mapping, so it must be set for each individually configured domain and for the default configuration\&. The configured ranges must be mutually disjoint\&. … … 4123 4419 .RE 4124 4420 4125 include ( G)4421 include (S) 4126 4422 .\" include 4127 4423 .PP … … 4166 4462 The ownership of new files and directories is normally governed by effective uid of the connected user\&. This option allows the Samba administrator to specify that the ownership for new files and directories should be controlled by the ownership of the parent directory\&. 4167 4463 .sp 4168 Common scenarios where this behavior is useful is in implementing drop\-boxes where users can create and edit files but not delete them and to ensure that newly create files in a user\*(Aqs roaming profile directory are actually ownerby the user\&.4464 Common scenarios where this behavior is useful is in implementing drop\-boxes, where users can create and edit files but not delete them and ensuring that newly created files in a user\*(Aqs roaming profile directory are actually owned by the user\&. 4169 4465 .sp 4170 4466 Default: … … 4203 4499 .RE 4204 4500 4501 init logon delay (G) 4502 .\" init logon delay 4503 .PP 4504 .RS 4 4505 This parameter specifies a delay in milliseconds for the hosts configured for delayed initial samlogon with 4506 \m[blue]\fBinit logon delayed hosts\fR\m[]\&. 4507 .sp 4508 Default: 4509 \fI\fIinit logon delay\fR\fR\fI = \fR\fI100\fR\fI \fR 4510 .RE 4511 4205 4512 init logon delayed hosts (G) 4206 4513 .\" init logon delayed hosts … … 4220 4527 .RE 4221 4528 4222 init logon delay (G)4223 .\" init logon delay4224 .PP4225 .RS 44226 This parameter specifies a delay in milliseconds for the hosts configured for delayed initial samlogon with4227 \m[blue]\fBinit logon delayed hosts\fR\m[]\&.4228 .sp4229 Default:4230 \fI\fIinit logon delay\fR\fR\fI = \fR\fI100\fR\fI \fR4231 .RE4232 4233 4529 interfaces (G) 4234 4530 .\" interfaces … … 4289 4585 .sp 4290 4586 By default Samba enables all active interfaces that are broadcast capable except the loopback adaptor (IP address 127\&.0\&.0\&.1)\&. 4587 .sp 4588 In order to support SMB3 multi\-channel configurations, smbd understands some extra data that can be appended after the actual interface with this extended syntax: 4589 .sp 4590 interface[;key1=value1[,key2=value2[\&.\&.\&.]]] 4591 .sp 4592 Known keys are speed, capability, and if_index\&. Speed is specified in bits per second\&. Known capabilities are RSS and RDMA\&. The if_index should be used with care: the values must not coincide with indexes used by the kernel\&. Note that these options are mainly intended for testing and development rather than for production use\&. At least on Linux systems, these values should be auto\-detected, but the settings can serve as last a resort when autodetection is not working or is not available\&. 4291 4593 .sp 4292 4594 The example below configures three network interfaces corresponding to the eth0 device and IP addresses 192\&.168\&.2\&.10 and 192\&.168\&.3\&.10\&. The netmasks of the latter two interfaces would be set to 255\&.255\&.255\&.0\&. … … 4355 4657 \m[blue]\fBsocket options\fR\m[])\&. Basically you should only use this option if you strike difficulties\&. 4356 4658 .sp 4659 Please note this option only applies to SMB1 client connections, and has no effect on SMB2 clients\&. 4660 .sp 4357 4661 Default: 4358 4662 \fI\fIkeepalive\fR\fR\fI = \fR\fI300\fR\fI \fR … … 4422 4726 .sp 4423 4727 Default: 4424 \fI\fIkerberos method\fR\fR\fI = \fR\fI secrets only\fR\fI \fR4425 .RE 4426 4427 kernel change notify ( S)4728 \fI\fIkerberos method\fR\fR\fI = \fR\fIdefault\fR\fI \fR 4729 .RE 4730 4731 kernel change notify (G) 4428 4732 .\" kernel change notify 4429 4733 .PP … … 4437 4741 .RE 4438 4742 4439 kernel oplocks ( G)4743 kernel oplocks (S) 4440 4744 .\" kernel oplocks 4441 4745 .PP … … 4443 4747 For UNIXes that support kernel based 4444 4748 \m[blue]\fBoplocks\fR\m[] 4445 (currently only IRIX and the Linux 2\&.4 kernel), this parameter allows the use of them to be turned on or off\&. 4749 (currently only IRIX and the Linux 2\&.4 kernel), this parameter allows the use of them to be turned on or off\&. However, this disables Level II oplocks for clients as the Linux and IRIX kernels do not support them properly\&. 4446 4750 .sp 4447 4751 Kernel oplocks support allows Samba … … 4453 4757 cool feature :\-)\&. 4454 4758 .sp 4759 If you do not need this interaction, you should disable the parameter on Linux and IRIX to get Level II oplocks and the associated performance benefit\&. 4760 .sp 4455 4761 This parameter defaults to 4456 \fBon\fR, but is translated to a no\-op on systems that no not have the necessary kernel support\&. You should never need to touch this parameter\&. 4457 .sp 4458 Default: 4459 \fI\fIkernel oplocks\fR\fR\fI = \fR\fIyes\fR\fI \fR 4762 \fBno\fR 4763 and is translated to a no\-op on systems that do not have the necessary kernel support\&. 4764 .sp 4765 Default: 4766 \fI\fIkernel oplocks\fR\fR\fI = \fR\fIno\fR\fI \fR 4767 .RE 4768 4769 kernel share modes (S) 4770 .\" kernel share modes 4771 .PP 4772 .RS 4 4773 This parameter controls whether SMB share modes are translated into UNIX flocks\&. 4774 .sp 4775 Kernel share modes provide a minimal level of interoperability with local UNIX processes and NFS operations by preventing access with flocks corresponding to the SMB share modes\&. Generally, it is very desirable to leave this enabled\&. 4776 .sp 4777 Note that in order to use SMB2 durable file handles on a share, you have to turn kernel share modes off\&. 4778 .sp 4779 This parameter defaults to 4780 \fByes\fR 4781 and is translated to a no\-op on systems that do not have the necessary kernel flock support\&. 4782 .sp 4783 Default: 4784 \fI\fIkernel share modes\fR\fR\fI = \fR\fIyes\fR\fI \fR 4785 .RE 4786 4787 kpasswd port (G) 4788 .\" kpasswd port 4789 .PP 4790 .RS 4 4791 Specifies which ports the Kerberos server should listen on for password changes\&. 4792 .sp 4793 Default: 4794 \fI\fIkpasswd port\fR\fR\fI = \fR\fI464\fR\fI \fR 4795 .RE 4796 4797 krb5 port (G) 4798 .\" krb5 port 4799 .PP 4800 .RS 4 4801 Specifies which port the KDC should listen on for Kerberos traffic\&. 4802 .sp 4803 Default: 4804 \fI\fIkrb5 port\fR\fR\fI = \fR\fI88\fR\fI \fR 4460 4805 .RE 4461 4806 … … 4472 4817 When this parameter is set to 4473 4818 no 4474 this will also result in sambaLMPassword in Samba\*(Aqs passdb being blanked after the next password change\&. As a result of that lanman clients won\*(Aqt be able to authenticate, even if lanman auth is re enabled later on\&.4819 this will also result in sambaLMPassword in Samba\*(Aqs passdb being blanked after the next password change\&. As a result of that lanman clients won\*(Aqt be able to authenticate, even if lanman auth is re\-enabled later on\&. 4475 4820 .sp 4476 4821 Unlike the … … 4548 4893 for tracing function calls\&. 4549 4894 .sp 4550 The debug ou put from the LDAP libraries appears with the prefix [LDAP] in Samba\*(Aqs logging output\&. The level at which LDAP logging is printed is controlled by the parameter4895 The debug output from the LDAP libraries appears with the prefix [LDAP] in Samba\*(Aqs logging output\&. The level at which LDAP logging is printed is controlled by the parameter 4551 4896 \fIldap debug threshold\fR\&. 4552 4897 .sp … … 4680 5025 .sp 4681 5026 Default: 4682 \fI\fIldap page size\fR\fR\fI = \fR\fI10 24\fR\fI \fR5027 \fI\fIldap page size\fR\fR\fI = \fR\fI1000\fR\fI \fR 4683 5028 .sp 4684 5029 Example: 4685 5030 \fI\fIldap page size\fR\fR\fI = \fR\fI512\fR\fI \fR 5031 .RE 5032 5033 ldap password sync 5034 .\" ldap password sync 5035 .PP 5036 .RS 4 5037 This parameter is a synonym for 5038 ldap passwd sync\&. 4686 5039 .RE 4687 5040 … … 4758 5111 .sp 4759 5112 To use this option, a basic ldap tree must be provided and the ldap suffix parameters must be properly configured\&. On virgin servers the default users and groups (Administrator, Guest, Domain Users, Domain Admins, Domain Guests) can be precreated with the command 4760 net sam provision\&. To run this command the ldap server must be running, Win indd must be running and the smb\&.conf ldap options must be properly configured\&. The typical ldap setup used with the5113 net sam provision\&. To run this command the ldap server must be running, Winbindd must be running and the smb\&.conf ldap options must be properly configured\&. The typical ldap setup used with the 4761 5114 \m[blue]\fBldapsam:trusted = yes\fR\m[] 4762 5115 option is usually sufficient to use … … 4859 5212 .RE 4860 5213 4861 ldap ssl ads (G) 4862 .\" ldap ssl ads 4863 .PP 4864 .RS 4 4865 This option is used to define whether or not Samba should use SSL when connecting to the ldap server using 4866 \fIads\fR 4867 methods\&. Rpc methods are not affected by this parameter\&. Please note, that this parameter won\*(Aqt have any effect if 4868 \m[blue]\fBldap ssl\fR\m[] 4869 is set to 4870 \fIno\fR\&. 4871 .sp 4872 See 4873 smb\&.conf(5) 4874 for more information on 4875 \m[blue]\fBldap ssl\fR\m[]\&. 4876 .sp 4877 Default: 4878 \fI\fIldap ssl ads\fR\fR\fI = \fR\fIno\fR\fI \fR 5214 ldap server require strong auth (G) 5215 .\" ldap server require strong auth 5216 .PP 5217 .RS 4 5218 The 5219 \m[blue]\fBldap server require strong auth\fR\m[] 5220 defines whether the ldap server requires ldap traffic to be signed or signed and encrypted (sealed)\&. Possible values are 5221 \fIno\fR, 5222 \fIallow_sasl_over_tls\fR 5223 and 5224 \fIyes\fR\&. 5225 .sp 5226 A value of 5227 \fIno\fR 5228 allows simple and sasl binds over all transports\&. 5229 .sp 5230 A value of 5231 \fIallow_sasl_over_tls\fR 5232 allows simple and sasl binds (without sign or seal) over TLS encrypted connections\&. Unencrypted connections only allow sasl binds with sign or seal\&. 5233 .sp 5234 A value of 5235 \fIyes\fR 5236 allows only simple binds over TLS encrypted connections\&. Unencrypted connections only allow sasl binds with sign or seal\&. 5237 .sp 5238 Default: 5239 \fI\fIldap server require strong auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 4879 5240 .RE 4880 5241 … … 4894 5255 \fIeither\fR 4895 5256 this parameter to 4896 \fIStart_tls\fR 4897 \fIor\fR 5257 \fIStart_tls\fR\fIor\fR 4898 5258 by specifying 4899 5259 \fIldaps://\fR … … 4934 5294 methods\&. To enable the LDAPv3 StartTLS extended operation (RFC2830) for 4935 5295 \fIads\fR, set 4936 \m[blue]\fBldap ssl = yes\fR\m[] 4937 \fIand\fR 4938 \m[blue]\fBldap ssl ads = yes\fR\m[]\&. See 5296 \m[blue]\fBldap ssl = yes\fR\m[]\fIand\fR\m[blue]\fBldap ssl ads = yes\fR\m[]\&. See 4939 5297 smb\&.conf(5) 4940 5298 for more information on … … 4943 5301 Default: 4944 5302 \fI\fIldap ssl\fR\fR\fI = \fR\fIstart tls\fR\fI \fR 5303 .RE 5304 5305 ldap ssl ads (G) 5306 .\" ldap ssl ads 5307 .PP 5308 .RS 4 5309 This option is used to define whether or not Samba should use SSL when connecting to the ldap server using 5310 \fIads\fR 5311 methods\&. Rpc methods are not affected by this parameter\&. Please note, that this parameter won\*(Aqt have any effect if 5312 \m[blue]\fBldap ssl\fR\m[] 5313 is set to 5314 \fIno\fR\&. 5315 .sp 5316 See 5317 smb\&.conf(5) 5318 for more information on 5319 \m[blue]\fBldap ssl\fR\m[]\&. 5320 .sp 5321 Default: 5322 \fI\fIldap ssl ads\fR\fR\fI = \fR\fIno\fR\fI \fR 4945 5323 .RE 4946 5324 … … 5099 5477 \fBno\fR 5100 5478 will cause 5101 nmbd 5102 \fInever\fR 5479 nmbd\fInever\fR 5103 5480 to become a local master browser\&. 5104 5481 .sp … … 5126 5503 .sp 5127 5504 Default: 5128 \fI\fIlock directory\fR\fR\fI = \fR\fI${prefix}/var/lock s\fR\fI \fR5505 \fI\fIlock directory\fR\fR\fI = \fR\fI${prefix}/var/lock\fR\fI \fR 5129 5506 .sp 5130 5507 Example: … … 5154 5531 Be careful about disabling locking either globally or in a specific service, as lack of locking may result in data corruption\&. You should never need to set this parameter\&. 5155 5532 .sp 5156 \fINo default\fR 5157 .RE 5158 5159 lock spin count (G) 5160 .\" lock spin count 5161 .PP 5162 .RS 4 5163 This parameter has been made inoperative in Samba 3\&.0\&.24\&. The functionality it contolled is now controlled by the parameter 5164 \m[blue]\fBlock spin time\fR\m[]\&. 5165 .sp 5166 Default: 5167 \fI\fIlock spin count\fR\fR\fI = \fR\fI0\fR\fI \fR 5533 Default: 5534 \fI\fIlocking\fR\fR\fI = \fR\fIyes\fR\fI \fR 5168 5535 .RE 5169 5536 … … 5194 5561 .RE 5195 5562 5563 logging (G) 5564 .\" logging 5565 .PP 5566 .RS 4 5567 This parameter configures logging backends\&. Multiple backends can be specified at the same time, with different log levels for each backend\&. The parameter is a list of backends, where each backend is specified as backend[:option][@loglevel]\&. 5568 .sp 5569 The \*(Aqoption\*(Aq parameter can be used to pass backend\-specific options\&. 5570 .sp 5571 The log level for a backend is optional, if it is not set for a backend, all messages are sent to this backend\&. The parameter 5572 \m[blue]\fBlog level\fR\m[] 5573 determines overall log levels, while the log levels specified here define what is sent to the individual backends\&. 5574 .sp 5575 When 5576 \m[blue]\fBlogging\fR\m[] 5577 is set, it overrides the 5578 \m[blue]\fBsyslog\fR\m[] 5579 and 5580 \m[blue]\fBsyslog only\fR\m[] 5581 parameters\&. 5582 .sp 5583 Some backends are only available when Samba has been compiled with the additional libraries\&. The overall list of logging backends: 5584 .sp 5585 .RS 4 5586 .ie n \{\ 5587 \h'-04'\(bu\h'+03'\c 5588 .\} 5589 .el \{\ 5590 .sp -1 5591 .IP \(bu 2.3 5592 .\} 5593 \fIsyslog\fR 5594 .RE 5595 .sp 5596 .RS 4 5597 .ie n \{\ 5598 \h'-04'\(bu\h'+03'\c 5599 .\} 5600 .el \{\ 5601 .sp -1 5602 .IP \(bu 2.3 5603 .\} 5604 \fIfile\fR 5605 .RE 5606 .sp 5607 .RS 4 5608 .ie n \{\ 5609 \h'-04'\(bu\h'+03'\c 5610 .\} 5611 .el \{\ 5612 .sp -1 5613 .IP \(bu 2.3 5614 .\} 5615 \fIsystemd\fR 5616 .RE 5617 .sp 5618 .RS 4 5619 .ie n \{\ 5620 \h'-04'\(bu\h'+03'\c 5621 .\} 5622 .el \{\ 5623 .sp -1 5624 .IP \(bu 2.3 5625 .\} 5626 \fIlttng\fR 5627 .RE 5628 .sp 5629 .RS 4 5630 .ie n \{\ 5631 \h'-04'\(bu\h'+03'\c 5632 .\} 5633 .el \{\ 5634 .sp -1 5635 .IP \(bu 2.3 5636 .\} 5637 \fIgpfs\fR 5638 .RE 5639 .sp 5640 .RE 5641 Default: 5642 \fI\fIlogging\fR\fR\fI = \fR\fI\fR\fI \fR 5643 .sp 5644 Example: 5645 \fI\fIlogging\fR\fR\fI = \fR\fIsyslog@1 file\fR\fI \fR 5646 .RE 5647 5196 5648 debuglevel 5197 5649 .\" debuglevel … … 5210 5662 file\&. 5211 5663 .sp 5212 This parameter has been extended since the 2\&.2\&.x series, now it allows to specify the debug level for multiple debug classes\&. This is to give greater flexibility in the configuration of the system\&. The following debug classes are currently implemented:5664 This parameter has been extended since the 2\&.2\&.x series, now it allows one to specify the debug level for multiple debug classes\&. This is to give greater flexibility in the configuration of the system\&. The following debug classes are currently implemented: 5213 5665 .sp 5214 5666 .RS 4 … … 5438 5890 Example: 5439 5891 \fI\fIlog level\fR\fR\fI = \fR\fI3 passdb:5 auth:10 winbind:2\fR\fI \fR 5892 .RE 5893 5894 log nt token command (G) 5895 .\" log nt token command 5896 .PP 5897 .RS 4 5898 This option can be set to a command that will be called when new nt tokens are created\&. 5899 .sp 5900 This is only useful for development purposes\&. 5901 .sp 5902 Default: 5903 \fI\fIlog nt token command\fR\fR\fI = \fR\fI\fR\fI \fR 5440 5904 .RE 5441 5905 … … 5462 5926 This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC\&. It allows you to do 5463 5927 .sp 5464 5465 5928 C:\e>\fBNET USE H: /HOME\fR 5466 5929 .sp … … 5471 5934 This parameter can be used with Win9X workstations to ensure that roaming profiles are stored in a subdirectory of the user\*(Aqs home directory\&. This is done in the following way: 5472 5935 .sp 5473 5474 5936 logon home = \e\e%N\e%U\eprofile 5475 5937 .sp … … 5640 6102 Note that it is good practice to include the absolute path in the lppause command as the PATH may not be available to the server\&. 5641 6103 .sp 5642 Default: 5643 \fI\fIlppause command\fR\fR\fI = \fR\fI # Currently no default value is given to this string, unless the value of the \m[blue]\fBprinting\fR\m[] parameter is \fBSYSV\fR, in which case the default is : lp \-i %p\-%j \-H hold or if the value of the \fIprinting\fR parameter is \fBSOFTQ\fR, then the default is: qstat \-s \-j%j \-h\&. \fR\fI \fR 6104 Currently no default value is given to this string, unless the value of the 6105 \m[blue]\fBprinting\fR\m[] 6106 parameter is 6107 \fBSYSV\fR, in which case the default is : 6108 lp \-i %p\-%j \-H hold 6109 or if the value of the 6110 \fIprinting\fR 6111 parameter is 6112 \fBSOFTQ\fR, then the default is: 6113 qstat \-s \-j%j \-h\&. 6114 .sp 6115 Default: 6116 \fI\fIlppause command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 5644 6117 .sp 5645 6118 Example: … … 5708 6181 .sp 5709 6182 Default: 5710 \fI\fIlpq command\fR\fR\fI = \fR\fI \fR\fI \fR6183 \fI\fIlpq command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 5711 6184 .sp 5712 6185 Example: … … 5752 6225 qstat \-s \-j%j \-r 5753 6226 .sp 5754 \fINo default\fR 6227 Default: 6228 \fI\fIlpresume command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 5755 6229 .sp 5756 6230 Example: … … 5793 6267 .sp 5794 6268 Default: 5795 \fI\fIlprm command\fR\fR\fI = \fR\fI determined by printing parameter\fR\fI \fR6269 \fI\fIlprm command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 5796 6270 .RE 5797 6271 … … 5800 6274 .PP 5801 6275 .RS 4 5802 If a Samba server is a member of a Windows NT Domain (see the6276 If a Samba server is a member of a Windows NT or Active Directory Domain (see the 5803 6277 \m[blue]\fBsecurity = domain\fR\m[] 5804 parameter) then periodically a running smbd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called 5805 private/secrets\&.tdb\&. This parameter specifies how often this password will be changed, in seconds\&. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\&. 6278 and 6279 \m[blue]\fBsecurity = ads\fR\m[] 6280 parameters), then periodically a running winbindd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called 6281 secrets\&.tdb\&. This parameter specifies how often this password will be changed, in seconds\&. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\&. 5806 6282 .sp 5807 6283 See also 5808 6284 \fBsmbpasswd\fR(8), and the 5809 6285 \m[blue]\fBsecurity = domain\fR\m[] 5810 parameter\&. 6286 and 6287 \m[blue]\fBsecurity = ads\fR\m[] 6288 parameters\&. 5811 6289 .sp 5812 6290 Default: … … 5839 6317 .RE 5840 6318 Default: 5841 \fI\fImagic output\fR\fR\fI = \fR\fI <magic script name>\&.out\fR\fI \fR6319 \fI\fImagic output\fR\fR\fI = \fR\fI # <magic script name>\&.out\fR\fI \fR 5842 6320 .sp 5843 6321 Example: … … 5969 6447 .PP 5970 6448 .RS 4 5971 controls the algorithm used for the generating the mangled names\&. Can take two different values, "hash" and "hash2"\&. "hash" is the algorithm that was used usedin Samba for many years and was the default in Samba 2\&.2\&.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\&. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\&.6449 controls the algorithm used for the generating the mangled names\&. Can take two different values, "hash" and "hash2"\&. "hash" is the algorithm that was used in Samba for many years and was the default in Samba 2\&.2\&.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\&. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\&. 5972 6450 .sp 5973 6451 Default: … … 5995 6473 .RS 4 5996 6474 This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit\&. The DOS archive bit is set when a file has been modified since its last backup\&. One motivation for this option is to keep Samba/your PC from making any file it touches from becoming executable under UNIX\&. This can be quite annoying for shared source code, documents, etc\&.\&.\&. 6475 .sp 6476 Note that this parameter will be ignored if the 6477 \m[blue]\fBstore dos attributes\fR\m[] 6478 parameter is set, as the DOS archive attribute will then be stored inside a UNIX extended attribute\&. 5997 6479 .sp 5998 6480 Note that this requires the … … 6012 6494 This controls whether DOS style hidden files should be mapped to the UNIX world execute bit\&. 6013 6495 .sp 6496 Note that this parameter will be ignored if the 6497 \m[blue]\fBstore dos attributes\fR\m[] 6498 parameter is set, as the DOS hidden attribute will then be stored inside a UNIX extended attribute\&. 6499 .sp 6014 6500 Note that this requires the 6015 6501 \m[blue]\fBcreate mask\fR\m[] … … 6018 6504 for details\&. 6019 6505 .sp 6020 \fINo default\fR 6506 Default: 6507 \fI\fImap hidden\fR\fR\fI = \fR\fIno\fR\fI \fR 6021 6508 .RE 6022 6509 … … 6049 6536 .IP \(bu 2.3 6050 6537 .\} 6051 6052 6538 \fBYes\fR 6053 6539 \- The read only DOS attribute is mapped to the inverse of the user or owner write bit in the unix permission mode set\&. If the owner write bit is not set, the read only attribute is reported as being set on the file\&. If the read only DOS attribute is set, Samba sets the owner, group and others write bits to zero\&. Write bits set in an ACL are ignored by Samba\&. If the read only DOS attribute is unset, Samba simply sets the write bit of the owner to one\&. … … 6062 6548 .IP \(bu 2.3 6063 6549 .\} 6064 6065 6550 \fBPermissions\fR 6066 6551 \- The read only DOS attribute is mapped to the effective permissions of the connecting user, as evaluated by … … 6077 6562 .IP \(bu 2.3 6078 6563 .\} 6079 6080 6564 \fBNo\fR 6081 6565 \- The read only DOS attribute is unaffected by permissions, and can only be set by the … … 6085 6569 .sp 6086 6570 .RE 6571 Note that this parameter will be ignored if the 6572 \m[blue]\fBstore dos attributes\fR\m[] 6573 parameter is set, as the DOS \*(Aqread\-only\*(Aq attribute will then be stored inside a UNIX extended attribute\&. 6574 .sp 6087 6575 Default: 6088 6576 \fI\fImap readonly\fR\fR\fI = \fR\fIyes\fR\fI \fR … … 6094 6582 .RS 4 6095 6583 This controls whether DOS style system files should be mapped to the UNIX group execute bit\&. 6584 .sp 6585 Note that this parameter will be ignored if the 6586 \m[blue]\fBstore dos attributes\fR\m[] 6587 parameter is set, as the DOS system attribute will then be stored inside a UNIX extended attribute\&. 6096 6588 .sp 6097 6589 Note that this requires the … … 6109 6601 .PP 6110 6602 .RS 4 6111 This parameter is only useful in6112 \m[blue]\fBSECURITY = security\fR\m[]6113 modes other than6114 \fIsecurity = share\fR6115 and6116 \fIsecurity = server\fR6117 \- i\&.e\&.6118 \fBuser\fR, and6119 \fBdomain\fR\&.6120 .sp6121 6603 This parameter can take four different values, which tell 6122 6604 \fBsmbd\fR(8) … … 6180 6662 .sp 6181 6663 .RE 6182 Note that this parameter is needed to set up "Guest" share services when using 6183 \fIsecurity\fR 6184 modes other than share and server\&. This is because in these modes the name of the resource being requested is 6664 Note that this parameter is needed to set up "Guest" share services\&. This is because in these modes the name of the resource being requested is 6185 6665 \fInot\fR 6186 sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\&. This parameter is not useful with 6187 \fIsecurity = server\fR 6188 as in this security mode no information is returned about whether a user logon failed due to a bad username or bad password, the same error is returned from a modern server in both cases\&. 6189 .sp 6190 For people familiar with the older Samba releases, this parameter maps to the old compile\-time setting of the 6191 \fB GUEST_SESSSETUP\fR 6192 value in local\&.h\&. 6666 sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\&. 6193 6667 .sp 6194 6668 Default: … … 6289 6763 This parameter limits the maximum number of open files that one 6290 6764 \fBsmbd\fR(8) 6291 file serving process may have open for a client at any one time\&. Th e This parameter can be set very high (16404) as Samba uses only one bit per unopened file\&. Setting this parameter lower than 16404 will cause Samba to complain and set this value back to the minimum of 16404, as Windows 7 depends on this number of open file handles being available\&.6765 file serving process may have open for a client at any one time\&. This parameter can be set very high (16384) as Samba uses only one bit per unopened file\&. Setting this parameter lower than 16384 will cause Samba to complain and set this value back to the minimum of 16384, as Windows 7 depends on this number of open file handles being available\&. 6292 6766 .sp 6293 6767 The limit of the number of open files is usually set by the UNIX per\-process file descriptor limit rather than this parameter so you should never need to touch this parameter\&. 6294 6768 .sp 6295 6769 Default: 6296 \fI\fImax open files\fR\fR\fI = \fR\fI16 404\fR\fI \fR6770 \fI\fImax open files\fR\fR\fI = \fR\fI16384\fR\fI \fR 6297 6771 .RE 6298 6772 … … 6310 6784 Example: 6311 6785 \fI\fImax print jobs\fR\fR\fI = \fR\fI5000\fR\fI \fR 6312 .RE6313 6314 protocol6315 .\" protocol6316 .PP6317 .RS 46318 This parameter is a synonym for6319 max protocol\&.6320 .RE6321 6322 max protocol (G)6323 .\" max protocol6324 .PP6325 .RS 46326 The value of the parameter (a string) is the highest protocol level that will be supported by the server\&.6327 .sp6328 Possible values are :6329 .sp6330 .RS 46331 .ie n \{\6332 \h'-04'\(bu\h'+03'\c6333 .\}6334 .el \{\6335 .sp -16336 .IP \(bu 2.36337 .\}6338 \fBCORE\fR: Earliest version\&. No concept of user names\&.6339 .RE6340 .sp6341 .RS 46342 .ie n \{\6343 \h'-04'\(bu\h'+03'\c6344 .\}6345 .el \{\6346 .sp -16347 .IP \(bu 2.36348 .\}6349 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency\&.6350 .RE6351 .sp6352 .RS 46353 .ie n \{\6354 \h'-04'\(bu\h'+03'\c6355 .\}6356 .el \{\6357 .sp -16358 .IP \(bu 2.36359 .\}6360 \fBLANMAN1\fR: First6361 \fI modern\fR6362 version of the protocol\&. Long filename support\&.6363 .RE6364 .sp6365 .RS 46366 .ie n \{\6367 \h'-04'\(bu\h'+03'\c6368 .\}6369 .el \{\6370 .sp -16371 .IP \(bu 2.36372 .\}6373 \fBLANMAN2\fR: Updates to Lanman1 protocol\&.6374 .RE6375 .sp6376 .RS 46377 .ie n \{\6378 \h'-04'\(bu\h'+03'\c6379 .\}6380 .el \{\6381 .sp -16382 .IP \(bu 2.36383 .\}6384 \fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&.6385 .RE6386 .sp6387 .RS 46388 .ie n \{\6389 \h'-04'\(bu\h'+03'\c6390 .\}6391 .el \{\6392 .sp -16393 .IP \(bu 2.36394 .\}6395 \fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and newer\&.6396 .RE6397 .sp6398 .RE6399 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.6400 .sp6401 Default:6402 \fI\fImax protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR6403 .sp6404 Example:6405 \fI\fImax protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR6406 6786 .RE 6407 6787 … … 6608 6988 .RE 6609 6989 6610 min protocol (G)6611 .\" min protocol6612 .PP6613 .RS 46614 The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support\&. Please refer to the6615 \m[blue]\fBmax protocol\fR\m[]6616 parameter for a list of valid protocol names and a brief description of each\&. You may also wish to refer to the C source code in6617 source/smbd/negprot\&.c6618 for a listing of known protocol dialects supported by clients\&.6619 .sp6620 If you are viewing this parameter as a security measure, you should also refer to the6621 \m[blue]\fBlanman auth\fR\m[]6622 parameter\&. Otherwise, you should never need to change this parameter\&.6623 .sp6624 Default:6625 \fI\fImin protocol\fR\fR\fI = \fR\fICORE\fR\fI \fR6626 .sp6627 Example:6628 \fI\fImin protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR6629 .RE6630 6631 6990 min receivefile size (G) 6632 6991 .\" min receivefile size … … 6639 6998 Note this option will have NO EFFECT if set on a SMB signed connection\&. 6640 6999 .sp 6641 The default is zero, which di ables this option\&.7000 The default is zero, which disables this option\&. 6642 7001 .sp 6643 7002 Default: … … 6663 7022 .PP 6664 7023 .RS 4 6665 This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\&. When clients attempt to connect to this share, they are redirected to the proxied shareusing the SMB\-Dfs protocol\&.7024 This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\&. When clients attempt to connect to this share, they are redirected to one or multiple, comma separated proxied shares using the SMB\-Dfs protocol\&. 6666 7025 .sp 6667 7026 Only Dfs roots can act as proxy shares\&. Take a look at the … … 6674 7033 .sp 6675 7034 Example: 6676 \fI\fImsdfs proxy\fR\fR\fI = \fR\fI\eotherserver\esomeshare \fR\fI \fR7035 \fI\fImsdfs proxy\fR\fR\fI = \fR\fI\eotherserver\esomeshare,\eotherserver2\esomeshare\fR\fI \fR 6677 7036 .RE 6678 7037 … … 6690 7049 .RE 6691 7050 7051 msdfs shuffle referrals (S) 7052 .\" msdfs shuffle referrals 7053 .PP 7054 .RS 4 7055 If set to 7056 \fByes\fR, Samba will shuffle Dfs referrals for a given Dfs link if multiple are available, allowing for load balancing across clients\&. For more information on setting up a Dfs tree on Samba, refer to the MSDFS chapter in the Samba3\-HOWTO book\&. 7057 .sp 7058 Default: 7059 \fI\fImsdfs shuffle referrals\fR\fR\fI = \fR\fIno\fR\fI \fR 7060 .RE 7061 6692 7062 multicast dns register (G) 6693 7063 .\" multicast dns register … … 6731 7101 .IP \(bu 2.3 6732 7102 .\} 6733 6734 7103 \fBlmhosts\fR 6735 7104 : Lookup an IP address in the Samba lmhosts file\&. If the line in lmhosts has no name type attached to the NetBIOS name (see the manpage for lmhosts for details) then any name type matches for lookup\&. … … 6744 7113 .IP \(bu 2.3 6745 7114 .\} 6746 6747 7115 \fBhost\fR 6748 7116 : Do a standard host name to IP address resolution, using the system … … 6797 7165 .RE 6798 7166 7167 socket address 7168 .\" socket address 7169 .PP 7170 .RS 4 7171 This parameter is a synonym for 7172 nbt client socket address\&. 7173 .RE 7174 7175 nbt client socket address (G) 7176 .\" nbt client socket address 7177 .PP 7178 .RS 4 7179 This option allows you to control what address Samba will send NBT client packets from, and process replies using, including in nmbd\&. 7180 .sp 7181 Setting this option should never be necessary on usual Samba servers running only one nmbd\&. 7182 .sp 7183 By default Samba will send UDP packets from the OS default address for the destination, and accept replies on 0\&.0\&.0\&.0\&. 7184 .sp 7185 This parameter is deprecated\&. See 7186 \m[blue]\fBbind interfaces only = Yes\fR\m[] 7187 and 7188 \m[blue]\fBinterfaces\fR\m[] 7189 for the previous behaviour of controlling the normal listening sockets\&. 7190 .sp 7191 Default: 7192 \fI\fInbt client socket address\fR\fR\fI = \fR\fI0\&.0\&.0\&.0\fR\fI \fR 7193 .sp 7194 Example: 7195 \fI\fInbt client socket address\fR\fR\fI = \fR\fI192\&.168\&.2\&.20\fR\fI \fR 7196 .RE 7197 7198 nbt port (G) 7199 .\" nbt port 7200 .PP 7201 .RS 4 7202 Specifies which port the server should use for NetBIOS over IP name services traffic\&. 7203 .sp 7204 Default: 7205 \fI\fInbt port\fR\fR\fI = \fR\fI137\fR\fI \fR 7206 .RE 7207 6799 7208 ncalrpc dir (G) 6800 7209 .\" ncalrpc dir … … 6803 7212 This directory will hold a series of named pipes to allow RPC over inter\-process communication\&. 6804 7213 .sp 6805 \&. 6806 This will allow Samba and other unix processes to interact over DCE/RPC without using TCP/IP\&. Additionally a sub\-directory \*(Aqnp\*(Aq has restricted permissions, and allows a trusted communication channel between Samba processes 6807 .sp 6808 Default: 6809 \fI\fIncalrpc dir\fR\fR\fI = \fR\fI${prefix}/var/ncalrpc\fR\fI \fR 7214 This will allow Samba and other unix processes to interact over DCE/RPC without using TCP/IP\&. Additionally a sub\-directory \*(Aqnp\*(Aq has restricted permissions, and allows a trusted communication channel between Samba processes 7215 .sp 7216 Default: 7217 \fI\fIncalrpc dir\fR\fR\fI = \fR\fI${prefix}/var/run/ncalrpc\fR\fI \fR 6810 7218 .sp 6811 7219 Example: … … 6832 7240 This sets the NetBIOS name by which a Samba server is known\&. By default it is the same as the first component of the host\*(Aqs DNS name\&. If a machine is a browse server or logon server this name (or the first component of the hosts DNS name) will be the name that these services are advertised under\&. 6833 7241 .sp 6834 There is a bug in Samba\-3 that breaks operation of browsing and access to shares if the netbios name is set to the literal name 6835 PIPE\&. To avoid this problem, do not name your Samba\-3 server 7242 Note that the maximum length for a NetBIOS name is 15 charactars\&. 7243 .sp 7244 There is a bug in Samba that breaks operation of browsing and access to shares if the netbios name is set to the literal name 7245 PIPE\&. To avoid this problem, do not name your Samba server 6836 7246 PIPE\&. 6837 7247 .sp … … 6853 7263 .RE 6854 7264 6855 nis homedir (G) 6856 .\" nis homedir 7265 neutralize nt4 emulation (G) 7266 .\" neutralize nt4 emulation 7267 .PP 7268 .RS 4 7269 This option controls whether winbindd sends the NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION flag in order to bypass the NT4 emulation of a domain controller\&. 7270 .sp 7271 Typically you should not need set this\&. It can be useful for upgrades from NT4 to AD domains\&. 7272 .sp 7273 The behavior can be controlled per netbios domain by using \*(Aqneutralize nt4 emulation:NETBIOSDOMAIN = yes\*(Aq as option\&. 7274 .sp 7275 Default: 7276 \fI\fIneutralize nt4 emulation\fR\fR\fI = \fR\fIno\fR\fI \fR 7277 .RE 7278 7279 NIS homedir (G) 7280 .\" NIS homedir 6857 7281 .PP 6858 7282 .RS 4 … … 6868 7292 .sp 6869 7293 Default: 6870 \fI\fI nishomedir\fR\fR\fI = \fR\fIno\fR\fI \fR7294 \fI\fINIS homedir\fR\fR\fI = \fR\fIno\fR\fI \fR 6871 7295 .RE 6872 7296 … … 6885 7309 .RE 6886 7310 7311 nsupdate command (G) 7312 .\" nsupdate command 7313 .PP 7314 .RS 4 7315 This option sets the path to the 7316 nsupdate 7317 command which is used for GSS\-TSIG dynamic DNS updates\&. 7318 .sp 7319 Default: 7320 \fI\fInsupdate command\fR\fR\fI = \fR\fI/usr/bin/nsupdate \-g\fR\fI \fR 7321 .RE 7322 6887 7323 nt acl support (S) 6888 7324 .\" nt acl support … … 6891 7327 This boolean parameter controls whether 6892 7328 \fBsmbd\fR(8) 6893 will attempt to map UNIX permissions into Windows NT access control lists\&. The UNIX permissions considered are the t he traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\&. This parameter was formally a global parameter in releases prior to 2\&.2\&.2\&.7329 will attempt to map UNIX permissions into Windows NT access control lists\&. The UNIX permissions considered are the traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\&. This parameter was formally a global parameter in releases prior to 2\&.2\&.2\&. 6894 7330 .sp 6895 7331 Default: … … 6927 7363 .RE 6928 7364 7365 ntp signd socket directory (G) 7366 .\" ntp signd socket directory 7367 .PP 7368 .RS 4 7369 This setting controls the location of the socket that the NTP daemon uses to communicate with Samba for signing packets\&. 7370 .sp 7371 If a non\-default path is specified here, then it is also necessary to make NTP aware of the new path using the 7372 \fBntpsigndsocket\fR 7373 directive in 7374 ntp\&.conf\&. 7375 .sp 7376 Default: 7377 \fI\fIntp signd socket directory\fR\fR\fI = \fR\fI${prefix}/var/lib/ntp_signd\fR\fI \fR 7378 .RE 7379 6929 7380 nt status support (G) 6930 7381 .\" nt status support … … 6943 7394 .RE 6944 7395 7396 ntvfs handler (S) 7397 .\" ntvfs handler 7398 .PP 7399 .RS 4 7400 This specifies the NTVFS handlers for this share\&. 7401 .sp 7402 .RS 4 7403 .ie n \{\ 7404 \h'-04'\(bu\h'+03'\c 7405 .\} 7406 .el \{\ 7407 .sp -1 7408 .IP \(bu 2.3 7409 .\} 7410 posix: Maps POSIX FS semantics to NT semantics 7411 .RE 7412 .sp 7413 .RS 4 7414 .ie n \{\ 7415 \h'-04'\(bu\h'+03'\c 7416 .\} 7417 .el \{\ 7418 .sp -1 7419 .IP \(bu 2.3 7420 .\} 7421 unixuid: Sets up user credentials based on POSIX gid/uid\&. 7422 .RE 7423 .sp 7424 .RS 4 7425 .ie n \{\ 7426 \h'-04'\(bu\h'+03'\c 7427 .\} 7428 .el \{\ 7429 .sp -1 7430 .IP \(bu 2.3 7431 .\} 7432 cifs: Proxies a remote CIFS FS\&. Mainly useful for testing\&. 7433 .RE 7434 .sp 7435 .RS 4 7436 .ie n \{\ 7437 \h'-04'\(bu\h'+03'\c 7438 .\} 7439 .el \{\ 7440 .sp -1 7441 .IP \(bu 2.3 7442 .\} 7443 nbench: Filter module that saves data useful to the nbench benchmark suite\&. 7444 .RE 7445 .sp 7446 .RS 4 7447 .ie n \{\ 7448 \h'-04'\(bu\h'+03'\c 7449 .\} 7450 .el \{\ 7451 .sp -1 7452 .IP \(bu 2.3 7453 .\} 7454 ipc: Allows using SMB for inter process communication\&. Only used for the IPC$ share\&. 7455 .RE 7456 .sp 7457 .RS 4 7458 .ie n \{\ 7459 \h'-04'\(bu\h'+03'\c 7460 .\} 7461 .el \{\ 7462 .sp -1 7463 .IP \(bu 2.3 7464 .\} 7465 posix: Maps POSIX FS semantics to NT semantics 7466 .RE 7467 .sp 7468 .RS 4 7469 .ie n \{\ 7470 \h'-04'\(bu\h'+03'\c 7471 .\} 7472 .el \{\ 7473 .sp -1 7474 .IP \(bu 2.3 7475 .\} 7476 print: Allows printing over SMB\&. This is LANMAN\-style printing, not the be confused with the spoolss DCE/RPC interface used by later versions of Windows\&. 7477 .RE 7478 .sp 7479 .RE 7480 Note that this option is only used when the NTVFS file server is in use\&. It is not used with the (default) s3fs file server\&. 7481 .sp 7482 Default: 7483 \fI\fIntvfs handler\fR\fR\fI = \fR\fIunixuid, default\fR\fI \fR 7484 .RE 7485 6945 7486 null passwords (G) 6946 7487 .\" null passwords … … 6967 7508 .RE 6968 7509 7510 old password allowed period (G) 7511 .\" old password allowed period 7512 .PP 7513 .RS 4 7514 Number of minutes to permit an NTLM login after a password change or reset using the old password\&. This allows the user to re\-cache the new password on multiple clients without disrupting a network reconnection in the meantime\&. 7515 .sp 7516 This parameter only applies when 7517 \m[blue]\fBserver role\fR\m[] 7518 is set to Active Directory Domain Controller 7519 .sp 7520 Default: 7521 \fI\fIold password allowed period\fR\fR\fI = \fR\fI60\fR\fI \fR 7522 .RE 7523 6969 7524 only user (S) 6970 7525 .\" only user 6971 7526 .PP 6972 7527 .RS 4 6973 This is a boolean option that controls whether connections with usernames not in the 6974 \fIuser\fR 6975 list will be allowed\&. By default this option is disabled so that a client can supply a username to be used by the server\&. Enabling this parameter will force the server to only use the login names from the 6976 \fIuser\fR 6977 list and is only really useful in 6978 \m[blue]\fBsecurity = share\fR\m[] 6979 level security\&. 6980 .sp 6981 Note that this also means Samba won\*(Aqt try to deduce usernames from the service name\&. This can be annoying for the [homes] section\&. To get around this you could use 6982 user = %S 6983 which means your 6984 \fIuser\fR 6985 list will be just the service name, which for home directories is the name of the user\&. 7528 To restrict a service to a particular set of users you can use the 7529 \m[blue]\fBvalid users\fR\m[] 7530 parameter\&. 7531 .sp 7532 This parameter is deprecated 7533 .sp 7534 However, it currently operates only in conjunction with 7535 \m[blue]\fBusername\fR\m[]\&. The supported way to restrict a service to a particular set of users is the 7536 \m[blue]\fBvalid users\fR\m[] 7537 parameter\&. 6986 7538 .sp 6987 7539 Default: … … 7133 7685 .RE 7134 7686 7135 paranoid server security (G)7136 .\" paranoid server security7137 .PP7138 .RS 47139 Some version of NT 4\&.x allow non\-guest users with a bad passowrd\&. When this option is enabled, samba will not use a broken NT 4\&.x server as password server, but instead complain to the logs and exit\&.7140 .sp7141 Disabling this option prevents Samba from making this check, which involves deliberatly attempting a bad logon to the remote server\&.7142 .sp7143 Default:7144 \fI\fIparanoid server security\fR\fR\fI = \fR\fIyes\fR\fI \fR7145 .RE7146 7147 7687 passdb backend (G) 7148 7688 .\" passdb backend … … 7235 7775 Default: 7236 7776 \fI\fIpassdb expand explicit\fR\fR\fI = \fR\fIno\fR\fI \fR 7777 .RE 7778 7779 passwd chat (G) 7780 .\" passwd chat 7781 .PP 7782 .RS 4 7783 This string controls the 7784 \fI"chat"\fR 7785 conversation that takes places between 7786 \fBsmbd\fR(8) 7787 and the local password changing program to change the user\*(Aqs password\&. The string describes a sequence of response\-receive pairs that 7788 \fBsmbd\fR(8) 7789 uses to determine what to send to the 7790 \m[blue]\fBpasswd program\fR\m[] 7791 and what to expect back\&. If the expected output is not received then the password is not changed\&. 7792 .sp 7793 This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\&. 7794 .sp 7795 Note that this parameter only is used if the 7796 \m[blue]\fBunix password sync\fR\m[] 7797 parameter is set to 7798 \fByes\fR\&. This sequence is then called 7799 \fIAS ROOT\fR 7800 when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\&. This means that root must be able to reset the user\*(Aqs password without knowing the text of the previous password\&. In the presence of NIS/YP, this means that the 7801 \m[blue]\fBpasswd program\fR\m[] 7802 must be executed on the NIS master\&. 7803 .sp 7804 The string can contain the macro 7805 \fI%n\fR 7806 which is substituted for the new password\&. The old passsword (\fI%o\fR) is only available when 7807 \m[blue]\fBencrypt passwords\fR\m[] 7808 has been disabled\&. The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\&. The chat sequence string can also contain a \*(Aq*\*(Aq which matches any sequence of characters\&. Double quotes can be used to collect strings with spaces in them into a single string\&. 7809 .sp 7810 If the send string in any part of the chat sequence is a full stop "\&.", then no string is sent\&. Similarly, if the expect string is a full stop then no string is expected\&. 7811 .sp 7812 If the 7813 \m[blue]\fBpam password change\fR\m[] 7814 parameter is set to 7815 \fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\&. The \en macro is ignored for PAM conversions\&. 7816 .sp 7817 Default: 7818 \fI\fIpasswd chat\fR\fR\fI = \fR\fI*new*password* %n\en *new*password* %n\en *changed*\fR\fI \fR 7819 .sp 7820 Example: 7821 \fI\fIpasswd chat\fR\fR\fI = \fR\fI"*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\fR\fI \fR 7237 7822 .RE 7238 7823 … … 7271 7856 .RE 7272 7857 7273 passwd chat (G)7274 .\" passwd chat7275 .PP7276 .RS 47277 This string controls the7278 \fI"chat"\fR7279 conversation that takes places between7280 \fBsmbd\fR(8)7281 and the local password changing program to change the user\*(Aqs password\&. The string describes a sequence of response\-receive pairs that7282 \fBsmbd\fR(8)7283 uses to determine what to send to the7284 \m[blue]\fBpasswd program\fR\m[]7285 and what to expect back\&. If the expected output is not received then the password is not changed\&.7286 .sp7287 This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\&.7288 .sp7289 Note that this parameter only is used if the7290 \m[blue]\fBunix password sync\fR\m[]7291 parameter is set to7292 \fByes\fR\&. This sequence is then called7293 \fIAS ROOT\fR7294 when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\&. This means that root must be able to reset the user\*(Aqs password without knowing the text of the previous password\&. In the presence of NIS/YP, this means that the7295 \m[blue]\fBpasswd program\fR\m[]7296 must be executed on the NIS master\&.7297 .sp7298 The string can contain the macro7299 \fI%n\fR7300 which is substituted for the new password\&. The old passsword (\fI%o\fR) is only available when7301 \m[blue]\fBencrypt passwords\fR\m[]7302 has been disabled\&. The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\&. The chat sequence string can also contain a \*(Aq*\*(Aq which matches any sequence of characters\&. Double quotes can be used to collect strings with spaces in them into a single string\&.7303 .sp7304 If the send string in any part of the chat sequence is a full stop "\&.", then no string is sent\&. Similarly, if the expect string is a full stop then no string is expected\&.7305 .sp7306 If the7307 \m[blue]\fBpam password change\fR\m[]7308 parameter is set to7309 \fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\&. The \en macro is ignored for PAM conversions\&.7310 .sp7311 Default:7312 \fI\fIpasswd chat\fR\fR\fI = \fR\fI*new*password* %n\en*new*password* %n\en *changed*\fR\fI \fR7313 .sp7314 Example:7315 \fI\fIpasswd chat\fR\fR\fI = \fR\fI"*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\fR\fI \fR7316 .RE7317 7318 7858 passwd program (G) 7319 7859 .\" passwd program … … 7357 7897 .RE 7358 7898 7359 password level (G)7360 .\" password level7361 .PP7362 .RS 47363 Some client/server combinations have difficulty with mixed\-case passwords\&. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! Another problem child is the Windows 95/98 family of operating systems\&. These clients upper case clear text passwords even when NT LM 0\&.12 selected by the protocol negotiation request/response\&.7364 .sp7365 This deprecated parameter defines the maximum number of characters that may be upper case in passwords\&.7366 .sp7367 For example, say the password given was "FRED"\&. If7368 \fI password level\fR7369 is set to 1, the following combinations would be tried if "FRED" failed:7370 .sp7371 "Fred", "fred", "fRed", "frEd","freD"7372 .sp7373 If7374 \fIpassword level\fR7375 was set to 2, the following combinations would also be tried:7376 .sp7377 "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", \&.\&.7378 .sp7379 And so on\&.7380 .sp7381 The higher value this parameter is set to the more likely it is that a mixed case password will be matched against a single case password\&. However, you should be aware that use of this parameter reduces security and increases the time taken to process a new connection\&.7382 .sp7383 A value of zero will cause only two attempts to be made \- the password as is and the password in all\-lower case\&.7384 .sp7385 This parameter is used only when using plain\-text passwords\&. It is not at all used when encrypted passwords as in use (that is the default since samba\-3\&.0\&.0)\&. Use this only when7386 \m[blue]\fBencrypt passwords = No\fR\m[]\&.7387 .sp7388 Default:7389 \fI\fIpassword level\fR\fR\fI = \fR\fI0\fR\fI \fR7390 .sp7391 Example:7392 \fI\fIpassword level\fR\fR\fI = \fR\fI4\fR\fI \fR7393 .RE7394 7395 7899 password server (G) 7396 7900 .\" password server 7397 7901 .PP 7398 7902 .RS 4 7399 By specifying the name of a nother SMB server or Active Directorydomain controller with this option, and using7400 security = [ads|domain |server]7903 By specifying the name of a domain controller with this option, and using 7904 security = [ads|domain] 7401 7905 it is possible to get Samba to do all its username/password validation using a specific remote server\&. 7402 7906 .sp 7403 If the 7404 \fIsecurity\fR 7405 parameter is set to 7406 \fBdomain\fR 7407 or 7408 \fBads\fR, then this option 7907 Ideally, this option 7409 7908 \fIshould not\fR 7410 be used, as the default \*(Aq*\*(Aq indicates to Samba to determine the best DC to contact dynamically, just as all other hosts in an AD domain do\&. This allows the domain to be maintained without modification to the smb\&.conf file\&. The cryptograpic protection on the authenticated RPC calls used to verify passwords ensures that this default is safe\&.7909 be used, as the default \*(Aq*\*(Aq indicates to Samba to determine the best DC to contact dynamically, just as all other hosts in an AD domain do\&. This allows the domain to be maintained (addition and removal of domain controllers) without modification to the smb\&.conf file\&. The cryptographic protection on the authenticated RPC calls used to verify passwords ensures that this default is safe\&. 7411 7910 .sp 7412 7911 \fIIt is strongly recommended that you use the default of \*(Aq*\*(Aq\fR, however if in your particular environment you have reason to specify a particular DC list, then the list of machines in this option must be a list of names or IP addresses of Domain controllers for the Domain\&. If you use the default of \*(Aq*\*(Aq, or list several hosts in the … … 7422 7921 and so may resolved by any method and order described in that parameter\&. 7423 7922 .sp 7424 If the7425 \fIsecurity\fR7426 parameter is set to7427 \fBserver\fR, these additional restrictions apply:7428 .sp7429 .RS 47430 .ie n \{\7431 \h'-04'\(bu\h'+03'\c7432 .\}7433 .el \{\7434 .sp -17435 .IP \(bu 2.37436 .\}7437 You may list several password servers in the7438 \fIpassword server\fR7439 parameter, however if an7440 smbd7441 makes a connection to a password server, and then the password server fails, no more users will be able to be authenticated from this7442 smbd\&. This is a restriction of the SMB/CIFS protocol when in7443 security = server7444 mode and cannot be fixed in Samba\&.7445 .RE7446 .sp7447 .RS 47448 .ie n \{\7449 \h'-04'\(bu\h'+03'\c7450 .\}7451 .el \{\7452 .sp -17453 .IP \(bu 2.37454 .\}7455 You will have to ensure that your users are able to login from the Samba server, as when in7456 security = server7457 mode the network logon will appear to come from the Samba server rather than from the users workstation\&.7458 .RE7459 .sp7460 .RS 47461 .ie n \{\7462 \h'-04'\(bu\h'+03'\c7463 .\}7464 .el \{\7465 .sp -17466 .IP \(bu 2.37467 .\}7468 The client must not select NTLMv2 authentication\&.7469 .RE7470 .sp7471 .RS 47472 .ie n \{\7473 \h'-04'\(bu\h'+03'\c7474 .\}7475 .el \{\7476 .sp -17477 .IP \(bu 2.37478 .\}7479 The password server must be a machine capable of using the "LM1\&.2X002" or the "NT LM 0\&.12" protocol, and it must be in user level security mode\&.7480 .RE7481 .sp7482 .RS 47483 .ie n \{\7484 \h'-04'\(bu\h'+03'\c7485 .\}7486 .el \{\7487 .sp -17488 .IP \(bu 2.37489 .\}7490 Using a password server means your UNIX box (running Samba) is only as secure as (a host masqurading as) your password server\&.7491 \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\*(AqT COMPLETELY TRUST\fR\&.7492 .RE7493 .sp7494 .RS 47495 .ie n \{\7496 \h'-04'\(bu\h'+03'\c7497 .\}7498 .el \{\7499 .sp -17500 .IP \(bu 2.37501 .\}7502 Never point a Samba server at itself for password serving\&. This will cause a loop and could lock up your Samba server!7503 .RE7504 .sp7505 .RS 47506 .ie n \{\7507 \h'-04'\(bu\h'+03'\c7508 .\}7509 .el \{\7510 .sp -17511 .IP \(bu 2.37512 .\}7513 The name of the password server takes the standard substitutions, but probably the only useful one is7514 \fI%m \fR, which means the Samba server will use the incoming client as the password server\&. If you use this then you better trust your clients, and you had better restrict them with hosts allow!7515 .RE7516 .sp7517 .RE7518 7923 Default: 7519 7924 \fI\fIpassword server\fR\fR\fI = \fR\fI*\fR\fI \fR … … 7575 7980 .sp 7576 7981 Default: 7577 \fI\fIpid directory\fR\fR\fI = \fR\fI${prefix}/var/ locks\fR\fI \fR7578 .sp 7579 Example: 7580 \fI\fIpid directory\fR\fR\fI = \fR\fI pid directory =/var/run/\fR\fI \fR7982 \fI\fIpid directory\fR\fR\fI = \fR\fI${prefix}/var/run\fR\fI \fR 7983 .sp 7984 Example: 7985 \fI\fIpid directory\fR\fR\fI = \fR\fI/var/run/\fR\fI \fR 7581 7986 .RE 7582 7987 … … 7610 8015 .RE 7611 8016 7612 preexec close (S)7613 .\" preexec close7614 .PP7615 .RS 47616 This boolean option controls whether a non\-zero return code from7617 \m[blue]\fBpreexec\fR\m[]7618 should close the service being connected to\&.7619 .sp7620 Default:7621 \fI\fIpreexec close\fR\fR\fI = \fR\fIno\fR\fI \fR7622 .RE7623 7624 8017 exec 7625 8018 .\" exec … … 7638 8031 An interesting example is to send the users a welcome message every time they log in\&. Maybe a message of the day? Here is an example: 7639 8032 .sp 7640 7641 8033 preexec = csh \-c \*(Aqecho \e"Welcome to %S!\e" | /usr/local/samba/bin/smbclient \-M %m \-I %I\*(Aq & 7642 8034 .sp … … 7653 8045 Example: 7654 8046 \fI\fIpreexec\fR\fR\fI = \fR\fIecho \e"%u connected to %S from %m (%I)\e" >> /tmp/log\fR\fI \fR 8047 .RE 8048 8049 preexec close (S) 8050 .\" preexec close 8051 .PP 8052 .RS 4 8053 This boolean option controls whether a non\-zero return code from 8054 \m[blue]\fBpreexec\fR\m[] 8055 should close the service being connected to\&. 8056 .sp 8057 Default: 8058 \fI\fIpreexec close\fR\fR\fI = \fR\fIno\fR\fI \fR 7655 8059 .RE 7656 8060 … … 7698 8102 .RE 7699 8103 7700 auto services7701 .\" auto services7702 .PP7703 .RS 47704 This parameter is a synonym for7705 preload\&.7706 .RE7707 7708 preload (G)7709 .\" preload7710 .PP7711 .RS 47712 This is a list of services that you want to be automatically added to the browse lists\&. This is most useful for homes and printers services that would otherwise not be visible\&.7713 .sp7714 Note that if you just want all printers in your printcap file loaded then the7715 \m[blue]\fBload printers\fR\m[]7716 option is easier\&.7717 .sp7718 Default:7719 \fI\fIpreload\fR\fR\fI = \fR\fI\fR\fI \fR7720 .sp7721 Example:7722 \fI\fIpreload\fR\fR\fI = \fR\fIfred lp colorlp\fR\fI \fR7723 .RE7724 7725 8104 preserve case (S) 7726 8105 .\" preserve case … … 7794 8173 .sp 7795 8174 To use the CUPS printing interface set 7796 printcap name = cups\&. This should be supplemented by an add tional setting8175 printcap name = cups\&. This should be supplemented by an additional setting 7797 8176 \m[blue]\fBprinting = cups\fR\m[] 7798 8177 in the [global] section\&. … … 7933 8312 .RE 7934 8313 7935 printer admin (S)7936 .\" printer admin7937 .PP7938 .RS 47939 This lists users who can do anything to printers via the remote administration interfaces offered by MS\-RPC (usually using a NT workstation)\&. This parameter can be set per\-share or globally\&. Note: The root user always has admin rights\&. Use caution with use in the global stanza as this can cause side effects\&.7940 .sp7941 This parameter has been marked deprecated in favor of using the SePrintOperatorPrivilege and individual print security descriptors\&. It will be removed in a future release\&.7942 .sp7943 Default:7944 \fI\fIprinter admin\fR\fR\fI = \fR\fI\fR\fI \fR7945 .sp7946 Example:7947 \fI\fIprinter admin\fR\fR\fI = \fR\fIadmin, @staff\fR\fI \fR7948 .RE7949 7950 8314 printer 7951 8315 .\" printer … … 7971 8335 .sp 7972 8336 Default: 7973 \fI\fIprinter name\fR\fR\fI = \fR\fI none\fR\fI \fR8337 \fI\fIprinter name\fR\fR\fI = \fR\fI\fR\fI \fR 7974 8338 .sp 7975 8339 Example: … … 7997 8361 \fBHPUX\fR, 7998 8362 \fBQNX\fR, 7999 \fBSOFTQ\fR, and 8000 \fBCUPS\fR\&. 8363 \fBSOFTQ\fR, 8364 \fBCUPS\fR 8365 and 8366 \fBIPRINT\fR\&. 8367 .sp 8368 Be aware that CUPS and IPRINT are only available if the CUPS development library was available at the time Samba was compiled or packaged\&. 8001 8369 .sp 8002 8370 To see what the defaults are for the other print commands when using the various options use the … … 8012 8380 section\&. 8013 8381 .sp 8014 Default: 8015 \fI\fIprinting\fR\fR\fI = \fR\fIDepends on the operating system, see testparm \-v\&.\fR\fI \fR 8382 See 8383 testparm \-v\&. 8384 for the default value on your system 8385 .sp 8386 Default: 8387 \fI\fIprinting\fR\fR\fI = \fR\fI # Depends on the operating system\fR\fI \fR 8016 8388 .RE 8017 8389 … … 8033 8405 .PP 8034 8406 .RS 4 8035 Windows print clients can update print queue status by expecting the server to open a backchannel SMB connection to them\&. Due to client firewall settings this can cause considerable timeouts and will often fail, as there is no guarantee the client is even running an SMB server\&. By setting this parameter to 8036 \fBno\fR 8037 the Samba print server will not try to connect back to clients and treat corresponding requests as if the connection back to the client failed\&. The default setting of 8038 \fByes\fR 8039 causes smbd to attempt this connection\&. 8040 .sp 8041 Default: 8042 \fI\fIprint notify backchannel\fR\fR\fI = \fR\fIyes\fR\fI \fR 8407 Windows print clients can update print queue status by expecting the server to open a backchannel SMB connection to them\&. Due to client firewall settings this can cause considerable timeouts and will often fail, as there is no guarantee the client is even running an SMB server\&. By default, the Samba print server will not try to connect back to clients, and will treat corresponding requests as if the connection back to the client failed\&. 8408 .sp 8409 Default: 8410 \fI\fIprint notify backchannel\fR\fR\fI = \fR\fIno\fR\fI \fR 8411 .RE 8412 8413 private directory 8414 .\" private directory 8415 .PP 8416 .RS 4 8417 This parameter is a synonym for 8418 private dir\&. 8043 8419 .RE 8044 8420 … … 8088 8464 Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\&. 8089 8465 .sp 8090 \fINo default\fR 8466 Default: 8467 \fI\fIqueuepause command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 8091 8468 .sp 8092 8469 Example: … … 8111 8488 .sp 8112 8489 Default: 8113 \fI\fIqueueresume command\fR\fR\fI = \fR\fI \fR\fI \fR8490 \fI\fIqueueresume command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 8114 8491 .sp 8115 8492 Example: 8116 8493 \fI\fIqueueresume command\fR\fR\fI = \fR\fIenable %p\fR\fI \fR 8494 .RE 8495 8496 raw NTLMv2 auth (G) 8497 .\" raw NTLMv2 auth 8498 .PP 8499 .RS 4 8500 This parameter determines whether or not 8501 \fBsmbd\fR(8) 8502 will allow SMB1 clients without extended security (without SPNEGO) to use NTLMv2 authentication\&. 8503 .sp 8504 If this option, 8505 lanman auth 8506 and 8507 ntlm auth 8508 are all disabled, then only clients with SPNEGO support will be permitted\&. That means NTLMv2 is only supported within NTLMSSP\&. 8509 .sp 8510 Default: 8511 \fI\fIraw NTLMv2 auth\fR\fR\fI = \fR\fIno\fR\fI \fR 8117 8512 .RE 8118 8513 … … 8127 8522 parameter\&. 8128 8523 .sp 8129 This parameter will not work with the8130 \m[blue]\fBsecurity = share\fR\m[]8131 in Samba 3\&.0\&. This is by design\&.8132 .sp8133 8524 Default: 8134 8525 \fI\fIread list\fR\fR\fI = \fR\fI\fR\fI \fR … … 8160 8551 .PP 8161 8552 .RS 4 8162 This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients\&. 8163 .sp 8164 If enabled, raw reads allow reads of 65535 bytes in one packet\&. This typically provides a major performance benefit\&. 8553 This is ignored if 8554 \m[blue]\fBasync smb echo handler\fR\m[] 8555 is set, because this feature is incompatible with raw read SMB requests 8556 .sp 8557 If enabled, raw reads allow reads of 65535 bytes in one packet\&. This typically provides a major performance benefit for some very, very old clients\&. 8165 8558 .sp 8166 8559 However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw reads\&. … … 8207 8600 Example: 8208 8601 \fI\fIregistry shares\fR\fR\fI = \fR\fIyes\fR\fI \fR 8602 .RE 8603 8604 reject md5 clients (G) 8605 .\" reject md5 clients 8606 .PP 8607 .RS 4 8608 This option controls whether the netlogon server (currently only in \*(Aqactive directory domain controller\*(Aq mode), will reject clients which does not support NETLOGON_NEG_SUPPORTS_AES\&. 8609 .sp 8610 You can set this to yes if all domain members support aes\&. This will prevent downgrade attacks\&. 8611 .sp 8612 This option takes precedence to the \*(Aqallow nt4 crypto\*(Aq option\&. 8613 .sp 8614 Default: 8615 \fI\fIreject md5 clients\fR\fR\fI = \fR\fIno\fR\fI \fR 8616 .RE 8617 8618 reject md5 servers (G) 8619 .\" reject md5 servers 8620 .PP 8621 .RS 4 8622 This option controls whether winbindd requires support for aes support for the netlogon secure channel\&. 8623 .sp 8624 The following flags will be required NETLOGON_NEG_ARCFOUR, NETLOGON_NEG_SUPPORTS_AES, NETLOGON_NEG_PASSWORD_SET2 and NETLOGON_NEG_AUTHENTICATED_RPC\&. 8625 .sp 8626 You can set this to yes if all domain controllers support aes\&. This will prevent downgrade attacks\&. 8627 .sp 8628 The behavior can be controlled per netbios domain by using \*(Aqreject md5 servers:NETBIOSDOMAIN = yes\*(Aq as option\&. 8629 .sp 8630 This option takes precedence to the 8631 \m[blue]\fBrequire strong key\fR\m[] 8632 option\&. 8633 .sp 8634 Default: 8635 \fI\fIreject md5 servers\fR\fR\fI = \fR\fIno\fR\fI \fR 8209 8636 .RE 8210 8637 … … 8309 8736 .RE 8310 8737 Default: 8311 \fI\fIrename user script\fR\fR\fI = \fR\fIno\fR\fI \fR 8738 \fI\fIrename user script\fR\fR\fI = \fR\fI\fR\fI \fR 8739 .RE 8740 8741 require strong key (G) 8742 .\" require strong key 8743 .PP 8744 .RS 4 8745 This option controls whether winbindd requires support for md5 strong key support for the netlogon secure channel\&. 8746 .sp 8747 The following flags will be required NETLOGON_NEG_STRONG_KEYS, NETLOGON_NEG_ARCFOUR and NETLOGON_NEG_AUTHENTICATED_RPC\&. 8748 .sp 8749 You can set this to no if some domain controllers only support des\&. This might allows weak crypto to be negotiated, may via downgrade attacks\&. 8750 .sp 8751 The behavior can be controlled per netbios domain by using \*(Aqrequire strong key:NETBIOSDOMAIN = no\*(Aq as option\&. 8752 .sp 8753 Note for active directory domain this option is hardcoded to \*(Aqyes\*(Aq 8754 .sp 8755 This option yields precedence to the 8756 \m[blue]\fBreject md5 servers\fR\m[] 8757 option\&. 8758 .sp 8759 This option takes precedence to the 8760 \m[blue]\fBclient schannel\fR\m[] 8761 option\&. 8762 .sp 8763 Default: 8764 \fI\fIrequire strong key\fR\fR\fI = \fR\fIyes\fR\fI \fR 8312 8765 .RE 8313 8766 … … 8339 8792 .\} 8340 8793 .sp 8341 registry key in Windows 2000 and Windows NT\&. When set to 0, user and group list information is returned to anyone who asks\&. When set to 1, only an authenticated user can retri ve user and group list information\&. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\&. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\&.8794 registry key in Windows 2000 and Windows NT\&. When set to 0, user and group list information is returned to anyone who asks\&. When set to 1, only an authenticated user can retrieve user and group list information\&. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\&. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\&. 8342 8795 .sp 8343 8796 The security advantage of using restrict anonymous = 1 is dubious, as user and group list information can be obtained using other means\&. … … 8363 8816 .RE 8364 8817 8818 rndc command (G) 8819 .\" rndc command 8820 .PP 8821 .RS 4 8822 This option specifies the path to the name server control utility\&. 8823 .sp 8824 The 8825 rndc 8826 utility should be a part of the bind installation\&. 8827 .sp 8828 Default: 8829 \fI\fIrndc command\fR\fR\fI = \fR\fI/usr/sbin/rndc\fR\fI \fR 8830 .sp 8831 Example: 8832 \fI\fIrndc command\fR\fR\fI = \fR\fI/usr/local/bind9/sbin/rndc\fR\fI \fR 8833 .RE 8834 8365 8835 root 8366 8836 .\" root … … 8402 8872 .sp 8403 8873 Default: 8404 \fI\fIroot directory\fR\fR\fI = \fR\fI /\fR\fI \fR8874 \fI\fIroot directory\fR\fR\fI = \fR\fI\fR\fI \fR 8405 8875 .sp 8406 8876 Example: … … 8420 8890 .RE 8421 8891 8892 root preexec (S) 8893 .\" root preexec 8894 .PP 8895 .RS 4 8896 This is the same as the 8897 \fIpreexec\fR 8898 parameter except that the command is run as root\&. This is useful for mounting filesystems (such as CDROMs) when a connection is opened\&. 8899 .sp 8900 Default: 8901 \fI\fIroot preexec\fR\fR\fI = \fR\fI\fR\fI \fR 8902 .RE 8903 8422 8904 root preexec close (S) 8423 8905 .\" root preexec close … … 8432 8914 .RE 8433 8915 8434 root preexec (S) 8435 .\" root preexec 8436 .PP 8437 .RS 4 8438 This is the same as the 8439 \fIpreexec\fR 8440 parameter except that the command is run as root\&. This is useful for mounting filesystems (such as CDROMs) when a connection is opened\&. 8441 .sp 8442 Default: 8443 \fI\fIroot preexec\fR\fR\fI = \fR\fI\fR\fI \fR 8444 .RE 8445 8446 rpc_server (G) 8447 .\" rpc_server 8448 .PP 8449 .RS 4 8450 Defines what kind of rpc server to use for a named pipe\&. The rpc_server prefix must be followed by the pipe name, and a value\&. 8451 .sp 8452 Three possible values are currently supported: 8453 embedded 8454 daemon 8455 external 8456 .sp 8457 The classic method is to run every pipe as an internal function 8458 \fIembedded\fR 8459 in smbd\&. 8460 .sp 8461 An alternative method is to fork a 8462 \fIdaemon\fR 8463 early on at smbd startup time\&. This is supported only for selected pipes\&. 8464 .sp 8465 Choosing the 8466 \fIexternal\fR 8467 option allows to run a completely independent (3rd party) server capable of interfacing with samba via the MS\-RPC interface over named pipes\&. 8468 .sp 8469 Currently only the spoolss pipe can be configured in 8470 \fIdaemon\fR 8471 mode like this: 8916 rpc big endian (G) 8917 .\" rpc big endian 8918 .PP 8919 .RS 4 8920 Setting this option will force the RPC client and server to transfer data in big endian\&. 8921 .sp 8922 If it is disabled, data will be transferred in little endian\&. 8923 .sp 8924 The behaviour is independent of the endianness of the host machine\&. 8925 .sp 8926 Default: 8927 \fI\fIrpc big endian\fR\fR\fI = \fR\fIno\fR\fI \fR 8928 .RE 8929 8930 rpc_daemon:DAEMON (G) 8931 .\" rpc_daemon:DAEMON 8932 .PP 8933 .RS 4 8934 Defines whether to use the embedded code or start a separate daemon for the defined rpc services\&. The rpc_daemon prefix must be followed by the server name, and a value\&. 8935 .sp 8936 Two possible values are currently supported: 8472 8937 .sp 8473 8938 .if n \{\ … … 8475 8940 .\} 8476 8941 .nf 8477 rpc_server:spoolss = daemon 8942 disabled 8943 fork 8478 8944 8479 8945 .fi … … 8482 8948 .\} 8483 8949 .sp 8484 Default: 8485 \fI\fIrpc_server\fR\fR\fI = \fR\fInone\fR\fI \fR 8486 .RE 8487 8488 security mask (S) 8489 .\" security mask 8490 .PP 8491 .RS 4 8492 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\&. 8493 .sp 8494 This parameter is applied as a mask (AND\*(Aqed with) to the incoming permission bits, thus resetting any bits not in this mask\&. Make sure not to mix up this parameter with 8495 \m[blue]\fBforce security mode\fR\m[], which works in a manner similar to this one but uses a logical OR instead of an AND\&. 8496 .sp 8497 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\&. 8498 .sp 8499 If not set explicitly this parameter is 0777, allowing a user to set all the user/group/world permissions on a file\&. 8500 .sp 8501 \fI Note\fR 8502 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it set to 8503 \fB0777\fR\&. 8504 .sp 8505 Default: 8506 \fI\fIsecurity mask\fR\fR\fI = \fR\fI0777\fR\fI \fR 8507 .sp 8508 Example: 8509 \fI\fIsecurity mask\fR\fR\fI = \fR\fI0770\fR\fI \fR 8950 The classic method is to run rpc services as internal daemons embedded in smbd, therefore the external daemons are 8951 \fIdisabled\fR 8952 by default\&. 8953 .sp 8954 Choosing the 8955 \fIfork\fR 8956 option will cause samba to fork a separate process for each daemon configured this way\&. Each daemon may in turn fork a number of children used to handle requests from multiple smbds and direct tcp/ip connections (if the Endpoint Mapper is enabled)\&. Communication with smbd happens over named pipes and require that said pipes are forward to the external daemon (see 8957 \m[blue]\fBrpc_server\fR\m[])\&. 8958 .sp 8959 Forked RPC Daemons support dynamically forking children to handle connections\&. The heuristics about how many children to keep around and how fast to allow them to fork and also how many clients each child is allowed to handle concurrently is defined by parametrical options named after the daemon\&. Five options are currently supported: 8960 .sp 8961 .if n \{\ 8962 .RS 4 8963 .\} 8964 .nf 8965 prefork_min_children 8966 prefork_max_children 8967 prefork_spawn_rate 8968 prefork_max_allowed_clients 8969 prefork_child_min_life 8970 8971 .fi 8972 .if n \{\ 8973 .RE 8974 .\} 8975 .sp 8976 To set one of these options use the follwing syntax: 8977 .sp 8978 .if n \{\ 8979 .RS 4 8980 .\} 8981 .nf 8982 damonname:prefork_min_children = 5 8983 8984 .fi 8985 .if n \{\ 8986 .RE 8987 .\} 8988 .sp 8989 Samba includes separate daemons for spoolss, lsarpc/lsass, netlogon, samr, FSRVP and mdssvc(Spotlight)\&. Currently five daemons are available and they are called: 8990 .sp 8991 .if n \{\ 8992 .RS 4 8993 .\} 8994 .nf 8995 epmd 8996 lsasd 8997 spoolssd 8998 fssd 8999 mdssd 9000 9001 .fi 9002 .if n \{\ 9003 .RE 9004 .\} 9005 .sp 9006 Example: 9007 .sp 9008 .if n \{\ 9009 .RS 4 9010 .\} 9011 .nf 9012 rpc_daemon:spoolssd = fork 9013 9014 .fi 9015 .if n \{\ 9016 .RE 9017 .\} 9018 .sp 9019 Default: 9020 \fI\fIrpc_daemon:DAEMON\fR\fR\fI = \fR\fIdisabled\fR\fI \fR 9021 .RE 9022 9023 rpc_server:SERVER (G) 9024 .\" rpc_server:SERVER 9025 .PP 9026 .RS 4 9027 With this option you can define if a rpc service should be running internal/embedded in smbd or should be redirected to an external daemon like Samba4, the endpoint mapper daemon, the spoolss daemon or the new LSA service daemon\&. The rpc_server prefix must be followed by the pipe name, and a value\&. 9028 .sp 9029 This option can be set for each available rpc service in Samba\&. The following list shows all available pipe names services you can modify with this option\&. 9030 .sp 9031 .RS 4 9032 .ie n \{\ 9033 \h'-04'\(bu\h'+03'\c 9034 .\} 9035 .el \{\ 9036 .sp -1 9037 .IP \(bu 2.3 9038 .\} 9039 epmapper \- Endpoint Mapper 9040 .RE 9041 .sp 9042 .RS 4 9043 .ie n \{\ 9044 \h'-04'\(bu\h'+03'\c 9045 .\} 9046 .el \{\ 9047 .sp -1 9048 .IP \(bu 2.3 9049 .\} 9050 winreg \- Remote Registry Service 9051 .RE 9052 .sp 9053 .RS 4 9054 .ie n \{\ 9055 \h'-04'\(bu\h'+03'\c 9056 .\} 9057 .el \{\ 9058 .sp -1 9059 .IP \(bu 2.3 9060 .\} 9061 srvsvc \- Remote Server Services 9062 .RE 9063 .sp 9064 .RS 4 9065 .ie n \{\ 9066 \h'-04'\(bu\h'+03'\c 9067 .\} 9068 .el \{\ 9069 .sp -1 9070 .IP \(bu 2.3 9071 .\} 9072 lsarpc \- Local Security Authority 9073 .RE 9074 .sp 9075 .RS 4 9076 .ie n \{\ 9077 \h'-04'\(bu\h'+03'\c 9078 .\} 9079 .el \{\ 9080 .sp -1 9081 .IP \(bu 2.3 9082 .\} 9083 samr \- Security Account Management 9084 .RE 9085 .sp 9086 .RS 4 9087 .ie n \{\ 9088 \h'-04'\(bu\h'+03'\c 9089 .\} 9090 .el \{\ 9091 .sp -1 9092 .IP \(bu 2.3 9093 .\} 9094 netlogon \- Netlogon Remote Protocol 9095 .RE 9096 .sp 9097 .RS 4 9098 .ie n \{\ 9099 \h'-04'\(bu\h'+03'\c 9100 .\} 9101 .el \{\ 9102 .sp -1 9103 .IP \(bu 2.3 9104 .\} 9105 netdfs \- Settings for Distributed File System 9106 .RE 9107 .sp 9108 .RS 4 9109 .ie n \{\ 9110 \h'-04'\(bu\h'+03'\c 9111 .\} 9112 .el \{\ 9113 .sp -1 9114 .IP \(bu 2.3 9115 .\} 9116 dssetup \- Active Directory Setup 9117 .RE 9118 .sp 9119 .RS 4 9120 .ie n \{\ 9121 \h'-04'\(bu\h'+03'\c 9122 .\} 9123 .el \{\ 9124 .sp -1 9125 .IP \(bu 2.3 9126 .\} 9127 wkssvc \- Workstation Services 9128 .RE 9129 .sp 9130 .RS 4 9131 .ie n \{\ 9132 \h'-04'\(bu\h'+03'\c 9133 .\} 9134 .el \{\ 9135 .sp -1 9136 .IP \(bu 2.3 9137 .\} 9138 spoolss \- Network Printing Spooler 9139 .RE 9140 .sp 9141 .RS 4 9142 .ie n \{\ 9143 \h'-04'\(bu\h'+03'\c 9144 .\} 9145 .el \{\ 9146 .sp -1 9147 .IP \(bu 2.3 9148 .\} 9149 svcctl \- Service Control 9150 .RE 9151 .sp 9152 .RS 4 9153 .ie n \{\ 9154 \h'-04'\(bu\h'+03'\c 9155 .\} 9156 .el \{\ 9157 .sp -1 9158 .IP \(bu 2.3 9159 .\} 9160 ntsvcs \- Plug and Play Services 9161 .RE 9162 .sp 9163 .RS 4 9164 .ie n \{\ 9165 \h'-04'\(bu\h'+03'\c 9166 .\} 9167 .el \{\ 9168 .sp -1 9169 .IP \(bu 2.3 9170 .\} 9171 eventlog \- Event Logger 9172 .RE 9173 .sp 9174 .RS 4 9175 .ie n \{\ 9176 \h'-04'\(bu\h'+03'\c 9177 .\} 9178 .el \{\ 9179 .sp -1 9180 .IP \(bu 2.3 9181 .\} 9182 initshutdown \- Init Shutdown Service 9183 .RE 9184 .sp 9185 .RS 4 9186 .ie n \{\ 9187 \h'-04'\(bu\h'+03'\c 9188 .\} 9189 .el \{\ 9190 .sp -1 9191 .IP \(bu 2.3 9192 .\} 9193 mdssvc \- Spotlight 9194 .RE 9195 .sp 9196 .RE 9197 Three possible values currently supported are: 9198 embeddedexternaldisabled 9199 .sp 9200 The classic method is to run every pipe as an internal function 9201 \fIembedded\fR 9202 in smbd\&. The defaults may vary depending on the service\&. 9203 .sp 9204 Choosing the 9205 \fIexternal\fR 9206 option allows one to run a separate daemon or even a completely independent (3rd party) server capable of interfacing with samba via the MS\-RPC interface over named pipes\&. 9207 .sp 9208 Currently in Samba3 we support four daemons, spoolssd, epmd, lsasd and mdssd\&. These daemons can be enabled using the 9209 \fIrpc_daemon\fR 9210 option\&. For spoolssd you have to enable the daemon and proxy the named pipe with: 9211 .sp 9212 Examples: 9213 .sp 9214 .if n \{\ 9215 .RS 4 9216 .\} 9217 .nf 9218 rpc_daemon:lsasd = fork 9219 rpc_server:lsarpc = external 9220 rpc_server:samr = external 9221 rpc_server:netlogon = external 9222 9223 rpc_server:spoolss = external 9224 rpc_server:epmapper = disabled 9225 9226 rpc_daemon:mdssd = fork 9227 rpc_server:mdssvc = external 9228 9229 .fi 9230 .if n \{\ 9231 .RE 9232 .\} 9233 .sp 9234 There is one special option which allows you to enable rpc services to listen for ncacn_ip_tcp connections too\&. Currently this is only used for testing and doesn\*(Aqt scale! 9235 .sp 9236 .if n \{\ 9237 .RS 4 9238 .\} 9239 .nf 9240 rpc_server:tcpip = yes 9241 9242 .fi 9243 .if n \{\ 9244 .RE 9245 .\} 9246 .sp 9247 Default: 9248 \fI\fIrpc_server:SERVER\fR\fR\fI = \fR\fIembedded\fR\fI \fR 9249 .RE 9250 9251 samba kcc command (G) 9252 .\" samba kcc command 9253 .PP 9254 .RS 4 9255 This option specifies the path to the Samba KCC command\&. This script is used for replication topology replication\&. 9256 .sp 9257 It should not be necessary to modify this option except for testing purposes or if the 9258 samba_kcc 9259 was installed in a non\-default location\&. 9260 .sp 9261 Default: 9262 \fI\fIsamba kcc command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_kcc\fR\fI \fR 9263 .sp 9264 Example: 9265 \fI\fIsamba kcc command\fR\fR\fI = \fR\fI/usr/local/bin/kcc\fR\fI \fR 8510 9266 .RE 8511 9267 … … 8518 9274 file\&. 8519 9275 .sp 8520 The option sets the "security mode bit" in replies to protocol negotiations with8521 \fBsmbd\fR(8)8522 to turn share level security on or off\&. Clients decide based on this bit whether (and how) to transfer user and password information to the server\&.8523 .sp8524 9276 The default is 8525 security = user, as this is the most common setting needed when talking to Windows 98 and Windows NT\&.9277 security = user, as this is the most common setting, used for a standalone file server or a DC\&. 8526 9278 .sp 8527 9279 The alternatives are 8528 9280 security = ads 8529 9281 or 8530 security = domain, which support joining Samba to a Windows domain, along with 8531 security = share 8532 and 8533 security = server, both of which are deprecated\&. 8534 .sp 8535 In versions of Samba prior to 2\&.0\&.0, the default was 8536 security = share 8537 mainly because that was the only option at one stage\&. 9282 security = domain, which support joining Samba to a Windows domain 8538 9283 .sp 8539 9284 You should use … … 8543 9288 if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&. 8544 9289 .sp 8545 It is possible to use8546 smbd8547 in a8548 \fI hybrid mode\fR8549 where it is offers both user and share level security under different8550 \m[blue]\fBNetBIOS aliases\fR\m[]\&.8551 .sp8552 9290 The different settings will now be explained\&. 8553 9291 .sp 9292 \fISECURITY = AUTO\fR 9293 .sp 9294 This is the default security setting in Samba, and causes Samba to consult the 9295 \m[blue]\fBserver role\fR\m[] 9296 parameter (if set) to determine the security mode\&. 9297 .sp 8554 9298 \fISECURITY = USER\fR 8555 9299 .sp 8556 This is the default security setting in Samba\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the 9300 If 9301 \m[blue]\fBserver role\fR\m[] 9302 is not specified, this is the default security setting in Samba\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the 8557 9303 \m[blue]\fBusername map\fR\m[] 8558 9304 parameter)\&. Encrypted passwords (see the … … 8572 9318 parameter for details on doing this\&. 8573 9319 .sp 8574 See also the section8575 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.8576 .sp8577 9320 \fISECURITY = DOMAIN\fR 8578 9321 .sp … … 8601 9344 parameter for details on doing this\&. 8602 9345 .sp 8603 See also the section8604 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.8605 .sp8606 9346 See also the 8607 9347 \m[blue]\fBpassword server\fR\m[] … … 8610 9350 parameter\&. 8611 9351 .sp 8612 \fISECURITY = SHARE\fR8613 .if n \{\8614 .sp8615 .\}8616 .RS 48617 .it 1 an-trap8618 .nr an-no-space-flag 18619 .nr an-break-flag 18620 .br8621 .ps +18622 \fBNote\fR8623 .ps -18624 .br8625 This option is deprecated as it is incompatible with SMB28626 .sp .5v8627 .RE8628 When clients connect to a share level security server, they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a8629 security = share8630 server)\&. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\&.8631 .sp8632 Note that8633 smbd8634 \fIALWAYS\fR8635 uses a valid UNIX user to act on behalf of the client, even in8636 security = share8637 level security\&.8638 .sp8639 As clients are not required to send a username to the server in share level security,8640 smbd8641 uses several techniques to determine the correct UNIX user to use on behalf of the client\&.8642 .sp8643 A list of possible UNIX usernames to match with the given client password is constructed using the following methods :8644 .sp8645 .RS 48646 .ie n \{\8647 \h'-04'\(bu\h'+03'\c8648 .\}8649 .el \{\8650 .sp -18651 .IP \(bu 2.38652 .\}8653 If the8654 \m[blue]\fBguest only\fR\m[]8655 parameter is set, then all the other stages are missed and only the8656 \m[blue]\fBguest account\fR\m[]8657 username is checked\&.8658 .RE8659 .sp8660 .RS 48661 .ie n \{\8662 \h'-04'\(bu\h'+03'\c8663 .\}8664 .el \{\8665 .sp -18666 .IP \(bu 2.38667 .\}8668 Is a username is sent with the share connection request, then this username (after mapping \- see8669 \m[blue]\fBusername map\fR\m[]), is added as a potential username\&.8670 .RE8671 .sp8672 .RS 48673 .ie n \{\8674 \h'-04'\(bu\h'+03'\c8675 .\}8676 .el \{\8677 .sp -18678 .IP \(bu 2.38679 .\}8680 If the client did a previous8681 \fIlogon \fR8682 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\&.8683 .RE8684 .sp8685 .RS 48686 .ie n \{\8687 \h'-04'\(bu\h'+03'\c8688 .\}8689 .el \{\8690 .sp -18691 .IP \(bu 2.38692 .\}8693 The name of the service the client requested is added as a potential username\&.8694 .RE8695 .sp8696 .RS 48697 .ie n \{\8698 \h'-04'\(bu\h'+03'\c8699 .\}8700 .el \{\8701 .sp -18702 .IP \(bu 2.38703 .\}8704 The NetBIOS name of the client is added to the list as a potential username\&.8705 .RE8706 .sp8707 .RS 48708 .ie n \{\8709 \h'-04'\(bu\h'+03'\c8710 .\}8711 .el \{\8712 .sp -18713 .IP \(bu 2.38714 .\}8715 Any users on the8716 \m[blue]\fBuser\fR\m[]8717 list are added as potential usernames\&.8718 .RE8719 .sp8720 .RE8721 If the8722 \fIguest only\fR8723 parameter is not set, then this list is then tried with the supplied password\&. The first user for whom the password matches will be used as the UNIX user\&.8724 .sp8725 If the8726 \fIguest only\fR8727 parameter is set, or no username can be determined then if the share is marked as available to the8728 \fIguest account\fR, then this guest user will be used, otherwise access is denied\&.8729 .sp8730 Note that it can be8731 \fIvery\fR8732 confusing in share\-level security as to which UNIX username will eventually be used in granting access\&.8733 .sp8734 See also the section8735 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.8736 .sp8737 \fISECURITY = SERVER\fR8738 .sp8739 In this depicted mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\&. If this fails it will revert to8740 security = user\&. It expects the8741 \m[blue]\fBencrypted passwords\fR\m[]8742 parameter to be set to8743 \fByes\fR, unless the remote server does not support them\&. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid8744 smbpasswd8745 file to check users against\&. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\&.8746 .if n \{\8747 .sp8748 .\}8749 .RS 48750 .it 1 an-trap8751 .nr an-no-space-flag 18752 .nr an-break-flag 18753 .br8754 .ps +18755 \fBNote\fR8756 .ps -18757 .br8758 This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\&. In particular, this mode of operation can cause significant resource consumption on the PDC, as it must maintain an active connection for the duration of the user\*(Aqs session\&. Furthermore, if this connection is lost, there is no way to reestablish it, and further authentications to the Samba server may fail (from a single client, till it disconnects)\&.8759 .sp .5v8760 .RE8761 .if n \{\8762 .sp8763 .\}8764 .RS 48765 .it 1 an-trap8766 .nr an-no-space-flag 18767 .nr an-break-flag 18768 .br8769 .ps +18770 \fBNote\fR8771 .ps -18772 .br8773 If the client selects NTLMv2 authentication, then this mode of operation8774 \fIwill fail\fR8775 .sp .5v8776 .RE8777 .if n \{\8778 .sp8779 .\}8780 .RS 48781 .it 1 an-trap8782 .nr an-no-space-flag 18783 .nr an-break-flag 18784 .br8785 .ps +18786 \fBNote\fR8787 .ps -18788 .br8789 From the client\*(Aqs point of view,8790 security = server8791 is the same as8792 security = user\&. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\&.8793 .sp .5v8794 .RE8795 .if n \{\8796 .sp8797 .\}8798 .RS 48799 .it 1 an-trap8800 .nr an-no-space-flag 18801 .nr an-break-flag 18802 .br8803 .ps +18804 \fBNote\fR8805 .ps -18806 .br8807 This option is deprecated, and may be removed in future8808 .sp .5v8809 .RE8810 9352 \fINote\fR 8811 9353 that the name of the resource being requested is … … 8816 9358 parameter for details on doing this\&. 8817 9359 .sp 8818 See also the section8819 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.8820 .sp8821 9360 See also the 8822 9361 \m[blue]\fBpassword server\fR\m[] … … 8831 9370 Note that this mode does NOT make Samba operate as a Active Directory Domain Controller\&. 8832 9371 .sp 9372 Note that this forces 9373 \m[blue]\fBrequire strong key = yes\fR\m[] 9374 and 9375 \m[blue]\fBclient schannel = yes\fR\m[] 9376 for the primary domain\&. 9377 .sp 8833 9378 Read the chapter about Domain Membership in the HOWTO for details\&. 8834 9379 .sp 8835 9380 Default: 8836 \fI\fIsecurity\fR\fR\fI = \fR\fI USER\fR\fI \fR9381 \fI\fIsecurity\fR\fR\fI = \fR\fIAUTO\fR\fI \fR 8837 9382 .sp 8838 9383 Example: … … 8840 9385 .RE 8841 9386 8842 send spnego principal (G) 8843 .\" send spnego principal 8844 .PP 8845 .RS 4 8846 This parameter determines whether or not 9387 security mask (S) 9388 .\" security mask 9389 .PP 9390 .RS 4 9391 This parameter has been removed for Samba 4\&.0\&.0\&. 9392 .sp 9393 \fINo default\fR 9394 .RE 9395 9396 max protocol 9397 .\" max protocol 9398 .PP 9399 .RS 4 9400 This parameter is a synonym for 9401 server max protocol\&. 9402 .RE 9403 9404 protocol 9405 .\" protocol 9406 .PP 9407 .RS 4 9408 This parameter is a synonym for 9409 server max protocol\&. 9410 .RE 9411 9412 server max protocol (G) 9413 .\" server max protocol 9414 .PP 9415 .RS 4 9416 The value of the parameter (a string) is the highest protocol level that will be supported by the server\&. 9417 .sp 9418 Possible values are : 9419 .sp 9420 .RS 4 9421 .ie n \{\ 9422 \h'-04'\(bu\h'+03'\c 9423 .\} 9424 .el \{\ 9425 .sp -1 9426 .IP \(bu 2.3 9427 .\} 9428 \fBLANMAN1\fR: First 9429 \fImodern\fR 9430 version of the protocol\&. Long filename support\&. 9431 .RE 9432 .sp 9433 .RS 4 9434 .ie n \{\ 9435 \h'-04'\(bu\h'+03'\c 9436 .\} 9437 .el \{\ 9438 .sp -1 9439 .IP \(bu 2.3 9440 .\} 9441 \fBLANMAN2\fR: Updates to Lanman1 protocol\&. 9442 .RE 9443 .sp 9444 .RS 4 9445 .ie n \{\ 9446 \h'-04'\(bu\h'+03'\c 9447 .\} 9448 .el \{\ 9449 .sp -1 9450 .IP \(bu 2.3 9451 .\} 9452 \fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&. 9453 .RE 9454 .sp 9455 .RS 4 9456 .ie n \{\ 9457 \h'-04'\(bu\h'+03'\c 9458 .\} 9459 .el \{\ 9460 .sp -1 9461 .IP \(bu 2.3 9462 .\} 9463 \fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and later versions of Windows\&. SMB2 has sub protocols available\&. 9464 .sp 9465 .RS 4 9466 .ie n \{\ 9467 \h'-04'\(bu\h'+03'\c 9468 .\} 9469 .el \{\ 9470 .sp -1 9471 .IP \(bu 2.3 9472 .\} 9473 \fBSMB2_02\fR: The earliest SMB2 version\&. 9474 .RE 9475 .sp 9476 .RS 4 9477 .ie n \{\ 9478 \h'-04'\(bu\h'+03'\c 9479 .\} 9480 .el \{\ 9481 .sp -1 9482 .IP \(bu 2.3 9483 .\} 9484 \fBSMB2_10\fR: Windows 7 SMB2 version\&. 9485 .RE 9486 .sp 9487 .RS 4 9488 .ie n \{\ 9489 \h'-04'\(bu\h'+03'\c 9490 .\} 9491 .el \{\ 9492 .sp -1 9493 .IP \(bu 2.3 9494 .\} 9495 \fBSMB2_22\fR: Early Windows 8 SMB2 version\&. 9496 .RE 9497 .sp 9498 .RS 4 9499 .ie n \{\ 9500 \h'-04'\(bu\h'+03'\c 9501 .\} 9502 .el \{\ 9503 .sp -1 9504 .IP \(bu 2.3 9505 .\} 9506 \fBSMB2_24\fR: Windows 8 beta SMB2 version\&. 9507 .RE 9508 .sp 9509 .RE 9510 By default SMB2 selects the SMB2_10 variant\&. 9511 .RE 9512 .sp 9513 .RS 4 9514 .ie n \{\ 9515 \h'-04'\(bu\h'+03'\c 9516 .\} 9517 .el \{\ 9518 .sp -1 9519 .IP \(bu 2.3 9520 .\} 9521 \fBSMB3\fR: The same as SMB2\&. Used by Windows 8\&. SMB3 has sub protocols available\&. 9522 .sp 9523 .RS 4 9524 .ie n \{\ 9525 \h'-04'\(bu\h'+03'\c 9526 .\} 9527 .el \{\ 9528 .sp -1 9529 .IP \(bu 2.3 9530 .\} 9531 \fBSMB3_00\fR: Windows 8 SMB3 version\&. (mostly the same as SMB2_24) 9532 .RE 9533 .sp 9534 .RS 4 9535 .ie n \{\ 9536 \h'-04'\(bu\h'+03'\c 9537 .\} 9538 .el \{\ 9539 .sp -1 9540 .IP \(bu 2.3 9541 .\} 9542 \fBSMB3_02\fR: Windows 8\&.1 SMB3 version\&. 9543 .RE 9544 .sp 9545 .RS 4 9546 .ie n \{\ 9547 \h'-04'\(bu\h'+03'\c 9548 .\} 9549 .el \{\ 9550 .sp -1 9551 .IP \(bu 2.3 9552 .\} 9553 \fBSMB3_10\fR: early Windows 10 technical preview SMB3 version\&. 9554 .RE 9555 .sp 9556 .RS 4 9557 .ie n \{\ 9558 \h'-04'\(bu\h'+03'\c 9559 .\} 9560 .el \{\ 9561 .sp -1 9562 .IP \(bu 2.3 9563 .\} 9564 \fBSMB3_11\fR: Windows 10 technical preview SMB3 version (maybe final)\&. 9565 .RE 9566 .sp 9567 .RE 9568 By default SMB3 selects the SMB3_11 variant\&. 9569 .RE 9570 .sp 9571 .RE 9572 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 9573 .sp 9574 Default: 9575 \fI\fIserver max protocol\fR\fR\fI = \fR\fISMB3\fR\fI \fR 9576 .sp 9577 Example: 9578 \fI\fIserver max protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR 9579 .RE 9580 9581 min protocol 9582 .\" min protocol 9583 .PP 9584 .RS 4 9585 This parameter is a synonym for 9586 server min protocol\&. 9587 .RE 9588 9589 server min protocol (G) 9590 .\" server min protocol 9591 .PP 9592 .RS 4 9593 This setting controls the minimum protocol version that the server will allow the client to use\&. 9594 .sp 9595 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 9596 .sp 9597 See 9598 Related command: \m[blue]\fBserver max protocol\fR\m[] 9599 for a full list of available protocols\&. 9600 .sp 9601 Default: 9602 \fI\fIserver min protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR 9603 .sp 9604 Example: 9605 \fI\fIserver min protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR 9606 .RE 9607 9608 server multi channel support (G) 9609 .\" server multi channel support 9610 .PP 9611 .RS 4 9612 This boolean parameter controls whether 8847 9613 \fBsmbd\fR(8) 8848 will send the server\-supplied principal sometimes given in the SPNEGO exchange\&. 8849 .sp 8850 If enabled, Samba can attempt to help clients to use Kerberos to contact it, even when known only by IP address or a name not registered with our KDC as a service principal name\&. Kerberos relies on names, so ordinarily cannot function in this situation\&. 8851 .sp 8852 If disabled, Samba will send the string not_defined_in_RFC4178@please_ignore as the \*(Aqrfc4178 hint\*(Aq, following the updated RFC and Windows 2008 behaviour in this area\&. 8853 .sp 8854 Note that Windows XP SP2 and later versions already ignored this value in all circumstances\&. 8855 .sp 8856 Default: 8857 \fI\fIsend spnego principal\fR\fR\fI = \fR\fIno\fR\fI \fR 9614 will support SMB3 multi\-channel\&. 9615 .sp 9616 This parameter has been added with version 4\&.4\&. 9617 .sp 9618 Warning: Note that this feature is considered experimental in Samba 4\&.4\&. Use it at your own risk: Even though it may seem to work well in testing, it may result in data corruption under some race conditions\&. Future 4\&.4\&.x release may improve this situation\&. 9619 .sp 9620 Default: 9621 \fI\fIserver multi channel support\fR\fR\fI = \fR\fIno\fR\fI \fR 9622 .RE 9623 9624 server role (G) 9625 .\" server role 9626 .PP 9627 .RS 4 9628 This option determines the basic operating mode of a Samba server and is one of the most important settings in the 9629 smb\&.conf 9630 file\&. 9631 .sp 9632 The default is 9633 server role = auto, as causes Samba to operate according to the 9634 \m[blue]\fBsecurity\fR\m[] 9635 setting, or if not specified as a simple file server that is not connected to any domain\&. 9636 .sp 9637 The alternatives are 9638 server role = standalone 9639 or 9640 server role = member server, which support joining Samba to a Windows domain, along with 9641 server role = domain controller, which run Samba as a Windows domain controller\&. 9642 .sp 9643 You should use 9644 server role = standalone 9645 and 9646 \m[blue]\fBmap to guest\fR\m[] 9647 if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&. 9648 .sp 9649 \fISERVER ROLE = AUTO\fR 9650 .sp 9651 This is the default server role in Samba, and causes Samba to consult the 9652 \m[blue]\fBsecurity\fR\m[] 9653 parameter (if set) to determine the server role, giving compatible behaviours to previous Samba versions\&. 9654 .sp 9655 \fISERVER ROLE = STANDALONE\fR 9656 .sp 9657 If 9658 \m[blue]\fBsecurity\fR\m[] 9659 is also not specified, this is the default security setting in Samba\&. In standalone operation, a client must first "log\-on" with a valid username and password (which can be mapped using the 9660 \m[blue]\fBusername map\fR\m[] 9661 parameter) stored on this machine\&. Encrypted passwords (see the 9662 \m[blue]\fBencrypted passwords\fR\m[] 9663 parameter) are by default used in this security mode\&. Parameters such as 9664 \m[blue]\fBuser\fR\m[] 9665 and 9666 \m[blue]\fBguest only\fR\m[] 9667 if set are then applied and may change the UNIX user to use on this connection, but only after the user has been successfully authenticated\&. 9668 .sp 9669 \fISERVER ROLE = MEMBER SERVER\fR 9670 .sp 9671 This mode will only work correctly if 9672 \fBnet\fR(8) 9673 has been used to add this machine into a Windows Domain\&. It expects the 9674 \m[blue]\fBencrypted passwords\fR\m[] 9675 parameter to be set to 9676 \fByes\fR\&. In this mode Samba will try to validate the username/password by passing it to a Windows or Samba Domain Controller, in exactly the same way that a Windows Server would do\&. 9677 .sp 9678 \fINote\fR 9679 that a valid UNIX user must still exist as well as the account on the Domain Controller to allow Samba to have a valid UNIX account to map file access to\&. Winbind can provide this\&. 9680 .sp 9681 \fISERVER ROLE = CLASSIC PRIMARY DOMAIN CONTROLLER\fR 9682 .sp 9683 This mode of operation runs a classic Samba primary domain controller, providing domain logon services to Windows and Samba clients of an NT4\-like domain\&. Clients must be joined to the domain to create a secure, trusted path across the network\&. There must be only one PDC per NetBIOS scope (typcially a broadcast network or clients served by a single WINS server)\&. 9684 .sp 9685 \fISERVER ROLE = CLASSIC BACKUP DOMAIN CONTROLLER\fR 9686 .sp 9687 This mode of operation runs a classic Samba backup domain controller, providing domain logon services to Windows and Samba clients of an NT4\-like domain\&. As a BDC, this allows multiple Samba servers to provide redundant logon services to a single NetBIOS scope\&. 9688 .sp 9689 \fISERVER ROLE = ACTIVE DIRECTORY DOMAIN CONTROLLER\fR 9690 .sp 9691 This mode of operation runs Samba as an active directory domain controller, providing domain logon services to Windows and Samba clients of the domain\&. This role requires special configuration, see the 9692 Samba4 HOWTO 9693 .sp 9694 Default: 9695 \fI\fIserver role\fR\fR\fI = \fR\fIAUTO\fR\fI \fR 9696 .sp 9697 Example: 9698 \fI\fIserver role\fR\fR\fI = \fR\fIACTIVE DIRECTORY DOMAIN CONTROLLER\fR\fI \fR 8858 9699 .RE 8859 9700 … … 8882 9723 .RE 8883 9724 9725 server services (G) 9726 .\" server services 9727 .PP 9728 .RS 4 9729 This option contains the services that the Samba daemon will run\&. 9730 .sp 9731 An entry in the 9732 smb\&.conf 9733 file can either override the previous value completely or entries can be removed from or added to it by prefixing them with 9734 \fB+\fR 9735 or 9736 \fB\-\fR\&. 9737 .sp 9738 Default: 9739 \fI\fIserver services\fR\fR\fI = \fR\fIs3fs, rpc, nbt, wrepl, ldap, cldap, kdc, drepl, winbindd, ntp_signd, kcc, dnsupdate, dns\fR\fI \fR 9740 .sp 9741 Example: 9742 \fI\fIserver services\fR\fR\fI = \fR\fI\-s3fs, +smb\fR\fI \fR 9743 .RE 9744 8884 9745 server signing (G) 8885 9746 .\" server signing … … 8887 9748 .RS 4 8888 9749 This controls whether the client is allowed or required to use SMB1 and SMB2 signing\&. Possible values are 9750 \fIdefault\fR, 8889 9751 \fIauto\fR, 8890 9752 \fImandatory\fR 8891 9753 and 8892 9754 \fIdisabled\fR\&. 9755 .sp 9756 By default, and when smb signing is set to 9757 \fIdefault\fR, smb signing is required when 9758 \m[blue]\fBserver role\fR\m[] 9759 is 9760 \fIactive directory domain controller\fR 9761 and disabled otherwise\&. 8893 9762 .sp 8894 9763 When set to auto, SMB1 signing is offered, but not enforced\&. When set to mandatory, SMB1 signing is required and if set to disabled, SMB signing is not offered either\&. … … 8901 9770 .sp 8902 9771 Default: 8903 \fI\fIserver signing\fR\fR\fI = \fR\fI Disabled\fR\fI \fR9772 \fI\fIserver signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR 8904 9773 .RE 8905 9774 … … 8928 9797 .RE 8929 9798 8930 set directory (S)8931 .\" set directory8932 .PP8933 .RS 48934 If8935 set directory = no, then users of the service may not use the setdir command to change directory\&.8936 .sp8937 The8938 setdir8939 command is only implemented in the Digital Pathworks client\&. See the Pathworks documentation for details\&.8940 .sp8941 Default:8942 \fI\fIset directory\fR\fR\fI = \fR\fIno\fR\fI \fR8943 .RE8944 8945 9799 set primary group script (G) 8946 9800 .\" set primary group script 8947 9801 .PP 8948 9802 .RS 4 8949 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\&. This script sets the primary group in the unix user datase when an administrator sets the primary group from the windows user manager or when fetching a SAM with9803 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\&. This script sets the primary group in the unix user database when an administrator sets the primary group from the windows user manager or when fetching a SAM with 8950 9804 net rpc vampire\&. 8951 9805 \fI%u\fR … … 8969 9823 should only be used whenever there is no operating system API available from the OS that samba can use\&. 8970 9824 .sp 8971 This option is only available if Samba was configured with the argument 8972 \-\-with\-sys\-quotas 8973 or on linux when 8974 \&./configure \-\-with\-quotas 8975 was used and a working quota api was found in the system\&. Most packages are configured with these options already\&. 9825 This option is only available if Samba was compiled with quota support\&. 8976 9826 .sp 8977 9827 This parameter should specify the path to a script that can set quota for the specified arguments\&. … … 8987 9837 .IP \(bu 2.3 8988 9838 .\} 8989 1 \- quota type 9839 1 \- path to where the quota needs to be set\&. This needs to be interpreted relative to the current working directory that the script may also check for\&. 9840 .RE 9841 .sp 9842 .RS 4 9843 .ie n \{\ 9844 \h'-04'\(bu\h'+03'\c 9845 .\} 9846 .el \{\ 9847 .sp -1 9848 .IP \(bu 2.3 9849 .\} 9850 2 \- quota type 8990 9851 .sp 8991 9852 .RS 4 … … 9044 9905 .IP \(bu 2.3 9045 9906 .\} 9046 2\- id (uid for user, gid for group, \-1 if N/A)9047 .RE 9048 .sp 9049 .RS 4 9050 .ie n \{\ 9051 \h'-04'\(bu\h'+03'\c 9052 .\} 9053 .el \{\ 9054 .sp -1 9055 .IP \(bu 2.3 9056 .\} 9057 3\- quota state (0 = disable, 1 = enable, 2 = enable and enforce)9058 .RE 9059 .sp 9060 .RS 4 9061 .ie n \{\ 9062 \h'-04'\(bu\h'+03'\c 9063 .\} 9064 .el \{\ 9065 .sp -1 9066 .IP \(bu 2.3 9067 .\} 9068 4\- block softlimit9069 .RE 9070 .sp 9071 .RS 4 9072 .ie n \{\ 9073 \h'-04'\(bu\h'+03'\c 9074 .\} 9075 .el \{\ 9076 .sp -1 9077 .IP \(bu 2.3 9078 .\} 9079 5\- block hardlimit9080 .RE 9081 .sp 9082 .RS 4 9083 .ie n \{\ 9084 \h'-04'\(bu\h'+03'\c 9085 .\} 9086 .el \{\ 9087 .sp -1 9088 .IP \(bu 2.3 9089 .\} 9090 6\- inode softlimit9091 .RE 9092 .sp 9093 .RS 4 9094 .ie n \{\ 9095 \h'-04'\(bu\h'+03'\c 9096 .\} 9097 .el \{\ 9098 .sp -1 9099 .IP \(bu 2.3 9100 .\} 9101 7\- inode hardlimit9102 .RE 9103 .sp 9104 .RS 4 9105 .ie n \{\ 9106 \h'-04'\(bu\h'+03'\c 9107 .\} 9108 .el \{\ 9109 .sp -1 9110 .IP \(bu 2.3 9111 .\} 9112 8(optional) \- block size, defaults to 10249907 3 \- id (uid for user, gid for group, \-1 if N/A) 9908 .RE 9909 .sp 9910 .RS 4 9911 .ie n \{\ 9912 \h'-04'\(bu\h'+03'\c 9913 .\} 9914 .el \{\ 9915 .sp -1 9916 .IP \(bu 2.3 9917 .\} 9918 4 \- quota state (0 = disable, 1 = enable, 2 = enable and enforce) 9919 .RE 9920 .sp 9921 .RS 4 9922 .ie n \{\ 9923 \h'-04'\(bu\h'+03'\c 9924 .\} 9925 .el \{\ 9926 .sp -1 9927 .IP \(bu 2.3 9928 .\} 9929 5 \- block softlimit 9930 .RE 9931 .sp 9932 .RS 4 9933 .ie n \{\ 9934 \h'-04'\(bu\h'+03'\c 9935 .\} 9936 .el \{\ 9937 .sp -1 9938 .IP \(bu 2.3 9939 .\} 9940 6 \- block hardlimit 9941 .RE 9942 .sp 9943 .RS 4 9944 .ie n \{\ 9945 \h'-04'\(bu\h'+03'\c 9946 .\} 9947 .el \{\ 9948 .sp -1 9949 .IP \(bu 2.3 9950 .\} 9951 7 \- inode softlimit 9952 .RE 9953 .sp 9954 .RS 4 9955 .ie n \{\ 9956 \h'-04'\(bu\h'+03'\c 9957 .\} 9958 .el \{\ 9959 .sp -1 9960 .IP \(bu 2.3 9961 .\} 9962 8 \- inode hardlimit 9963 .RE 9964 .sp 9965 .RS 4 9966 .ie n \{\ 9967 \h'-04'\(bu\h'+03'\c 9968 .\} 9969 .el \{\ 9970 .sp -1 9971 .IP \(bu 2.3 9972 .\} 9973 9(optional) \- block size, defaults to 1024 9113 9974 .RE 9114 9975 .sp … … 9121 9982 Example: 9122 9983 \fI\fIset quota command\fR\fR\fI = \fR\fI/usr/local/sbin/set_quota\fR\fI \fR 9984 .RE 9985 9986 share backend (G) 9987 .\" share backend 9988 .PP 9989 .RS 4 9990 This option specifies the backend that will be used to access the configuration of file shares\&. 9991 .sp 9992 Traditionally, Samba file shares have been configured in the 9993 \fBsmb\&.conf\fR 9994 file and this is still the default\&. 9995 .sp 9996 At the moment there are no other supported backends\&. 9997 .sp 9998 Default: 9999 \fI\fIshare backend\fR\fR\fI = \fR\fIclassic\fR\fI \fR 9123 10000 .RE 9124 10001 … … 9133 10010 Default: 9134 10011 \fI\fIshare:fake_fscaps\fR\fR\fI = \fR\fI0\fR\fI \fR 9135 .RE9136 9137 share modes (S)9138 .\" share modes9139 .PP9140 .RS 49141 This enables or disables the honoring of the9142 \fIshare modes\fR9143 during a file open\&. These modes are used by clients to gain exclusive read or write access to a file\&.9144 .sp9145 This is a deprecated option from old versions of Samba, and will be removed in the next major release\&.9146 .sp9147 These open modes are not directly supported by UNIX, so they are simulated using shared memory\&.9148 .sp9149 The share modes that are enabled by this option are the standard Windows share modes\&.9150 .sp9151 This option gives full share compatibility and is enabled by default\&.9152 .sp9153 You should9154 \fINEVER\fR9155 turn this parameter off as many Windows applications will break if you do so\&.9156 .sp9157 Default:9158 \fI\fIshare modes\fR\fR\fI = \fR\fIyes\fR\fI \fR9159 10012 .RE 9160 10013 … … 9181 10034 With the introduction of MS\-RPC based printing support for Windows NT/2000 client in Samba 2\&.2, a "Printers\&.\&.\&." folder will appear on Samba hosts in the share listing\&. Normally this folder will contain an icon for the MS Add Printer Wizard (APW)\&. However, it is possible to disable this feature regardless of the level of privilege of the connected user\&. 9182 10035 .sp 9183 Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\&. If the user does not have administrative access on the print server (i\&.e is not root or a member of the 9184 \fIprinter admin\fR 9185 group), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\&. This should succeed, however the APW icon will not be displayed\&. 10036 Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\&. If the user does not have administrative access on the print server (i\&.e is not root or has granted the SePrintOperatorPrivilege), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\&. This should succeed, however the APW icon will not be displayed\&. 9186 10037 .sp 9187 10038 Disabling the … … 9215 10066 that should start a shutdown procedure\&. 9216 10067 .sp 9217 If the connected user posses es the10068 If the connected user possesses the 9218 10069 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as root\&. 9219 10070 .sp … … 9299 10150 .RE 9300 10151 10152 smb2 leases (G) 10153 .\" smb2 leases 10154 .PP 10155 .RS 4 10156 This boolean option tells 10157 smbd 10158 whether to globally negotiate SMB2 leases on file open requests\&. Leasing is an SMB2\-only feature which allows clients to aggressively cache files locally above and beyond the caching allowed by SMB1 oplocks\&. This (experimental) parameter is set to off by default until the SMB2 leasing code is declared fully stable\&. 10159 .sp 10160 This is only available with 10161 \m[blue]\fBoplocks = yes\fR\m[] 10162 and 10163 \m[blue]\fBkernel oplocks = no\fR\m[]\&. 10164 .sp 10165 Note that the write cache won\*(Aqt be used for file handles with a smb2 write lease\&. 10166 .sp 10167 The Samba implementation of leases is currently marked as experimental! 10168 .sp 10169 Default: 10170 \fI\fIsmb2 leases\fR\fR\fI = \fR\fIno\fR\fI \fR 10171 .RE 10172 9301 10173 smb2 max credits (G) 9302 10174 .\" smb2 max credits … … 9321 10193 will return to a client, informing the client of the largest size that may be returned by a single SMB2 read call\&. 9322 10194 .sp 9323 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&. 9324 .sp 9325 Default: 9326 \fI\fIsmb2 max read\fR\fR\fI = \fR\fI65536\fR\fI \fR 10195 The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&. 10196 .sp 10197 Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 8MiB for SMB >= 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&. 10198 .sp 10199 Default: 10200 \fI\fIsmb2 max read\fR\fR\fI = \fR\fI8388608\fR\fI \fR 9327 10201 .RE 9328 10202 … … 9335 10209 will return to a client, informing the client of the largest size of buffer that may be used in querying file meta\-data via QUERY_INFO and related SMB2 calls\&. 9336 10210 .sp 9337 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&. 9338 .sp 9339 Default: 9340 \fI\fIsmb2 max trans\fR\fR\fI = \fR\fI65536\fR\fI \fR 10211 The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&. 10212 .sp 10213 Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 1MiB for SMB >= 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&. 10214 .sp 10215 Default: 10216 \fI\fIsmb2 max trans\fR\fR\fI = \fR\fI8388608\fR\fI \fR 9341 10217 .RE 9342 10218 … … 9349 10225 will return to a client, informing the client of the largest size that may be sent to the server by a single SMB2 write call\&. 9350 10226 .sp 9351 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&. 9352 .sp 9353 Default: 9354 \fI\fIsmb2 max write\fR\fR\fI = \fR\fI65536\fR\fI \fR 10227 The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&. 10228 .sp 10229 Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 8MiB for SMB => 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&. 10230 .sp 10231 Default: 10232 \fI\fIsmb2 max write\fR\fR\fI = \fR\fI8388608\fR\fI \fR 10233 .RE 10234 10235 smbd profiling level (G) 10236 .\" smbd profiling level 10237 .PP 10238 .RS 4 10239 This parameter allows the administrator to enable profiling support\&. 10240 .sp 10241 Possible values are 10242 \fBoff\fR, 10243 \fBcount\fR 10244 and 10245 \fBon\fR\&. 10246 .sp 10247 Default: 10248 \fI\fIsmbd profiling level\fR\fR\fI = \fR\fIoff\fR\fI \fR 10249 .sp 10250 Example: 10251 \fI\fIsmbd profiling level\fR\fR\fI = \fR\fIon\fR\fI \fR 9355 10252 .RE 9356 10253 … … 9359 10256 .PP 9360 10257 .RS 4 9361 This is a new feature introduced with Samba 3\&.2 and above\&. It is an extension to the SMB/CIFS protocol negotiated as part of the UNIX extensions\&. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\&. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\&. Currently this is only supported by Samba 3\&.2 smbclient, and hopefully soon Linux CIFSFS and MacOS/X clients\&. Windows clients do not support this feature\&. 9362 .sp 9363 This controls whether the remote client is allowed or required to use SMB encryption\&. Possible values are 9364 \fIauto\fR, 9365 \fImandatory\fR 9366 and 9367 \fIdisabled\fR\&. This may be set on a per\-share basis, but clients may chose to encrypt the entire session, not just traffic to a specific share\&. If this is set to mandatory then all traffic to a share 10258 This parameter controls whether a remote client is allowed or required to use SMB encryption\&. It has different effects depending on whether the connection uses SMB1 or SMB2 and newer: 10259 .sp 10260 .RS 4 10261 .ie n \{\ 10262 \h'-04'\(bu\h'+03'\c 10263 .\} 10264 .el \{\ 10265 .sp -1 10266 .IP \(bu 2.3 10267 .\} 10268 If the connection uses SMB1, then this option controls the use of a Samba\-specific extension to the SMB protocol introduced in Samba 3\&.2 that makes use of the Unix extensions\&. 10269 .RE 10270 .sp 10271 .RS 4 10272 .ie n \{\ 10273 \h'-04'\(bu\h'+03'\c 10274 .\} 10275 .el \{\ 10276 .sp -1 10277 .IP \(bu 2.3 10278 .\} 10279 If the connection uses SMB2 or newer, then this option controls the use of the SMB\-level encryption that is supported in SMB version 3\&.0 and above and available in Windows 8 and newer\&. 10280 .RE 10281 .sp 10282 .RE 10283 This parameter can be set globally and on a per\-share bases\&. Possible values are 10284 \fIoff\fR 10285 (or 10286 \fIdisabled\fR), 10287 \fIenabled\fR 10288 (or 10289 \fIauto\fR, or 10290 \fIif_required\fR), 10291 \fIdesired\fR, and 10292 \fIrequired\fR 10293 (or 10294 \fImandatory\fR)\&. A special value is 10295 \fIdefault\fR 10296 which is the implicit default setting of 10297 \fIenabled\fR\&. 10298 .PP 10299 \fIEffects for SMB1\fR 10300 .RS 4 10301 The Samba\-specific encryption of SMB1 connections is an extension to the SMB protocol negotiated as part of the UNIX extensions\&. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\&. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\&. Currently this is only supported smbclient of by Samba 3\&.2 and newer, and hopefully soon Linux CIFSFS and MacOS/X clients\&. Windows clients do not support this feature\&. 10302 .sp 10303 This may be set on a per\-share basis, but clients may chose to encrypt the entire session, not just traffic to a specific share\&. If this is set to mandatory then all traffic to a share 9368 10304 \fImust\fR 9369 mustbe encrypted once the connection has been made to the share\&. The server would return "access denied" to all non\-encrypted requests on such a share\&. Selecting encrypted traffic reduces throughput as smaller packet sizes must be used (no huge UNIX style read/writes allowed) as well as the overhead of encrypting and signing all the data\&.10305 be encrypted once the connection has been made to the share\&. The server would return "access denied" to all non\-encrypted requests on such a share\&. Selecting encrypted traffic reduces throughput as smaller packet sizes must be used (no huge UNIX style read/writes allowed) as well as the overhead of encrypting and signing all the data\&. 9370 10306 .sp 9371 10307 If SMB encryption is selected, Windows style SMB signing (see the … … 9373 10309 option) is no longer necessary, as the GSSAPI flags use select both signing and sealing of the data\&. 9374 10310 .sp 9375 When set to auto, SMB encryption is offered, but not enforced\&. When set to mandatory, SMB encryption is required and if set to disabled, SMB encryption can not be negotiated\&. 9376 .sp 9377 Default: 9378 \fI\fIsmb encrypt\fR\fR\fI = \fR\fIauto\fR\fI \fR 10311 When set to auto or default, SMB encryption is offered, but not enforced\&. When set to mandatory, SMB encryption is required and if set to disabled, SMB encryption can not be negotiated\&. 10312 .RE 10313 .PP 10314 \fIEffects for SMB2\fR 10315 .RS 4 10316 Native SMB transport encryption is available in SMB version 3\&.0 or newer\&. It is only offered by Samba if 10317 \fIserver max protocol\fR 10318 is set to 10319 \fISMB3\fR 10320 or newer\&. Clients supporting this type of encryption include Windows 8 and newer, Windows server 2012 and newer, and smbclient of Samba 4\&.1 and newer\&. 10321 .sp 10322 The protocol implementation offers various options: 10323 .sp 10324 .RS 4 10325 .ie n \{\ 10326 \h'-04'\(bu\h'+03'\c 10327 .\} 10328 .el \{\ 10329 .sp -1 10330 .IP \(bu 2.3 10331 .\} 10332 The capability to perform SMB encryption can be negotiated during protocol negotiation\&. 10333 .RE 10334 .sp 10335 .RS 4 10336 .ie n \{\ 10337 \h'-04'\(bu\h'+03'\c 10338 .\} 10339 .el \{\ 10340 .sp -1 10341 .IP \(bu 2.3 10342 .\} 10343 Data encryption can be enabled globally\&. In that case, an encryption\-capable connection will have all traffic in all its sessions encrypted\&. In particular all share connections will be encrypted\&. 10344 .RE 10345 .sp 10346 .RS 4 10347 .ie n \{\ 10348 \h'-04'\(bu\h'+03'\c 10349 .\} 10350 .el \{\ 10351 .sp -1 10352 .IP \(bu 2.3 10353 .\} 10354 Data encryption can also be enabled per share if not enabled globally\&. For an encryption\-capable connection, all connections to an encryption\-enabled share will be encrypted\&. 10355 .RE 10356 .sp 10357 .RS 4 10358 .ie n \{\ 10359 \h'-04'\(bu\h'+03'\c 10360 .\} 10361 .el \{\ 10362 .sp -1 10363 .IP \(bu 2.3 10364 .\} 10365 Encryption can be enforced\&. This means that session setups will be denied on non\-encryption\-capable connections if data encryption has been enabled globally\&. And tree connections will be denied for non\-encryption capable connections to shares with data encryption enabled\&. 10366 .RE 10367 .sp 10368 .RE 10369 These features can be controlled with settings of 10370 \fIsmb encrypt\fR 10371 as follows: 10372 .sp 10373 .RS 4 10374 .ie n \{\ 10375 \h'-04'\(bu\h'+03'\c 10376 .\} 10377 .el \{\ 10378 .sp -1 10379 .IP \(bu 2.3 10380 .\} 10381 Leaving it as default, explicitly setting 10382 \fIdefault\fR, or setting it to 10383 \fIenabled\fR 10384 globally will enable negotiation of encryption but will not turn on data encryption globally or per share\&. 10385 .RE 10386 .sp 10387 .RS 4 10388 .ie n \{\ 10389 \h'-04'\(bu\h'+03'\c 10390 .\} 10391 .el \{\ 10392 .sp -1 10393 .IP \(bu 2.3 10394 .\} 10395 Setting it to 10396 \fIdesired\fR 10397 globally will enable negotiation and will turn on data encryption on sessions and share connections for those clients that support it\&. 10398 .RE 10399 .sp 10400 .RS 4 10401 .ie n \{\ 10402 \h'-04'\(bu\h'+03'\c 10403 .\} 10404 .el \{\ 10405 .sp -1 10406 .IP \(bu 2.3 10407 .\} 10408 Setting it to 10409 \fIrequired\fR 10410 globally will enable negotiation and turn on data encryption on sessions and share connections\&. Clients that do not support encryption will be denied access to the server\&. 10411 .RE 10412 .sp 10413 .RS 4 10414 .ie n \{\ 10415 \h'-04'\(bu\h'+03'\c 10416 .\} 10417 .el \{\ 10418 .sp -1 10419 .IP \(bu 2.3 10420 .\} 10421 Setting it to 10422 \fIoff\fR 10423 globally will completely disable the encryption feature\&. 10424 .RE 10425 .sp 10426 .RS 4 10427 .ie n \{\ 10428 \h'-04'\(bu\h'+03'\c 10429 .\} 10430 .el \{\ 10431 .sp -1 10432 .IP \(bu 2.3 10433 .\} 10434 Setting it to 10435 \fIdesired\fR 10436 on a share will turn on data encryption for this share for clients that support encryption if negotiation has been enabled globally\&. 10437 .RE 10438 .sp 10439 .RS 4 10440 .ie n \{\ 10441 \h'-04'\(bu\h'+03'\c 10442 .\} 10443 .el \{\ 10444 .sp -1 10445 .IP \(bu 2.3 10446 .\} 10447 Setting it to 10448 \fIrequired\fR 10449 on a share will enforce data encryption for this share if negotiation has been enabled globally\&. I\&.e\&. clients that do not support encryption will be denied access to the share\&. 10450 .sp 10451 Note that this allows per\-share enforcing to be controlled in Samba differently from Windows: In Windows, 10452 \fIRejectUnencryptedAccess\fR 10453 is a global setting, and if it is set, all shares with data encryption turned on are automatically enforcing encryption\&. In order to achieve the same effect in Samba, one has to globally set 10454 \fIsmb encrypt\fR 10455 to 10456 \fIenabled\fR, and then set all shares that should be encrypted to 10457 \fIrequired\fR\&. Additionally, it is possible in Samba to have some shares with encryption 10458 \fIrequired\fR 10459 and some other shares with encryption only 10460 \fIdesired\fR, which is not possible in Windows\&. 10461 .RE 10462 .sp 10463 .RS 4 10464 .ie n \{\ 10465 \h'-04'\(bu\h'+03'\c 10466 .\} 10467 .el \{\ 10468 .sp -1 10469 .IP \(bu 2.3 10470 .\} 10471 Setting it to 10472 \fIoff\fR 10473 or 10474 \fIenabled\fR 10475 for a share has no effect\&. 10476 .RE 10477 .sp 10478 .RE 10479 .RE 10480 .sp 10481 Default: 10482 \fI\fIsmb encrypt\fR\fR\fI = \fR\fIdefault\fR\fI \fR 9379 10483 .RE 9380 10484 … … 9411 10515 .RE 9412 10516 9413 socket address (G)9414 .\" socket address9415 .PP9416 .RS 49417 This option allows you to control what address Samba will listen for connections on\&. This is used to support multiple virtual interfaces on the one server, each with a different configuration\&.9418 .sp9419 Setting this option should never be necessary on usual Samba servers running only one nmbd\&.9420 .sp9421 By default Samba will accept connections on any address\&.9422 .sp9423 Default:9424 \fI\fIsocket address\fR\fR\fI = \fR\fI\fR\fI \fR9425 .sp9426 Example:9427 \fI\fIsocket address\fR\fR\fI = \fR\fI192\&.168\&.2\&.20\fR\fI \fR9428 .RE9429 9430 10517 socket options (G) 9431 10518 .\" socket options 9432 10519 .PP 9433 10520 .RS 4 10521 .if n \{\ 10522 .sp 10523 .\} 10524 .RS 4 10525 .it 1 an-trap 10526 .nr an-no-space-flag 1 10527 .nr an-break-flag 1 10528 .br 10529 .ps +1 10530 \fBWarning\fR 10531 .ps -1 10532 .br 10533 Modern server operating systems are tuned for high network performance in the majority of situations; when you set socket options you are overriding those settings\&. Linux in particular has an auto\-tuning mechanism for buffer sizes that will be disabled if you specify a socket buffer size\&. This can potentially cripple your TCP/IP stack\&. 10534 .sp 10535 Getting the socket options correct can make a big difference to your performance, but getting them wrong can degrade it by just as much\&. As with any other low level setting, if you must make changes to it, make small changes and 10536 \fItest\fR 10537 the effect before making any large changes\&. 10538 .sp .5v 10539 .RE 10540 .sp 9434 10541 This option allows you to set socket options to be used when talking with the client\&. 9435 10542 .sp … … 9441 10548 .sp 9442 10549 You may find that on some systems Samba will say "Unknown socket option" when you supply an option\&. This means you either incorrectly typed it or you need to add an include file to includes\&.h for your OS\&. If the latter is the case please send the patch to 9443 samba\-technical@ samba\&.org\&.10550 samba\-technical@lists\&.samba\&.org\&. 9444 10551 .sp 9445 10552 Any of the supported socket options may be combined in any way you like, as long as your OS allows it\&. … … 9499 10606 .IP \(bu 2.3 9500 10607 .\} 10608 TCP_KEEPCNT * 10609 .RE 10610 .sp 10611 .RS 4 10612 .ie n \{\ 10613 \h'-04'\(bu\h'+03'\c 10614 .\} 10615 .el \{\ 10616 .sp -1 10617 .IP \(bu 2.3 10618 .\} 10619 TCP_KEEPIDLE * 10620 .RE 10621 .sp 10622 .RS 4 10623 .ie n \{\ 10624 \h'-04'\(bu\h'+03'\c 10625 .\} 10626 .el \{\ 10627 .sp -1 10628 .IP \(bu 2.3 10629 .\} 10630 TCP_KEEPINTVL * 10631 .RE 10632 .sp 10633 .RS 4 10634 .ie n \{\ 10635 \h'-04'\(bu\h'+03'\c 10636 .\} 10637 .el \{\ 10638 .sp -1 10639 .IP \(bu 2.3 10640 .\} 9501 10641 IPTOS_LOWDELAY 9502 10642 .RE … … 9521 10661 .IP \(bu 2.3 9522 10662 .\} 10663 SO_REUSEPORT 10664 .RE 10665 .sp 10666 .RS 4 10667 .ie n \{\ 10668 \h'-04'\(bu\h'+03'\c 10669 .\} 10670 .el \{\ 10671 .sp -1 10672 .IP \(bu 2.3 10673 .\} 9523 10674 SO_SNDBUF * 9524 10675 .RE … … 9555 10706 .\} 9556 10707 SO_RCVLOWAT * 10708 .RE 10709 .sp 10710 .RS 4 10711 .ie n \{\ 10712 \h'-04'\(bu\h'+03'\c 10713 .\} 10714 .el \{\ 10715 .sp -1 10716 .IP \(bu 2.3 10717 .\} 10718 SO_SNDTIMEO * 10719 .RE 10720 .sp 10721 .RS 4 10722 .ie n \{\ 10723 \h'-04'\(bu\h'+03'\c 10724 .\} 10725 .el \{\ 10726 .sp -1 10727 .IP \(bu 2.3 10728 .\} 10729 SO_RCVTIMEO * 10730 .RE 10731 .sp 10732 .RS 4 10733 .ie n \{\ 10734 \h'-04'\(bu\h'+03'\c 10735 .\} 10736 .el \{\ 10737 .sp -1 10738 .IP \(bu 2.3 10739 .\} 10740 TCP_FASTACK * 10741 .RE 10742 .sp 10743 .RS 4 10744 .ie n \{\ 10745 \h'-04'\(bu\h'+03'\c 10746 .\} 10747 .el \{\ 10748 .sp -1 10749 .IP \(bu 2.3 10750 .\} 10751 TCP_QUICKACK 10752 .RE 10753 .sp 10754 .RS 4 10755 .ie n \{\ 10756 \h'-04'\(bu\h'+03'\c 10757 .\} 10758 .el \{\ 10759 .sp -1 10760 .IP \(bu 2.3 10761 .\} 10762 TCP_NODELAYACK 10763 .RE 10764 .sp 10765 .RS 4 10766 .ie n \{\ 10767 \h'-04'\(bu\h'+03'\c 10768 .\} 10769 .el \{\ 10770 .sp -1 10771 .IP \(bu 2.3 10772 .\} 10773 TCP_KEEPALIVE_THRESHOLD * 10774 .RE 10775 .sp 10776 .RS 4 10777 .ie n \{\ 10778 \h'-04'\(bu\h'+03'\c 10779 .\} 10780 .el \{\ 10781 .sp -1 10782 .IP \(bu 2.3 10783 .\} 10784 TCP_KEEPALIVE_ABORT_THRESHOLD * 10785 .RE 10786 .sp 10787 .RS 4 10788 .ie n \{\ 10789 \h'-04'\(bu\h'+03'\c 10790 .\} 10791 .el \{\ 10792 .sp -1 10793 .IP \(bu 2.3 10794 .\} 10795 TCP_DEFER_ACCEPT * 9557 10796 .RE 9558 10797 .sp … … 9582 10821 Example: 9583 10822 \fI\fIsocket options\fR\fR\fI = \fR\fIIPTOS_LOWDELAY\fR\fI \fR 10823 .RE 10824 10825 spn update command (G) 10826 .\" spn update command 10827 .PP 10828 .RS 4 10829 This option sets the command that for updating servicePrincipalName names from 10830 spn_update_list\&. 10831 .sp 10832 Default: 10833 \fI\fIspn update command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_spnupdate\fR\fI \fR 10834 .sp 10835 Example: 10836 \fI\fIspn update command\fR\fR\fI = \fR\fI/usr/local/sbin/spnupdate\fR\fI \fR 10837 .RE 10838 10839 spoolss: architecture (G) 10840 .\" spoolss: architecture 10841 .PP 10842 .RS 4 10843 Windows spoolss print clients only allow association of server\-side drivers with printers when the driver architecture matches the advertised print server architecture\&. Samba\*(Aqs spoolss print server architecture can be changed using this parameter\&. 10844 .sp 10845 Default: 10846 \fI\fIspoolss: architecture\fR\fR\fI = \fR\fIWindows NT x86\fR\fI \fR 10847 .sp 10848 Example: 10849 \fI\fIspoolss: architecture\fR\fR\fI = \fR\fIWindows x64\fR\fI \fR 10850 .RE 10851 10852 spoolss: os_major (G) 10853 .\" spoolss: os_major 10854 .PP 10855 .RS 4 10856 Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&. 10857 .sp 10858 Default: 10859 \fI\fIspoolss: os_major\fR\fR\fI = \fR\fI5\fR\fI \fR 10860 .sp 10861 Example: 10862 \fI\fIspoolss: os_major\fR\fR\fI = \fR\fI6\fR\fI \fR 10863 .RE 10864 10865 spoolss: os_minor (G) 10866 .\" spoolss: os_minor 10867 .PP 10868 .RS 4 10869 Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&. 10870 .sp 10871 Default: 10872 \fI\fIspoolss: os_minor\fR\fR\fI = \fR\fI0\fR\fI \fR 10873 .sp 10874 Example: 10875 \fI\fIspoolss: os_minor\fR\fR\fI = \fR\fI1\fR\fI \fR 10876 .RE 10877 10878 spoolss: os_build (G) 10879 .\" spoolss: os_build 10880 .PP 10881 .RS 4 10882 Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&. 10883 .sp 10884 Default: 10885 \fI\fIspoolss: os_build\fR\fR\fI = \fR\fI2195\fR\fI \fR 10886 .sp 10887 Example: 10888 \fI\fIspoolss: os_build\fR\fR\fI = \fR\fI7601\fR\fI \fR 10889 .RE 10890 10891 spotlight (S) 10892 .\" spotlight 10893 .PP 10894 .RS 4 10895 This parameter controls whether Samba allows Spotlight queries on a share\&. For controlling indexing of filesystems you also have to use Tracker\*(Aqs own configuration system\&. 10896 .sp 10897 Spotlight has several prerequisites: 10898 .sp 10899 .RS 4 10900 .ie n \{\ 10901 \h'-04'\(bu\h'+03'\c 10902 .\} 10903 .el \{\ 10904 .sp -1 10905 .IP \(bu 2.3 10906 .\} 10907 Samba must be configured and built with Spotlight support\&. 10908 .RE 10909 .sp 10910 .RS 4 10911 .ie n \{\ 10912 \h'-04'\(bu\h'+03'\c 10913 .\} 10914 .el \{\ 10915 .sp -1 10916 .IP \(bu 2.3 10917 .\} 10918 The 10919 \fImdssvc\fR 10920 RPC service must be enabled, see below\&. 10921 .RE 10922 .sp 10923 .RS 4 10924 .ie n \{\ 10925 \h'-04'\(bu\h'+03'\c 10926 .\} 10927 .el \{\ 10928 .sp -1 10929 .IP \(bu 2.3 10930 .\} 10931 Tracker intergration must be setup and the share must be indexed by Tracker\&. 10932 .RE 10933 .sp 10934 .RE 10935 For a detailed set of instructions please see 10936 https://wiki\&.samba\&.org/index\&.php/Spotlight\&. 10937 .sp 10938 The Spotlight RPC service can either be enabled as embedded RPC service: 10939 .sp 10940 .if n \{\ 10941 .RS 4 10942 .\} 10943 .nf 10944 \fI[Global]\fR 10945 \m[blue]\fBrpc_server:mdsvc = embedded\fR\m[] 10946 .fi 10947 .if n \{\ 10948 .RE 10949 .\} 10950 .sp 10951 Or it can be run in a seperate RPC service daemon: 10952 .sp 10953 .if n \{\ 10954 .RS 4 10955 .\} 10956 .nf 10957 \fI[Global]\fR 10958 \m[blue]\fBrpc_server:mdssd = fork\fR\m[] 10959 \m[blue]\fBrpc_server:mdsvc = external\fR\m[] 10960 .fi 10961 .if n \{\ 10962 .RE 10963 .\} 10964 .sp 10965 Default: 10966 \fI\fIspotlight\fR\fR\fI = \fR\fIno\fR\fI \fR 9584 10967 .RE 9585 10968 … … 9623 11006 \m[blue]\fBmap hidden\fR\m[] 9624 11007 and 9625 \m[blue]\fBmap readonly\fR\m[])\&. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\&. For no other mapping to occur as a fall\-back,the parameters11008 \m[blue]\fBmap readonly\fR\m[])\&. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\&. When this parameter is set it will override the parameters 9626 11009 \m[blue]\fBmap hidden\fR\m[], 9627 11010 \m[blue]\fBmap system\fR\m[], … … 9629 11012 and 9630 11013 \m[blue]\fBmap readonly\fR\m[] 9631 must be set to off\&. This parameter writes the DOS attributes as a string into the extended attribute named "user\&.DOSATTRIB"\&. This extended attribute is explicitly hidden from smbd clients requesting an EA list\&. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\&. In Samba 3\&.5\&.0 and above the "user\&.DOSATTRIB" extended attribute has been extended to store the create time for a file as well as the DOS attributes\&. This is done in a backwards compatible way so files created by Samba 3\&.5\&.0 and above can still have the DOS attribute read from this extended attribute by earlier versions of Samba, but they will not be able to read the create time stored there\&. Storing the create time separately from the normal filesystem meta\-data allows Samba to faithfully reproduce NTFS semantics on top of a POSIX filesystem\&.11014 and they will behave as if they were set to off\&. This parameter writes the DOS attributes as a string into the extended attribute named "user\&.DOSATTRIB"\&. This extended attribute is explicitly hidden from smbd clients requesting an EA list\&. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\&. In Samba 3\&.5\&.0 and above the "user\&.DOSATTRIB" extended attribute has been extended to store the create time for a file as well as the DOS attributes\&. This is done in a backwards compatible way so files created by Samba 3\&.5\&.0 and above can still have the DOS attribute read from this extended attribute by earlier versions of Samba, but they will not be able to read the create time stored there\&. Storing the create time separately from the normal filesystem meta\-data allows Samba to faithfully reproduce NTFS semantics on top of a POSIX filesystem\&. 9632 11015 .sp 9633 11016 Default: … … 9643 11026 the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\&. In UNIX terminology this means that Samba will stop creating sparse files\&. 9644 11027 .sp 9645 This option is really des gined for file systems that support fast allocation of large numbers of blocks such as extent\-based file systems\&. On file systems that don\*(Aqt support extents (most notably ext3) this can make Samba slower\&. When you work with large files over >100MB on file systems without extents you may even run into problems with clients running into timeouts\&.11028 This option is really designed for file systems that support fast allocation of large numbers of blocks such as extent\-based file systems\&. On file systems that don\*(Aqt support extents (most notably ext3) this can make Samba slower\&. When you work with large files over >100MB on file systems without extents you may even run into problems with clients running into timeouts\&. 9646 11029 .sp 9647 11030 When you have an extent based filesystem it\*(Aqs likely that we can make use of unwritten extents which allows Samba to allocate even large amounts of space very fast and you will not see any timeout problems caused by strict allocate\&. With strict allocate in use you will also get much better out of quota messages in case you use quotas\&. Another advantage of activating this setting is that it will help to reduce file fragmentation\&. … … 9674 11057 .RE 9675 11058 11059 strict rename (S) 11060 .\" strict rename 11061 .PP 11062 .RS 4 11063 By default a Windows SMB server prevents directory renames when there are open file or directory handles below it in the filesystem hierarchy\&. Historically Samba has always allowed this as POSIX filesystem semantics require it\&. 11064 .sp 11065 This boolean parameter allows Samba to match the Windows behavior\&. Setting this to "yes" is a very expensive change, as it forces Samba to travers the entire open file handle database on every directory rename request\&. In a clustered Samba system the cost is even greater than the non\-clustered case\&. 11066 .sp 11067 When set to "no" smbd only checks the local process the client is attached to for open files below a directory being renamed, instead of checking for open files across all smbd processes\&. 11068 .sp 11069 Because of the expense in fully searching the database, the default is "no", and it is recommended to be left that way unless a specific Windows application requires it to be changed\&. 11070 .sp 11071 If the client has requested UNIX extensions (POSIX pathnames) then renames are always allowed and this parameter has no effect\&. 11072 .sp 11073 Default: 11074 \fI\fIstrict rename\fR\fR\fI = \fR\fIno\fR\fI \fR 11075 .RE 11076 9676 11077 strict sync (S) 9677 11078 .\" strict sync 9678 11079 .PP 9679 11080 .RS 4 9680 Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\&. Under UNIX, a sync call forces the processto be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\&. This is very slow and should only be done rarely\&. Setting this parameter to11081 Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\&. Under UNIX, a sync call forces the thread to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\&. This is very slow and should only be done rarely\&. Setting this parameter to 9681 11082 \fBno\fR 9682 11083 (the default) means that 9683 11084 \fBsmbd\fR(8) 9684 11085 ignores the Windows applications requests for a sync call\&. There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting\&. In addition, this fixes many performance problems that people have reported with the new Windows98 explorer shell file copies\&. 11086 .sp 11087 The flush request from SMB2/3 clients is handled asynchronously, so for these clients setting the parameter to 11088 \fByes\fR 11089 does not block the processing of other requests in the smbd process\&. 9685 11090 .sp 9686 11091 Default: … … 9727 11132 .RE 9728 11133 9729 syslog only (G)9730 .\" syslog only9731 .PP9732 .RS 49733 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\&. There still will be some logging to log\&.[sn]mbd even if9734 \fIsyslog only\fR9735 is enabled\&.9736 .sp9737 Default:9738 \fI\fIsyslog only\fR\fR\fI = \fR\fIno\fR\fI \fR9739 .RE9740 9741 11134 syslog (G) 9742 11135 .\" syslog … … 9753 11146 is enabled\&. 9754 11147 .sp 11148 The 11149 \m[blue]\fBlogging\fR\m[] 11150 parameter should be used instead\&. When 11151 \m[blue]\fBlogging\fR\m[] 11152 is set, it overrides the 11153 \m[blue]\fBsyslog\fR\m[] 11154 parameter\&. 11155 .sp 9755 11156 Default: 9756 11157 \fI\fIsyslog\fR\fR\fI = \fR\fI1\fR\fI \fR 11158 .RE 11159 11160 syslog only (G) 11161 .\" syslog only 11162 .PP 11163 .RS 4 11164 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\&. There still will be some logging to log\&.[sn]mbd even if 11165 \fIsyslog only\fR 11166 is enabled\&. 11167 .sp 11168 The 11169 \m[blue]\fBlogging\fR\m[] 11170 parameter should be used instead\&. When 11171 \m[blue]\fBlogging\fR\m[] 11172 is set, it overrides the 11173 \m[blue]\fBsyslog only\fR\m[] 11174 parameter\&. 11175 .sp 11176 Default: 11177 \fI\fIsyslog only\fR\fR\fI = \fR\fIno\fR\fI \fR 9757 11178 .RE 9758 11179 … … 9781 11202 daemon uses this parameter to fill in the login shell for that user\&. 9782 11203 .sp 9783 \fINo default\fR 9784 .RE 9785 9786 time offset (G) 9787 .\" time offset 9788 .PP 9789 .RS 4 9790 This deprecated parameter is a setting in minutes to add to the normal GMT to local time conversion\&. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\&. 9791 .if n \{\ 9792 .sp 9793 .\} 9794 .RS 4 9795 .it 1 an-trap 9796 .nr an-no-space-flag 1 9797 .nr an-break-flag 1 9798 .br 9799 .ps +1 9800 \fBNote\fR 9801 .ps -1 9802 .br 9803 This option is deprecated, and will be removed in the next major release 9804 .sp .5v 9805 .RE 9806 Default: 9807 \fI\fItime offset\fR\fR\fI = \fR\fI0\fR\fI \fR 9808 .sp 9809 Example: 9810 \fI\fItime offset\fR\fR\fI = \fR\fI60\fR\fI \fR 11204 Default: 11205 \fI\fItemplate shell\fR\fR\fI = \fR\fI/bin/false\fR\fI \fR 9811 11206 .RE 9812 11207 … … 9823 11218 .RE 9824 11219 11220 debug timestamp 11221 .\" debug timestamp 11222 .PP 11223 .RS 4 11224 This parameter is a synonym for 11225 timestamp logs\&. 11226 .RE 11227 11228 timestamp logs (G) 11229 .\" timestamp logs 11230 .PP 11231 .RS 4 11232 Samba debug log messages are timestamped by default\&. If you are running at a high 11233 \m[blue]\fBdebug level\fR\m[] 11234 these timestamps can be distracting\&. This boolean parameter allows timestamping to be turned off\&. 11235 .sp 11236 Default: 11237 \fI\fItimestamp logs\fR\fR\fI = \fR\fIyes\fR\fI \fR 11238 .RE 11239 11240 tls cafile (G) 11241 .\" tls cafile 11242 .PP 11243 .RS 4 11244 This option can be set to a file (PEM format) containing CA certificates of root CAs to trust to sign certificates or intermediate CA certificates\&. 11245 .sp 11246 This path is relative to 11247 \m[blue]\fBprivate dir\fR\m[] 11248 if the path does not start with a /\&. 11249 .sp 11250 Default: 11251 \fI\fItls cafile\fR\fR\fI = \fR\fItls/ca\&.pem\fR\fI \fR 11252 .RE 11253 11254 tls certfile (G) 11255 .\" tls certfile 11256 .PP 11257 .RS 4 11258 This option can be set to a file (PEM format) containing the RSA certificate\&. 11259 .sp 11260 This path is relative to 11261 \m[blue]\fBprivate dir\fR\m[] 11262 if the path does not start with a /\&. 11263 .sp 11264 Default: 11265 \fI\fItls certfile\fR\fR\fI = \fR\fItls/cert\&.pem\fR\fI \fR 11266 .RE 11267 11268 tls crlfile (G) 11269 .\" tls crlfile 11270 .PP 11271 .RS 4 11272 This option can be set to a file containing a certificate revocation list (CRL)\&. 11273 .sp 11274 This path is relative to 11275 \m[blue]\fBprivate dir\fR\m[] 11276 if the path does not start with a /\&. 11277 .sp 11278 Default: 11279 \fI\fItls crlfile\fR\fR\fI = \fR\fI\fR\fI \fR 11280 .RE 11281 11282 tls dh params file (G) 11283 .\" tls dh params file 11284 .PP 11285 .RS 4 11286 This option can be set to a file with Diffie\-Hellman parameters which will be used with DH ciphers\&. 11287 .sp 11288 This path is relative to 11289 \m[blue]\fBprivate dir\fR\m[] 11290 if the path does not start with a /\&. 11291 .sp 11292 Default: 11293 \fI\fItls dh params file\fR\fR\fI = \fR\fI\fR\fI \fR 11294 .RE 11295 11296 tls enabled (G) 11297 .\" tls enabled 11298 .PP 11299 .RS 4 11300 If this option is set to 11301 \fByes\fR, then Samba will use TLS when possible in communication\&. 11302 .sp 11303 Default: 11304 \fI\fItls enabled\fR\fR\fI = \fR\fIyes\fR\fI \fR 11305 .RE 11306 11307 tls keyfile (G) 11308 .\" tls keyfile 11309 .PP 11310 .RS 4 11311 This option can be set to a file (PEM format) containing the RSA private key\&. This file must be accessible without a pass\-phrase, i\&.e\&. it must not be encrypted\&. 11312 .sp 11313 This path is relative to 11314 \m[blue]\fBprivate dir\fR\m[] 11315 if the path does not start with a /\&. 11316 .sp 11317 Default: 11318 \fI\fItls keyfile\fR\fR\fI = \fR\fItls/key\&.pem\fR\fI \fR 11319 .RE 11320 11321 tls priority (G) 11322 .\" tls priority 11323 .PP 11324 .RS 4 11325 This option can be set to a string describing the TLS protocols to be supported in the parts of Samba that use GnuTLS, specifically the AD DC\&. 11326 .sp 11327 The default turns off SSLv3, as this protocol is no longer considered secure after CVE\-2014\-3566 (otherwise known as POODLE) impacted SSLv3 use in HTTPS applications\&. 11328 .sp 11329 The valid options are described in the 11330 GNUTLS Priority\-Strings documentation at http://gnutls\&.org/manual/html_node/Priority\-Strings\&.html 11331 .sp 11332 Default: 11333 \fI\fItls priority\fR\fR\fI = \fR\fINORMAL:\-VERS\-SSL3\&.0\fR\fI \fR 11334 .RE 11335 11336 tls verify peer (G) 11337 .\" tls verify peer 11338 .PP 11339 .RS 4 11340 This controls if and how strict the client will verify the peer\*(Aqs certificate and name\&. Possible values are (in increasing order): 11341 \fBno_check\fR, 11342 \fBca_only\fR, 11343 \fBca_and_name_if_available\fR, 11344 \fBca_and_name\fR 11345 and 11346 \fBas_strict_as_possible\fR\&. 11347 .sp 11348 When set to 11349 \fBno_check\fR 11350 the certificate is not verified at all, which allows trivial man in the middle attacks\&. 11351 .sp 11352 When set to 11353 \fBca_only\fR 11354 the certificate is verified to be signed from a ca specified in the 11355 \m[blue]\fBtls ca file\fR\m[] 11356 option\&. Setting 11357 \m[blue]\fBtls ca file\fR\m[] 11358 to a valid file is required\&. The certificate lifetime is also verified\&. If the 11359 \m[blue]\fBtls crl file\fR\m[] 11360 option is configured, the certificate is also verified against the ca crl\&. 11361 .sp 11362 When set to 11363 \fBca_and_name_if_available\fR 11364 all checks from 11365 \fBca_only\fR 11366 are performed\&. In addition, the peer hostname is verified against the certificate\*(Aqs name, if it is provided by the application layer and not given as an ip address string\&. 11367 .sp 11368 When set to 11369 \fBca_and_name\fR 11370 all checks from 11371 \fBca_and_name_if_available\fR 11372 are performed\&. In addition the peer hostname needs to be provided and even an ip address is checked against the certificate\*(Aqs name\&. 11373 .sp 11374 When set to 11375 \fBas_strict_as_possible\fR 11376 all checks from 11377 \fBca_and_name\fR 11378 are performed\&. In addition the 11379 \m[blue]\fBtls crl file\fR\m[] 11380 needs to be configured\&. Future versions of Samba may implement additional checks\&. 11381 .sp 11382 Default: 11383 \fI\fItls verify peer\fR\fR\fI = \fR\fIas_strict_as_possible\fR\fI \fR 11384 .RE 11385 11386 unicode (G) 11387 .\" unicode 11388 .PP 11389 .RS 4 11390 Specifies whether the server and client should support unicode\&. 11391 .sp 11392 If this option is set to false, the use of ASCII will be forced\&. 11393 .sp 11394 Default: 11395 \fI\fIunicode\fR\fR\fI = \fR\fIyes\fR\fI \fR 11396 .RE 11397 9825 11398 unix charset (G) 9826 11399 .\" unix charset … … 9832 11405 .sp 9833 11406 Default: 9834 \fI\fIunix charset\fR\fR\fI = \fR\fIUTF 8\fR\fI \fR11407 \fI\fIunix charset\fR\fR\fI = \fR\fIUTF\-8\fR\fI \fR 9835 11408 .sp 9836 11409 Example: … … 9879 11452 disable spoolss = yes\&. 9880 11453 .sp 9881 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\&. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\&. If the user possesses local administ ator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\&. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\&.11454 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\&. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\&. If the user possesses local administrator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\&. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\&. 9882 11455 .sp 9883 11456 If this parameter is enabled for a printer, then any attempt to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped to PRINTER_ACCESS_USE instead\&. Thus allowing the OpenPrinterEx() call to succeed\&. … … 9900 11473 .RE 9901 11474 11475 user 11476 .\" user 11477 .PP 11478 .RS 4 11479 This parameter is a synonym for 11480 username\&. 11481 .RE 11482 11483 users 11484 .\" users 11485 .PP 11486 .RS 4 11487 This parameter is a synonym for 11488 username\&. 11489 .RE 11490 11491 username (S) 11492 .\" username 11493 .PP 11494 .RS 4 11495 To restrict a service to a particular set of users you can use the 11496 \m[blue]\fBvalid users\fR\m[] 11497 parameter\&. 11498 .sp 11499 This parameter is deprecated 11500 .sp 11501 However, it currently operates only in conjunction with 11502 \m[blue]\fBonly user\fR\m[]\&. The supported way to restrict a service to a particular set of users is the 11503 \m[blue]\fBvalid users\fR\m[] 11504 parameter\&. 11505 .sp 11506 Default: 11507 \fI\fIusername\fR\fR\fI = \fR\fI # The guest account if a guest service, else <empty string>\&.\fR\fI \fR 11508 .sp 11509 Example: 11510 \fI\fIusername\fR\fR\fI = \fR\fIfred, mary, jack, jane, @users, @pcgroup\fR\fI \fR 11511 .RE 11512 9902 11513 username level (G) 9903 11514 .\" username level … … 9916 11527 Example: 9917 11528 \fI\fIusername level\fR\fR\fI = \fR\fI5\fR\fI \fR 11529 .RE 11530 11531 username map (G) 11532 .\" username map 11533 .PP 11534 .RS 4 11535 This option allows you to specify a file containing a mapping of usernames from the clients to the server\&. This can be used for several purposes\&. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\&. The other is to map multiple users to a single username so that they can more easily share files\&. 11536 .sp 11537 Please note that for user mode security, the username map is applied prior to validating the user credentials\&. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified entries in the map table (e\&.g\&. biddle = 11538 DOMAIN\efoo)\&. 11539 .sp 11540 The map file is parsed line by line\&. Each line should contain a single UNIX username on the left then a \*(Aq=\*(Aq followed by a list of usernames on the right\&. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\&. The special client name \*(Aq*\*(Aq is a wildcard and matches any name\&. Each line of the map file may be up to 1023 characters long\&. 11541 .sp 11542 The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \*(Aq=\*(Aq signs\&. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\&. Processing then continues with the next line\&. 11543 .sp 11544 If any line begins with a \*(Aq#\*(Aq or a \*(Aq;\*(Aq then it is ignored\&. 11545 .sp 11546 If any line begins with an \*(Aq!\*(Aq then the processing will stop after that line if a mapping was done by the line\&. Otherwise mapping continues with every line being processed\&. Using \*(Aq!\*(Aq is most useful when you have a wildcard mapping line later in the file\&. 11547 .sp 11548 For example to map from the name 11549 \fBadmin\fR 11550 or 11551 \fBadministrator\fR 11552 to the UNIX name 11553 \fB root\fR 11554 you would use: 11555 .sp 11556 .if n \{\ 11557 .RS 4 11558 .\} 11559 .nf 11560 root = admin administrator 11561 .fi 11562 .if n \{\ 11563 .RE 11564 .\} 11565 .sp 11566 Or to map anyone in the UNIX group 11567 \fBsystem\fR 11568 to the UNIX name 11569 \fBsys\fR 11570 you would use: 11571 .sp 11572 .if n \{\ 11573 .RS 4 11574 .\} 11575 .nf 11576 sys = @system 11577 .fi 11578 .if n \{\ 11579 .RE 11580 .\} 11581 .sp 11582 You can have as many mappings as you like in a username map file\&. 11583 .sp 11584 If your system supports the NIS NETGROUP option then the netgroup database is checked before the 11585 /etc/group 11586 database for matching groups\&. 11587 .sp 11588 You can map Windows usernames that have spaces in them by using double quotes around the name\&. For example: 11589 .sp 11590 .if n \{\ 11591 .RS 4 11592 .\} 11593 .nf 11594 tridge = "Andrew Tridgell" 11595 .fi 11596 .if n \{\ 11597 .RE 11598 .\} 11599 .sp 11600 would map the windows username "Andrew Tridgell" to the unix username "tridge"\&. 11601 .sp 11602 The following example would map mary and fred to the unix user sys, and map the rest to guest\&. Note the use of the \*(Aq!\*(Aq to tell Samba to stop processing if it gets a match on that line: 11603 .sp 11604 .if n \{\ 11605 .RS 4 11606 .\} 11607 .nf 11608 !sys = mary fred 11609 guest = * 11610 .fi 11611 .if n \{\ 11612 .RE 11613 .\} 11614 .sp 11615 Note that the remapping is applied to all occurrences of usernames\&. Thus if you connect to \e\eserver\efred and 11616 \fBfred\fR 11617 is remapped to 11618 \fBmary\fR 11619 then you will actually be connecting to \e\eserver\emary and will need to supply a password suitable for 11620 \fBmary\fR 11621 not 11622 \fBfred\fR\&. The only exception to this is the username passed to a Domain Controller (if you have one)\&. The DC will receive whatever username the client supplies without modification\&. 11623 .sp 11624 Also note that no reverse mapping is done\&. The main effect this has is with printing\&. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\*(Aqt own the print job\&. 11625 .sp 11626 Samba versions prior to 3\&.0\&.8 would only support reading the fully qualified username (e\&.g\&.: 11627 DOMAIN\euser) from the username map when performing a kerberos login from a client\&. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\&. This resulted in inconsistent behavior sometimes even on the same server\&. 11628 .sp 11629 The following functionality is obeyed in version 3\&.0\&.8 and later: 11630 .sp 11631 When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\&. 11632 .sp 11633 When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\&.e\&. 11634 DOMAIN\euser) only after the user has been successfully authenticated\&. 11635 .sp 11636 An example of use is: 11637 .sp 11638 .if n \{\ 11639 .RS 4 11640 .\} 11641 .nf 11642 username map = /usr/local/samba/lib/users\&.map 11643 .fi 11644 .if n \{\ 11645 .RE 11646 .\} 11647 .sp 11648 Default: 11649 \fI\fIusername map\fR\fR\fI = \fR\fI # no username map\fR\fI \fR 9918 11650 .RE 9919 11651 … … 9947 11679 This script is a mutually exclusive alternative to the 9948 11680 \m[blue]\fBusername map\fR\m[] 9949 parameter\&. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line lineon standard output (the name to which the account should mapped)\&. In this way, it is possible to store username map tables in an LDAP or NIS directory services\&.11681 parameter\&. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line on standard output (the name to which the account should mapped)\&. In this way, it is possible to store username map tables in an LDAP or NIS directory services\&. 9950 11682 .sp 9951 11683 Default: … … 9954 11686 Example: 9955 11687 \fI\fIusername map script\fR\fR\fI = \fR\fI/etc/samba/scripts/mapusers\&.sh\fR\fI \fR 9956 .RE9957 9958 username map (G)9959 .\" username map9960 .PP9961 .RS 49962 This option allows you to specify a file containing a mapping of usernames from the clients to the server\&. This can be used for several purposes\&. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\&. The other is to map multiple users to a single username so that they can more easily share files\&.9963 .sp9964 Please note that for user or share mode security, the username map is applied prior to validating the user credentials\&. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified enties in the map table (e\&.g\&. biddle =9965 DOMAIN\efoo)\&.9966 .sp9967 The map file is parsed line by line\&. Each line should contain a single UNIX username on the left then a \*(Aq=\*(Aq followed by a list of usernames on the right\&. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\&. The special client name \*(Aq*\*(Aq is a wildcard and matches any name\&. Each line of the map file may be up to 1023 characters long\&.9968 .sp9969 The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \*(Aq=\*(Aq signs\&. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\&. Processing then continues with the next line\&.9970 .sp9971 If any line begins with a \*(Aq#\*(Aq or a \*(Aq;\*(Aq then it is ignored\&.9972 .sp9973 If any line begins with an \*(Aq!\*(Aq then the processing will stop after that line if a mapping was done by the line\&. Otherwise mapping continues with every line being processed\&. Using \*(Aq!\*(Aq is most useful when you have a wildcard mapping line later in the file\&.9974 .sp9975 For example to map from the name9976 \fBadmin\fR9977 or9978 \fBadministrator\fR9979 to the UNIX name9980 \fB root\fR9981 you would use:9982 .sp9983 .if n \{\9984 .RS 49985 .\}9986 .nf9987 root = admin administrator9988 .fi9989 .if n \{\9990 .RE9991 .\}9992 .sp9993 Or to map anyone in the UNIX group9994 \fBsystem\fR9995 to the UNIX name9996 \fBsys\fR9997 you would use:9998 .sp9999 .if n \{\10000 .RS 410001 .\}10002 .nf10003 sys = @system10004 .fi10005 .if n \{\10006 .RE10007 .\}10008 .sp10009 You can have as many mappings as you like in a username map file\&.10010 .sp10011 If your system supports the NIS NETGROUP option then the netgroup database is checked before the10012 /etc/group10013 database for matching groups\&.10014 .sp10015 You can map Windows usernames that have spaces in them by using double quotes around the name\&. For example:10016 .sp10017 .if n \{\10018 .RS 410019 .\}10020 .nf10021 tridge = "Andrew Tridgell"10022 .fi10023 .if n \{\10024 .RE10025 .\}10026 .sp10027 would map the windows username "Andrew Tridgell" to the unix username "tridge"\&.10028 .sp10029 The following example would map mary and fred to the unix user sys, and map the rest to guest\&. Note the use of the \*(Aq!\*(Aq to tell Samba to stop processing if it gets a match on that line:10030 .sp10031 .if n \{\10032 .RS 410033 .\}10034 .nf10035 !sys = mary fred10036 guest = *10037 .fi10038 .if n \{\10039 .RE10040 .\}10041 .sp10042 Note that the remapping is applied to all occurrences of usernames\&. Thus if you connect to \e\eserver\efred and10043 \fBfred\fR10044 is remapped to10045 \fBmary\fR10046 then you will actually be connecting to \e\eserver\emary and will need to supply a password suitable for10047 \fBmary\fR10048 not10049 \fBfred\fR\&. The only exception to this is the username passed to the10050 \m[blue]\fBpassword server\fR\m[]10051 (if you have one)\&. The password server will receive whatever username the client supplies without modification\&.10052 .sp10053 Also note that no reverse mapping is done\&. The main effect this has is with printing\&. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\*(Aqt own the print job\&.10054 .sp10055 Samba versions prior to 3\&.0\&.8 would only support reading the fully qualified username (e\&.g\&.:10056 DOMAIN\euser) from the username map when performing a kerberos login from a client\&. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\&. This resulted in inconsistent behavior sometimes even on the same server\&.10057 .sp10058 The following functionality is obeyed in version 3\&.0\&.8 and later:10059 .sp10060 When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\&.10061 .sp10062 When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\&.e\&.10063 DOMAIN\euser) only after the user has been successfully authenticated\&.10064 .sp10065 An example of use is:10066 .sp10067 .if n \{\10068 .RS 410069 .\}10070 .nf10071 username map = /usr/local/samba/lib/users\&.map10072 .fi10073 .if n \{\10074 .RE10075 .\}10076 .sp10077 Default:10078 \fI\fIusername map\fR\fR\fI = \fR\fI # no username map\fR\fI \fR10079 .RE10080 10081 user10082 .\" user10083 .PP10084 .RS 410085 This parameter is a synonym for10086 username\&.10087 .RE10088 10089 users10090 .\" users10091 .PP10092 .RS 410093 This parameter is a synonym for10094 username\&.10095 .RE10096 10097 username (S)10098 .\" username10099 .PP10100 .RS 410101 Multiple users may be specified in a comma\-delimited list, in which case the supplied password will be tested against each username in turn (left to right)\&.10102 .sp10103 The deprecated10104 \fIusername\fR10105 line is needed only when the PC is unable to supply its own username\&. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames\&. In both these cases you may also be better using the \e\eserver\eshare%user syntax instead\&.10106 .sp10107 The10108 \fIusername\fR10109 line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the10110 \fIusername\fR10111 line in turn\&. This is slow and a bad idea for lots of users in case of duplicate passwords\&. You may get timeouts or security breaches using this parameter unwisely\&.10112 .sp10113 Samba relies on the underlying UNIX security\&. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password\&. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session\&. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do\&.10114 .sp10115 To restrict a service to a particular set of users you can use the10116 \m[blue]\fBvalid users\fR\m[]10117 parameter\&.10118 .sp10119 If any of the usernames begin with a \*(Aq@\*(Aq then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name\&.10120 .sp10121 If any of the usernames begin with a \*(Aq+\*(Aq then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name\&.10122 .sp10123 If any of the usernames begin with a \*(Aq&\*(Aq then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name\&.10124 .sp10125 Note that searching though a groups database can take quite some time, and some clients may time out during the search\&.10126 .sp10127 See the section10128 NOTE ABOUT USERNAME/PASSWORD VALIDATION10129 for more information on how this parameter determines access to the services\&.10130 .sp10131 Default:10132 \fI\fIusername\fR\fR\fI = \fR\fI # The guest account if a guest service, else <empty string>\&.\fR\fI \fR10133 .sp10134 Example:10135 \fI\fIusername\fR\fR\fI = \fR\fIfred, mary, jack, jane, @users, @pcgroup\fR\fI \fR10136 11688 .RE 10137 11689 … … 10165 11717 .sp 10166 11718 Default: 10167 \fI\fIusershare owner only\fR\fR\fI = \fR\fI True\fR\fI \fR11719 \fI\fIusershare owner only\fR\fR\fI = \fR\fIyes\fR\fI \fR 10168 11720 .RE 10169 11721 … … 10172 11724 .PP 10173 11725 .RS 4 10174 This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\&. This directory must be owned by root, and have no access for other, and be writable only by the group owner\&. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\&. Members of the group owner of this directory are the users allowed to create usershares\&. If this parameter is undefined then no user defined shares are allowed\&.11726 This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\&. This directory must be owned by root, and have no access for other, and be writable only by the group owner\&. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\&. Members of the group owner of this directory are the users allowed to create usershares\&. 10175 11727 .sp 10176 11728 For example, a valid usershare directory might be /usr/local/samba/lib/usershares, set up as follows\&. 10177 .sp10178 10179 11729 .sp 10180 11730 .if n \{\ … … 10193 11743 .sp 10194 11744 Default: 10195 \fI\fIusershare path\fR\fR\fI = \fR\fI NULL\fR\fI \fR11745 \fI\fIusershare path\fR\fR\fI = \fR\fI${prefix}/var/locks/usershares\fR\fI \fR 10196 11746 .RE 10197 11747 … … 10205 11755 .sp 10206 11756 Default: 10207 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fI NULL\fR\fI \fR11757 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fI\fR\fI \fR 10208 11758 .sp 10209 11759 Example: … … 10220 11770 .sp 10221 11771 Default: 10222 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fI NULL\fR\fI \fR11772 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fI\fR\fI \fR 10223 11773 .sp 10224 11774 Example: … … 10235 11785 .sp 10236 11786 Default: 10237 \fI\fIusershare template share\fR\fR\fI = \fR\fI NULL\fR\fI \fR11787 \fI\fIusershare template share\fR\fR\fI = \fR\fI\fR\fI \fR 10238 11788 .sp 10239 11789 Example: … … 10251 11801 .sp 10252 11802 Default: 10253 \fI\fIuse sendfile\fR\fR\fI = \fR\fI false\fR\fI \fR11803 \fI\fIuse sendfile\fR\fR\fI = \fR\fIno\fR\fI \fR 10254 11804 .RE 10255 11805 … … 10258 11808 .PP 10259 11809 .RS 4 10260 This deprecated variable controls controlswhether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&.11810 This deprecated variable controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&. 10261 11811 .sp 10262 11812 Unless further issues are discovered with our SPNEGO implementation, there is no reason this should ever be disabled\&. … … 10264 11814 Default: 10265 11815 \fI\fIuse spnego\fR\fR\fI = \fR\fIyes\fR\fI \fR 11816 .RE 11817 11818 utmp (G) 11819 .\" utmp 11820 .PP 11821 .RS 4 11822 This boolean parameter is only available if Samba has been configured and compiled with the option 11823 \-\-with\-utmp\&. If set to 11824 \fByes\fR 11825 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\&. Sites may use this to record the user connecting to a Samba share\&. 11826 .sp 11827 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\&. Enabling this option creates an n^2 algorithm to find this number\&. This may impede performance on large installations\&. 11828 .sp 11829 Default: 11830 \fI\fIutmp\fR\fR\fI = \fR\fIno\fR\fI \fR 10266 11831 .RE 10267 11832 … … 10282 11847 .RE 10283 11848 10284 utmp (G) 10285 .\" utmp 10286 .PP 10287 .RS 4 10288 This boolean parameter is only available if Samba has been configured and compiled with the option 10289 \-\-with\-utmp\&. If set to 10290 \fByes\fR 10291 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\&. Sites may use this to record the user connecting to a Samba share\&. 10292 .sp 10293 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\&. Enabling this option creates an n^2 algorithm to find this number\&. This may impede performance on large installations\&. 10294 .sp 10295 Default: 10296 \fI\fIutmp\fR\fR\fI = \fR\fIno\fR\fI \fR 11849 \-valid (S) 11850 .\" -valid 11851 .PP 11852 .RS 4 11853 This parameter indicates whether a share is valid and thus can be used\&. When this parameter is set to false, the share will be in no way visible nor accessible\&. 11854 .sp 11855 This option should not be used by regular users but might be of help to developers\&. Samba uses this option internally to mark shares as deleted\&. 11856 .sp 11857 Default: 11858 \fI\fI\-valid\fR\fR\fI = \fR\fIyes\fR\fI \fR 10297 11859 .RE 10298 11860 … … 10312 11874 \fI%S\fR\&. This is useful in the [homes] section\&. 10313 11875 .sp 11876 \fINote: \fRWhen used in the [global] section this parameter may have unwanted side effects\&. For example: If samba is configured as a MASTER BROWSER (see 11877 \fIlocal master\fR, 11878 \fIos level\fR, 11879 \fIdomain master\fR, 11880 \fIpreferred master\fR) this option will prevent workstations from being able to browse the network\&. 11881 .sp 10314 11882 Default: 10315 11883 \fI\fIvalid users\fR\fR\fI = \fR\fI # No valid users list (anyone can login) \fR\fI \fR … … 10317 11885 Example: 10318 11886 \fI\fIvalid users\fR\fR\fI = \fR\fIgreg, @pcusers\fR\fI \fR 10319 .RE10320 10321 \-valid (S)10322 .\" -valid10323 .PP10324 .RS 410325 This parameter indicates whether a share is valid and thus can be used\&. When this parameter is set to false, the share will be in no way visible nor accessible\&.10326 .sp10327 This option should not be used by regular users but might be of help to developers\&. Samba uses this option internally to mark shares as deleted\&.10328 .sp10329 Default:10330 \fI\fI\-valid\fR\fR\fI = \fR\fIyes\fR\fI \fR10331 11887 .RE 10332 11888 … … 10374 11930 .sp 10375 11931 Default: 10376 \fI\fIveto files\fR\fR\fI = \fR\fI No files or directories are vetoed\&.\fR\fI \fR11932 \fI\fIveto files\fR\fR\fI = \fR\fI # No files or directories are vetoed\fR\fI \fR 10377 11933 .RE 10378 11934 … … 10437 11993 .RE 10438 11994 11995 web port (G) 11996 .\" web port 11997 .PP 11998 .RS 4 11999 Specifies which port the Samba web server should listen on\&. 12000 .sp 12001 Default: 12002 \fI\fIweb port\fR\fR\fI = \fR\fI901\fR\fI \fR 12003 .sp 12004 Example: 12005 \fI\fIweb port\fR\fR\fI = \fR\fI80\fR\fI \fR 12006 .RE 12007 10439 12008 wide links (S) 10440 12009 .\" wide links … … 10469 12038 Default: 10470 12039 \fI\fIwinbind cache time\fR\fR\fI = \fR\fI300\fR\fI \fR 12040 .RE 12041 12042 winbindd privileged socket directory (G) 12043 .\" winbindd privileged socket directory 12044 .PP 12045 .RS 4 12046 This setting controls the location of the winbind daemon\*(Aqs privileged socket\&. 12047 .sp 12048 Default: 12049 \fI\fIwinbindd privileged socket directory\fR\fR\fI = \fR\fI${prefix}/var/lib/winbindd_privileged\fR\fI \fR 12050 .RE 12051 12052 winbindd socket directory (G) 12053 .\" winbindd socket directory 12054 .PP 12055 .RS 4 12056 This setting controls the location of the winbind daemon\*(Aqs socket\&. 12057 .sp 12058 Except within automated test scripts, this should not be altered, as the client tools (nss_winbind etc) do not honour this parameter\&. Client tools must then be advised of the altered path with the WINBINDD_SOCKET_DIR environment varaible\&. 12059 .sp 12060 Default: 12061 \fI\fIwinbindd socket directory\fR\fR\fI = \fR\fI${prefix}/var/run/winbindd\fR\fI \fR 10471 12062 .RE 10472 12063 … … 10553 12144 Be aware that a high value for this parameter can result in system slowdown as the main parent winbindd daemon must perform the group unrolling and will be unable to answer incoming NSS or authentication requests during this time\&. 10554 12145 .sp 10555 Default: 10556 \fI\fIwinbind expand groups\fR\fR\fI = \fR\fI1\fR\fI \fR 12146 The default value was changed from 1 to 0 with Samba 4\&.2\&. Some broken applications calculate the group memberships of users by traversing groups, such applications will require "winbind expand groups = 1"\&. But the new default makes winbindd more reliable as it doesn\*(Aqt require SAMR access to domain controllers of trusted domains\&. 12147 .sp 12148 Default: 12149 \fI\fIwinbind expand groups\fR\fR\fI = \fR\fI0\fR\fI \fR 10557 12150 .RE 10558 12151 … … 10563 12156 This parameter specifies the maximum number of clients the 10564 12157 \fBwinbindd\fR(8) 10565 daemon can connect with\&. 12158 daemon can connect with\&. The parameter is not a hard limit\&. The 12159 \fBwinbindd\fR(8) 12160 daemon configures itself to be able to accept at least that many connections, and if the limit is reached, an attempt is made to disconnect idle clients\&. 10566 12161 .sp 10567 12162 Default: … … 10605 12200 This parameter controls whether winbindd will replace whitespace in user and group names with an underscore (_) character\&. For example, whether the name "Space Kadet" should be replaced with the string "space_kadet"\&. Frequently Unix shell scripts will have difficulty with usernames contains whitespace due to the default field separator in the shell\&. If your domain possesses names containing the underscore character, this option may cause problems unless the name aliasing feature is supported by your nss_info plugin\&. 10606 12201 .sp 10607 This feature also enables the name aliasing API which can be used to make domain user and group names to a non\-qualified version\&. Please refer to the manpage for the configured idmap and nss_info plugin for the specifics on how to configure name aliasing for a specific configuration\&. Name aliasing takes precedence (and is mutually exclusive) over the whitespace replacement mechanism discussed previ souly\&.12202 This feature also enables the name aliasing API which can be used to make domain user and group names to a non\-qualified version\&. Please refer to the manpage for the configured idmap and nss_info plugin for the specifics on how to configure name aliasing for a specific configuration\&. Name aliasing takes precedence (and is mutually exclusive) over the whitespace replacement mechanism discussed previously\&. 10608 12203 .sp 10609 12204 Default: … … 10643 12238 .IP \(bu 2.3 10644 12239 .\} 10645 \fI<sfu | rfc2307 >\fR10646 \- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\&. Note that retrieving UID and GID from your ADS\-Server requires to use12240 \fI<sfu | sfu20 | rfc2307 >\fR 12241 \- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\&. For SFU 3\&.0 or 3\&.5 simply choose "sfu", if you use SFU 2\&.0 please choose "sfu20"\&. Note that retrieving UID and GID from your ADS\-Server requires to use 10647 12242 \fIidmap config DOMAIN:backend\fR 10648 = ad as well\&. 12243 = ad as well\&. The primary group membership is currently always calculated via the "primaryGroupID" LDAP attribute\&. 10649 12244 .RE 10650 12245 .sp … … 10662 12257 .PP 10663 12258 .RS 4 10664 This parameter is designed to control whether Winbind should allow to login with the12259 This parameter is designed to control whether Winbind should allow one to login with the 10665 12260 \fIpam_winbind\fR 10666 12261 module using Cached Credentials\&. If enabled, winbindd will store user credentials from successful logins encrypted in a local cache\&. 10667 12262 .sp 10668 12263 Default: 10669 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fI false\fR\fI \fR10670 .sp 10671 Example: 10672 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fI true\fR\fI \fR12264 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fIno\fR\fI \fR 12265 .sp 12266 Example: 12267 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fIyes\fR\fI \fR 10673 12268 .RE 10674 12269 … … 10694 12289 .sp 10695 12290 Default: 10696 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIfalse\fR\fI \fR 10697 .sp 10698 Example: 10699 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fItrue\fR\fI \fR 12291 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIno\fR\fI \fR 12292 .sp 12293 Example: 12294 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIyes\fR\fI \fR 12295 .RE 12296 12297 winbind request timeout (G) 12298 .\" winbind request timeout 12299 .PP 12300 .RS 4 12301 This parameter specifies the number of seconds the 12302 \fBwinbindd\fR(8) 12303 daemon will wait before disconnecting either a client connection with no outstanding requests (idle) or a client connection with a request that has remained outstanding (hung) for longer than this number of seconds\&. 12304 .sp 12305 Default: 12306 \fI\fIwinbind request timeout\fR\fR\fI = \fR\fI60\fR\fI \fR 10700 12307 .RE 10701 12308 … … 10710 12317 Default: 10711 12318 \fI\fIwinbind rpc only\fR\fR\fI = \fR\fIno\fR\fI \fR 12319 .RE 12320 12321 winbind sealed pipes (G) 12322 .\" winbind sealed pipes 12323 .PP 12324 .RS 4 12325 This option controls whether any requests from winbindd to domain controllers pipe will be sealed\&. Disabling sealing can be useful for debugging purposes\&. 12326 .sp 12327 The behavior can be controlled per netbios domain by using \*(Aqwinbind sealed pipes:NETBIOSDOMAIN = no\*(Aq as option\&. 12328 .sp 12329 Default: 12330 \fI\fIwinbind sealed pipes\fR\fR\fI = \fR\fIyes\fR\fI \fR 10712 12331 .RE 10713 12332 … … 10726 12345 .sp 10727 12346 Default: 10728 \fI\fIwinbind separator\fR\fR\fI = \fR\fI\ *(Aq\e\*(Aq\fR\fI \fR12347 \fI\fIwinbind separator\fR\fR\fI = \fR\fI\e\fR\fI \fR 10729 12348 .sp 10730 12349 Example: … … 10933 12552 .RE 10934 12553 12554 write ok 12555 .\" write ok 12556 .PP 12557 .RS 4 12558 This parameter is a synonym for 12559 writeable\&. 12560 .RE 12561 10935 12562 writeable (S) 10936 12563 .\" writeable … … 10956 12583 The integer parameter specifies the size of this cache (per oplocked file) in bytes\&. 10957 12584 .sp 12585 Note that the write cache won\*(Aqt be used for file handles with a smb2 write lease\&. 12586 .sp 10958 12587 Default: 10959 12588 \fI\fIwrite cache size\fR\fR\fI = \fR\fI0\fR\fI \fR … … 10973 12602 Note that if a user is in both the read list and the write list then they will be given write access\&. 10974 12603 .sp 10975 By design, this parameter will not work with the10976 \m[blue]\fBsecurity = share\fR\m[]10977 in Samba 3\&.0\&.10978 .sp10979 12604 Default: 10980 12605 \fI\fIwrite list\fR\fR\fI = \fR\fI\fR\fI \fR … … 10988 12613 .PP 10989 12614 .RS 4 10990 This parameter controls whether or not the server will support raw write SMB\*(Aqs when transferring data from clients\&. You should never need to change this parameter\&. 12615 This is ignored if 12616 \m[blue]\fBasync smb echo handler\fR\m[] 12617 is set, because this feature is incompatible with raw write SMB requests 12618 .sp 12619 If enabled, raw writes allow writes of 65535 bytes in one packet\&. This typically provides a major performance benefit for some very, very old clients\&. 12620 .sp 12621 However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw writes\&. 12622 .sp 12623 In general this parameter should be viewed as a system tuning tool and left severely alone\&. 10991 12624 .sp 10992 12625 Default: … … 11026 12659 .SH "VERSION" 11027 12660 .PP 11028 This man page is correct for version 3of the Samba suite\&.12661 This man page is correct for version 4 of the Samba suite\&. 11029 12662 .SH "SEE ALSO" 11030 12663 .PP 11031 11032 12664 \fBsamba\fR(7), 11033 12665 \fBsmbpasswd\fR(8), 11034 \fBswat\fR(8),11035 12666 \fBsmbd\fR(8), 11036 12667 \fBnmbd\fR(8), 12668 \fBwinbindd\fR(8), 12669 \fBsamba\fR(8), 12670 \fBsamba-tool\fR(8), 11037 12671 \fBsmbclient\fR(1), 11038 12672 \fBnmblookup\fR(1), 11039 \fBtestparm\fR(1), 11040 \fBtestprns\fR(1)\&. 12673 \fBtestparm\fR(1)\&. 11041 12674 .SH "AUTHOR" 11042 12675 .PP -
vendor/current/docs/manpages/smbcacls.1
r860 r988 2 2 .\" Title: smbcacls 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBCACLS" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "SMBCACLS" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 smbcacls {//server/share} {/filename} [\-D|\-\-delete\ acl s] [\-M|\-\-modify\ acls] [\-a|\-\-add\ acls] [\-S|\-\-set\ acls] [\-C|\-\-chown\ name] [\-G|\-\-chgrp\ name] [\-I\ allow|romove|copy] [\-\-numeric] [\-t] [\-U\ username] [\-h] [\-d]34 smbcacls {//server/share} {/filename} [\-D|\-\-delete\ acl] [\-M|\-\-modify\ acl] [\-a|\-\-add\ acl] [\-S|\-\-set\ acl] [\-C|\-\-chown\ name] [\-G|\-\-chgrp\ name] [\-I\ allow|remove|copy] [\-\-numeric] [\-t] [\-U\ username] [\-d] [\-e] [\-m|\-\-max\-protocol\ LEVEL] [\-\-query\-security\-info\ FLAGS] [\-\-set\-security\-info\ FLAGS] [\-\-sddl] [\-\-domain\-sid\ SID] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 41 41 The 42 42 smbcacls 43 program manipulates NT Access Control Lists (ACLs) on SMB file shares\&. 43 program manipulates NT Access Control Lists (ACLs) on SMB file shares\&. An ACL is comprised zero or more Access Control Entries (ACEs), which define access restrictions for a specific user or group\&. 44 44 .SH "OPTIONS" 45 45 .PP … … 48 48 program\&. The format of ACLs is described in the section ACL FORMAT 49 49 .PP 50 \-a|\-\-add acl s51 .RS 4 52 Add the ACLs specified to the ACL list\&. Existing access control entries are unchanged\&.53 .RE 54 .PP 55 \-M|\-\-modify acl s56 .RS 4 57 Modify the mask value (permissions) for the AC Ls specified on the command line\&. An error will be printed for each ACL specified that was not already present in the ACL list58 .RE 59 .PP 60 \-D|\-\-delete acl s61 .RS 4 62 Delete any AC Ls specified on the command line\&. An error will be printed for each ACL specified that was not already present in the ACL list\&.63 .RE 64 .PP 65 \-S|\-\-set acl s66 .RS 4 67 This command sets the ACL s on the file with only the ones specified on the command line\&. All other ACLs areerased\&. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed\&.50 \-a|\-\-add acl 51 .RS 4 52 Add the entries specified to the ACL\&. Existing access control entries are unchanged\&. 53 .RE 54 .PP 55 \-M|\-\-modify acl 56 .RS 4 57 Modify the mask value (permissions) for the ACEs specified on the command line\&. An error will be printed for each ACE specified that was not already present in the object\*(Aqs ACL\&. 58 .RE 59 .PP 60 \-D|\-\-delete acl 61 .RS 4 62 Delete any ACEs specified on the command line\&. An error will be printed for each ACE specified that was not already present in the object\*(Aqs ACL\&. 63 .RE 64 .PP 65 \-S|\-\-set acl 66 .RS 4 67 This command sets the ACL on the object with only what is specified on the command line\&. Any existing ACL is erased\&. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed\&. 68 68 .RE 69 69 .PP … … 98 98 .RE 99 99 .PP 100 \-m|\-\-max\-protocol PROTOCOL_NAME 101 .RS 4 102 This allows the user to select the highest SMB protocol level that smbcacls will use to connect to the server\&. By default this is set to NT1, which is the highest available SMB1 protocol\&. To connect using SMB2 or SMB3 protocol, use the strings SMB2 or SMB3 respectively\&. Note that to connect to a Windows 2012 server with encrypted transport selecting a max\-protocol of SMB3 is required\&. 103 .RE 104 .PP 100 105 \-t|\-\-test\-args 101 106 .RS 4 … … 103 108 .RE 104 109 .PP 105 \-h|\-\-help 106 .RS 4 107 Print a summary of command line options\&. 108 .RE 109 .PP 110 \-d|\-\-debuglevel=level 111 .RS 4 112 \fIlevel\fR 113 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&. 114 .sp 115 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&. 116 .sp 117 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&. 118 .sp 119 Note that specifying this parameter here will override the 120 \m[blue]\fBlog level\fR\m[] 121 parameter in the 122 smb\&.conf 123 file\&. 124 .RE 125 .PP 126 \-V|\-\-version 127 .RS 4 128 Prints the program version number\&. 129 .RE 130 .PP 131 \-s|\-\-configfile <configuration file> 132 .RS 4 133 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 134 smb\&.conf 135 for more information\&. The default configuration file name is determined at compile time\&. 136 .RE 137 .PP 138 \-l|\-\-log\-basename=logdirectory 139 .RS 4 140 Base directory name for log/debug files\&. The extension 141 \fB"\&.progname"\fR 142 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&. 143 .RE 144 .PP 145 \-N|\-\-no\-pass 146 .RS 4 147 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&. 148 .sp 149 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&. 150 .sp 151 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&. 152 .RE 153 .PP 154 \-k|\-\-kerberos 155 .RS 4 156 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&. 157 .RE 158 .PP 159 \-C|\-\-use\-ccache 160 .RS 4 161 Try to use the credentials cached by winbind\&. 162 .RE 163 .PP 164 \-A|\-\-authentication\-file=filename 165 .RS 4 166 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is 167 .sp 168 .if n \{\ 169 .RS 4 170 .\} 171 .nf 172 username = <value> 173 password = <value> 174 domain = <value> 175 .fi 176 .if n \{\ 177 .RE 178 .\} 179 .sp 180 Make certain that the permissions on the file restrict access from unwanted users\&. 181 .RE 182 .PP 183 \-U|\-\-user=username[%password] 184 .RS 4 185 Sets the SMB username or username and password\&. 186 .sp 187 If %password is not specified, the user will be prompted\&. The client will first check the 188 \fBUSER\fR 189 environment variable, then the 190 \fBLOGNAME\fR 191 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username 192 \fBGUEST\fR 193 is used\&. 194 .sp 195 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the 196 \fI\-A\fR 197 for more details\&. 198 .sp 199 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the 200 ps 201 command\&. To be safe always allow 202 rpcclient 203 to prompt for a password and type it in directly\&. 110 \-\-query\-security\-info FLAGS 111 .RS 4 112 The security\-info flags for queries\&. 113 .RE 114 .PP 115 \-\-set\-security\-info FLAGS 116 .RS 4 117 The security\-info flags for queries\&. 118 .RE 119 .PP 120 \-\-sddl 121 .RS 4 122 Output and input acls in sddl format\&. 123 .RE 124 .PP 125 \-\-domain\-sid SID 126 .RS 4 127 SID used for sddl processing\&. 204 128 .RE 205 129 .SH "ACL FORMAT" 206 130 .PP 207 The format of an ACL is one or more ACLentries separated by either commas or newlines\&. An ACL entry is one of the following:131 The format of an ACL is one or more entries separated by either commas or newlines\&. An ACL entry is one of the following: 208 132 .PP 209 133 .if n \{\ … … 225 149 The owner and group specify the owner and group sids for the object\&. If a SID in the format S\-1\-x\-y\-z is specified this is used, otherwise the name specified is resolved using the server on which the file or directory resides\&. 226 150 .PP 227 AC Ls specify permissions granted to the SID\&. ThisSID again can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\&. The type, flags and mask values determine the type of access granted to the SID\&.228 .PP 229 The type can be either ALLOWED or DENIED to allow/deny access to the SID\&. The flags values are generally zero for file AC Ls and either 9 or 2 for directory ACLs\&. Some common flags are:151 ACEs are specified with an "ACL:" prefix, and define permissions granted to an SID\&. The SID again can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\&. The type, flags and mask values determine the type of access granted to the SID\&. 152 .PP 153 The type can be either ALLOWED or DENIED to allow/deny access to the SID\&. The flags values are generally zero for file ACEs and either 9 or 2 for directory ACEs\&. Some common flags are: 230 154 .sp 231 155 .RS 4 … … 275 199 .RE 276 200 .PP 277 At present flags can only be specified as decimal or hexadecimal values\&.201 At present, flags can only be specified as decimal or hexadecimal values\&. 278 202 .PP 279 203 The mask is a value which expresses the access right granted to the SID\&. It can be given as a decimal or hexadecimal value, or by using one of the following text strings which map to the NT file permissions of the same name\&. … … 401 325 .SH "VERSION" 402 326 .PP 403 This man page is correct for version 3of the Samba suite\&.327 This man page is correct for version 4 of the Samba suite\&. 404 328 .SH "AUTHOR" 405 329 .PP -
vendor/current/docs/manpages/smbclient.1
r860 r988 2 2 .\" Title: smbclient 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBCLIENT" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "SMBCLIENT" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 smbclient [\-b\ <buffer\ size>] [\-d\ debuglevel] [\-e] [\-L\ <netbios\ name>] [\-U\ username] [\-I\ destinationIP] [\-M\ <netbios\ name>] [\-m\ maxprotocol] [\-A\ authfile] [\-N] [\-C] [\-g] [\-i\ scope] [\-O\ <socket\ options>] [\-p\ port] [\-R\ <name\ resolve\ order>] [\-s\ <smb\ config\ file>] [\- k] [\-P] [\-c\ <command>]34 smbclient [\-b\ <buffer\ size>] [\-d\ debuglevel] [\-e] [\-L\ <netbios\ name>] [\-U\ username] [\-I\ destinationIP] [\-M\ <netbios\ name>] [\-m\ maxprotocol] [\-A\ authfile] [\-N] [\-C] [\-g] [\-i\ scope] [\-O\ <socket\ options>] [\-p\ port] [\-R\ <name\ resolve\ order>] [\-s\ <smb\ config\ file>] [\-t\ <per\-operation\ timeout\ in\ seconds>] [\-k] [\-P] [\-c\ <command>] 35 35 .HP \w'\ 'u 36 smbclient {servicename} [password] [\-b\ <buffer\ size>] [\-d\ debuglevel] [\-e] [\-D\ Directory] [\-U\ username] [\-W\ workgroup] [\-M\ <netbios\ name>] [\-m\ maxprotocol] [\-A\ authfile] [\-N] [\-C] [\-g] [\-l\ log\-basename] [\-I\ destinationIP] [\-E] [\-c\ <command\ string>] [\-i\ scope] [\-O\ <socket\ options>] [\-p\ port] [\-R\ <name\ resolve\ order>] [\-s\ <smb\ config\ file>] [\- T<c|x>IXFqgbNan] [\-k]36 smbclient {servicename} [password] [\-b\ <buffer\ size>] [\-d\ debuglevel] [\-e] [\-D\ Directory] [\-U\ username] [\-W\ workgroup] [\-M\ <netbios\ name>] [\-m\ maxprotocol] [\-A\ authfile] [\-N] [\-C] [\-g] [\-l\ log\-basename] [\-I\ destinationIP] [\-E] [\-c\ <command\ string>] [\-i\ scope] [\-O\ <socket\ options>] [\-p\ port] [\-R\ <name\ resolve\ order>] [\-s\ <smb\ config\ file>] [\-t\ <per\-operation\ timeout\ in\ seconds>] [\-T<c|x>IXFqgbNan] [\-k] 37 37 .SH "DESCRIPTION" 38 38 .PP … … 198 198 \-m|\-\-max\-protocol protocol 199 199 .RS 4 200 This parameter sets the maximum protocol version announced by the client\&.200 This allows the user to select the highest SMB protocol level that smbclient will use to connect to the server\&. By default this is set to NT1, which is the highest available SMB1 protocol\&. To connect using SMB2 or SMB3 protocol, use the strings SMB2 or SMB3 respectively\&. Note that to connect to a Windows 2012 server with encrypted transport selecting a max\-protocol of SMB3 is required\&. 201 201 .RE 202 202 .PP … … 204 204 .RS 4 205 205 Make queries to the external server using the machine account of the local server\&. 206 .RE207 .PP208 \-h|\-\-help209 .RS 4210 Print a summary of command line options\&.211 206 .RE 212 207 .PP … … 241 236 \-b|\-\-send\-buffer buffersize 242 237 .RS 4 243 This option changes the transmit/send buffer size when getting or putting a file from/to the server\&. The default is 65520 bytes\&. Setting this value smaller (to 1200 bytes) has been observed to speed up file transfers to and from a Win9x server\&. 244 .RE 245 .PP 246 \-e|\-\-encrypt 247 .RS 4 248 This command line parameter requires the remote server support the UNIX extensions\&. Request that the connection be encrypted\&. This is new for Samba 3\&.2 and will only work with Samba 3\&.2 or above servers\&. Negotiates SMB encryption using GSSAPI\&. Uses the given credentials for the encryption negotiation (either kerberos or NTLMv1/v2 if given domain/username/password triple\&. Fails the connection if encryption cannot be negotiated\&. 249 .RE 250 .PP 251 \-d|\-\-debuglevel=level 252 .RS 4 253 \fIlevel\fR 254 is an integer from 0 to 10\&. The default value if this parameter is not specified is 1\&. 255 .sp 256 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&. 257 .sp 258 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&. 259 .sp 260 Note that specifying this parameter here will override the 261 \m[blue]\fBlog level\fR\m[] 262 parameter in the 263 smb\&.conf 264 file\&. 265 .RE 266 .PP 267 \-V|\-\-version 268 .RS 4 269 Prints the program version number\&. 270 .RE 271 .PP 272 \-s|\-\-configfile <configuration file> 273 .RS 4 274 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 275 smb\&.conf 276 for more information\&. The default configuration file name is determined at compile time\&. 277 .RE 278 .PP 279 \-l|\-\-log\-basename=logdirectory 280 .RS 4 281 Base directory name for log/debug files\&. The extension 282 \fB"\&.progname"\fR 283 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&. 284 .RE 285 .PP 286 \-N|\-\-no\-pass 287 .RS 4 288 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&. 289 .sp 290 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&. 291 .sp 292 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&. 293 .RE 294 .PP 295 \-k|\-\-kerberos 296 .RS 4 297 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&. 298 .RE 299 .PP 300 \-C|\-\-use\-ccache 301 .RS 4 302 Try to use the credentials cached by winbind\&. 303 .RE 304 .PP 305 \-A|\-\-authentication\-file=filename 306 .RS 4 307 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is 308 .sp 309 .if n \{\ 310 .RS 4 311 .\} 312 .nf 313 username = <value> 314 password = <value> 315 domain = <value> 316 .fi 317 .if n \{\ 318 .RE 319 .\} 320 .sp 321 Make certain that the permissions on the file restrict access from unwanted users\&. 322 .RE 323 .PP 324 \-U|\-\-user=username[%password] 325 .RS 4 326 Sets the SMB username or username and password\&. 327 .sp 328 If %password is not specified, the user will be prompted\&. The client will first check the 329 \fBUSER\fR 330 environment variable, then the 331 \fBLOGNAME\fR 332 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username 333 \fBGUEST\fR 334 is used\&. 335 .sp 336 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the 337 \fI\-A\fR 338 for more details\&. 339 .sp 340 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the 341 ps 342 command\&. To be safe always allow 343 rpcclient 344 to prompt for a password and type it in directly\&. 345 .RE 346 .PP 347 \-n|\-\-netbiosname <primary NetBIOS name> 348 .RS 4 349 This option allows you to override the NetBIOS name that Samba uses for itself\&. This is identical to setting the 350 \m[blue]\fBnetbios name\fR\m[] 351 parameter in the 352 smb\&.conf 353 file\&. However, a command line setting will take precedence over settings in 354 smb\&.conf\&. 355 .RE 356 .PP 357 \-i|\-\-scope <scope> 358 .RS 4 359 This specifies a NetBIOS scope that 360 nmblookup 361 will use to communicate with when generating NetBIOS names\&. For details on the use of NetBIOS scopes, see rfc1001\&.txt and rfc1002\&.txt\&. NetBIOS scopes are 362 \fIvery\fR 363 rarely used, only set this parameter if you are the system administrator in charge of all the NetBIOS systems you communicate with\&. 364 .RE 365 .PP 366 \-W|\-\-workgroup=domain 367 .RS 4 368 Set the SMB domain of the username\&. This overrides the default domain which is the domain defined in smb\&.conf\&. If the domain specified is the same as the servers NetBIOS name, it causes the client to log on using the servers local SAM (as opposed to the Domain SAM)\&. 369 .RE 370 .PP 371 \-O|\-\-socket\-options socket options 372 .RS 4 373 TCP socket options to set on the client socket\&. See the socket options parameter in the 374 smb\&.conf 375 manual page for the list of valid options\&. 238 When sending or receiving files, smbclient uses an internal buffer sized by the maximum number of allowed requests to the connected server\&. This command allows this size to be set to any range between 0 (which means use the default server controlled size) bytes and 16776960 (0xFFFF00) bytes\&. Using the server controlled size is the most efficient as smbclient will pipeline as many simultaneous reads or writes needed to keep the server as busy as possible\&. Setting this to any other size will slow down the transfer\&. This can also be set using the 239 iosize 240 command inside smbclient\&. 241 .RE 242 .PP 243 \-B|\-\-browse 244 .RS 4 245 Browse SMB servers using DNS\&. 246 .RE 247 .PP 248 \-t|\-\-timeout <timeout\-seconds> 249 .RS 4 250 This allows the user to tune the default timeout used for each SMB request\&. The default setting is 20 seconds\&. Increase it if requests to the server sometimes time out\&. This can happen when SMB3 encryption is selected and smbclient is overwhelming the server with requests\&. This can also be set using the 251 timeout 252 command inside smbclient\&. 376 253 .RE 377 254 .PP … … 380 257 smbclient may be used to create 381 258 tar(1) 382 compatible backups of all the files on an SMB/CIFS share\&. The secondary tar flags that can be given to this option are 259 compatible backups of all the files on an SMB/CIFS share\&. The secondary tar flags that can be given to this option are: 383 260 .sp 384 261 .RS 4 … … 391 268 .\} 392 269 \fIc\fR 393 \- Create a tar file on UNIX\&. Must be followed by the name of a tar file, tape device or "\-" for standard output\&. If using standard output you must turn the log level to its lowest value \-d0 to avoid corrupting your tar file\&. This flag is mutually exclusive with the270 \- Create a tar backup archive on the local system\&. Must be followed by the name of a tar file, tape device or "\-" for standard output\&. If using standard output you must turn the log level to its lowest value \-d0 to avoid corrupting your tar file\&. This flag is mutually exclusive with the 394 271 \fIx\fR 395 272 flag\&. … … 433 310 .\} 434 311 \fIX\fR 435 \- Exclude files and directories\&. Causes files to be excluded from an extract or create\&. See example below\&. Filename globbing works in one of two ways now\&. See312 \- Exclude files and directories\&. Causes files to be excluded from an extract or create\&. See example below\&. Filename globbing works in one of two ways\&. See 436 313 \fIr\fR 437 314 below\&. … … 463 340 .\} 464 341 \fIb\fR 465 \- Blocksize\&. Must be followed by a valid (greater than zero) blocksize\&. Causes tar file to be written out in blocksize*TBLOCK ( usually512 byte) blocks\&.342 \- Blocksize\&. Must be followed by a valid (greater than zero) blocksize\&. Causes tar file to be written out in blocksize*TBLOCK (512 byte) blocks\&. 466 343 .RE 467 344 .sp … … 501 378 .\} 502 379 \fIr\fR 503 \- Regular expression include or exclude\&. Uses regular expression matching for excluding or excluding files if compiled with HAVE_REGEX_H\&. However this mode can be very slow\&. If not compiled with HAVE_REGEX_H, does a limited wildcard match on \*(Aq*\*(Aq and \*(Aq?\*(Aq\&.380 \- Use wildcard matching to include or exclude\&. Deprecated\&. 504 381 .RE 505 382 .sp … … 564 441 Create the same tar file as above, but now use a DOS path name\&. 565 442 .sp 566 smbclient //mypc/myshare "" \-N \- tc backup\&.tar users\eedocs443 smbclient //mypc/myshare "" \-N \-Tc backup\&.tar users\eedocs 567 444 .sp 568 445 Create a tar file of the files listed in the file … … 636 513 .RS 4 637 514 Sets the archive level when operating on files\&. 0 means ignore the archive bit, 1 means only operate on files with this bit set, 2 means only operate on files with this bit set and reset it after operation, 3 means operate on all files and reset it after operation\&. The default is 0\&. 515 .RE 516 .PP 517 backup 518 .RS 4 519 Toggle the state of the "backup intent" flag sent to the server on directory listings and file opens\&. If the "backup intent" flag is true, the server will try and bypass some file system checks if the user has been granted SE_BACKUP or SE_RESTORE privileges\&. This state is useful when performing a backup or restore operation\&. 638 520 .RE 639 521 .PP … … 736 618 iosize <bytes> 737 619 .RS 4 738 When sending or receiving files, smbclient uses an internal memory buffer by default of size 64512 bytes\&. This command allows this size to be set to any range between 16384 (0x4000) bytes and 16776960 (0xFFFF00) bytes\&. Larger sizes may mean more efficient data transfer as smbclient will try and use the most efficient read and write calls for the connected server\&.620 When sending or receiving files, smbclient uses an internal buffer sized by the maximum number of allowed requests to the connected server\&. This command allows this size to be set to any range between 0 (which means use the default server controlled size) bytes and 16776960 (0xFFFF00) bytes\&. Using the server controlled size is the most efficient as smbclient will pipeline as many simultaneous reads or writes needed to keep the server as busy as possible\&. Setting this to any other size will slow down the transfer\&. 739 621 .RE 740 622 .PP … … 766 648 .RS 4 767 649 Establishes a new vuid for this session by logging on again\&. Replaces the current vuid\&. Prints out the new vuid\&. Used for internal Samba testing purposes\&. 650 .RE 651 .PP 652 logoff 653 .RS 4 654 Logs the user off the server, closing the session\&. Used for internal Samba testing purposes\&. 768 655 .RE 769 656 .PP … … 830 717 smbclient 831 718 are binary\&. 719 .RE 720 .PP 721 notify <dir name> 722 .RS 4 723 Query a directory for change notifications\&. This command issues a recursive filechangenotify call for all possible changes\&. As changes come in will print one line per change\&. See 724 https://msdn\&.microsoft\&.com/en\-us/library/dn392331\&.aspx 725 for a description of the action numbers that this command prints\&. 726 .sp 727 This command never ends, it waits for event indefinitely\&. 832 728 .RE 833 729 .PP … … 933 829 .RE 934 830 .PP 831 scopy <source filename> <destination filename> 832 .RS 4 833 Attempt to copy a file on the server using the most efficient server\-side copy calls\&. Falls back to using read then write if server doesn\*(Aqt support server\-side copy\&. 834 .RE 835 .PP 935 836 setmode <filename> <perm=[+|\e\-]rsha> 936 837 .RS 4 … … 960 861 .RS 4 961 862 Performs a tar operation \- see the 962 \fI\-T 863 \fI\-T\fR 963 864 command line option above\&. Behavior may be affected by the tarmode command (see below)\&. Using g (incremental) and N (newer) will affect tarmode settings\&. Note that using the "\-" option with tar x may not work \- use the command line option instead\&. 964 865 .RE … … 967 868 .RS 4 968 869 Blocksize\&. Must be followed by a valid (greater than zero) blocksize\&. Causes tar file to be written out in 969 \fIblocksize\fR*TBLOCK (usually 512 byte) blocks\&. 970 .RE 971 .PP 972 tarmode <full|inc|reset|noreset> 973 .RS 4 974 Changes tar\*(Aqs behavior with regard to archive bits\&. In full mode, tar will back up everything regardless of the archive bit setting (this is the default mode)\&. In incremental mode, tar will only back up files with the archive bit set\&. In reset mode, tar will reset the archive bit on all files it backs up (implies read/write share)\&. 870 \fIblocksize\fR*TBLOCK (512 byte) blocks\&. 871 .RE 872 .PP 873 tarmode <full|inc|reset|noreset|system|nosystem|hidden|nohidden> 874 .RS 4 875 Changes tar\*(Aqs behavior with regard to DOS attributes\&. There are 4 modes which can be turned on or off\&. 876 .sp 877 Incremental mode (default off)\&. When off (using 878 full) tar will back up everything regardless of the 879 \fIarchive\fR 880 bit setting\&. When on (using 881 inc), tar will only back up files with the archive bit set\&. 882 .sp 883 Reset mode (default off)\&. When on (using 884 reset), tar will remove the archive bit on all files it backs up (implies read/write share)\&. Use 885 noreset 886 to turn off\&. 887 .sp 888 System mode (default on)\&. When off, tar will not backup system files\&. Use 889 nosystem 890 to turn off\&. 891 .sp 892 Hidden mode (default on)\&. When off, tar will not backup hidden files\&. Use 893 nohidden 894 to turn off\&. 895 .RE 896 .PP 897 timeout <per\-operation timeout in seconds> 898 .RS 4 899 This allows the user to tune the default timeout used for each SMB request\&. The default setting is 20 seconds\&. Increase it if requests to the server sometimes time out\&. This can happen when SMB3 encryption is selected and smbclient is overwhelming the server with requests\&. 975 900 .RE 976 901 .PP … … 988 913 .RS 4 989 914 Changes the currently used vuid in the protocol to the given arbitrary number\&. Without an argument prints out the current vuid being used\&. Used for internal Samba testing purposes\&. 915 .RE 916 .PP 917 tcon <sharename> 918 .RS 4 919 Establishes a new tree connect (connection to a share)\&. Replaces the current tree connect\&. Prints the new tid (tree id)\&. Used for internal Samba testing purposes\&. 920 .RE 921 .PP 922 tdis 923 .RS 4 924 Close the current share connection (tree disconnect)\&. Used for internal Samba testing purposes\&. 925 .RE 926 .PP 927 tid <number> 928 .RS 4 929 Changes the current tree id (tid) in the protocol to a new arbitrary number\&. Without an argument, it prints out the tid currently used\&. Used for internal Samba testing purposes\&. 990 930 .RE 991 931 .SH "NOTES" -
vendor/current/docs/manpages/smbcontrol.1
r860 r988 2 2 .\" Title: smbcontrol 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBCONTROL" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "SMBCONTROL" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 smbcontrol [\- i] [\-s]34 smbcontrol [\-s] [\-t|\-\-timeout] 35 35 .HP \w'\ 'u 36 36 smbcontrol [destination] [message\-type] [parameter] … … 49 49 .SH "OPTIONS" 50 50 .PP 51 \-h|\-\-help 52 .RS 4 53 Print a summary of command line options\&. 54 .RE 55 .PP 56 \-s|\-\-configfile <configuration file> 57 .RS 4 58 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 59 smb\&.conf 60 for more information\&. The default configuration file name is determined at compile time\&. 61 .RE 62 .PP 63 \-i 64 .RS 4 65 Run interactively\&. Individual commands of the form destination message\-type parameters can be entered on STDIN\&. An empty command line or a "q" will quit the program\&. 51 \-t|\-\-timeout 52 .RS 4 53 Set timeout to seconds\&. 66 54 .RE 67 55 .PP … … 70 58 One of 71 59 \fInmbd\fR, 72 \fIsmbd\fR 60 \fIsmbd\fR, 61 \fIwinbindd\fR 73 62 or a process ID\&. 74 63 .sp … … 124 113 .RE 125 114 .PP 115 kill\-client\-ip 116 .RS 4 117 Order smbd to close the client connections from a given IP address\&. This message\-type takes an argument of the IP address from which client connections will be closed\&. This message can only be sent to 118 \fBsmbd\fR\&. 119 .RE 120 .PP 126 121 force\-election 127 122 .RS 4 … … 184 179 This message can only be sent to 185 180 \fBsmbd\fR\&. 186 .RE187 .PP188 samsync189 .RS 4190 Order smbd to synchronise sam database from PDC (being BDC)\&. Can only be sent to191 \fBsmbd\fR\&.192 .if n \{\193 .sp194 .\}195 .RS 4196 .it 1 an-trap197 .nr an-no-space-flag 1198 .nr an-break-flag 1199 .br200 .ps +1201 \fBNote\fR202 .ps -1203 .br204 Not working at the moment205 .sp .5v206 .RE207 .RE208 .PP209 samrepl210 .RS 4211 Send sam replication message, with specified serial\&. Can only be sent to212 \fBsmbd\fR\&. Should not be used manually\&.213 181 .RE 214 182 .PP … … 246 214 .RE 247 215 .PP 216 reload\-printers 217 .RS 4 218 Force smbd to reload printers\&. Can only be sent to 219 \fBsmbd\fR\&. 220 .RE 221 .PP 248 222 idmap 249 223 .RS 4 … … 270 244 .RE 271 245 .RE 246 .PP 247 num\-children 248 .RS 4 249 Query the number of smbd child processes\&. This message can only be sent to 250 \fBsmbd\fR\&. 251 .RE 272 252 .SH "VERSION" 273 253 .PP -
vendor/current/docs/manpages/smbcquotas.1
r860 r988 2 2 .\" Title: smbcquotas 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBCQUOTAS" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "SMBCQUOTAS" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 smbcquotas {//server/share} [\-u \ user] [\-L] [\-F] [\-S\ QUOTA_SET_COMMAND] [\-n] [\-t] [\-v] [\-d\ debuglevel] [\-s\ configfile] [\-l\ logdir] [\-V] [\-U\ username] [\-N] [\-k] [\-A]34 smbcquotas {//server/share} [\-u|\-\-user\ user] [\-L|\-\-list] [\-F|\-\-fs] [\-S|\-\-set\ QUOTA_SET_COMMAND] [\-n|\-\-numeric] [\-t|\-\-test\-args] [\-v|\-\-verbose] [\-d\ debuglevel] [\-s\ configfile] [\-l\ logdir] [\-V] [\-U\ username] [\-N] [\-k] [\-A] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 48 48 program\&. 49 49 .PP 50 \-u user50 \-u|\-\-user user 51 51 .RS 4 52 52 Specifies the user of whom the quotas are get or set\&. By default the current user\*(Aqs username will be used\&. 53 53 .RE 54 54 .PP 55 \-L 55 \-L|\-\-list 56 56 .RS 4 57 57 Lists all quota records of the share\&. 58 58 .RE 59 59 .PP 60 \-F 60 \-F|\-\-fs 61 61 .RS 4 62 62 Show the share quota status and default limits\&. 63 63 .RE 64 64 .PP 65 \-S QUOTA_SET_COMMAND65 \-S|\-\-set QUOTA_SET_COMMAND 66 66 .RS 4 67 67 This command sets/modifies quotas for a user or on the share, depending on the QUOTA_SET_COMMAND parameter which is described later\&. 68 68 .RE 69 69 .PP 70 \-n 70 \-n|\-\-numeric 71 71 .RS 4 72 72 This option displays all QUOTA information in numeric format\&. The default is to convert SIDs to names and QUOTA limits to a readable string format\&. 73 73 .RE 74 74 .PP 75 \-t 75 \-t|\-\-test\-args 76 76 .RS 4 77 77 Don\*(Aqt actually do anything, only validate the correctness of the arguments\&. 78 78 .RE 79 79 .PP 80 \-v 80 \-v|\-\-verbose 81 81 .RS 4 82 82 Be verbose\&. 83 .RE84 .PP85 \-h|\-\-help86 .RS 487 Print a summary of command line options\&.88 .RE89 .PP90 \-d|\-\-debuglevel=level91 .RS 492 \fIlevel\fR93 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.94 .sp95 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.96 .sp97 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.98 .sp99 Note that specifying this parameter here will override the100 \m[blue]\fBlog level\fR\m[]101 parameter in the102 smb\&.conf103 file\&.104 .RE105 .PP106 \-V|\-\-version107 .RS 4108 Prints the program version number\&.109 .RE110 .PP111 \-s|\-\-configfile <configuration file>112 .RS 4113 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See114 smb\&.conf115 for more information\&. The default configuration file name is determined at compile time\&.116 .RE117 .PP118 \-l|\-\-log\-basename=logdirectory119 .RS 4120 Base directory name for log/debug files\&. The extension121 \fB"\&.progname"\fR122 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.123 .RE124 .PP125 \-N|\-\-no\-pass126 .RS 4127 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.128 .sp129 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.130 .sp131 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.132 .RE133 .PP134 \-k|\-\-kerberos135 .RS 4136 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.137 .RE138 .PP139 \-C|\-\-use\-ccache140 .RS 4141 Try to use the credentials cached by winbind\&.142 .RE143 .PP144 \-A|\-\-authentication\-file=filename145 .RS 4146 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is147 .sp148 .if n \{\149 .RS 4150 .\}151 .nf152 username = <value>153 password = <value>154 domain = <value>155 .fi156 .if n \{\157 .RE158 .\}159 .sp160 Make certain that the permissions on the file restrict access from unwanted users\&.161 .RE162 .PP163 \-U|\-\-user=username[%password]164 .RS 4165 Sets the SMB username or username and password\&.166 .sp167 If %password is not specified, the user will be prompted\&. The client will first check the168 \fBUSER\fR169 environment variable, then the170 \fBLOGNAME\fR171 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username172 \fBGUEST\fR173 is used\&.174 .sp175 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the176 \fI\-A\fR177 for more details\&.178 .sp179 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the180 ps181 command\&. To be safe always allow182 rpcclient183 to prompt for a password and type it in directly\&.184 83 .RE 185 84 .SH "QUOTA_SET_COMMAND" -
vendor/current/docs/manpages/smbd.8
r860 r988 2 2 .\" Title: smbd 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBD" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "SMBD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 smbd [\-D ] [\-F] [\-S] [\-i] [\-h] [\-V] [\-b] [\-d\ <debug\ level>] [\-l\ <log\ directory>] [\-p\ <port\ number(s)>] [\-P\ <profiling\ level>] [\-O\ <socket\ option>] [\-s\ <configuration\ file>]34 smbd [\-D|\-\-daemon] [\-F|\-\-foreground] [\-S|\-\-log\-stdout] [\-i|\-\-interactive] [\-V] [\-b|\-\-build\-options] [\-d\ <debug\ level>] [\-l|\-\-log\-basename\ <log\ directory>] [\-p\ <port\ number(s)>] [\-P\ <profiling\ level>] [\-s\ <configuration\ file>] [\-\-no\-process\-group] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 56 56 .SH "OPTIONS" 57 57 .PP 58 \-D 58 \-D|\-\-daemon 59 59 .RS 4 60 60 If specified, this parameter causes the server to operate as a daemon\&. That is, it detaches itself and runs in the background, fielding requests on the appropriate port\&. Operating the server as a daemon is the recommended way of running … … 65 65 .RE 66 66 .PP 67 \-F 67 \-F|\-\-foreground 68 68 .RS 4 69 69 If specified, this parameter causes the main … … 80 80 .RE 81 81 .PP 82 \-S 82 \-S|\-\-log\-stdout 83 83 .RS 4 84 84 If specified, this parameter causes … … 87 87 .RE 88 88 .PP 89 \-i 89 \-i|\-\-interactive 90 90 .RS 4 91 91 If this parameter is specified it causes the server to run "interactively", not as a daemon, even if the server is executed on the command line of a shell\&. Setting this parameter negates the implicit daemon mode when run from the command line\&. 92 92 smbd 93 also logsto standard output, as if the93 will only accept one connection and terminate\&. It will also log to standard output, as if the 94 94 \-S 95 95 parameter had been given\&. 96 96 .RE 97 97 .PP 98 \-d|\-\-debuglevel=level 99 .RS 4 100 \fIlevel\fR 101 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&. 102 .sp 103 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&. 104 .sp 105 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&. 106 .sp 107 Note that specifying this parameter here will override the 108 \m[blue]\fBlog level\fR\m[] 109 parameter in the 110 smb\&.conf 111 file\&. 112 .RE 113 .PP 114 \-V|\-\-version 115 .RS 4 116 Prints the program version number\&. 117 .RE 118 .PP 119 \-s|\-\-configfile <configuration file> 120 .RS 4 121 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 122 smb\&.conf 123 for more information\&. The default configuration file name is determined at compile time\&. 124 .RE 125 .PP 126 \-l|\-\-log\-basename=logdirectory 127 .RS 4 128 Base directory name for log/debug files\&. The extension 129 \fB"\&.progname"\fR 130 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&. 131 .RE 132 .PP 133 \-h|\-\-help 134 .RS 4 135 Print a summary of command line options\&. 136 .RE 137 .PP 138 \-b 98 \-\-no\-process\-group 99 .RS 4 100 Do not create a new process group for smbd\&. 101 .RE 102 .PP 103 \-b|\-\-build\-options 139 104 .RS 4 140 105 Prints information about how Samba was built\&. … … 147 112 \m[blue]\fBports\fR\m[] 148 113 parameter in 149 smb\&.conf150 114 .sp 151 115 The default ports are 139 (used for SMB over NetBIOS over TCP) and port 445 (used for plain SMB over TCP)\&. … … 208 172 .PP 209 173 Samba uses PAM for authentication (when presented with a plaintext password), for account checking (is this account disabled?) and for session management\&. The degree too which samba supports PAM is restricted by the limitations of the SMB protocol and the 210 \m[blue]\fBobey pam restrictions\fR\m[] 211 \fBsmb.conf\fR(5) 174 \m[blue]\fBobey pam restrictions\fR\m[]\fBsmb.conf\fR(5) 212 175 parameter\&. When this is set, the following restrictions apply: 213 176 .sp … … 265 228 .RE 266 229 .PP 267 connections\&.tdb 230 gencache\&.tdb 231 .RS 4 232 generic caching db 233 .RE 234 .PP 235 group_mapping\&.tdb* 236 .RS 4 237 group mapping information 238 .RE 239 .PP 240 locking\&.tdb 241 .RS 4 242 share modes & oplocks 243 .RE 244 .PP 245 login_cache\&.tdb* 246 .RS 4 247 bad pw attempts 248 .RE 249 .PP 250 messages\&.tdb 251 .RS 4 252 Samba messaging system 253 .RE 254 .PP 255 netsamlogon_cache\&.tdb* 256 .RS 4 257 cache of user net_info_3 struct from net_samlogon() request (as a domain member) 258 .RE 259 .PP 260 ntdrivers\&.tdb* 261 .RS 4 262 installed printer drivers 263 .RE 264 .PP 265 ntforms\&.tdb* 266 .RS 4 267 installed printer forms 268 .RE 269 .PP 270 ntprinters\&.tdb* 271 .RS 4 272 installed printer information 273 .RE 274 .PP 275 printing/ 276 .RS 4 277 directory containing tdb per print queue of cached lpq output 278 .RE 279 .PP 280 registry\&.tdb 281 .RS 4 282 Windows registry skeleton (connect via regedit\&.exe) 283 .RE 284 .PP 285 smbXsrv_session_global\&.tdb 286 .RS 4 287 session information (e\&.g\&. support for \*(Aqutmp = yes\*(Aq) 288 .RE 289 .PP 290 smbXsrv_tcon_global\&.tdb 268 291 .RS 4 269 292 share connections (used to enforce max connections, etc\&.\&.\&.) 270 293 .RE 271 294 .PP 272 gencache\&.tdb 273 .RS 4 274 generic caching db 275 .RE 276 .PP 277 group_mapping\&.tdb* 278 .RS 4 279 group mapping information 280 .RE 281 .PP 282 locking\&.tdb 283 .RS 4 284 share modes & oplocks 285 .RE 286 .PP 287 login_cache\&.tdb* 288 .RS 4 289 bad pw attempts 290 .RE 291 .PP 292 messages\&.tdb 293 .RS 4 294 Samba messaging system 295 .RE 296 .PP 297 netsamlogon_cache\&.tdb* 298 .RS 4 299 cache of user net_info_3 struct from net_samlogon() request (as a domain member) 300 .RE 301 .PP 302 ntdrivers\&.tdb* 303 .RS 4 304 installed printer drivers 305 .RE 306 .PP 307 ntforms\&.tdb* 308 .RS 4 309 installed printer forms 310 .RE 311 .PP 312 ntprinters\&.tdb* 313 .RS 4 314 installed printer information 315 .RE 316 .PP 317 printing/ 318 .RS 4 319 directory containing tdb per print queue of cached lpq output 320 .RE 321 .PP 322 registry\&.tdb 323 .RS 4 324 Windows registry skeleton (connect via regedit\&.exe) 325 .RE 326 .PP 327 sessionid\&.tdb 328 .RS 4 329 session information (e\&.g\&. support for \*(Aqutmp = yes\*(Aq) 295 smbXsrv_open_global\&.tdb 296 .RS 4 297 open file handles (used durable handles, etc\&.\&.\&.) 330 298 .RE 331 299 .PP … … 360 328 smbd 361 329 process it is recommended that 362 SIGKILL (\-9) 363 \fINOT\fR 330 SIGKILL (\-9)\fINOT\fR 364 331 be used, except as a last resort, as this may leave the shared memory area in an inconsistent state\&. The safe way to terminate an 365 332 smbd … … 383 350 \fBsmb.conf\fR(5), 384 351 \fBsmbclient\fR(1), 385 \fBtestparm\fR(1), 386 \fBtestprns\fR(1), and the Internet RFC\*(Aqs 352 \fBtestparm\fR(1), and the Internet RFC\*(Aqs 387 353 rfc1001\&.txt, 388 354 rfc1002\&.txt\&. In addition the CIFS (formerly SMB) specification is available as a link from the Web page -
vendor/current/docs/manpages/smbget.1
r860 r988 2 2 .\" Title: smbget 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBGET" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "SMBGET" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 smbget [\-a,\ \-\-guest] [\-r,\ \-\-resume] [\-R,\ \-\-recursive] [\- u,\ \-\-username=STRING] [\-p,\ \-\-password=STRING] [\-w,\ \-\-workgroup=STRING] [\-n,\ \-\-nonprompt] [\-d,\ \-\-debuglevel=INT] [\-D,\ \-\-dots] [\-P,\ \-\-keep\-permissions] [\-o,\ \-\-outputfile] [\-f,\ \-\-rcfile] [\-q,\ \-\-quiet] [\-v,\ \-\-verbose] [\-b,\ \-\-blocksize] [\-O,\ \-\-stdout] [\-?,\ \-\-help] [\-\-usage] {smb://host/share/path/to/file} [smb://url2/] [\&.\&.\&.]34 smbget [\-a,\ \-\-guest] [\-r,\ \-\-resume] [\-R,\ \-\-recursive] [\-U,\ \-\-username=STRING] [\-w,\ \-\-workgroup=STRING] [\-n,\ \-\-nonprompt] [\-d,\ \-\-debuglevel=INT] [\-D,\ \-\-dots] [\-o,\ \-\-outputfile] [\-f,\ \-\-rcfile] [\-q,\ \-\-quiet] [\-v,\ \-\-verbose] [\-b,\ \-\-blocksize] [\-O,\ \-\-stdout] [\-u,\ \-\-update] [\-?,\ \-\-help] [\-\-usage] {smb://host/share/path/to/file} [smb://url2/] [\&.\&.\&.] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 60 60 .RE 61 61 .PP 62 \- u, \-\-username=STRING62 \-U, \-\-username=\fIusername[%password]\fR 63 63 .RS 4 64 Username to use 65 .RE 66 .PP 67 \-p, \-\-password=STRING 68 .RS 4 69 Password to use 64 Username (and password) to use 70 65 .RE 71 66 .PP … … 88 83 .RS 4 89 84 Show dots as progress indication 90 .RE91 .PP92 \-P, \-\-keep\-permissions93 .RS 494 Set same permissions on local file as are set on remote file\&.95 85 .RE 96 86 .PP … … 133 123 .RS 4 134 124 Display brief usage message 125 .RE 126 .PP 127 \-u, \-\-update 128 .RS 4 129 Download only when remote file is newer than local file or local file is missing\&. 135 130 .RE 136 131 .SH "SMB URLS" -
vendor/current/docs/manpages/smbgetrc.5
r860 r988 2 2 .\" Title: smbgetrc 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: File Formats and Conventions 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBGETRC" "5" "0 9/18/2013" "Samba 3\&.6" "File Formats and Conventions"10 .TH "SMBGETRC" "5" "05/02/2016" "Samba 4\&.4" "File Formats and Conventions" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 57 57 .RE 58 58 .PP 59 user name \fIname\fR59 user \fIname[%password]\fR 60 60 .RS 4 61 Username to use when logging in to the remote server\&. Use an empty string for anonymous access\&. 62 .RE 63 .PP 64 password \fIpass\fR 65 .RS 4 66 Password to use when logging in\&. 61 Username (and password) to use when logging in to the remote server\&. Use an empty string for anonymous access\&. 67 62 .RE 68 63 .PP -
vendor/current/docs/manpages/smbpasswd.5
r860 r988 2 2 .\" Title: smbpasswd 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: File Formats and Conventions 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBPASSWD" "5" "0 9/18/2013" "Samba 3\&.6" "File Formats and Conventions"10 .TH "SMBPASSWD" "5" "05/02/2016" "Samba 4\&.4" "File Formats and Conventions" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 44 44 The format of the smbpasswd file used by Samba 2\&.2 is very similar to the familiar Unix 45 45 passwd(5) 46 file\&. It is an ASCII file containing one line for each user\&. Each field ithin each line is separated from the next by a colon\&. Any entry beginning with \*(Aq#\*(Aq is ignored\&. The smbpasswd file contains the following information for each user:46 file\&. It is an ASCII file containing one line for each user\&. Each field within each line is separated from the next by a colon\&. Any entry beginning with \*(Aq#\*(Aq is ignored\&. The smbpasswd file contains the following information for each user: 47 47 .PP 48 48 name -
vendor/current/docs/manpages/smbpasswd.8
r860 r988 2 2 .\" Title: smbpasswd 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBPASSWD" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "SMBPASSWD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 75 75 \-c 76 76 .RS 4 77 This option can be used to specify the path and file name of the 78 smb\&.conf 79 configuration file when it is important to use other than the default file and / or location\&. 77 This option can be used to specify the path and file name of the configuration file when it is important to use other than the default file and / or location\&. 80 78 .RE 81 79 .PP -
vendor/current/docs/manpages/smbspool.8
r860 r988 2 2 .\" Title: smbspool 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBSPOOL" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "SMBSPOOL" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 86 86 .IP \(bu 2.3 87 87 .\} 88 smb://domain\eusername:password@server[:port]/printer 89 .RE 90 .sp 91 .RS 4 92 .ie n \{\ 93 \h'-04'\(bu\h'+03'\c 94 .\} 95 .el \{\ 96 .sp -1 97 .IP \(bu 2.3 98 .\} 88 99 smb://username:password@workgroup/server[:port]/printer 89 100 .RE … … 103 114 \fBDEVICE_URI\fR 104 115 environment variable prior to running smbspool\&. 116 .PP 117 smbspool will accept URI escaped characters\&. This allows setting a domain in the username, or space in the printer name\&. For example smb://domain%5Cusername/printer%20name 105 118 .SH "OPTIONS" 106 119 .sp -
vendor/current/docs/manpages/smbstatus.1
r860 r988 2 2 .\" Title: smbstatus 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBSTATUS" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "SMBSTATUS" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 smbstatus [\-P] [\-b] [\-d\ <debug\ level>] [\-v] [\-L] [\-B] [\-p] [\-S] [\- s\ <configuration\ file>] [\-u\ <username>]34 smbstatus [\-P] [\-b] [\-d\ <debug\ level>] [\-v] [\-L] [\-B] [\-p] [\-S] [\-N] [\-f] [\-s\ <configuration\ file>] [\-u\ <username>] [\-n|\-\-numeric] [\-R|\-\-profile\-rates] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 48 48 .RE 49 49 .PP 50 \-R|\-\-profile\-rates 51 .RS 4 52 If samba has been compiled with the profiling option, print the contents of the profiling shared memory area and the call rates\&. 53 .RE 54 .PP 50 55 \-b|\-\-brief 51 56 .RS 4 52 57 gives brief output\&. 53 .RE54 .PP55 \-d|\-\-debuglevel=level56 .RS 457 \fIlevel\fR58 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.59 .sp60 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.61 .sp62 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.63 .sp64 Note that specifying this parameter here will override the65 \m[blue]\fBlog level\fR\m[]66 parameter in the67 smb\&.conf68 file\&.69 .RE70 .PP71 \-V|\-\-version72 .RS 473 Prints the program version number\&.74 .RE75 .PP76 \-s|\-\-configfile <configuration file>77 .RS 478 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See79 smb\&.conf80 for more information\&. The default configuration file name is determined at compile time\&.81 .RE82 .PP83 \-l|\-\-log\-basename=logdirectory84 .RS 485 Base directory name for log/debug files\&. The extension86 \fB"\&.progname"\fR87 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.88 58 .RE 89 59 .PP … … 115 85 .RE 116 86 .PP 117 \- h|\-\-help87 \-N|\-\-notify 118 88 .RS 4 119 Print a summary of command line options\&. 89 causes smbstatus to display registered file notifications 90 .RE 91 .PP 92 \-f|\-\-fast 93 .RS 4 94 causes smbstatus to not check if the status data is valid by checking if the processes that the status data refer to all still exist\&. This speeds up execution on busy systems and clusters but might display stale data of processes that died without cleaning up properly\&. 120 95 .RE 121 96 .PP … … 125 100 \fIusername\fR 126 101 only\&. 102 .RE 103 .PP 104 \-n|\-\-numeric 105 .RS 4 106 causes smbstatus to display numeric UIDs and GIDs instead of resolving them to names\&. 127 107 .RE 128 108 .SH "VERSION" -
vendor/current/docs/manpages/smbtar.1
r860 r988 2 2 .\" Title: smbtar 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBTAR" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "SMBTAR" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/smbtree.1
r860 r988 2 2 .\" Title: smbtree 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMBTREE" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "SMBTREE" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 57 57 Only print a list of all the domains and servers responding on broadcast or known by the master browser\&. 58 58 .RE 59 .PP60 \-d|\-\-debuglevel=level61 .RS 462 \fIlevel\fR63 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.64 .sp65 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.66 .sp67 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.68 .sp69 Note that specifying this parameter here will override the70 \m[blue]\fBlog level\fR\m[]71 parameter in the72 smb\&.conf73 file\&.74 .RE75 .PP76 \-V|\-\-version77 .RS 478 Prints the program version number\&.79 .RE80 .PP81 \-s|\-\-configfile <configuration file>82 .RS 483 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See84 smb\&.conf85 for more information\&. The default configuration file name is determined at compile time\&.86 .RE87 .PP88 \-l|\-\-log\-basename=logdirectory89 .RS 490 Base directory name for log/debug files\&. The extension91 \fB"\&.progname"\fR92 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.93 .RE94 .PP95 \-N|\-\-no\-pass96 .RS 497 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.98 .sp99 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.100 .sp101 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.102 .RE103 .PP104 \-k|\-\-kerberos105 .RS 4106 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.107 .RE108 .PP109 \-C|\-\-use\-ccache110 .RS 4111 Try to use the credentials cached by winbind\&.112 .RE113 .PP114 \-A|\-\-authentication\-file=filename115 .RS 4116 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is117 .sp118 .if n \{\119 .RS 4120 .\}121 .nf122 username = <value>123 password = <value>124 domain = <value>125 .fi126 .if n \{\127 .RE128 .\}129 .sp130 Make certain that the permissions on the file restrict access from unwanted users\&.131 .RE132 .PP133 \-U|\-\-user=username[%password]134 .RS 4135 Sets the SMB username or username and password\&.136 .sp137 If %password is not specified, the user will be prompted\&. The client will first check the138 \fBUSER\fR139 environment variable, then the140 \fBLOGNAME\fR141 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username142 \fBGUEST\fR143 is used\&.144 .sp145 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the146 \fI\-A\fR147 for more details\&.148 .sp149 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the150 ps151 command\&. To be safe always allow152 rpcclient153 to prompt for a password and type it in directly\&.154 .RE155 .PP156 \-h|\-\-help157 .RS 4158 Print a summary of command line options\&.159 .RE160 59 .SH "VERSION" 161 60 .PP -
vendor/current/docs/manpages/testparm.1
r860 r988 2 2 .\" Title: testparm 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "TESTPARM" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "TESTPARM" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 testparm [\-s ] [\-h] [\-v] [\-t\ <encoding>] {config\ filename} [hostname\ hostIP]34 testparm [\-s|\-\-suppress\-prompt] [\-\-help] [\-v|\-\-verbose] {config\ filename} [hostname\ hostIP] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 60 60 .SH "OPTIONS" 61 61 .PP 62 \-s 62 \-s|\-\-suppress\-prompt 63 63 .RS 4 64 64 Without this option, … … 67 67 .RE 68 68 .PP 69 \-h|\-\-help 70 .RS 4 71 Print a summary of command line options\&. 72 .RE 73 .PP 74 \-V|\-\-version 75 .RS 4 76 Prints the program version number\&. 77 .RE 78 .PP 79 \-v 69 \-v|\-\-verbose 80 70 .RS 4 81 71 If this option is specified, testparm will also output all options that were not used in 82 72 \fBsmb.conf\fR(5) 83 73 and are thus set to their defaults\&. 84 .RE85 .PP86 \-t encoding87 .RS 488 Output data in specified encoding\&.89 74 .RE 90 75 .PP … … 97 82 .RS 4 98 83 Dumps the named section\&. 84 .RE 85 .PP 86 \-\-show\-all\-parameters 87 .RS 4 88 Show the parameters, type, possible values\&. 89 .RE 90 .PP 91 \-l|\-\-skip\-logic\-checks 92 .RS 4 93 Skip the global checks\&. 99 94 .RE 100 95 .PP -
vendor/current/docs/manpages/vfs_acl_tdb.8
r860 r988 2 2 .\" Title: vfs_acl_tdb 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_ACL_TDB" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_ACL_TDB" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_acl_xattr.8
r860 r988 2 2 .\" Title: vfs_acl_xattr 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_ACL_XATTR" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_ACL_XATTR" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_aio_fork.8
r860 r988 2 2 .\" Title: vfs_aio_fork 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_AIO_FORK" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_AIO_FORK" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 63 63 .SH "VERSION" 64 64 .PP 65 This man page is correct for version 3\&.6\&.0 of the Samba suite\&.65 This man page is correct for version 4\&.0\&.0 of the Samba suite\&. 66 66 .SH "AUTHOR" 67 67 .PP -
vendor/current/docs/manpages/vfs_aio_pthread.8
r860 r988 2 2 .\" Title: vfs_aio_pthread 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_AIO_PTHREAD" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_AIO_PTHREAD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 79 79 .SH "VERSION" 80 80 .PP 81 This man page is correct for version 3\&.6\&.3of the Samba suite\&.81 This man page is correct for version 4\&.0 of the Samba suite\&. 82 82 .SH "AUTHOR" 83 83 .PP -
vendor/current/docs/manpages/vfs_audit.8
r860 r988 2 2 .\" Title: vfs_audit 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_AUDIT" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_AUDIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_cacheprime.8
r860 r988 2 2 .\" Title: vfs_cacheprime 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_CACHEPRIME" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_CACHEPRIME" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 112 112 .PP 113 113 cacheprime 114 is not a asubstitute for a general\-purpose readahead mechanism\&. It is intended for use only in very specific environments where disk operations must be aligned and sized to known values (as much as that is possible)\&.114 is not a substitute for a general\-purpose readahead mechanism\&. It is intended for use only in very specific environments where disk operations must be aligned and sized to known values (as much as that is possible)\&. 115 115 .SH "VERSION" 116 116 .PP -
vendor/current/docs/manpages/vfs_cap.8
r860 r988 2 2 .\" Title: vfs_cap 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_CAP" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_CAP" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_catia.8
r860 r988 2 2 .\" Title: vfs_catia 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_CATIA" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_CATIA" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 45 45 This module is stackable\&. 46 46 .PP 47 Up to samba version 3\&.4\&.x a fixed character mapping was used\&. The invalid windows characters \e / : * ? " < > | and the blank character were mapped in a hardcoded way\&. 47 The parameter "catia:mappings" specifies the mapping on a per\-character basis, see below\&. 48 .SH "OPTIONS" 48 49 .PP 49 Starting with samba\-3\&.5\&.0 a more flexible mapping was introduced\&. The new parameter "catia:mappings" now specifies the mapping on a char by char basis using the notation: unix hex char 0x\&.\&. : windows hex char 0x\&.\&. Multiple character mappings are separated by a comma\&. 50 catia:mappings = SERVER_HEX_CHAR:CLIENT_HEX_CHAR 51 .RS 4 52 SERVER_HEX_CHAR specifies a 0x prefixed hexedecimal character code that, when included in a Samba server\-side filename, will be mapped to CLIENT_HEX_CHAR for the CIFS client\&. 53 .sp 54 The same mapping occurs in the opposite direction\&. Multiple character mappings are separated by a comma\&. 55 .RE 50 56 .SH "EXAMPLES" 51 57 .PP 52 Samba versions up to 3\&.4\&.x: 53 .PP 54 Map Catia filenames on the [CAD] share: 55 .sp 56 .if n \{\ 57 .RS 4 58 .\} 59 .nf 60 \fI[CAD]\fR 61 \m[blue]\fBpath = /data/cad\fR\m[] 62 \m[blue]\fBvfs objects = catia\fR\m[] 63 .fi 64 .if n \{\ 65 .RE 66 .\} 67 .PP 68 Samba versions 3\&.5\&.0 and later: 69 .PP 70 Map Catia filenames on the [CAD] share: 58 Map server\-side quotation\-marks (") to client\-side diaeresis (\(ad) on filenames in the [CAD] share: 71 59 .sp 72 60 .if n \{\ … … 83 71 .\} 84 72 .PP 85 To get the full formerly fixed mappings:73 Perform comprehensive mapping of common Catia filename characters: 86 74 .sp 87 75 .if n \{\ … … 92 80 \m[blue]\fBpath = /data/cad\fR\m[] 93 81 \m[blue]\fBvfs objects = catia\fR\m[] 94 \m[blue]\fBcatia:mappings = 0x22:0xa8,0x2a:0xa4,0x2f:0xf8,0x3a:0xf7,0x3c:0xab,0x3e:0xbb,0x3f:0xbf,0x5c:0xff,0x7c:0xa6 ,0x20:0xb1\fR\m[]82 \m[blue]\fBcatia:mappings = 0x22:0xa8,0x2a:0xa4,0x2f:0xf8,0x3a:0xf7,0x3c:0xab,0x3e:0xbb,0x3f:0xbf,0x5c:0xff,0x7c:0xa6\fR\m[] 95 83 .fi 96 84 .if n \{\ … … 98 86 .\} 99 87 .PP 100 Unixfilename to be translated (Note that the path delimiter "/" is not used here):88 Server\-side filename to be translated (Note that the path delimiter "/" is not used here): 101 89 .PP 102 a\ea:a*a?a"a<a>a|a a90 a\ea:a*a?a"a<a>a|a 103 91 .PP 104 Resulting windows filename:92 Resulting filename, as seen by the client: 105 93 .PP 106 aÿa\(dia\(Csa\(r?a\(ada\(Foa\(Fca\(bba\(+-a 94 aÿa\(dia\(Csa\(r?a\(ada\(Foa\(Fca\(bba 95 .SH "CAVEATS" 107 96 .PP 108 Note that the character mapping must work in BOTH directions (unix \-> windows and windows \-> unix) to get unique and existing file names!97 Character mapping must work in BOTH directions (server \-> client and client \-> server) to get unique and existing file names! 109 98 .PP 110 99 A NOT working example: … … 125 114 Here the colon ":" is mapped to the underscore "_"\&. 126 115 .PP 127 Assuming a unix filename "a:should_work", which is well translated to windows as "a_should_work"\&.116 Assuming a server\-side filename "a:should_work", which is translated to "a_should_work" for the client\&. 128 117 .PP 129 BUT the reverse mapping from windows "a_should_work" to unixwill result in "a:should:work" \- something like "file not found" will be returned\&.118 BUT the reverse mapping from client "a_should_work" to server will result in "a:should:work" \- something like "file not found" will be returned\&. 130 119 .SH "VERSION" 131 120 .PP 132 This man page is correct for all versions up to 4\&.0\&.3 of the Samba suite\&.121 This man page is correct for Samba versions from 3\&.5\&.0 to 4\&.0\&.6\&. 133 122 .SH "AUTHOR" 134 123 .PP -
vendor/current/docs/manpages/vfs_commit.8
r860 r988 2 2 .\" Title: vfs_commit 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_COMMIT" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_COMMIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_crossrename.8
r860 r988 2 2 .\" Title: vfs_crossrename 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_CROSSRENAME" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_CROSSRENAME" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 90 90 .SH "VERSION" 91 91 .PP 92 This man page is correct for version 3\&.6\&.0 of the Samba suite\&.92 This man page is correct for version 4\&.0\&.0 of the Samba suite\&. 93 93 .SH "AUTHOR" 94 94 .PP -
vendor/current/docs/manpages/vfs_default_quota.8
r860 r988 2 2 .\" Title: vfs_default_quota 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_DEFAULT_QUOTA" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_DEFAULT_QUOTA" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_dirsort.8
r860 r988 2 2 .\" Title: vfs_dirsort 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_DIRSORT" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_DIRSORT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_extd_audit.8
r860 r988 2 2 .\" Title: vfs_extd_audit 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_EXTD_AUDIT" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_EXTD_AUDIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_fake_perms.8
r860 r988 2 2 .\" Title: vfs_fake_perms 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_FAKE_PERMS" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_FAKE_PERMS" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_fileid.8
r860 r988 2 2 .\" Title: vfs_fileid 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_FILEID" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_FILEID" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_full_audit.8
r860 r988 2 2 .\" Title: vfs_full_audit 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_FULL_AUDIT" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_FULL_AUDIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 47 47 is able to record the complete set of Samba VFS operations: 48 48 .RS 4 49 aio_cancel50 .RE51 .RS 452 aio_error53 .RE54 .RS 455 aio_fsync56 .RE57 .RS 458 aio_read59 .RE60 .RS 461 aio_return62 .RE63 .RS 464 aio_suspend65 .RE66 .RS 467 aio_write68 .RE69 .RS 470 49 chdir 71 50 .RE … … 92 71 .RE 93 72 .RS 4 73 copy_chunk_send 74 .RE 75 .RS 4 76 copy_chunk_recv 77 .RE 78 .RS 4 94 79 disconnect 95 80 .RE … … 134 119 .RE 135 120 .RS 4 121 get_compression 122 .RE 123 .RS 4 136 124 get_nt_acl 137 125 .RE … … 155 143 .RE 156 144 .RS 4 157 lgetxattr158 .RE159 .RS 4160 145 link 161 146 .RE … … 167 152 .RE 168 153 .RS 4 169 llistxattr170 .RE171 .RS 4172 154 lock 173 155 .RE 174 156 .RS 4 175 lremovexattr176 .RE177 .RS 4178 157 lseek 179 158 .RE 180 159 .RS 4 181 lsetxattr182 .RE183 .RS 4184 160 lstat 185 161 .RE … … 233 209 .RE 234 210 .RS 4 211 set_compression 212 .RE 213 .RS 4 235 214 set_nt_acl 236 215 .RE … … 242 221 .RE 243 222 .RS 4 223 snap_check_path 224 .RE 225 .RS 4 226 snap_create 227 .RE 228 .RS 4 229 snap_delete 230 .RE 231 .RS 4 244 232 stat 245 233 .RE … … 251 239 .RE 252 240 .RS 4 253 sys_acl_add_perm254 .RE255 .RS 4256 sys_acl_clear_perms257 .RE258 .RS 4259 sys_acl_create_entry260 .RE261 .RS 4262 241 sys_acl_delete_def_file 263 242 .RE 264 243 .RS 4 265 sys_acl_free_acl266 .RE267 .RS 4268 sys_acl_free_qualifier269 .RE270 .RS 4271 sys_acl_free_text272 .RE273 .RS 4274 sys_acl_get_entry275 .RE276 .RS 4277 244 sys_acl_get_fd 278 245 .RE … … 281 248 .RE 282 249 .RS 4 283 sys_acl_get_perm284 .RE285 .RS 4286 sys_acl_get_permset287 .RE288 .RS 4289 sys_acl_get_qualifier290 .RE291 .RS 4292 sys_acl_get_tag_type293 .RE294 .RS 4295 sys_acl_init296 .RE297 .RS 4298 250 sys_acl_set_fd 299 251 .RE 300 252 .RS 4 301 253 sys_acl_set_file 302 .RE303 .RS 4304 sys_acl_set_permset305 .RE306 .RS 4307 sys_acl_set_qualifier308 .RE309 .RS 4310 sys_acl_set_tag_type311 .RE312 .RS 4313 sys_acl_to_text314 .RE315 .RS 4316 sys_acl_valid317 254 .RE 318 255 .RS 4 … … 402 339 .SH "OPTIONS" 403 340 .PP 404 vfs_full_audit:prefix = STRING341 full_audit:prefix = STRING 405 342 .RS 4 406 343 Prepend audit messages with STRING\&. STRING is processed for standard substitution variables listed in … … 408 345 .RE 409 346 .PP 410 vfs_full_audit:success = LIST411 .RS 4 412 LIST is a list of VFS operations that should be recorded if they succeed\&. Operations are specified using the names listed above\&. Operations can be unset by prefixing the names with "!"\&. 413 .RE 414 .PP 415 vfs_full_audit:failure = LIST416 .RS 4 417 LIST is a list of VFS operations that should be recorded if they failed\&. Operations are specified using the names listed above\&. Operations can be unset by prefixing the names with "!"\&. 347 full_audit:success = LIST 348 .RS 4 349 LIST is a list of VFS operations that should be recorded if they succeed\&. Operations are specified using the names listed above\&. Operations can be unset by prefixing the names with "!"\&. The default is all operations\&. 350 .RE 351 .PP 352 full_audit:failure = LIST 353 .RS 4 354 LIST is a list of VFS operations that should be recorded if they failed\&. Operations are specified using the names listed above\&. Operations can be unset by prefixing the names with "!"\&. The default is all operations\&. 418 355 .RE 419 356 .PP … … 430 367 \fBsyslog\fR(3) 431 368 priority\&. 369 .RE 370 .PP 371 full_audit:syslog = true/false 372 .RS 4 373 Log messages to syslog (default) or as a debug level 1 message\&. 374 .RE 375 .PP 376 full_audit:log_secdesc = true/false 377 .RS 4 378 Log an sddl form of the security descriptor coming in when a client sets an acl\&. Defaults to false\&. 432 379 .RE 433 380 .SH "EXAMPLES" -
vendor/current/docs/manpages/vfs_gpfs.8
r860 r988 2 2 .\" Title: vfs_gpfs 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_GPFS" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_GPFS" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 80 80 .RE 81 81 .PP 82 NOTE:This module follows the posix\-acl behaviour and hence allows permission stealing via chown\&. Samba might allow at a later point in time, to restrict the chown via this module as such restrictions are the responsibility of the underlying filesystem than of Samba\&. 82 NOTE: 83 This module follows the posix\-acl behaviour and hence allows permission stealing via chown\&. Samba might allow at a later point in time, to restrict the chown via this module as such restrictions are the responsibility of the underlying filesystem than of Samba\&. 84 .PP 85 This module makes use of the smb\&.conf parameter 86 \m[blue]\fBacl map full control\fR\m[]\&. When set to yes (the default), this parameter will add in the FILE_DELETE_CHILD bit on a returned ACE entry for a file (not a directory) that already contains all file permissions except for FILE_DELETE and FILE_DELETE_CHILD\&. This can prevent Windows applications that request GENERIC_ALL access from getting ACCESS_DENIED errors when running against a filesystem with NFSv4 compatible ACLs\&. 83 87 .PP 84 88 This module is stackable\&. 89 .PP 90 Since Samba 4\&.0 all options are per share options\&. 85 91 .SH "OPTIONS" 86 92 .PP … … 97 103 .IP \(bu 2.3 98 104 .\} 99 100 105 yes(default) 101 106 \- propagate sharemodes across all GPFS nodes\&. … … 110 115 .IP \(bu 2.3 111 116 .\} 112 113 117 no 114 118 \- do not propagate sharemodes across all GPFS nodes\&. This should only be used if the GPFS file system is exclusively exported by Samba\&. Access by local unix application or NFS exports could lead to corrupted files\&. … … 134 138 .IP \(bu 2.3 135 139 .\} 136 137 140 yes(default) 138 141 \- propagate leases across all GPFS nodes\&. … … 147 150 .IP \(bu 2.3 148 151 .\} 149 150 152 no 151 153 \- do not propagate leases across all GPFS nodes\&. This should only be used if the GPFS file system is exclusively exported by Samba\&. Access by local unix application or NFS exports could lead to corrupted files\&. … … 167 169 .IP \(bu 2.3 168 170 .\} 169 170 171 no(default) 171 172 \- Do not announce HSM\&. … … 180 181 .IP \(bu 2.3 181 182 .\} 182 183 no 183 yes 184 184 \- Announce HSM\&. 185 .RE 186 .sp 187 .RE 188 .RE 189 .PP 190 gpfs:recalls = [ yes | no ] 191 .RS 4 192 When this option is set to no, an attempt to open an offline file will be rejected with access denied\&. This helps preventing recall storms triggered by careless applications like Finder and Explorer\&. 193 .sp 194 .RS 4 195 .ie n \{\ 196 \h'-04'\(bu\h'+03'\c 197 .\} 198 .el \{\ 199 .sp -1 200 .IP \(bu 2.3 201 .\} 202 yes(default) 203 \- Open files that are offline\&. This will recall the files from HSM\&. 204 .RE 205 .sp 206 .RS 4 207 .ie n \{\ 208 \h'-04'\(bu\h'+03'\c 209 .\} 210 .el \{\ 211 .sp -1 212 .IP \(bu 2.3 213 .\} 214 no 215 \- Reject access to offline files with access denied\&. This will prevent recalls of files from HSM\&. Using this setting also requires gpfs:hsm to be set to yes\&. 185 216 .RE 186 217 .sp … … 202 233 .IP \(bu 2.3 203 234 .\} 204 205 235 yes(default) 206 236 \- use … … 216 246 .IP \(bu 2.3 217 247 .\} 218 219 248 no 220 249 \- do not use … … 239 268 .IP \(bu 2.3 240 269 .\} 241 242 270 no(default) 243 271 \- do not use GPFS windows attributes\&. … … 252 280 .IP \(bu 2.3 253 281 .\} 254 255 282 yes 256 283 \- use GPFS windows attributes\&. … … 262 289 gpfs:merge_writeappend = [ yes | no ] 263 290 .RS 4 264 GPFS ACLs doesn\*(Aqt know about the \*(AqAPPEND\*(Aq right\&. This optionen lets Samba map the \*(AqAPPEND\*(Aq right to \*(AqWRITE\*(Aq\&. 265 .sp 266 .RS 4 267 .ie n \{\ 268 \h'-04'\(bu\h'+03'\c 269 .\} 270 .el \{\ 271 .sp -1 272 .IP \(bu 2.3 273 .\} 274 291 GPFS ACLs doesn\*(Aqt know about the \*(AqAPPEND\*(Aq right\&. This option lets Samba map the \*(AqAPPEND\*(Aq right to \*(AqWRITE\*(Aq\&. 292 .sp 293 .RS 4 294 .ie n \{\ 295 \h'-04'\(bu\h'+03'\c 296 .\} 297 .el \{\ 298 .sp -1 299 .IP \(bu 2.3 300 .\} 275 301 yes(default) 276 302 \- map \*(AqAPPEND\*(Aq to \*(AqWRITE\*(Aq\&. … … 285 311 .IP \(bu 2.3 286 312 .\} 287 288 313 no 289 314 \- do not map \*(AqAPPEND\*(Aq to \*(AqWRITE\*(Aq\&. 315 .RE 316 .sp 317 .RE 318 .RE 319 .PP 320 gpfs:acl = [ yes | no ] 321 .RS 4 322 This option lets Samba use or ignore GPFS ACLs\&. 323 .sp 324 .RS 4 325 .ie n \{\ 326 \h'-04'\(bu\h'+03'\c 327 .\} 328 .el \{\ 329 .sp -1 330 .IP \(bu 2.3 331 .\} 332 yes(default) 333 \- use GPFS ACLs\&. 334 .RE 335 .sp 336 .RS 4 337 .ie n \{\ 338 \h'-04'\(bu\h'+03'\c 339 .\} 340 .el \{\ 341 .sp -1 342 .IP \(bu 2.3 343 .\} 344 no 345 \- do not use GPFS ACLs and pass everything to the next SMB_VFS module\&. 290 346 .RE 291 347 .sp … … 309 365 .IP \(bu 2.3 310 366 .\} 311 312 367 no(default) 313 368 \- ignore the DESC_DACL_PROTECTED flags\&. … … 322 377 .IP \(bu 2.3 323 378 .\} 324 325 379 yes 326 380 \- reject ACLs with DESC_DACL_PROTECTED\&. … … 330 384 .RE 331 385 .PP 386 gpfs:dfreequota = [ yes | no ] 387 .RS 4 388 Adjust reporting of the size and free space of a share according to quotas\&. If this setting is "yes", a request for size and free space will also evaluate the user quota of the user requesting the data and the group quota of the primary group of the user\&. Fileset quotas are not queried, since GPFS already provides the option \-\-dfreequota to reflect the fileset quota in the free space query\&. Please use that option to include fileset quotas in the reported disk space\&. 389 .sp 390 If any of the soft or hard quota limits has been reached, the free space will be reported as 0\&. If a quota is in place, but the limits have not been reached, the free space will be reported according to the space left in the quota\&. If more than one quota applies the free space will be reported as the smallest space left in those quotas\&. The size of the share will be reported according to the quota usage\&. If more than one quota applies, the smallest size will be reported for the share size according to these quotas\&. 391 .sp 392 .RS 4 393 .ie n \{\ 394 \h'-04'\(bu\h'+03'\c 395 .\} 396 .el \{\ 397 .sp -1 398 .IP \(bu 2.3 399 .\} 400 yes 401 \- include the quotas when reporting the share size and free space 402 .RE 403 .sp 404 .RS 4 405 .ie n \{\ 406 \h'-04'\(bu\h'+03'\c 407 .\} 408 .el \{\ 409 .sp -1 410 .IP \(bu 2.3 411 .\} 412 no(default) 413 \- do not include quotas, simply report the size and free space of the file system 414 .RE 415 .sp 416 .RE 417 .RE 418 .PP 419 gpfs:prealloc = [ yes | no ] 420 .RS 4 421 If set to yes the gpfs_prealloc function will be used in the fallocate callback when appropriate\&. If set to no gpfs_prealloc will not be used\&. In both cases the system and libc calls are avoided\&. 422 .sp 423 .RS 4 424 .ie n \{\ 425 \h'-04'\(bu\h'+03'\c 426 .\} 427 .el \{\ 428 .sp -1 429 .IP \(bu 2.3 430 .\} 431 yes (default) 432 \- Use gpfs_prealloc for the fallocate callback\&. 433 .RE 434 .sp 435 .RS 4 436 .ie n \{\ 437 \h'-04'\(bu\h'+03'\c 438 .\} 439 .el \{\ 440 .sp -1 441 .IP \(bu 2.3 442 .\} 443 no 444 \- Do not use gpfs_prealloc for the fallocate callback\&. 445 .RE 446 .sp 447 .RE 448 .RE 449 .PP 450 gpfs:settimes = [ yes | no ] 451 .RS 4 452 Use the gpfs_set_times API when changing the timestamps of a file or directory\&. If the GPFS API is not available the old method of using utime and the GPFS winattr call will be used instead\&. 453 .sp 454 .RS 4 455 .ie n \{\ 456 \h'-04'\(bu\h'+03'\c 457 .\} 458 .el \{\ 459 .sp -1 460 .IP \(bu 2.3 461 .\} 462 yes(default) 463 \- Use gpfs_set_times\&. Fall back to utime and winattr when it is not available\&. 464 .RE 465 .sp 466 .RS 4 467 .ie n \{\ 468 \h'-04'\(bu\h'+03'\c 469 .\} 470 .el \{\ 471 .sp -1 472 .IP \(bu 2.3 473 .\} 474 no 475 \- Do not use gpfs_set_times\&. 476 .RE 477 .sp 478 .RE 479 .RE 480 .PP 332 481 nfs4:mode = [ simple | special ] 333 482 .RS 4 334 Enable/Disable substitution of special IDs on GPFS\&. This parameter should not affect the windows users in anyway\&. It only ensures that Samba sets the special IDs \- OWNER@ and GROUP@ ( mappings to simple uids ) that are relevant to GPFS\&.483 Controls substitution of special IDs (OWNER@ and GROUP@) on GPFS\&. The use of mode simple is recommended\&. In this mode only non inheriting ACL entries for the file owner and group are mapped to special IDs\&. 335 484 .sp 336 485 The following MODEs are understood by the module: … … 345 494 .\} 346 495 simple(default) 347 \- do not use special IDs in GPFS ACEs348 .RE 349 .sp 350 .RS 4 351 .ie n \{\ 352 \h'-04'\(bu\h'+03'\c 353 .\} 354 .el \{\ 355 .sp -1 356 .IP \(bu 2.3 357 .\} 358 special 359 \- use special IDs in GPFSACEs\&.496 \- use OWNER@ and GROUP@ special IDs for non inheriting ACEs only\&. 497 .RE 498 .sp 499 .RS 4 500 .ie n \{\ 501 \h'-04'\(bu\h'+03'\c 502 .\} 503 .el \{\ 504 .sp -1 505 .IP \(bu 2.3 506 .\} 507 special(deprecated) 508 \- use OWNER@ and GROUP@ special IDs in ACEs for all file owner and group ACEs\&. 360 509 .RE 361 510 .sp … … 469 618 .IP \(bu 2.3 470 619 .\} 471 yesOpen files with O_SYNC 472 .RE 473 .sp 474 .RS 4 475 .ie n \{\ 476 \h'-04'\(bu\h'+03'\c 477 .\} 478 .el \{\ 479 .sp -1 480 .IP \(bu 2.3 481 .\} 482 no (default)Open files as normal Samba would do 620 yes 621 \- Open files with O_SYNC 622 .RE 623 .sp 624 .RS 4 625 .ie n \{\ 626 \h'-04'\(bu\h'+03'\c 627 .\} 628 .el \{\ 629 .sp -1 630 .IP \(bu 2.3 631 .\} 632 no (default) 633 \- Open files as normal Samba would do 483 634 .RE 484 635 .sp … … 520 671 At build time, only the header file 521 672 gpfs_gpl\&.h 522 is required 673 is required, which is a symlink to 523 674 gpfs\&.h 524 675 in gpfs versions newer than 3\&.2\&.1 PTF8\&. -
vendor/current/docs/manpages/vfs_netatalk.8
r860 r988 2 2 .\" Title: vfs_netatalk 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_NETATALK" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_NETATALK" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_prealloc.8
r860 r988 2 2 .\" Title: vfs_prealloc 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_PREALLOC" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_PREALLOC" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_preopen.8
r860 r988 2 2 .\" Title: vfs_preopen 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_PREOPEN" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_PREOPEN" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_readahead.8
r860 r988 2 2 .\" Title: vfs_readahead 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_READAHEAD" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_READAHEAD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_readonly.8
r860 r988 2 2 .\" Title: vfs_readonly 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_READONLY" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_READONLY" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_recycle.8
r860 r988 2 2 .\" Title: vfs_recycle 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_RECYCLE" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_RECYCLE" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfs_shadow_copy.8
r860 r988 2 2 .\" Title: vfs_shadow_copy 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_SHADOW_COPY" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_SHADOW_COPY" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 29 29 .\" ----------------------------------------------------------------- 30 30 .SH "NAME" 31 vfs_shadow_copy \- Make a Samba share read only for a specified time period31 vfs_shadow_copy \- Expose snapshots to Windows clients as shadow copies\&. 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u -
vendor/current/docs/manpages/vfs_shadow_copy2.8
r860 r988 2 2 .\" Title: vfs_shadow_copy2 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_SHADOW_COPY2" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_SHADOW_COPY2" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 41 41 The 42 42 vfs_shadow_copy2 43 VFS module functionality that is similar to Microsoft Shadow Copy services\&. When setup properly, this module allows Microsoft Shadow Copy clients to browse "shadow copies" on Samba shares\&. 44 .PP 45 This is a 2nd implementation of a shadow copy module\&. This version has the following features: 43 VFS module offers a functionality similar to Microsoft Shadow Copy services\&. When set up properly, this module allows Microsoft Shadow Copy clients to browse through file system snapshots as "shadow copies" on Samba shares\&. 44 .PP 45 This is a second implementation of a shadow copy module which has the following additional features (compared to the original 46 \fBshadow_copy\fR(8) 47 module): 46 48 .sp 47 49 .RS 4 … … 53 55 .IP " 1." 4.2 54 56 .\} 55 You don\*(Aqt need to populate your shares with symlinks to thesnapshots\&. This can be very important when you have thousands of shares, or use [homes]\&.57 There is no need any more to populate your share\*(Aqs root directory with symlinks to the snapshots if the file system stores the snapshots elsewhere\&. Instead, you can flexibly configure the module where to look for the file system snapshots\&. This can be very important when you have thousands of shares, or use [homes]\&. 56 58 .RE 57 59 .sp … … 64 66 .IP " 2." 4.2 65 67 .\} 66 The inode number of the files is altered so it is different from the original\&. This allows the \*(Aqrestore\*(Aq button to work without a sharing violation\&. 68 Snapshot directories need not be in one fixed central place but can be located anywhere in the directory tree\&. This mode helps to support file systems that offer snapshotting of particular subtrees, for example the GPFS independent file sets\&. 69 .RE 70 .sp 71 .RS 4 72 .ie n \{\ 73 \h'-04' 3.\h'+01'\c 74 .\} 75 .el \{\ 76 .sp -1 77 .IP " 3." 4.2 78 .\} 79 Vanity naming for snapshots: snapshots can be named in any format compatible with str[fp]time conversions\&. 80 .RE 81 .sp 82 .RS 4 83 .ie n \{\ 84 \h'-04' 4.\h'+01'\c 85 .\} 86 .el \{\ 87 .sp -1 88 .IP " 4." 4.2 89 .\} 90 Timestamps can be represented in localtime rather than UTC\&. 91 .RE 92 .sp 93 .RS 4 94 .ie n \{\ 95 \h'-04' 5.\h'+01'\c 96 .\} 97 .el \{\ 98 .sp -1 99 .IP " 5." 4.2 100 .\} 101 The inode number of the files can optionally be altered to be different from the original\&. This fixes the \*(Aqrestore\*(Aq button in the Windows GUI to work without a sharing violation when serving from file systems, like GPFS, that return the same device and inode number for the snapshot file and the original\&. 102 .RE 103 .sp 104 .RS 4 105 .ie n \{\ 106 \h'-04' 6.\h'+01'\c 107 .\} 108 .el \{\ 109 .sp -1 110 .IP " 6." 4.2 111 .\} 112 Shadow copy results are by default sorted before being sent to the client\&. This is beneficial for filesystems that don\*(Aqt read directories alphabetically (the default unix)\&. Sort ordering can be configured and sorting can be turned off completely if the file system sorts its directory listing\&. 67 113 .RE 68 114 .sp … … 75 121 relies on a filesystem snapshot implementation\&. Many common filesystems have native support for this\&. 76 122 .PP 77 Filesystem snapshots must be mounted on specially named directories in order to be recognized by 78 vfs_shadow_copy2\&. The snapshot mount points must be immediate children of a the directory being shared\&. 79 .PP 80 The snapshot naming convention is @GMT\-YYYY\&.MM\&.DD\-hh\&.mm\&.ss, where: 123 Filesystem snapshots must be available under specially named directories in order to be recognized by 124 vfs_shadow_copy2\&. These snapshot directory is typically a direct subdirectory of the share root\*(Aqs mountpoint but there are other modes that can be configured with the parameters described in detail below\&. 125 .PP 126 The snapshot at a given point in time is expected in a subdirectory of the snapshot directory where the snapshot\*(Aqs directory is expected to be a formatted version of the snapshot time\&. The default format which can be changed with the 127 shadow:format 128 option is @GMT\-YYYY\&.MM\&.DD\-hh\&.mm\&.ss, where: 81 129 .sp 82 130 .RS 4 … … 172 220 .SH "OPTIONS" 173 221 .PP 222 shadow:mountpoint = MOUNTPOINT 223 .RS 4 224 With this parameter, one can specify the mount point of the filesystem that contains the share path\&. Usually this mount point is automatically detected\&. But for some constellations, in particular tests, it can be convenient to be able to specify it\&. 225 .sp 226 Example: shadow:mountpoint = /path/to/filesystem 227 .sp 228 Default: shadow:mountpoint = NOT SPECIFIED 229 .RE 230 .PP 174 231 shadow:snapdir = SNAPDIR 175 232 .RS 4 176 Path to the directory where snapshots are kept\&. 233 Path to the directory where the file system of the share keeps its snapshots\&. If an absolute path is specified, it is used as\-is\&. If a relative path is specified, then it is taken relative to the mount point of the filesystem of the share root\&. (See 234 shadow:mountpoint\&.) 235 .sp 236 Note that 237 shadow:snapdirseverywhere 238 depends on this parameter and needs a relative path\&. Setting an absolute path disables 239 shadow:snapdirseverywhere\&. 240 .sp 241 Note that the 242 shadow:crossmountpoints 243 option also requires a relative snapdir\&. Setting an absolute path disables 244 shadow:crossmountpoints\&. 245 .sp 246 Example: shadow:snapdir = /some/absolute/path 247 .sp 248 Default: shadow:snapdir = \&.snapshots 177 249 .RE 178 250 .PP 179 251 shadow:basedir = BASEDIR 180 252 .RS 4 181 Path to the base directory that snapshots are from\&. 182 .RE 183 .PP 184 shadow:sort = asc/desc, or not specified for unsorted (default) 185 .RS 4 186 By this parameter one can specify that the shadow copy directories should be sorted before they are sent to the client\&. This can be beneficial as unix filesystems are usually not listed alphabetically sorted\&. If enabled, you typically want to specify descending order\&. 253 The basedir option allows one to specify a directory between the share\*(Aqs mount point and the share root, relative to which the file system\*(Aqs snapshots are taken\&. 254 .sp 255 For example, if 256 .sp 257 .RS 4 258 .ie n \{\ 259 \h'-04'\(bu\h'+03'\c 260 .\} 261 .el \{\ 262 .sp -1 263 .IP \(bu 2.3 264 .\} 265 basedir = mountpoint/rel_basedir 266 .RE 267 .sp 268 .RS 4 269 .ie n \{\ 270 \h'-04'\(bu\h'+03'\c 271 .\} 272 .el \{\ 273 .sp -1 274 .IP \(bu 2.3 275 .\} 276 share_root = basedir/rel_share_root 277 .RE 278 .sp 279 .RS 4 280 .ie n \{\ 281 \h'-04'\(bu\h'+03'\c 282 .\} 283 .el \{\ 284 .sp -1 285 .IP \(bu 2.3 286 .\} 287 snapshot_path = mountpoint/snapdir 288 .sp 289 or 290 snapshot_path = snapdir 291 if snapdir is absolute 292 .RE 293 .sp 294 .RE 295 then the snapshot of a 296 file = mountpoint/rel_basedir/rel_share_root/rel_file 297 at a time TIME will be found under 298 snapshot_path/FS_GMT_TOKEN(TIME)/rel_share_root/rel_file, where FS_GMT_TOKEN(TIME) is the timestamp string belonging to TIME in the format required by the file system\&. (See 299 shadow:format\&.) 300 .sp 301 The default for the basedir is the mount point of the file system of the share root (see 302 shadow:mountpoint)\&. 303 .sp 304 Note that the 305 shadow:snapdirseverywhere 306 and 307 shadow:crossmountpoints 308 options are incompatible with 309 shadow:basedir 310 and disable the basedir setting\&. 311 .RE 312 .PP 313 shadow:snapsharepath = SNAPSHAREPATH 314 .RS 4 315 With this parameter, one can specify the path of the share\*(Aqs root directory in snapshots, relative to the snapshot\*(Aqs root directory\&. It is an alternative method to 316 shadow:basedir, allowing greater control\&. 317 .sp 318 For example, if within each snapshot the files of the share have a 319 path/to/share/ 320 prefix, then 321 shadow:snapsharepath 322 can be set to 323 path/to/share\&. 324 .sp 325 With this parameter, it is no longer assumed that a snapshot represents an image of the original file system or a portion of it\&. For example, a system could perform backups of only files contained in shares, and then expose the backup files in a logical structure: 326 .sp 327 .RS 4 328 .ie n \{\ 329 \h'-04'\(bu\h'+03'\c 330 .\} 331 .el \{\ 332 .sp -1 333 .IP \(bu 2.3 334 .\} 335 share1/ 336 .RE 337 .sp 338 .RS 4 339 .ie n \{\ 340 \h'-04'\(bu\h'+03'\c 341 .\} 342 .el \{\ 343 .sp -1 344 .IP \(bu 2.3 345 .\} 346 share2/ 347 .RE 348 .sp 349 .RS 4 350 .ie n \{\ 351 \h'-04'\(bu\h'+03'\c 352 .\} 353 .el \{\ 354 .sp -1 355 .IP \(bu 2.3 356 .\} 357 \&.\&.\&./ 358 .RE 359 .sp 360 .RE 361 Note that the 362 shadow:snapdirseverywhere 363 and the 364 shadow:basedir 365 options are incompatible with 366 shadow:snapsharepath 367 and disable 368 shadow:snapsharepath 369 setting\&. 370 .sp 371 Example: shadow:snapsharepath = path/to/share 372 .sp 373 Default: shadow:snapsharepath = NOT SPECIFIED 374 .RE 375 .PP 376 shadow:sort = asc/desc 377 .RS 4 378 By default, this module sorts the shadow copy data alphabetically before sending it to the client\&. With this parameter, one can specify the sort order\&. Possible known values are desc (descending, the default) and asc (ascending)\&. If the file system lists directories alphabetically sorted, one can turn off sorting in this module by specifying any other value\&. 379 .sp 380 Example: shadow:sort = asc 381 .sp 382 Example: shadow:sort = none 383 .sp 384 Default: shadow:sort = desc 187 385 .RE 188 386 .PP 189 387 shadow:localtime = yes/no 190 388 .RS 4 191 This is an optional parameter that indicates whether the snapshot names are in UTC/GMT or in local time\&. By default UTC is expected\&. 389 This is an optional parameter that indicates whether the snapshot names are in UTC/GMT or in local time\&. If it is disabled then UTC/GMT is expected\&. 390 .sp 391 shadow:localtime = no 192 392 .RE 193 393 .PP 194 394 shadow:format = format specification for snapshot names 195 395 .RS 4 196 This is an optional parameter that specifies the format specification for the naming of snapshots\&. The format must be compatible with the conversion specifications recognized by str[fp]time\&. The default value is "@GMT\-%Y\&.%m\&.%d\-%H\&.%M\&.%S"\&. 396 This is an optional parameter that specifies the format specification for the naming of snapshots in the file system\&. The format must be compatible with the conversion specifications recognized by str[fp]time\&. 397 .sp 398 Default: shadow:format = "@GMT\-%Y\&.%m\&.%d\-%H\&.%M\&.%S" 399 .RE 400 .PP 401 shadow:sscanf = yes/no 402 .RS 4 403 This parameter can be used to specify that the time in format string is given as an unsigned long integer (%lu) rather than a time strptime() can parse\&. The result must be a unix time_t time\&. 404 .sp 405 Default: shadow:sscanf = no 197 406 .RE 198 407 .PP … … 202 411 shadow:fixinodes 203 412 then this module will modify the apparent inode number of files in the snapshot directories using a hash of the files path\&. This is needed for snapshot systems where the snapshots have the same device:inode number as the original files (such as happens with GPFS snapshots)\&. If you don\*(Aqt set this option then the \*(Aqrestore\*(Aq button in the shadow copy UI will fail with a sharing violation\&. 413 .sp 414 Default: shadow:fixinodes = no 415 .RE 416 .PP 417 shadow:snapdirseverywhere = yes/no 418 .RS 4 419 If you enable 420 shadow:snapdirseverywhere 421 then this module will look out for snapshot directories in the current working directory and all parent directories, stopping at the mount point by default\&. But see 422 shadow:crossmountpoints 423 how to change that behaviour\&. 424 .sp 425 An example where this is needed are independent filesets in IBM\*(Aqs GPFS, but other filesystems might support snapshotting only particular subtrees of the filesystem as well\&. 426 .sp 427 Note that 428 shadow:snapdirseverywhere 429 depends on 430 shadow:snapdir 431 and needs it to be a relative path\&. Setting an absolute snapdir path disables 432 shadow:snapdirseverywhere\&. 433 .sp 434 Note that this option is incompatible with the 435 shadow:basedir 436 option and removes the 437 shadow:basedir 438 setting by itself\&. 439 .sp 440 Example: shadow:snapdirseverywhere = yes 441 .sp 442 Default: shadow:snapdirseverywhere = no 443 .RE 444 .PP 445 shadow:crossmountpoints = yes/no 446 .RS 4 447 This option is effective in the case of 448 shadow:snapdirseverywhere = yes\&. Setting this option makes the module not stop at the first mount point encountered when looking for snapdirs, but lets it search potentially all through the path instead\&. 449 .sp 450 An example where this is needed are independent filesets in IBM\*(Aqs GPFS, but other filesystems might support snapshotting only particular subtrees of the filesystem as well\&. 451 .sp 452 Note that 453 shadow:crossmountpoints 454 depends on 455 shadow:snapdir 456 and needs it to be a relative path\&. Setting an absolute snapdir path disables 457 shadow:crossmountpoints\&. 458 .sp 459 Note that this option is incompatible with the 460 shadow:basedir 461 option and removes the 462 shadow:basedir 463 setting by itself\&. 464 .sp 465 Example: shadow:crossmountpoints = yes 466 .sp 467 Default: shadow:crossmountpoints = no 204 468 .RE 205 469 .SH "EXAMPLES" … … 229 493 .SH "VERSION" 230 494 .PP 231 This man page is correct for version 3\&.2\&.7of the Samba suite\&.495 This man page is correct for version 4\&.0 of the Samba suite\&. 232 496 .SH "AUTHOR" 233 497 .PP -
vendor/current/docs/manpages/vfs_streams_depot.8
r860 r988 2 2 .\" Title: vfs_streams_depot 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_STREAMS_DEPOT" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_STREAMS_DEPOT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 50 50 Path of the directory where the alternate data streams should be stored\&. Defaults to the sharepath/\&.streams\&. 51 51 .RE 52 .PP 53 streams_depot:delete_lost = [ yes | no ] 54 .RS 4 55 In the case of an already existing data streams directory for a newly created file the streams directory will be renamed to "lost\-%lu", random()\&. With this option lost stream directories will be removed instead of renamed\&. 56 .sp 57 .RS 4 58 .ie n \{\ 59 \h'-04'\(bu\h'+03'\c 60 .\} 61 .el \{\ 62 .sp -1 63 .IP \(bu 2.3 64 .\} 65 no(default) 66 \- rename lost streams to "lost\-%lu", random()\&. 67 .RE 68 .sp 69 .RS 4 70 .ie n \{\ 71 \h'-04'\(bu\h'+03'\c 72 .\} 73 .el \{\ 74 .sp -1 75 .IP \(bu 2.3 76 .\} 77 yes 78 \- remove lost streams\&. 79 .RE 80 .sp 81 .RE 82 .RE 52 83 .SH "EXAMPLES" 53 84 .sp -
vendor/current/docs/manpages/vfs_streams_xattr.8
r860 r988 2 2 .\" Title: vfs_streams_xattr 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_STREAMS_XATTR" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_STREAMS_XATTR" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 41 41 The 42 42 vfs_streams_xattr 43 enables storing of NTFS alternate data streams in the file system\&. As a normal posix file system does not support the concept of multiple data streams per file, the streams_xattr module stores the data in posix extended attributes (xattrs)\&. The name of these attributes is user\&.DosStream\&."ADS\-NAME"\&. 43 enables storing of NTFS alternate data streams in the file system\&. As a normal posix file system does not support the concept of multiple data streams per file, the streams_xattr module stores the data in posix extended attributes (xattrs)\&. The name of these attributes by default is user\&.DosStream\&."ADS\-NAME"\&. The prefix "user\&.DosStream\&." can be changed with the module option 44 streams_xattr:prefix, but be aware that this will also expose those ADS over the SMB extended attributes interface\&. 44 45 .PP 45 46 The file system that is shared with this module enabled must support xattrs\&. 46 47 .PP 47 48 Please note that most file systems have severe limitations on the size of xattrs\&. So this module might work for applications like IE that stores small zone information in streams but will fail for applications that store serious amounts of data in ADSs\&. 49 .PP 50 CAUTION: Make sure to set "kernel oplocks = no" in smb\&.conf if if you use this module because this combination is currently broken\&. See Bug 7537 for details\&. 51 .SH "OPTIONS" 52 .PP 53 streams_xattr:prefix = STRING 54 .RS 4 55 Name prefix used when storing an ADS in an xattr, defaults to 56 user\&.DosStream\&.\&. Changing this will also expose ADS over the SMB extended attributes interface\&. 57 .RE 58 .PP 59 streams_xattr:store_stream_type = [yes|no] 60 .RS 4 61 Whether the xattr names for Alternate Data Streams of type "$DATA" are suffixed by the stream type string ":$DATA"\&. The default is 62 yes\&. 63 .RE 48 64 .SH "EXAMPLES" 49 65 .sp -
vendor/current/docs/manpages/vfs_time_audit.8
r860 r988 2 2 .\" Title: vfs_time_audit 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_TIME_AUDIT" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_TIME_AUDIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 42 42 time_audit 43 43 VFS module logs system calls that take longer than the number of milliseconds defined by the variable 44 time_audit: audit_timeout\&. It will log the calls and the time spent in it\&.44 time_audit:timeout\&. It will log the calls and the time spent in it\&. 45 45 .PP 46 46 It\*(Aqs kind of comparable with … … 51 51 .SH "OPTIONS" 52 52 .PP 53 time_audit: audit_timeout = number of milliseconds53 time_audit:timeout = number of milliseconds 54 54 .RS 4 55 55 VFS calls that take longer than the defined number of milliseconds that should be logged\&. The default is 10000 (10s)\&. … … 66 66 \m[blue]\fBpath = /test/sample_share\fR\m[] 67 67 \m[blue]\fBvfs objects = time_audit\fR\m[] 68 \m[blue]\fBtime_audit: audit_timeout = 3000\fR\m[]68 \m[blue]\fBtime_audit:timeout = 3000\fR\m[] 69 69 .fi 70 70 .if n \{\ … … 73 73 .SH "VERSION" 74 74 .PP 75 This man page is correct for version 3\&.6\&.0 of the Samba suite\&.75 This man page is correct for version 4\&.0\&.0 of the Samba suite\&. 76 76 .SH "AUTHOR" 77 77 .PP -
vendor/current/docs/manpages/vfs_xattr_tdb.8
r860 r988 2 2 .\" Title: vfs_xattr_tdb 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFS_XATTR_TDB" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "VFS_XATTR_TDB" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff -
vendor/current/docs/manpages/vfstest.1
r860 r988 2 2 .\" Title: vfstest 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "VFSTEST" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "VFSTEST" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 45 45 \-c|\-\-command=command 46 46 .RS 4 47 Execute the specified (colon\-separated) commands\&. See below for the commands that are available\&. 48 .RE 49 .PP 50 \-h|\-\-help 51 .RS 4 52 Print a summary of command line options\&. 47 Execute the specified (\fBsemicolon\fR\-separated) commands\&. See below for the commands that are available\&. 53 48 .RE 54 49 .PP … … 59 54 will be appended\&. The log file is never removed by the client\&. 60 55 .RE 61 .PP62 \-d|\-\-debuglevel=level63 .RS 464 \fIlevel\fR65 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.66 .sp67 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.68 .sp69 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.70 .sp71 Note that specifying this parameter here will override the72 \m[blue]\fBlog level\fR\m[]73 parameter in the74 smb\&.conf75 file\&.76 .RE77 .PP78 \-V|\-\-version79 .RS 480 Prints the program version number\&.81 .RE82 .PP83 \-s|\-\-configfile <configuration file>84 .RS 485 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See86 smb\&.conf87 for more information\&. The default configuration file name is determined at compile time\&.88 .RE89 .PP90 \-l|\-\-log\-basename=logdirectory91 .RS 492 Base directory name for log/debug files\&. The extension93 \fB"\&.progname"\fR94 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.95 .RE96 56 .SH "COMMANDS" 97 57 .PP … … 530 490 .RE 531 491 .sp 492 .RS 4 493 .ie n \{\ 494 \h'-04'\(bu\h'+03'\c 495 .\} 496 .el \{\ 497 .sp -1 498 .IP \(bu 2.3 499 .\} 500 getxattr 501 \- VFS getxattr() 502 .RE 503 .sp 504 .RS 4 505 .ie n \{\ 506 \h'-04'\(bu\h'+03'\c 507 .\} 508 .el \{\ 509 .sp -1 510 .IP \(bu 2.3 511 .\} 512 listxattr 513 \- VFS listxattr() 514 .RE 515 .sp 516 .RS 4 517 .ie n \{\ 518 \h'-04'\(bu\h'+03'\c 519 .\} 520 .el \{\ 521 .sp -1 522 .IP \(bu 2.3 523 .\} 524 setxattr 525 \- VFS setxattr() 526 .RE 527 .sp 528 .RS 4 529 .ie n \{\ 530 \h'-04'\(bu\h'+03'\c 531 .\} 532 .el \{\ 533 .sp -1 534 .IP \(bu 2.3 535 .\} 536 removexattr 537 \- VFS removexattr() 538 .RE 539 .sp 540 .RS 4 541 .ie n \{\ 542 \h'-04'\(bu\h'+03'\c 543 .\} 544 .el \{\ 545 .sp -1 546 .IP \(bu 2.3 547 .\} 548 fget_nt_acl 549 \- VFS fget_nt_acl() 550 .RE 551 .sp 552 .RS 4 553 .ie n \{\ 554 \h'-04'\(bu\h'+03'\c 555 .\} 556 .el \{\ 557 .sp -1 558 .IP \(bu 2.3 559 .\} 560 get_nt_acl 561 \- VFS get_nt_acl() 562 .RE 563 .sp 564 .RS 4 565 .ie n \{\ 566 \h'-04'\(bu\h'+03'\c 567 .\} 568 .el \{\ 569 .sp -1 570 .IP \(bu 2.3 571 .\} 572 fset_nt_acl 573 \- VFS fset_nt_acl() 574 .RE 575 .sp 576 .RS 4 577 .ie n \{\ 578 \h'-04'\(bu\h'+03'\c 579 .\} 580 .el \{\ 581 .sp -1 582 .IP \(bu 2.3 583 .\} 584 set_nt_acl 585 \- VFS open() and fset_nt_acl() 586 .RE 587 .sp 588 .RS 4 589 .ie n \{\ 590 \h'-04'\(bu\h'+03'\c 591 .\} 592 .el \{\ 593 .sp -1 594 .IP \(bu 2.3 595 .\} 596 fchmod_acl 597 \- VFS fchmod_acl() 598 .RE 599 .sp 600 .RS 4 601 .ie n \{\ 602 \h'-04'\(bu\h'+03'\c 603 .\} 604 .el \{\ 605 .sp -1 606 .IP \(bu 2.3 607 .\} 608 chmod_acl 609 \- VFS chmod_acl() 610 .RE 611 .sp 612 .RS 4 613 .ie n \{\ 614 \h'-04'\(bu\h'+03'\c 615 .\} 616 .el \{\ 617 .sp -1 618 .IP \(bu 2.3 619 .\} 620 sys_acl_get_file 621 \- VFS sys_acl_get_file() 622 .RE 623 .sp 624 .RS 4 625 .ie n \{\ 626 \h'-04'\(bu\h'+03'\c 627 .\} 628 .el \{\ 629 .sp -1 630 .IP \(bu 2.3 631 .\} 632 sys_acl_get_fd 633 \- VFS sys_acl_get_fd() 634 .RE 635 .sp 636 .RS 4 637 .ie n \{\ 638 \h'-04'\(bu\h'+03'\c 639 .\} 640 .el \{\ 641 .sp -1 642 .IP \(bu 2.3 643 .\} 644 sys_acl_blob_get_file 645 \- VFS sys_acl_blob_get_file() 646 .RE 647 .sp 648 .RS 4 649 .ie n \{\ 650 \h'-04'\(bu\h'+03'\c 651 .\} 652 .el \{\ 653 .sp -1 654 .IP \(bu 2.3 655 .\} 656 sys_acl_blob_get_fd 657 \- VFS sys_acl_blob_get_fd() 658 .RE 659 .sp 660 .RS 4 661 .ie n \{\ 662 \h'-04'\(bu\h'+03'\c 663 .\} 664 .el \{\ 665 .sp -1 666 .IP \(bu 2.3 667 .\} 668 sys_acl_delete_def_file 669 \- VFS sys_acl_delete_def_file() 670 .RE 671 .sp 672 .RS 4 673 .ie n \{\ 674 \h'-04'\(bu\h'+03'\c 675 .\} 676 .el \{\ 677 .sp -1 678 .IP \(bu 2.3 679 .\} 680 test_chain 681 \- test chain code 682 .RE 683 .sp 684 .RS 4 685 .ie n \{\ 686 \h'-04'\(bu\h'+03'\c 687 .\} 688 .el \{\ 689 .sp -1 690 .IP \(bu 2.3 691 .\} 692 translate_name 693 \- VFS translate_name() 694 .RE 695 .sp 532 696 .RE 533 697 .PP … … 595 759 .SH "VERSION" 596 760 .PP 597 This man page is correct for version 3 of the Samba suite\&.761 This man page is correct for version 3 and 4 of the Samba suite\&. 598 762 .SH "AUTHOR" 599 763 .PP 600 764 The original Samba software and related utilities were created by Andrew Tridgell\&. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\&. 601 765 .PP 602 The vfstest man page was written by Jelmer Vernooij\&. 766 The vfstest man page was written by Jelmer Vernooij\&. Updated version by Guenter Kukkukk\&. -
vendor/current/docs/manpages/wbinfo.1
r860 r988 2 2 .\" Title: wbinfo 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "WBINFO" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "WBINFO" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 wbinfo [\-a\ user%password] [\-\-all\-domains] [\-\-allocate\-gid] [\-\-allocate\-uid] [\-c] [\-\-ccache\-save] [\-\-change\-user\-password] [\-D\ domain] [\-\-d omain\ domain] [\-\-dsgetdcname\ domain] [\-g] [\-\-getdcname\ domain] [\-\-get\-auth\-user] [\-G\ gid] [\-\-gid\-info] [\-\-group\-info] [\-\-help|\-?] [\-i\ user] [\-I\ ip] [\-K\ user%password] [\-\-lanman] [\-m] [\-n\ name] [\-N\ netbios\-name] [\-\-ntlmv2] [\-\-online\-status] [\-\-own\-domain] [\-p] [\-P|\-\-ping\-dc] [\-r\ user] [\-R|\-\-lookup\-rids] [\-s\ sid] [\-\-separator] [\-\-set\-auth\-user\ user%password] [\-S\ sid] [\-\-sid\-aliases] [\-\-sid\-to\-fullname] [\-t] [\-u] [\-\-uid\-info\ uid] [\-\-usage] [\-\-user\-domgroups\ sid] [\-\-user\-sids\ sid] [\-U\ uid] [\-V] [\-\-verbose] [\-Y\ sid]34 wbinfo [\-a\ user%password] [\-\-all\-domains] [\-\-allocate\-gid] [\-\-allocate\-uid] [\-c] [\-\-ccache\-save] [\-\-change\-user\-password] [\-D\ domain] [\-\-dc\-info\ domain] [\-\-domain\ domain] [\-\-dsgetdcname\ domain] [\-g] [\-\-getdcname\ domain] [\-\-get\-auth\-user] [\-G\ gid] [\-\-gid\-info\ gid] [\-\-group\-info\ group] [\-\-help|\-?] [\-i\ user] [\-I\ ip] [\-K\ user%password] [\-\-krb5ccname\ cctype] [\-\-lanman] [\-\-logoff] [\-\-logoff\-uid\ uid] [\-\-logoff\-user\ username] [\-\-lookup\-sids] [\-m] [\-n\ name] [\-N\ netbios\-name] [\-\-ntlmv2] [\-\-online\-status] [\-\-own\-domain] [\-p] [\-P|\-\-ping\-dc] [\-\-pam\-logon\ user%password] [\-r\ user] [\-R|\-\-lookup\-rids] [\-\-remove\-gid\-mapping\ gid,sid] [\-\-remove\-uid\-mapping\ uid,sid] [\-s\ sid] [\-\-separator] [\-\-sequence] [\-\-set\-auth\-user\ user%password] [\-\-set\-gid\-mapping\ gid,sid] [\-\-set\-uid\-mapping\ uid,sid] [\-S\ sid] [\-\-sid\-aliases\ sid] [\-\-sid\-to\-fullname\ sid] [\-\-sids\-to\-unix\-ids\ sidlist] [\-t] [\-u] [\-\-uid\-info\ uid] [\-\-usage] [\-\-user\-domgroups\ sid] [\-\-user\-sidinfo\ sid] [\-\-user\-sids\ sid] [\-U\ uid] [\-V] [\-\-verbose] [\-Y\ sid] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 106 106 .RE 107 107 .PP 108 \-\-dc\-info \fIdomain\fR 109 .RS 4 110 Displays information about the current domain controller for a domain\&. 111 .RE 112 .PP 108 113 \-\-domain \fIname\fR 109 114 .RS 4 110 115 This parameter sets the domain on which any specified operations will performed\&. If special domain name \*(Aq\&.\*(Aq is used to represent the current domain to which 111 116 \fBwinbindd\fR(8) 112 belongs\&. Currently only the 113 \fB\-u\fR, and 114 \fB\-g\fR 115 options honor this parameter\&. 117 belongs\&. A \*(Aq*\*(Aq as the domain name means to enumerate over all domains (NOTE: This can take a long time and use a lot of memory)\&. 116 118 .RE 117 119 .PP … … 131 133 .RE 132 134 .PP 133 \-\-group\-info \fI user\fR134 .RS 4 135 Get group info f or user\&.135 \-\-group\-info \fIgroup\fR 136 .RS 4 137 Get group info from group name\&. 136 138 .RE 137 139 .PP … … 140 142 This option will list all groups available in the Windows NT domain for which the 141 143 \fBsamba\fR(7) 142 daemon is operating in\&. Groups in all trusted domains will also be listed\&. Note that this operation does not assign group ids to any groups that have not already been seen by144 daemon is operating in\&. Groups in all trusted domains can be listed with the \-\-domain=\*(Aq*\*(Aq option\&. Note that this operation does not assign group ids to any groups that have not already been seen by 143 145 \fBwinbindd\fR(8)\&. 144 146 .RE … … 188 190 .RE 189 191 .PP 192 \-\-krb5ccname \fIKRB5CCNAME\fR 193 .RS 4 194 Allows one to request a sepcific kerberos credential cache type used for authentication\&. 195 .RE 196 .PP 190 197 \-\-lanman 191 198 .RS 4 192 199 Use lanman cryptography for user authentication\&. 200 .RE 201 .PP 202 \-\-logoff 203 .RS 4 204 Logoff a user\&. 205 .RE 206 .PP 207 \-\-logoff\-uid \fIUID\fR 208 .RS 4 209 Define user uid used during logoff request\&. 210 .RE 211 .PP 212 \-\-logoff\-user \fIUSERNAME\fR 213 .RS 4 214 Define username used during logoff request\&. 215 .RE 216 .PP 217 \-\-lookup\-sids \fISID1,SID2\&.\&.\&.\fR 218 .RS 4 219 Looks up SIDs\&. SIDs must be specified as ASCII strings in the traditional Microsoft format\&. For example, S\-1\-5\-21\-1455342024\-3071081365\-2475485837\-500\&. 193 220 .RE 194 221 .PP … … 207 234 \fBwinbindd\fR(8) 208 235 for the SID associated with the name specified\&. Domain names can be specified before the user name by using the winbind separator character\&. For example CWDOM1/Administrator refers to the Administrator user in the domain CWDOM1\&. If no domain is specified then the domain used is the one specified in the 209 \fBsmb.conf\fR(5) 210 \fIworkgroup \fR 236 \fBsmb.conf\fR(5)\fIworkgroup \fR 211 237 parameter\&. 212 238 .RE … … 238 264 .RE 239 265 .PP 266 \-\-pam\-logon \fIusername%password\fR 267 .RS 4 268 Attempt to authenticate a user in the same way pam_winbind would do\&. 269 .RE 270 .PP 240 271 \-p|\-\-ping 241 272 .RS 4 … … 258 289 .RS 4 259 290 Converts RIDs to names\&. Uses a comma separated list of rids\&. 291 .RE 292 .PP 293 \-\-remove\-gid\-mapping \fIGID,SID\fR 294 .RS 4 295 Removes an existing GID to SID mapping from the database\&. 296 .RE 297 .PP 298 \-\-remove\-uid\-mapping \fIUID,SID\fR 299 .RS 4 300 Removes an existing UID to SID mapping from the database\&. 260 301 .RE 261 302 .PP … … 274 315 .RE 275 316 .PP 317 \-\-sequence 318 .RS 4 319 This command has been deprecated\&. Please use the \-\-online\-status option instead\&. 320 .RE 321 .PP 276 322 \-\-set\-auth\-user \fIusername%password\fR 277 323 .RS 4 … … 281 327 .RE 282 328 .PP 329 \-\-set\-gid\-mapping \fIGID,SID\fR 330 .RS 4 331 Create a GID to SID mapping in the database\&. 332 .RE 333 .PP 334 \-\-set\-uid\-mapping \fIUID,SID\fR 335 .RS 4 336 Create a UID to SID mapping in the database\&. 337 .RE 338 .PP 283 339 \-S|\-\-sid\-to\-uid \fIsid\fR 284 340 .RS 4 … … 296 352 .RS 4 297 353 Converts a SID to a full username (DOMAIN\eusername)\&. 354 .RE 355 .PP 356 \-\-sids\-to\-unix\-ids \fIsid1,sid2,sid3\&.\&.\&.\fR 357 .RS 4 358 Resolve SIDs to Unix IDs\&. SIDs must be specified as ASCII strings in the traditional Microsoft format\&. For example, S\-1\-5\-21\-1455342024\-3071081365\-2475485837\-500\&. 298 359 .RE 299 360 .PP … … 309 370 This option will list all users available in the Windows NT domain for which the 310 371 \fBwinbindd\fR(8) 311 daemon is operating in\&. Users in all trusted domains will also be listed\&. Note that this operation does not assign user ids to any users that have not already been seen by372 daemon is operating in\&. Users in all trusted domains can be listed with the \-\-domain=\*(Aq*\*(Aq option\&. Note that this operation does not assign user ids to any users that have not already been seen by 312 373 \fBwinbindd\fR(8) 313 374 \&. … … 329 390 .RE 330 391 .PP 392 \-\-user\-sidinfo \fIsid\fR 393 .RS 4 394 Get user info by sid\&. 395 .RE 396 .PP 331 397 \-\-user\-sids \fIsid\fR 332 398 .RS 4 … … 349 415 \fBwinbindd\fR(8) 350 416 then the operation will fail\&. 351 .RE352 .PP353 \-V|\-\-version354 .RS 4355 Prints the program version number\&.356 .RE357 .PP358 \-h|\-\-help359 .RS 4360 Print a summary of command line options\&.361 417 .RE 362 418 .SH "EXIT STATUS" -
vendor/current/docs/manpages/winbind_krb5_locator.7
r860 r988 2 2 .\" Title: winbind_krb5_locator 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: 7 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "WINBIND_KRB5_LOCATOR" "7" "0 9/18/2013" "Samba 3\&.6" "7"10 .TH "WINBIND_KRB5_LOCATOR" "7" "05/02/2016" "Samba 4\&.4" "7" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 36 36 suite\&. 37 37 .PP 38 39 38 winbind_krb5_locator 40 39 is a plugin that permits MIT and Heimdal Kerberos libraries to detect Kerberos Servers (for the KDC and kpasswd service) using the same semantics that other tools of the Samba suite use\&. This include site\-aware DNS service record lookups and caching of closest dc\&. The plugin uses the public locator API provided by most modern Kerberos implementations\&. -
vendor/current/docs/manpages/winbindd.8
r860 r988 2 2 .\" Title: winbindd 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: System Administration tools 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "WINBINDD" "8" "0 9/18/2013" "Samba 3\&.6" "System Administration tools"10 .TH "WINBINDD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 winbindd [\-D ] [\-F] [\-S] [\-i] [\-d\ <debug\ level>] [\-s\ <smb\ config\ file>] [\-n]34 winbindd [\-D|\-\-daemon] [\-F|\-\-foreground] [\-S|\-\-stdout] [\-i|\-\-interactive] [\-d\ <debug\ level>] [\-s\ <smb\ config\ file>] [\-n|\-\-no\-caching] [\-\-no\-process\-group] 35 35 .SH "DESCRIPTION" 36 36 .PP … … 144 144 .SH "OPTIONS" 145 145 .PP 146 \-D 146 \-D|\-\-daemon 147 147 .RS 4 148 148 If specified, this parameter causes the server to operate as a daemon\&. That is, it detaches itself and runs in the background on the appropriate port\&. This switch is assumed if … … 151 151 .RE 152 152 .PP 153 \-F 153 \-F|\-\-foreground 154 154 .RS 4 155 155 If specified, this parameter causes the main … … 166 166 .RE 167 167 .PP 168 \-S 168 \-S|\-\-stdout 169 169 .RS 4 170 170 If specified, this parameter causes … … 173 173 .RE 174 174 .PP 175 \-d|\-\-debuglevel=level 176 .RS 4 177 \fIlevel\fR 178 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&. 179 .sp 180 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&. 181 .sp 182 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&. 183 .sp 184 Note that specifying this parameter here will override the 185 \m[blue]\fBlog level\fR\m[] 186 parameter in the 187 smb\&.conf 188 file\&. 189 .RE 190 .PP 191 \-V|\-\-version 192 .RS 4 193 Prints the program version number\&. 194 .RE 195 .PP 196 \-s|\-\-configfile <configuration file> 197 .RS 4 198 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See 199 smb\&.conf 200 for more information\&. The default configuration file name is determined at compile time\&. 201 .RE 202 .PP 203 \-l|\-\-log\-basename=logdirectory 204 .RS 4 205 Base directory name for log/debug files\&. The extension 206 \fB"\&.progname"\fR 207 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&. 208 .RE 209 .PP 210 \-h|\-\-help 211 .RS 4 212 Print a summary of command line options\&. 213 .RE 214 .PP 215 \-i 175 \-i|\-\-interactive 216 176 .RS 4 217 177 Tells … … 226 186 .RE 227 187 .PP 228 \-n 229 .RS 4 230 Disable caching\&. This means winbindd will always have to wait for a response from the domain controller before it can respond to a client and this thus makes things slower\&. The results will however be more accurate, since results from the cache might not be up\-to\-date\&. This might also temporarily hang winbindd if the DC doesn\*(Aqt respond\&. 188 \-n|\-\-no\-caching 189 .RS 4 190 Disable some caching\&. This means winbindd will often have to wait for a response from the domain controller before it can respond to a client and this thus makes things slower\&. The results will however be more accurate, since results from the cache might not be up\-to\-date\&. This might also temporarily hang winbindd if the DC doesn\*(Aqt respond\&. This does not disable the samlogon cache, which is required for group membership tracking in trusted environments\&. 191 .RE 192 .PP 193 \-\-no\-process\-group 194 .RS 4 195 Do not create a new process group for winbindd\&. 231 196 .RE 232 197 .SH "NAME AND ID RESOLUTION" … … 255 220 .IP \(bu 2.3 256 221 .\} 257 258 222 \m[blue]\fBwinbind separator\fR\m[] 259 223 .RE … … 267 231 .IP \(bu 2.3 268 232 .\} 269 270 233 \m[blue]\fBidmap config * : range\fR\m[] 271 234 .RE … … 279 242 .IP \(bu 2.3 280 243 .\} 281 282 244 \m[blue]\fBidmap config * : backend\fR\m[] 283 245 .RE … … 291 253 .IP \(bu 2.3 292 254 .\} 293 294 255 \m[blue]\fBwinbind cache time\fR\m[] 295 256 .RE … … 303 264 .IP \(bu 2.3 304 265 .\} 305 306 266 \m[blue]\fBwinbind enum users\fR\m[] 307 267 .RE … … 315 275 .IP \(bu 2.3 316 276 .\} 317 318 277 \m[blue]\fBwinbind enum groups\fR\m[] 319 278 .RE … … 327 286 .IP \(bu 2.3 328 287 .\} 329 330 288 \m[blue]\fBtemplate homedir\fR\m[] 331 289 .RE … … 339 297 .IP \(bu 2.3 340 298 .\} 341 342 299 \m[blue]\fBtemplate shell\fR\m[] 343 300 .RE … … 351 308 .IP \(bu 2.3 352 309 .\} 353 354 310 \m[blue]\fBwinbind use default domain\fR\m[] 355 311 .RE … … 363 319 .IP \(bu 2.3 364 320 .\} 365 366 321 \m[blue]\fBwinbind: rpc only\fR\m[] 367 322 Setting this parameter forces winbindd to use RPC instead of LDAP to retrieve information from Domain Controllers\&. … … 500 455 is configured\&. 501 456 .PP 502 If the theWindows NT SID to UNIX user and group id mapping file is damaged or destroyed then the mappings will be lost\&.457 If the Windows NT SID to UNIX user and group id mapping file is damaged or destroyed then the mappings will be lost\&. 503 458 .SH "SIGNALS" 504 459 .PP
Note:
See TracChangeset
for help on using the changeset viewer.