Changeset 988 for vendor/current/docs-xml/smbdotconf/security
- Timestamp:
- Nov 24, 2016, 1:14:11 PM (9 years ago)
- Location:
- vendor/current/docs-xml/smbdotconf/security
- Files:
-
- 15 added
- 3 deleted
- 74 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/docs-xml/smbdotconf/security/accessbasedshareenum.xml
r414 r988 1 1 <samba:parameter name="access based share enum" 2 2 type="boolean" 3 3 context="S" 4 basic="1" advanced="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para>If this parameter is <constant>yes</constant> for a 8 7 service, then the share hosted by the service will only be visible 9 8 to users who have read or write access to the share during share 10 enumeration (for example net view \\sambaserver). This has 9 enumeration (for example net view \\sambaserver). The share ACLs 10 which allow or deny the access to the share can be modified using 11 for example the <command moreinfo="none">sharesec</command> command 12 or using the appropriate Windows tools. This has 11 13 parallels to access based enumeration, the main difference being 12 14 that only share permissions are evaluated, and security -
vendor/current/docs-xml/smbdotconf/security/aclgroupcontrol.xml
r414 r988 1 1 <samba:parameter name="acl group control" 2 2 context="S" 3 3 type="boolean" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <description> … … 15 15 on a point in the filesystem to the group owner of a directory and anything below it also owned 16 16 by that group. This means there are multiple people with permissions to modify ACLs on a file 17 or directory, easing manag ability.17 or directory, easing manageability. 18 18 </para> 19 19 <para> … … 25 25 <para> 26 26 This parameter is best used with the <smbconfoption name="inherit owner"/> option and also 27 on ona share containing directories with the UNIX <emphasis>setgid bit</emphasis> set27 on a share containing directories with the UNIX <emphasis>setgid bit</emphasis> set 28 28 on them, which causes new files and directories created within it to inherit the group 29 29 ownership from the containing directory. … … 31 31 32 32 <para> 33 This is parameter has beenwas deprecated in Samba 3.0.23, but re-activated in33 This parameter was deprecated in Samba 3.0.23, but re-activated in 34 34 Samba 3.0.31 and above, as it now only controls permission changes if the user 35 35 is in the owning primary group. It is now no longer equivalent to the -
vendor/current/docs-xml/smbdotconf/security/adminusers.xml
r414 r988 1 1 <samba:parameter name="admin users" 2 2 context="S" 3 type="list"3 type="cmdlist" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <description> … … 12 12 irrespective of file permissions.</para> 13 13 14 <para>This parameter will not work with the <smbconfoption name="security">share</smbconfoption> in15 Samba 3.0. This is by design.</para>16 17 14 </description> 18 15 -
vendor/current/docs-xml/smbdotconf/security/algorithmicridbase.xml
r414 r988 1 1 <samba:parameter name="algorithmic rid base" 2 2 context="G" 3 advanced="1" developer="1" 4 type="integer" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="integer" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para>This determines how Samba will use its … … 12 11 <para>Setting this option to a larger value could be useful to sites 13 12 transitioning from WinNT and Win2k, as existing user and 14 group rids would otherwise clash with sy tem users etc.13 group rids would otherwise clash with system users etc. 15 14 </para> 16 15 -
vendor/current/docs-xml/smbdotconf/security/allowdcerpcauthlevelconnect.xml
r919 r988 8 8 but no per message integrity nor privacy protection.</para> 9 9 10 <para>The behavior can be controlled per interface name (e.g. lsarpc, netlogon, samr, srvsvc, 11 winreg, wkssvc ...) by using 'allow dcerpc auth level connect:interface = no' as option.</para> 10 <para>Some interfaces like samr, lsarpc and netlogon have a hard-coded default of 11 <constant>no</constant> and epmapper, mgmt and rpcecho have a hard-coded default of 12 <constant>yes</constant>. 13 </para> 12 14 13 <para>This option yields precedence to the implentation specific restrictions. 15 <para>The behavior can be overwritten per interface name (e.g. lsarpc, netlogon, samr, srvsvc, 16 winreg, wkssvc ...) by using 'allow dcerpc auth level connect:interface = yes' as option.</para> 17 18 <para>This option yields precedence to the implementation specific restrictions. 14 19 E.g. the drsuapi and backupkey protocols require DCERPC_AUTH_LEVEL_PRIVACY. 15 While others like samr and lsarpc have a hardcoded default of <constant>no</constant>.20 The dnsserver protocol requires DCERPC_AUTH_LEVEL_INTEGRITY. 16 21 </para> 17 22 </description> -
vendor/current/docs-xml/smbdotconf/security/allowtrusteddomains.xml
r414 r988 1 1 <samba:parameter name="allow trusted domains" 2 2 context="G" 3 type="boolean" 4 advanced="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="boolean" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para> -
vendor/current/docs-xml/smbdotconf/security/authmethods.xml
r414 r988 1 1 <samba:parameter name="auth methods" 2 2 context="G" 3 type="list" 4 basic="1" advanced="1" wizard="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="cmdlist" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 -
vendor/current/docs-xml/smbdotconf/security/checkpasswordscript.xml
r414 r988 1 1 <samba:parameter name="check password script" 2 2 context="G" 3 type="string" 4 advanced="1" developer="1" 3 type="string" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> … … 18 17 </description> 19 18 20 <value type="default"> Disabled</value>19 <value type="default"><comment>Disabled</comment></value> 21 20 <value type="example">/usr/local/sbin/crackcheck</value> 22 21 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/clientipcsigning.xml
r919 r988 2 2 context="G" 3 3 type="enum" 4 function="_client_ipc_signing" 4 5 enumlist="enum_smb_signing_vals" 5 6 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 7 <description> 7 8 <para>This controls whether the client is allowed or required to use SMB signing for IPC$ 8 connections as DCERPC transport inside of winbind. Possible values9 connections as DCERPC transport. Possible values 9 10 are <emphasis>auto</emphasis>, <emphasis>mandatory</emphasis> 10 11 and <emphasis>disabled</emphasis>. 11 12 </para> 13 14 <para>When set to mandatory or default, SMB signing is required.</para> 12 15 13 16 <para>When set to auto, SMB signing is offered, but not enforced and if set … … 20 23 <related>client signing</related> 21 24 22 <value type="default"> mandatory</value>25 <value type="default">default</value> 23 26 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/clientlanmanauth.xml
r414 r988 1 1 <samba:parameter name="client lanman auth" 2 2 context="G" 3 type="boolean" 4 advanced="1" developer="1" 3 type="boolean" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> -
vendor/current/docs-xml/smbdotconf/security/clientntlmv2auth.xml
r919 r988 1 <samba:parameter name="client ntlmv2 auth"1 <samba:parameter name="client NTLMv2 auth" 2 2 context="G" 3 type="boolean" 4 advanced="1" developer="1" 3 type="boolean" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> -
vendor/current/docs-xml/smbdotconf/security/clientplaintextauth.xml
r414 r988 1 1 <samba:parameter name="client plaintext auth" 2 2 context="G" 3 type="boolean" 4 basic="1" advanced="1" wizard="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="boolean" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para>Specifies whether a client should send a plaintext -
vendor/current/docs-xml/smbdotconf/security/clientschannel.xml
r414 r988 1 1 <samba:parameter name="client schannel" 2 2 context="G" 3 basic="1"4 type="boolean-auto"5 3 type="enum" 4 enumlist="enum_bool_auto" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 7 … … 13 13 if the server is not able to speak netlogon schannel. 14 14 </para> 15 16 <para>Note that for active directory domains this is hardcoded to 17 <smbconfoption name="client schannel">yes</smbconfoption>.</para> 18 19 <para>This option yields precedence to the <smbconfoption name="require strong key"/> option.</para> 15 20 </description> 16 21 <value type="default">auto</value> -
vendor/current/docs-xml/smbdotconf/security/clientsigning.xml
r919 r988 1 1 <samba:parameter name="client signing" 2 2 context="G" 3 type="boolean-auto"4 basic="1"5 3 type="enum" 4 enumlist="enum_smb_signing_vals" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 7 <para>This controls whether the client is allowed or required to use SMB signing. Possible values … … 10 10 </para> 11 11 12 <para>When set to auto, SMB signing is offered, but not enforced. 13 When set to mandatory, SMB signing is required and if set 14 to disabled, SMB signing is not offered either. 12 <para>When set to auto or default, SMB signing is offered, but not enforced.</para> 13 14 <para>When set to mandatory, SMB signing is required and if set 15 to disabled, SMB signing is not offered either.</para> 15 16 16 17 <para>IPC$ connections for DCERPC e.g. in winbindd, are handled by the 17 18 <smbconfoption name="client ipc signing"/> option.</para> 18 </para>19 19 </description> 20 20 21 <value type="default">auto</value> 21 <related>client ipc signing</related> 22 23 <value type="default">default</value> 22 24 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/clientusepsnegoprincipal.xml
r860 r988 1 1 <samba:parameter name="client use spnego principal" 2 2 context="G" 3 4 advanced="1" developer="1"3 type="boolean" 4 deprecated="1" 5 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> … … 15 15 ordinarily cannot function in this situation. </para> 16 16 17 <para>This is a VERY BAD IDEA for security reasons, and so this 18 parameter SHOULD NOT BE USED. It will be removed in a future 19 version of Samba.</para> 20 17 21 <para>If disabled, Samba will use the name used to look up the 18 22 server when asking the KDC for a ticket. This avoids situations … … 24 28 this behaviour, and Windows Vista and later servers no longer 25 29 supply this 'rfc4178 hint' principal on the server side.</para> 30 31 <para>This parameter is deprecated in Samba 4.2.1 and will be removed 32 (along with the functionality) in a later release of Samba.</para> 26 33 </description> 27 34 <value type="default">no</value> -
vendor/current/docs-xml/smbdotconf/security/createmask.xml
r414 r988 1 1 <samba:parameter name="create mask" 2 2 context="S" 3 type="string"3 type="octal" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 … … 27 27 for details. 28 28 </para> 29 30 <para>31 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors. If the32 administrator wishes to enforce a mask on access control lists also, they need to set the <smbconfoption33 name="security mask"/>.34 </para>35 29 </description> 36 30 -
vendor/current/docs-xml/smbdotconf/security/dedicatedkeytabfile.xml
r414 r988 1 <samba:parameter name="dedicated keytab file" context="G" type="string" 2 advanced="1" developer="1" 1 <samba:parameter name="dedicated keytab file" 2 context="G" 3 type="string" 4 constant="1" 3 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 4 6 <description> -
vendor/current/docs-xml/smbdotconf/security/directorymask.xml
r414 r988 1 1 <samba:parameter name="directory mask" 2 3 type="string"2 context="S" 3 type="octal" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <synonym>directory mode</synonym> … … 24 24 created from this parameter with the value of the <smbconfoption name="force directory mode"/> parameter. 25 25 This parameter is set to 000 by default (i.e. no extra mode bits are added).</para> 26 27 <para>Note that this parameter does not apply to permissions28 set by Windows NT/2000 ACL editors. If the administrator wishes to enforce29 a mask on access control lists also, they need to set the <smbconfoption name="directory security mask"/>.</para>30 26 </description> 31 27 32 28 <related>force directory mode</related> 33 29 <related>create mask</related> 34 <related>directory security mask</related>35 30 <related>inherit permissions</related> 36 31 <value type="default">0755</value> -
vendor/current/docs-xml/smbdotconf/security/directorysecuritymask.xml
r414 r988 1 1 <samba:parameter name="directory security mask" 2 2 context="S" 3 type="string" 3 removed="1" 4 type="string" 4 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 6 <description> 6 <para>This parameter controls what UNIX permission bits7 will be set when a Windows NT client is manipulating the UNIX8 permission on a directory using the native NT security dialog9 box.</para>10 11 7 <para> 12 This parameter is applied as a mask (AND'ed with) to the incoming permission bits, thus resetting 13 any bits not in this mask. Make sure not to mix up this parameter with <smbconfoption name="force 14 directory security mode"/>, which works similar like this one but uses logical OR instead of AND. 15 Essentially, zero bits in this mask are a set of bits that will always be set to zero. 16 </para> 17 18 <para> 19 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the 20 file permissions regardless of the previous status of this bits on the file. 8 This parameter has been removed for Samba 4.0.0. 21 9 </para> 22 23 <para>If not set explicitly this parameter is set to 077724 meaning a user is allowed to set all the user/group/world25 permissions on a directory.</para>26 27 <para><emphasis>Note</emphasis> that users who can access the28 Samba server through other means can easily bypass this restriction,29 so it is primarily useful for standalone "appliance" systems.30 Administrators of most normal systems will probably want to leave31 it as the default of <constant>0777</constant>.</para>32 10 </description> 33 11 34 <related>force directory security mode</related>35 <related>security mask</related>36 <related>force security mode</related>37 <value type="default">0777</value>38 <value type="example">0700</value>39 12 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/encryptpasswords.xml
r414 r988 1 1 <samba:parameter name="encrypt passwords" 2 2 context="G" 3 type="boolean" 4 basic="1" advanced="1" wizard="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="boolean" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para>This boolean controls whether encrypted passwords … … 33 32 <manvolnum>5</manvolnum></citerefentry> file (see the <citerefentry><refentrytitle>smbpasswd</refentrytitle> 34 33 <manvolnum>8</manvolnum></citerefentry> program for information on how to set up 35 and maintain this file), or set the <smbconfoption name="security">[ server|domain|ads]</smbconfoption> parameter which34 and maintain this file), or set the <smbconfoption name="security">[domain|ads]</smbconfoption> parameter which 36 35 causes <command moreinfo="none">smbd</command> to authenticate against another 37 36 server.</para> -
vendor/current/docs-xml/smbdotconf/security/forcecreatemode.xml
r414 r988 1 1 <samba:parameter name="force create mode" 2 2 context="S" 3 type="octal" 3 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 4 5 <description> … … 20 21 <related>inherit permissions</related> 21 22 22 <value type="default">000 </value>23 <value type="default">0000</value> 23 24 <value type="example">0755</value> 24 25 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/forcedirectorymode.xml
r414 r988 1 1 <samba:parameter name="force directory mode" 2 2 context="S" 3 type="string"3 type="octal" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <description> … … 18 18 </description> 19 19 20 <value type="default">000 </value>20 <value type="default">0000</value> 21 21 <value type="example">0755</value> 22 22 -
vendor/current/docs-xml/smbdotconf/security/forcedirectorysecuritymode.xml
r414 r988 1 1 <samba:parameter name="force directory security mode" 2 2 context="S" 3 type="string" 3 type="string" 4 removed="1" 4 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 6 <description> 6 7 <para> 7 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating 8 the UNIX permission on a directory using the native NT security dialog box. 9 </para> 10 11 <para> 12 This parameter is applied as a mask (OR'ed with) to the changed permission bits, thus forcing any bits in this 13 mask that the user may have modified to be on. Make sure not to mix up this parameter with <smbconfoption 14 name="directory security mask"/>, which works in a similar manner to this one, but uses a logical AND instead 15 of an OR. 16 </para> 17 18 <para> 19 Essentially, this mask may be treated as a set of bits that, when modifying security on a directory, 20 to will enable (1) any flags that are off (0) but which the mask has set to on (1). 21 </para> 22 23 <para> 24 If not set explicitly this parameter is 0000, which allows a user to modify all the user/group/world 25 permissions on a directory without restrictions. 26 </para> 27 28 <note><para> 29 Users who can access the Samba server through other means can easily bypass this restriction, so it is 30 primarily useful for standalone "appliance" systems. Administrators of most normal systems will 31 probably want to leave it set as 0000. 32 </para></note> 33 8 This parameter has been removed for Samba 4.0.0. 9 </para> 34 10 </description> 35 36 <value type="default">0</value>37 <value type="example">700</value>38 39 <related>directory security mask</related>40 <related>security mask</related>41 <related>force security mode</related>42 43 11 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/forcegroup.xml
r414 r988 1 1 <samba:parameter name="force group" 2 2 context="S" 3 3 type="string" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <synonym>group</synonym> -
vendor/current/docs-xml/smbdotconf/security/forcesecuritymode.xml
r414 r988 1 1 <samba:parameter name="force security mode" 2 2 context="S" 3 type="string" 3 type="string" 4 removed="1" 4 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 6 <description> 6 7 <para> 7 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating 8 the UNIX permission on a file using the native NT security dialog box. 9 </para> 10 11 <para> 12 This parameter is applied as a mask (OR'ed with) to the changed permission bits, thus forcing any bits in this 13 mask that the user may have modified to be on. Make sure not to mix up this parameter with <smbconfoption 14 name="security mask"/>, which works similar like this one but uses logical AND instead of OR. 15 </para> 16 17 <para> 18 Essentially, one bits in this mask may be treated as a set of bits that, when modifying security on a file, 19 the user has always set to be on. 20 </para> 21 22 <para> 23 If not set explicitly this parameter is set to 0, and allows a user to modify all the user/group/world 24 permissions on a file, with no restrictions. 25 </para> 26 27 <para><emphasis> 28 Note</emphasis> that users who can access the Samba server through other means can easily bypass this 29 restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most 30 normal systems will probably want to leave this set to 0000. 31 </para> 32 8 This parameter has been removed for Samba 4.0.0. 9 </para> 33 10 </description> 34 35 <value type="default">0</value>36 <value type="example">700</value>37 38 <related>force directory security mode</related>39 <related>directory security mask</related>40 <related>security mask</related>41 11 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/forceunknownacluser.xml
r414 r988 1 1 <samba:parameter name="force unknown acl user" 2 2 context="S" 3 3 type="boolean" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 -
vendor/current/docs-xml/smbdotconf/security/forceuser.xml
r414 r988 1 1 <samba:parameter name="force user" 2 2 type="string" 3 3 context="S" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> -
vendor/current/docs-xml/smbdotconf/security/guestaccount.xml
r414 r988 1 1 <samba:parameter name="guest account" 2 2 context="G" 3 4 basic="1" advanced="1" developer="1"5 3 type="string" 4 constant="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 7 <para>This is a username which will be used for access -
vendor/current/docs-xml/smbdotconf/security/guestok.xml
r740 r988 1 1 <samba:parameter name="guest ok" 2 2 type="boolean" 3 3 context="S" 4 basic="1" advanced="1" print="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <synonym>public</synonym> 7 6 <description> -
vendor/current/docs-xml/smbdotconf/security/guestonly.xml
r414 r988 1 1 <samba:parameter name="guest only" 2 2 context="S" 3 3 type="boolean" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <synonym>only guest</synonym> -
vendor/current/docs-xml/smbdotconf/security/hostsallow.xml
r414 r988 1 1 <samba:parameter name="hosts allow" 2 2 context="S" 3 type="list" 4 basic="1" advanced="1" print="1" developer="1" 3 type="cmdlist" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <synonym>allow hosts</synonym> -
vendor/current/docs-xml/smbdotconf/security/hostsdeny.xml
r414 r988 1 1 <samba:parameter name="hosts deny" 2 2 context="S" 3 type="list" 4 basic="1" advanced="1" print="1" developer="1" 3 type="cmdlist" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <synonym>deny hosts</synonym> -
vendor/current/docs-xml/smbdotconf/security/inheritacls.xml
r414 r988 1 1 <samba:parameter name="inherit acls" 2 2 context="S" 3 3 type="boolean" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <description> -
vendor/current/docs-xml/smbdotconf/security/inheritowner.xml
r414 r988 1 1 <samba:parameter name="inherit owner" 2 2 context="S" 3 3 type="boolean" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <description> … … 11 11 12 12 <para>Common scenarios where this behavior is useful is in 13 implementing drop-boxes where users can create and edit files but not14 delete them and to ensure that newly createfiles in a user's15 roaming profile directory are actually owne rby the user.</para>13 implementing drop-boxes, where users can create and edit files but 14 not delete them and ensuring that newly created files in a user's 15 roaming profile directory are actually owned by the user.</para> 16 16 </description> 17 17 -
vendor/current/docs-xml/smbdotconf/security/inheritpermissions.xml
r414 r988 1 1 <samba:parameter name="inherit permissions" 2 2 context="S" 3 3 type="boolean" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <description> -
vendor/current/docs-xml/smbdotconf/security/invalidusers.xml
r414 r988 1 1 <samba:parameter name="invalid users" 2 2 context="S" 3 type="list"3 type="cmdlist" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <description> -
vendor/current/docs-xml/smbdotconf/security/kerberosmethod.xml
r414 r988 1 <samba:parameter name="kerberos method" context="G" type="enum" 2 advanced="1" developer="1" 1 <samba:parameter name="kerberos method" 2 context="G" 3 type="enum" 4 enumlist="enum_kerberos_method" 3 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 4 6 <description> … … 36 38 </description> 37 39 <related>dedicated keytab file</related> 38 <value type="default"> secrets only</value>40 <value type="default">default</value> 39 41 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/lanmanauth.xml
r414 r988 1 1 <samba:parameter name="lanman auth" 2 2 context="G" 3 type="boolean" 4 advanced="1" developer="1" 3 type="boolean" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> … … 22 21 blanked after the next password change. As a result of that 23 22 lanman clients won't be able to authenticate, even if lanman 24 auth is re enabled later on.23 auth is re-enabled later on. 25 24 </para> 26 25 -
vendor/current/docs-xml/smbdotconf/security/maptoguest.xml
r414 r988 1 1 <samba:parameter name="map to guest" 2 2 type="enum" 3 3 context="G" 4 advanced="1" developer="1"5 4 enumlist="enum_map_to_guest" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 <para>This parameter is only useful in <smbconfoption name="SECURITY">8 security</smbconfoption> modes other than <parameter moreinfo="none">security = share</parameter>9 and <parameter moreinfo="none">security = server</parameter>10 - i.e. <constant>user</constant>, and <constant>domain</constant>.</para>11 12 7 <para>This parameter can take four different values, which tell 13 8 <citerefentry><refentrytitle>smbd</refentrytitle> … … 56 51 57 52 <para>Note that this parameter is needed to set up "Guest" 58 share services when using <parameter moreinfo="none">security</parameter> modes other than 59 share and server. This is because in these modes the name of the resource being 53 share services. This is because in these modes the name of the resource being 60 54 requested is <emphasis>not</emphasis> sent to the server until after 61 55 the server has successfully authenticated the client so the server 62 56 cannot make authentication decisions at the correct time (connection 63 to the share) for "Guest" shares. This parameter is not useful with 64 <parameter moreinfo="none">security = server</parameter> as in this security mode 65 no information is returned about whether a user logon failed due to 66 a bad username or bad password, the same error is returned from a modern server 67 in both cases.</para> 68 69 <para>For people familiar with the older Samba releases, this 70 parameter maps to the old compile-time setting of the <constant> 71 GUEST_SESSSETUP</constant> value in local.h.</para> 57 to the share) for "Guest" shares. </para> 72 58 </description> 73 59 -
vendor/current/docs-xml/smbdotconf/security/mapuntrustedtodomain.xml
r414 r988 1 1 <samba:parameter name="map untrusted to domain" 2 2 context="G" 3 type="boolean" 4 advanced="1" 5 developer="1" 6 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="boolean" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 7 5 <description> 8 6 <para> -
vendor/current/docs-xml/smbdotconf/security/ntlmauth.xml
r414 r988 1 1 <samba:parameter name="ntlm auth" 2 2 context="G" 3 type="boolean" 4 advanced="1" developer="1" 3 type="boolean" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> -
vendor/current/docs-xml/smbdotconf/security/nullpasswords.xml
r414 r988 1 1 <samba:parameter name="null passwords" 2 2 context="G" 3 advanced="1" developer="1"4 type="boolean"5 3 type="boolean" 4 deprecated="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 7 <para>Allow or disallow client access to accounts that have null passwords. </para> -
vendor/current/docs-xml/smbdotconf/security/obeypamrestrictions.xml
r414 r988 1 1 <samba:parameter name="obey pam restrictions" 2 2 context="G" 3 type="boolean" 4 advanced="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="boolean" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para>When Samba 3.0 is configured to enable PAM support -
vendor/current/docs-xml/smbdotconf/security/onlyuser.xml
r414 r988 1 1 <samba:parameter name="only user" 2 2 type="boolean" 3 3 context="S" 4 deprecated="1" 4 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 6 <description> 6 <para>This is a boolean option that controls whether 7 connections with usernames not in the <parameter moreinfo="none">user</parameter> 8 list will be allowed. By default this option is disabled so that a 9 client can supply a username to be used by the server. Enabling 10 this parameter will force the server to only use the login 11 names from the <parameter moreinfo="none">user</parameter> list and is only really 12 useful in <smbconfoption name="security">share</smbconfoption> level security.</para> 7 <para>To restrict a service to a particular set of users you 8 can use the <smbconfoption name="valid users"/> parameter.</para> 13 9 14 <para>Note that this also means Samba won't try to deduce 15 usernames from the service name. This can be annoying for 16 the [homes] section. To get around this you could use <command moreinfo="none">user = 17 %S</command> which means your <parameter moreinfo="none">user</parameter> list 18 will be just the service name, which for home directories is the 19 name of the user.</para> 10 <para>This parameter is deprecated</para> 11 12 <para>However, it currently operates only in conjunction with 13 <smbconfoption name="username"/>. The supported way to restrict 14 a service to a particular set of users is the 15 <smbconfoption name="valid users"/> parameter.</para> 16 20 17 </description> 21 18 -
vendor/current/docs-xml/smbdotconf/security/pampasswordchange.xml
r414 r988 1 1 <samba:parameter name="pam password change" 2 2 context="G" 3 type="boolean" 4 advanced="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="boolean" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para>With the addition of better PAM support in Samba 2.2, -
vendor/current/docs-xml/smbdotconf/security/passdbbackend.xml
r414 r988 1 1 <samba:parameter name="passdb backend" 2 2 context="G" 3 type="list"4 advanced="1" developer="1"5 3 type="string" 4 constant="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 7 -
vendor/current/docs-xml/smbdotconf/security/passdbexpandexplicit.xml
r414 r988 1 1 <samba:parameter name="passdb expand explicit" 2 2 context="G" 3 advanced="1" developer="0" 4 type="boolean" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="boolean" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para> -
vendor/current/docs-xml/smbdotconf/security/passwdchat.xml
r414 r988 2 2 context="G" 3 3 type="string" 4 advanced="1" developer="1"5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> … … 56 55 <related>pam password change</related> 57 56 58 <value type="default">*new*password* %n\n *new*password* %n\n *changed*</value>57 <value type="default">*new*password* %n\n *new*password* %n\n *changed*</value> 59 58 <value type="example">"*Enter NEW password*" %n\n "*Reenter NEW password*" %n\n "*Password changed*"</value> 60 59 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/passwdchatdebug.xml
r414 r988 1 1 <samba:parameter name="passwd chat debug" 2 2 context="G" 3 advanced="1" developer="1" 4 type="boolean" 3 type="boolean" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> -
vendor/current/docs-xml/smbdotconf/security/passwdchattimeout.xml
r414 r988 1 1 <samba:parameter name="passwd chat timeout" 2 2 context="G" 3 type="integer" 4 advanced="1" developer="1" 3 type="integer" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> -
vendor/current/docs-xml/smbdotconf/security/passwdprogram.xml
r414 r988 1 1 <samba:parameter name="passwd program" 2 2 context="G" 3 type="string" 4 advanced="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="string" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para>The name of a program that can be used to set -
vendor/current/docs-xml/smbdotconf/security/passwordserver.xml
r740 r988 1 1 <samba:parameter name="password server" 2 2 context="G" 3 type="list"4 advanced="1" wizard="1" developer="1"5 3 type="string" 4 constant="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 <para>By specifying the name of another SMB server 8 or Active Directory domain controller with this option, 9 and using <command moreinfo="none">security = [ads|domain|server]</command> 7 <para>By specifying the name of a domain controller with this option, 8 and using <command moreinfo="none">security = [ads|domain]</command> 10 9 it is possible to get Samba 11 10 to do all its username/password validation using a specific remote server.</para> 12 11 13 <para>I f the <parameter moreinfo="none">security</parameter> parameter is set to14 < constant>domain</constant> or <constant>ads</constant>, then this option15 <emphasis>should not</emphasis> be used, as the default '*' indicates to Samba16 to determine the best DC to contact dynamically, just as all other hosts in an17 AD domain do. This allows the domain to be maintainedwithout modification to18 the smb.conf file. The cryptograp ic protection on the authenticated RPC calls12 <para>Ideally, this option 13 <emphasis>should not</emphasis> be used, as the default '*' indicates to Samba 14 to determine the best DC to contact dynamically, just as all other hosts in an 15 AD domain do. This allows the domain to be maintained (addition 16 and removal of domain controllers) without modification to 17 the smb.conf file. The cryptographic protection on the authenticated RPC calls 19 18 used to verify passwords ensures that this default is safe.</para> 20 19 … … 36 35 this list by locating the closest DC.</para> 37 36 38 <para>If parameter is a name, it is looked up using the 37 <para>If parameter is a name, it is looked up using the 39 38 parameter <smbconfoption name="name resolve order"/> and so may resolved 40 39 by any method and order described in that parameter.</para> 41 40 42 <para>If the <parameter moreinfo="none">security</parameter> parameter is43 set to <constant>server</constant>, these additional restrictions apply:</para>44 45 <itemizedlist>46 <listitem>47 <para>You may list several password servers in48 the <parameter moreinfo="none">password server</parameter> parameter, however if an49 <command moreinfo="none">smbd</command> makes a connection to a password server,50 and then the password server fails, no more users will be able51 to be authenticated from this <command moreinfo="none">smbd</command>. This is a52 restriction of the SMB/CIFS protocol when in <command moreinfo="none">security = server53 </command> mode and cannot be fixed in Samba.</para>54 </listitem>55 56 <listitem>57 <para>You will have to ensure that your users58 are able to login from the Samba server, as when in <command moreinfo="none">59 security = server</command> mode the network logon will appear to60 come from the Samba server rather than from the users workstation.</para>61 </listitem>62 63 <listitem>64 <para>The client must not select NTLMv2 authentication.</para>65 </listitem>66 67 <listitem>68 <para>The password server must be a machine capable of using69 the "LM1.2X002" or the "NT LM 0.12" protocol, and it must be in70 user level security mode.</para>71 </listitem>72 73 <listitem>74 <para>Using a password server means your UNIX box (running75 Samba) is only as secure as (a host masqurading as) your password server. <emphasis>DO NOT76 CHOOSE A PASSWORD SERVER THAT YOU DON'T COMPLETELY TRUST</emphasis>.77 </para>78 </listitem>79 80 <listitem>81 <para>Never point a Samba server at itself for password serving.82 This will cause a loop and could lock up your Samba server!</para>83 </listitem>84 85 <listitem>86 <para>The name of the password server takes the standard87 substitutions, but probably the only useful one is <parameter moreinfo="none">%m88 </parameter>, which means the Samba server will use the incoming89 client as the password server. If you use this then you better90 trust your clients, and you had better restrict them with hosts allow!</para>91 </listitem>92 93 </itemizedlist>94 41 </description> 95 42 -
vendor/current/docs-xml/smbdotconf/security/preloadmodules.xml
r414 r988 1 1 <samba:parameter name="preload modules" 2 type="list" 3 context="G" 4 basic="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 2 type="cmdlist" 3 context="G" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para>This is a list of paths to modules that should -
vendor/current/docs-xml/smbdotconf/security/privatedir.xml
r414 r988 1 1 <samba:parameter name="private dir" 2 2 context="G" 3 type="string" 4 advanced="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="string" 4 constant="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 <synonym>private directory</synonym> 6 7 <description> 7 8 <para>This parameters defines the directory … … 11 12 </description> 12 13 13 <value type="default"> ${prefix}/private</value>14 <value type="default">&pathconfig.PRIVATE_DIR;</value> 14 15 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/readlist.xml
r414 r988 1 1 <samba:parameter name="read list" 2 2 context="S" 3 type="list"3 type="cmdlist" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <description> … … 10 10 parameter. 11 11 </para> 12 13 <para>This parameter will not work with the <smbconfoption name="security">share</smbconfoption> in14 Samba 3.0. This is by design.</para>15 12 </description> 16 17 13 <related>write list</related> 18 14 <related>invalid users</related> -
vendor/current/docs-xml/smbdotconf/security/readonly.xml
r414 r988 1 1 <samba:parameter name="read only" 2 2 context="S" 3 type="boolean" 4 basic="1" advanced="1" 3 type="boolean" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> -
vendor/current/docs-xml/smbdotconf/security/renameuserscript.xml
r414 r988 1 1 <samba:parameter name="rename user script" 2 2 context="G" 3 advanced="1" developer="1" 4 type="boolean" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 3 type="string" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> 7 6 <para> … … 30 29 </description> 31 30 32 <value type="default"> no</value>31 <value type="default"></value> 33 32 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/restrictanonymous.xml
r414 r988 1 1 <samba:parameter name="restrict anonymous" 2 2 type="integer" 3 3 context="G" 4 advanced="1" developer="1"5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> … … 14 13 registry key in Windows 2000 and Windows NT. When set to 0, user 15 14 and group list information is returned to anyone who asks. When set 16 to 1, only an authenticated user can retri ve user and15 to 1, only an authenticated user can retrieve user and 17 16 group list information. For the value 2, supported by 18 17 Windows 2000/XP and Samba, no anonymous connections are allowed at -
vendor/current/docs-xml/smbdotconf/security/rootdirectory.xml
r414 r988 1 1 <samba:parameter name="root directory" 2 context="G" 3 type="string" 4 advanced="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 2 context="G" 3 type="string" 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <synonym>root</synonym> 7 6 <synonym>root dir</synonym> … … 31 30 </description> 32 31 33 <value type="default"> /</value>32 <value type="default"></value> 34 33 <value type="example">/homes/smb</value> 35 34 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/security.xml
r740 r988 1 1 <samba:parameter name="security" 2 2 context="G" 3 type="enum" 4 basic="1" advanced="1" wizard="1" developer="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 <when_value value="security"> 7 <requires option="encrypted passwords">/(yes|true)/</requires> 8 </when_value> 3 type="enum" 4 function="_security" 5 enumlist="enum_security" 6 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 7 <when_value value="security"> 8 <requires option="encrypted passwords">/(yes|true)/</requires> 9 </when_value> 9 10 <description> 10 11 <para>This option affects how clients respond to … … 12 13 smb.conf</filename> file.</para> 13 14 14 <para>The option sets the "security mode bit" in replies to15 protocol negotiations with <citerefentry><refentrytitle>smbd</refentrytitle>16 <manvolnum>8</manvolnum></citerefentry> to turn share level security on or off. Clients decide17 based on this bit whether (and how) to transfer user and password18 information to the server.</para>19 20 21 15 <para>The default is <command moreinfo="none">security = user</command>, as this is 22 the most common setting needed when talking to Windows 98 and 23 Windows NT.</para> 16 the most common setting, used for a standalone file server or a DC.</para> 24 17 25 18 <para>The alternatives are 26 19 <command moreinfo="none">security = ads</command> or <command moreinfo="none">security = domain 27 </command>, which support joining Samba to a Windows domain , along with <command moreinfo="none">security = share</command> and <command moreinfo="none">security = server</command>, both of which are deprecated.</para>20 </command>, which support joining Samba to a Windows domain</para> 28 21 29 <para>In versions of Samba prior to 2.0.0, the default was 30 <command moreinfo="none">security = share</command> mainly because that was 31 the only option at one stage.</para> 32 33 <para>You should use <command moreinfo="none">security = user</command> and 34 <smbconfoption name="map to guest"/> if you 22 <para>You should use <command moreinfo="none">security = user</command> and 23 <smbconfoption name="map to guest"/> if you 35 24 want to mainly setup shares without a password (guest shares). This 36 25 is commonly used for a shared printer server. </para> 37 26 38 <para>It is possible to use <command moreinfo="none">smbd</command> in a <emphasis>39 hybrid mode</emphasis> where it is offers both user and share40 level security under different <smbconfoption name="NetBIOS aliases"/>. </para>41 42 27 <para>The different settings will now be explained.</para> 43 28 44 29 30 <para><anchor id="SECURITYEQUALSAUTO"/><emphasis>SECURITY = AUTO</emphasis></para> 31 32 <para>This is the default security setting in Samba, and causes Samba to consult 33 the <smbconfoption name="server role"/> parameter (if set) to determine the security mode.</para> 34 45 35 <para><anchor id="SECURITYEQUALSUSER"/><emphasis>SECURITY = USER</emphasis></para> 46 36 47 <para> This is the default security setting in Samba.48 With user-level security a client must first "log-on" with a 49 valid username and password (which can be mapped using the <smbconfoption name="username map"/> 37 <para>If <smbconfoption name="server role"/> is not specified, this is the default security setting in Samba. 38 With user-level security a client must first "log-on" with a 39 valid username and password (which can be mapped using the <smbconfoption name="username map"/> 50 40 parameter). Encrypted passwords (see the <smbconfoption name="encrypted passwords"/> parameter) can also 51 41 be used in this security mode. Parameters such as <smbconfoption name="user"/> and <smbconfoption 52 name="guest only"/> if set are then applied and 53 may change the UNIX user to use on this connection, but only after 42 name="guest only"/> if set are then applied and 43 may change the UNIX user to use on this connection, but only after 54 44 the user has been successfully authenticated.</para> 55 56 <para><emphasis>Note</emphasis> that the name of the resource being57 requested is <emphasis>not</emphasis> sent to the server until after58 the server has successfully authenticated the client. This is why59 guest shares don't work in user level security without allowing60 the server to automatically map unknown users into the <smbconfoption name="guest account"/>.61 See the <smbconfoption name="map to guest"/> parameter for details on doing this.</para>62 63 <para>See also the section <link linkend="VALIDATIONSECT">NOTE ABOUT USERNAME/PASSWORD VALIDATION</link>.</para>64 65 <para><anchor id="SECURITYEQUALSDOMAIN"/><emphasis>SECURITY = DOMAIN</emphasis></para>66 67 <para>This mode will only work correctly if <citerefentry><refentrytitle>net</refentrytitle>68 <manvolnum>8</manvolnum></citerefentry> has been used to add this69 machine into a Windows NT Domain. It expects the <smbconfoption name="encrypted passwords"/>70 parameter to be set to <constant>yes</constant>. In this71 mode Samba will try to validate the username/password by passing72 it to a Windows NT Primary or Backup Domain Controller, in exactly73 the same way that a Windows NT Server would do.</para>74 75 <para><emphasis>Note</emphasis> that a valid UNIX user must still76 exist as well as the account on the Domain Controller to allow77 Samba to have a valid UNIX account to map file access to.</para>78 79 <para><emphasis>Note</emphasis> that from the client's point80 of view <command moreinfo="none">security = domain</command> is the same81 as <command moreinfo="none">security = user</command>. It only82 affects how the server deals with the authentication,83 it does not in any way affect what the client sees.</para>84 85 <para><emphasis>Note</emphasis> that the name of the resource being86 requested is <emphasis>not</emphasis> sent to the server until after87 the server has successfully authenticated the client. This is why88 guest shares don't work in user level security without allowing89 the server to automatically map unknown users into the <smbconfoption name="guest account"/>.90 See the <smbconfoption name="map to guest"/> parameter for details on doing this.</para>91 92 <para>See also the section <link linkend="VALIDATIONSECT">93 NOTE ABOUT USERNAME/PASSWORD VALIDATION</link>.</para>94 95 <para>See also the <smbconfoption name="password server"/> parameter and96 the <smbconfoption name="encrypted passwords"/> parameter.</para>97 98 <para><anchor id="SECURITYEQUALSSHARE"/><emphasis>SECURITY = SHARE</emphasis></para>99 100 <note><para>This option is deprecated as it is incompatible with SMB2</para></note>101 102 <para>When clients connect to a share level security server, they103 need not log onto the server with a valid username and password before104 attempting to connect to a shared resource (although modern clients105 such as Windows 95/98 and Windows NT will send a logon request with106 a username but no password when talking to a <command moreinfo="none">security = share107 </command> server). Instead, the clients send authentication information108 (passwords) on a per-share basis, at the time they attempt to connect109 to that share.</para>110 111 <para>Note that <command moreinfo="none">smbd</command> <emphasis>ALWAYS</emphasis>112 uses a valid UNIX user to act on behalf of the client, even in113 <command moreinfo="none">security = share</command> level security.</para>114 115 <para>As clients are not required to send a username to the server116 in share level security, <command moreinfo="none">smbd</command> uses several117 techniques to determine the correct UNIX user to use on behalf118 of the client.</para>119 120 <para>A list of possible UNIX usernames to match with the given121 client password is constructed using the following methods :</para>122 123 <itemizedlist>124 <listitem>125 <para>If the <smbconfoption name="guest only"/> parameter is set, then all the other126 stages are missed and only the <smbconfoption name="guest account"/> username is checked.127 </para>128 </listitem>129 130 <listitem>131 <para>Is a username is sent with the share connection132 request, then this username (after mapping - see <smbconfoption name="username map"/>),133 is added as a potential username.134 </para>135 </listitem>136 137 <listitem>138 <para>If the client did a previous <emphasis>logon139 </emphasis> request (the SessionSetup SMB call) then the140 username sent in this SMB will be added as a potential username.141 </para>142 </listitem>143 144 <listitem>145 <para>The name of the service the client requested is146 added as a potential username.147 </para>148 </listitem>149 150 <listitem>151 <para>The NetBIOS name of the client is added to152 the list as a potential username.153 </para>154 </listitem>155 156 <listitem>157 <para>Any users on the <smbconfoption name="user"/> list are added as potential usernames.158 </para>159 </listitem>160 </itemizedlist>161 162 <para>If the <parameter moreinfo="none">guest only</parameter> parameter is163 not set, then this list is then tried with the supplied password.164 The first user for whom the password matches will be used as the165 UNIX user.</para>166 167 <para>If the <parameter moreinfo="none">guest only</parameter> parameter is168 set, or no username can be determined then if the share is marked169 as available to the <parameter moreinfo="none">guest account</parameter>, then this170 guest user will be used, otherwise access is denied.</para>171 172 <para>Note that it can be <emphasis>very</emphasis> confusing173 in share-level security as to which UNIX username will eventually174 be used in granting access.</para>175 176 <para>See also the section <link linkend="VALIDATIONSECT">177 NOTE ABOUT USERNAME/PASSWORD VALIDATION</link>.</para>178 179 <para><anchor id="SECURITYEQUALSSERVER"/><emphasis>SECURITY = SERVER</emphasis></para>180 181 <para>182 In this depicted mode Samba will try to validate the username/password by passing it to another SMB server, such as an183 NT box. If this fails it will revert to <command moreinfo="none">security = user</command>. It expects the184 <smbconfoption name="encrypted passwords"/> parameter to be set to <constant>yes</constant>, unless the remote185 server does not support them. However note that if encrypted passwords have been negotiated then Samba cannot186 revert back to checking the UNIX password file, it must have a valid <filename187 moreinfo="none">smbpasswd</filename> file to check users against. See the chapter about the User Database in188 the Samba HOWTO Collection for details on how to set this up.189 </para>190 191 <note><para>This mode of operation has192 significant pitfalls since it is more vulnerable to193 man-in-the-middle attacks and server impersonation. In particular,194 this mode of operation can cause significant resource consumption on195 the PDC, as it must maintain an active connection for the duration196 of the user's session. Furthermore, if this connection is lost,197 there is no way to reestablish it, and further authentications to the198 Samba server may fail (from a single client, till it disconnects).199 </para></note>200 201 <note><para>If the client selects NTLMv2 authentication, then this mode of operation <emphasis>will fail</emphasis>202 </para></note>203 204 <note><para>From the client's point of205 view, <command moreinfo="none">security = server</command> is the206 same as <command moreinfo="none">security = user</command>. It207 only affects how the server deals with the authentication, it does208 not in any way affect what the client sees.</para></note>209 210 <note><para>This option is deprecated, and may be removed in future</para></note>211 45 212 46 <para><emphasis>Note</emphasis> that the name of the resource being … … 217 51 See the <smbconfoption name="map to guest"/> parameter for details on doing this.</para> 218 52 219 <para>See also the section <link linkend="VALIDATIONSECT"> 220 NOTE ABOUT USERNAME/PASSWORD VALIDATION</link>.</para> 53 <para><anchor id="SECURITYEQUALSDOMAIN"/><emphasis>SECURITY = DOMAIN</emphasis></para> 54 55 <para>This mode will only work correctly if <citerefentry><refentrytitle>net</refentrytitle> 56 <manvolnum>8</manvolnum></citerefentry> has been used to add this 57 machine into a Windows NT Domain. It expects the <smbconfoption name="encrypted passwords"/> 58 parameter to be set to <constant>yes</constant>. In this 59 mode Samba will try to validate the username/password by passing 60 it to a Windows NT Primary or Backup Domain Controller, in exactly 61 the same way that a Windows NT Server would do.</para> 62 63 <para><emphasis>Note</emphasis> that a valid UNIX user must still 64 exist as well as the account on the Domain Controller to allow 65 Samba to have a valid UNIX account to map file access to.</para> 66 67 <para><emphasis>Note</emphasis> that from the client's point 68 of view <command moreinfo="none">security = domain</command> is the same 69 as <command moreinfo="none">security = user</command>. It only 70 affects how the server deals with the authentication, 71 it does not in any way affect what the client sees.</para> 72 73 <para><emphasis>Note</emphasis> that the name of the resource being 74 requested is <emphasis>not</emphasis> sent to the server until after 75 the server has successfully authenticated the client. This is why 76 guest shares don't work in user level security without allowing 77 the server to automatically map unknown users into the <smbconfoption name="guest account"/>. 78 See the <smbconfoption name="map to guest"/> parameter for details on doing this.</para> 79 80 <para>See also the <smbconfoption name="password server"/> parameter and 81 the <smbconfoption name="encrypted passwords"/> parameter.</para> 82 83 84 <para><emphasis>Note</emphasis> that the name of the resource being 85 requested is <emphasis>not</emphasis> sent to the server until after 86 the server has successfully authenticated the client. This is why 87 guest shares don't work in user level security without allowing 88 the server to automatically map unknown users into the <smbconfoption name="guest account"/>. 89 See the <smbconfoption name="map to guest"/> parameter for details on doing this.</para> 221 90 222 91 <para>See also the <smbconfoption name="password server"/> parameter and the … … 232 101 <para>Note that this mode does NOT make Samba operate as a Active Directory Domain 233 102 Controller. </para> 234 103 104 <para>Note that this forces <smbconfoption name="require strong key">yes</smbconfoption> 105 and <smbconfoption name="client schannel">yes</smbconfoption> for the primary domain.</para> 106 235 107 <para>Read the chapter about Domain Membership in the HOWTO for details.</para> 236 108 </description> … … 239 111 <related>encrypt passwords</related> 240 112 241 <value type="default"> USER</value>113 <value type="default">AUTO</value> 242 114 <value type="example">DOMAIN</value> 243 115 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/securitymask.xml
r414 r988 1 1 <samba:parameter name="security mask" 2 2 context="S" 3 type="string" 3 type="string" 4 removed="1" 4 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 6 <description> 6 7 <para> 7 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the 8 UNIX permission on a file using the native NT security dialog box. 9 </para> 10 11 <para> 12 This parameter is applied as a mask (AND'ed with) to the incoming permission bits, thus resetting 13 any bits not in this mask. Make sure not to mix up this parameter with <smbconfoption name="force 14 security mode"/>, which works in a manner similar to this one but uses a logical OR instead of an AND. 15 </para> 16 17 <para> 18 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the 19 file permissions regardless of the previous status of this bits on the file. 8 This parameter has been removed for Samba 4.0.0. 20 9 </para> 21 22 <para>23 If not set explicitly this parameter is 0777, allowing a user to set all the user/group/world permissions on a file.24 </para>25 26 <para><emphasis>27 Note</emphasis> that users who can access the Samba server through other means can easily bypass this28 restriction, so it is primarily useful for standalone "appliance" systems. Administrators of29 most normal systems will probably want to leave it set to <constant>0777</constant>.30 </para>31 10 </description> 32 33 <related>force directory security mode</related>34 <related>directory security mask</related>35 <related>force security mode</related>36 37 <value type="default">0777</value>38 <value type="example">0770</value>39 11 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/serverschannel.xml
r414 r988 1 1 <samba:parameter name="server schannel" 2 2 context="G" 3 type="boolean-auto"4 basic="1"5 3 type="enum" 4 enumlist="enum_bool_auto" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 7 <para> -
vendor/current/docs-xml/smbdotconf/security/serversigning.xml
r746 r988 1 1 <samba:parameter name="server signing" 2 2 context="G" 3 4 basic="1"5 3 type="enum" 4 enumlist="enum_smb_signing_vals" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 7 8 8 <para>This controls whether the client is allowed or required to use SMB1 and SMB2 signing. Possible values 9 are <emphasis> auto</emphasis>, <emphasis>mandatory</emphasis>9 are <emphasis>default</emphasis>, <emphasis>auto</emphasis>, <emphasis>mandatory</emphasis> 10 10 and <emphasis>disabled</emphasis>. 11 11 </para> 12 13 <para>By default, and when smb signing is set to 14 <emphasis>default</emphasis>, smb signing is required when 15 <smbconfoption name="server role"/> is <emphasis>active directory 16 domain controller</emphasis> and disabled otherwise.</para> 12 17 13 18 <para>When set to auto, SMB1 signing is offered, but not enforced. … … 21 26 </description> 22 27 23 <value type="default"> Disabled</value>28 <value type="default">default</value> 24 29 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/smbencrypt.xml
r414 r988 1 1 <samba:parameter name="smb encrypt" 2 2 context="S" 3 4 basic="1"5 3 type="enum" 4 enumlist="enum_smb_signing_vals" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 8 <para>This is a new feature introduced with Samba 3.2 and above. It is an 9 extension to the SMB/CIFS protocol negotiated as part of the UNIX extensions. 10 SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt 11 and sign every request/response in a SMB protocol stream. When 12 enabled it provides a secure method of SMB/CIFS communication, 13 similar to an ssh protected session, but using SMB/CIFS authentication 14 to negotiate encryption and signing keys. Currently this is only 15 supported by Samba 3.2 smbclient, and hopefully soon Linux CIFSFS 16 and MacOS/X clients. Windows clients do not support this feature. 17 </para> 18 19 <para>This controls whether the remote client is allowed or required to use SMB encryption. Possible values 20 are <emphasis>auto</emphasis>, <emphasis>mandatory</emphasis> 21 and <emphasis>disabled</emphasis>. This may be set on a per-share 22 basis, but clients may chose to encrypt the entire session, not 23 just traffic to a specific share. If this is set to mandatory 24 then all traffic to a share <emphasis>must</emphasis> must 25 be encrypted once the connection has been made to the share. 26 The server would return "access denied" to all non-encrypted 27 requests on such a share. Selecting encrypted traffic reduces 28 throughput as smaller packet sizes must be used (no huge UNIX 29 style read/writes allowed) as well as the overhead of encrypting 30 and signing all the data. 31 </para> 32 33 <para>If SMB encryption is selected, Windows style SMB signing (see 34 the <smbconfoption name="server signing"/> option) is no longer necessary, 35 as the GSSAPI flags use select both signing and sealing of the data. 36 </para> 37 38 <para>When set to auto, SMB encryption is offered, but not enforced. 39 When set to mandatory, SMB encryption is required and if set 40 to disabled, SMB encryption can not be negotiated.</para> 7 <para> 8 This parameter controls whether a remote client is allowed or required 9 to use SMB encryption. It has different effects depending on whether 10 the connection uses SMB1 or SMB2 and newer: 11 </para> 12 13 <itemizedlist> 14 <listitem> 15 <para> 16 If the connection uses SMB1, then this option controls the use 17 of a Samba-specific extension to the SMB protocol introduced in 18 Samba 3.2 that makes use of the Unix extensions. 19 </para> 20 </listitem> 21 22 <listitem> 23 <para> 24 If the connection uses SMB2 or newer, then this option controls 25 the use of the SMB-level encryption that is supported in SMB 26 version 3.0 and above and available in Windows 8 and newer. 27 </para> 28 </listitem> 29 </itemizedlist> 30 31 <para> 32 This parameter can be set globally and on a per-share bases. 33 Possible values are 34 <emphasis>off</emphasis> (or <emphasis>disabled</emphasis>), 35 <emphasis>enabled</emphasis> (or <emphasis>auto</emphasis>, or 36 <emphasis>if_required</emphasis>), 37 <emphasis>desired</emphasis>, 38 and 39 <emphasis>required</emphasis> 40 (or <emphasis>mandatory</emphasis>). 41 A special value is <emphasis>default</emphasis> which is 42 the implicit default setting of <emphasis>enabled</emphasis>. 43 </para> 44 45 <variablelist> 46 <varlistentry> 47 <term><emphasis>Effects for SMB1</emphasis></term> 48 <listitem> 49 <para> 50 The Samba-specific encryption of SMB1 connections is an 51 extension to the SMB protocol negotiated as part of the UNIX 52 extensions. SMB encryption uses the GSSAPI (SSPI on Windows) 53 ability to encrypt and sign every request/response in a SMB 54 protocol stream. When enabled it provides a secure method of 55 SMB/CIFS communication, similar to an ssh protected session, but 56 using SMB/CIFS authentication to negotiate encryption and 57 signing keys. Currently this is only supported smbclient of by 58 Samba 3.2 and newer, and hopefully soon Linux CIFSFS and MacOS/X 59 clients. Windows clients do not support this feature. 60 </para> 61 62 <para>This may be set on a per-share 63 basis, but clients may chose to encrypt the entire session, not 64 just traffic to a specific share. If this is set to mandatory 65 then all traffic to a share <emphasis>must</emphasis> 66 be encrypted once the connection has been made to the share. 67 The server would return "access denied" to all non-encrypted 68 requests on such a share. Selecting encrypted traffic reduces 69 throughput as smaller packet sizes must be used (no huge UNIX 70 style read/writes allowed) as well as the overhead of encrypting 71 and signing all the data. 72 </para> 73 74 <para> 75 If SMB encryption is selected, Windows style SMB signing (see 76 the <smbconfoption name="server signing"/> option) is no longer 77 necessary, as the GSSAPI flags use select both signing and 78 sealing of the data. 79 </para> 80 81 <para> 82 When set to auto or default, SMB encryption is offered, but not 83 enforced. When set to mandatory, SMB encryption is required and 84 if set to disabled, SMB encryption can not be negotiated. 85 </para> 86 </listitem> 87 </varlistentry> 88 89 <varlistentry> 90 <term><emphasis>Effects for SMB2</emphasis></term> 91 <listitem> 92 <para> 93 Native SMB transport encryption is available in SMB version 3.0 94 or newer. It is only offered by Samba if 95 <emphasis>server max protocol</emphasis> is set to 96 <emphasis>SMB3</emphasis> or newer. 97 Clients supporting this type of encryption include 98 Windows 8 and newer, 99 Windows server 2012 and newer, 100 and smbclient of Samba 4.1 and newer. 101 </para> 102 103 <para> 104 The protocol implementation offers various options: 105 </para> 106 107 <itemizedlist> 108 <listitem> 109 <para> 110 The capability to perform SMB encryption can be 111 negotiated during protocol negotiation. 112 </para> 113 </listitem> 114 115 <listitem> 116 <para> 117 Data encryption can be enabled globally. In that case, 118 an encryption-capable connection will have all traffic 119 in all its sessions encrypted. In particular all share 120 connections will be encrypted. 121 </para> 122 </listitem> 123 124 <listitem> 125 <para> 126 Data encryption can also be enabled per share if not 127 enabled globally. For an encryption-capable connection, 128 all connections to an encryption-enabled share will be 129 encrypted. 130 </para> 131 </listitem> 132 133 <listitem> 134 <para> 135 Encryption can be enforced. This means that session 136 setups will be denied on non-encryption-capable 137 connections if data encryption has been enabled 138 globally. And tree connections will be denied for 139 non-encryption capable connections to shares with data 140 encryption enabled. 141 </para> 142 </listitem> 143 </itemizedlist> 144 145 <para> 146 These features can be controlled with settings of 147 <emphasis>smb encrypt</emphasis> as follows: 148 </para> 149 150 <itemizedlist> 151 <listitem> 152 <para> 153 Leaving it as default, explicitly setting 154 <emphasis>default</emphasis>, or setting it to 155 <emphasis>enabled</emphasis> globally will enable 156 negotiation of encryption but will not turn on 157 data encryption globally or per share. 158 </para> 159 </listitem> 160 161 <listitem> 162 <para> 163 Setting it to <emphasis>desired</emphasis> globally 164 will enable negotiation and will turn on data encryption 165 on sessions and share connections for those clients 166 that support it. 167 </para> 168 </listitem> 169 170 <listitem> 171 <para> 172 Setting it to <emphasis>required</emphasis> globally 173 will enable negotiation and turn on data encryption 174 on sessions and share connections. Clients that do 175 not support encryption will be denied access to the 176 server. 177 </para> 178 </listitem> 179 180 <listitem> 181 <para> 182 Setting it to <emphasis>off</emphasis> globally will 183 completely disable the encryption feature. 184 </para> 185 </listitem> 186 187 <listitem> 188 <para> 189 Setting it to <emphasis>desired</emphasis> on a share 190 will turn on data encryption for this share for clients 191 that support encryption if negotiation has been 192 enabled globally. 193 </para> 194 </listitem> 195 196 <listitem> 197 <para> 198 Setting it to <emphasis>required</emphasis> on a share 199 will enforce data encryption for this share if 200 negotiation has been enabled globally. I.e. clients that 201 do not support encryption will be denied access to the 202 share. 203 </para> 204 <para> 205 Note that this allows per-share enforcing to be 206 controlled in Samba differently from Windows: 207 In Windows, <emphasis>RejectUnencryptedAccess</emphasis> 208 is a global setting, and if it is set, all shares with 209 data encryption turned on 210 are automatically enforcing encryption. In order to 211 achieve the same effect in Samba, one 212 has to globally set <emphasis>smb encrypt</emphasis> to 213 <emphasis>enabled</emphasis>, and then set all shares 214 that should be encrypted to 215 <emphasis>required</emphasis>. 216 Additionally, it is possible in Samba to have some 217 shares with encryption <emphasis>required</emphasis> 218 and some other shares with encryption only 219 <emphasis>desired</emphasis>, which is not possible in 220 Windows. 221 </para> 222 </listitem> 223 224 <listitem> 225 <para> 226 Setting it to <emphasis>off</emphasis> or 227 <emphasis>enabled</emphasis> for a share has 228 no effect. 229 </para> 230 </listitem> 231 </itemizedlist> 232 </listitem> 233 </varlistentry> 234 </variablelist> 41 235 </description> 42 236 43 <value type="default"> auto</value>237 <value type="default">default</value> 44 238 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/smbpasswdfile.xml
r414 r988 1 1 <samba:parameter name="smb passwd file" 2 2 type="string" 3 3 context="G" 4 advanced="1" developer="1"5 4 constant="1" 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 6 <description> 7 7 <para>This option sets the path to the encrypted smbpasswd file. By … … 16 16 </description> 17 17 18 <value type="default"> ${prefix}/private/smbpasswd</value>18 <value type="default">&pathconfig.SMB_PASSWD_FILE;</value> 19 19 </samba:parameter> -
vendor/current/docs-xml/smbdotconf/security/unixpasswordsync.xml
r414 r988 1 1 <samba:parameter name="unix password sync" 2 2 context="G" 3 type="boolean" 4 advanced="1" developer="1" 3 type="boolean" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> -
vendor/current/docs-xml/smbdotconf/security/username.xml
r740 r988 1 1 <samba:parameter name="username" 2 context="S" 3 type="string" 2 context="S" 3 type="string" 4 deprecated="1" 4 5 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 6 <synonym>user</synonym> 6 7 <synonym>users</synonym> 7 8 <description> 8 <para>Multiple users may be specified in a comma-delimited9 list, in which case the supplied password will be tested against10 each username in turn (left to right).</para>11 12 <para>The deprecated <parameter moreinfo="none">username</parameter> line is needed only when13 the PC is unable to supply its own username. This is the case14 for the COREPLUS protocol or where your users have different WfWg15 usernames to UNIX usernames. In both these cases you may also be16 better using the \\server\share%user syntax instead.</para>17 18 <para>The <parameter moreinfo="none">username</parameter> line is not a great19 solution in many cases as it means Samba will try to validate20 the supplied password against each of the usernames in the21 <parameter moreinfo="none">username</parameter> line in turn. This is slow and22 a bad idea for lots of users in case of duplicate passwords.23 You may get timeouts or security breaches using this parameter24 unwisely.</para>25 26 <para>Samba relies on the underlying UNIX security. This27 parameter does not restrict who can login, it just offers hints28 to the Samba server as to what usernames might correspond to the29 supplied password. Users can login as whoever they please and30 they will be able to do no more damage than if they started a31 telnet session. The daemon runs as the user that they log in as,32 so they cannot do anything that user cannot do.</para>33 34 9 <para>To restrict a service to a particular set of users you 35 10 can use the <smbconfoption name="valid users"/> parameter.</para> 36 11 37 <para>If any of the usernames begin with a '@' then the name 38 will be looked up first in the NIS netgroups list (if Samba 39 is compiled with netgroup support), followed by a lookup in 40 the UNIX groups database and will expand to a list of all users 41 in the group of that name.</para> 42 43 <para>If any of the usernames begin with a '+' then the name 44 will be looked up only in the UNIX groups database and will 45 expand to a list of all users in the group of that name.</para> 12 <para>This parameter is deprecated</para> 46 13 47 <para> If any of the usernames begin with a '&' then the name48 will be looked up only in the NIS netgroups database (if Samba49 is compiled with netgroup support) and will expand to a list50 of all users in the netgroup group of that name.</para>14 <para>However, it currently operates only in conjunction with 15 <smbconfoption name="only user"/>. The supported way to restrict 16 a service to a particular set of users is the 17 <smbconfoption name="valid users"/> parameter.</para> 51 18 52 <para>Note that searching though a groups database can take53 quite some time, and some clients may time out during the54 search.</para>55 56 <para>See the section <link linkend="VALIDATIONSECT">NOTE ABOUT57 USERNAME/PASSWORD VALIDATION</link> for more information on how58 this parameter determines access to the services.</para>59 19 </description> 60 20 -
vendor/current/docs-xml/smbdotconf/security/usernamelevel.xml
r414 r988 1 1 <samba:parameter name="username level" 2 2 context="G" 3 advanced="1" developer="1" 4 type="integer" 3 type="integer" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> -
vendor/current/docs-xml/smbdotconf/security/usernamemap.xml
r414 r988 1 1 <samba:parameter name="username map" 2 2 context="G" 3 advanced="1" developer="1" 4 type="string" 3 type="string" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> … … 13 12 14 13 <para> 15 Please note that for user or sharemode security, the username map is applied prior to validating the user14 Please note that for user mode security, the username map is applied prior to validating the user 16 15 credentials. Domain member servers (domain or ads) apply the username map after the user has been 17 successfully authenticated by the domain controller and require fully qualified ent ies in the map table (e.g.16 successfully authenticated by the domain controller and require fully qualified entries in the map table (e.g. 18 17 biddle = <literal>DOMAIN\foo</literal>). 19 18 </para> … … 85 84 <constant>fred</constant> is remapped to <constant>mary</constant> then you will actually be connecting to 86 85 \\server\mary and will need to supply a password suitable for <constant>mary</constant> not 87 <constant>fred</constant>. The only exception to this is the username passed to the <smbconfoption88 name="password server"/> (if you have one). The password serverwill receive whatever username the client86 <constant>fred</constant>. The only exception to this is the 87 username passed to a Domain Controller (if you have one). The DC will receive whatever username the client 89 88 supplies without modification. 90 89 </para> -
vendor/current/docs-xml/smbdotconf/security/usernamemapcachetime.xml
r740 r988 1 1 <samba:parameter name="username map cache time" 2 2 context="G" 3 advanced="1" developer="0" 4 type="integer" 3 type="integer" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> -
vendor/current/docs-xml/smbdotconf/security/usernamemapscript.xml
r414 r988 1 1 <samba:parameter name="username map script" 2 2 context="G" 3 type="string" 4 advanced="1" developer="1" 3 type="string" 5 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 6 5 <description> … … 9 8 specifies and external program or script that must accept a single 10 9 command line option (the username transmitted in the authentication 11 request) and return a line line on standard output (the name to which10 request) and return a line on standard output (the name to which 12 11 the account should mapped). In this way, it is possible to store 13 12 username map tables in an LDAP or NIS directory services. -
vendor/current/docs-xml/smbdotconf/security/validusers.xml
r414 r988 1 1 <samba:parameter name="valid users" 2 2 context="S" 3 type="list"3 type="cmdlist" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <description> … … 20 20 This is useful in the [homes] section. 21 21 </para> 22 23 <para><emphasis>Note: </emphasis>When used in the [global] section this 24 parameter may have unwanted side effects. For example: If samba is configured as a MASTER BROWSER (see 25 <parameter moreinfo="none">local master</parameter>, 26 <parameter moreinfo="none">os level</parameter>, 27 <parameter moreinfo="none">domain master</parameter>, 28 <parameter moreinfo="none">preferred master</parameter>) this option 29 will prevent workstations from being able to browse the network. 30 </para> 31 22 32 </description> 23 33 -
vendor/current/docs-xml/smbdotconf/security/writeable.xml
r414 r988 1 1 <samba:parameter name="writeable" 2 2 context="S" 3 type="boolean" 3 type="boolean-rev" 4 function="read_only" 5 synonym="1" 4 6 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 7 <synonym>writable</synonym> 8 <synonym>write ok</synonym> 6 9 <description> 7 10 <para>Inverted synonym for <smbconfoption name="read only"/>.</para> -
vendor/current/docs-xml/smbdotconf/security/writelist.xml
r414 r988 1 1 <samba:parameter name="write list" 2 2 context="S" 3 type="list"3 type="cmdlist" 4 4 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> 5 5 <description> … … 16 16 </para> 17 17 18 <para>19 By design, this parameter will not work with the20 <smbconfoption name="security">share</smbconfoption> in Samba 3.0.21 </para>22 23 18 </description> 24 19
Note:
See TracChangeset
for help on using the changeset viewer.