Ignore:
Timestamp:
Nov 24, 2016, 1:14:11 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to version 4.4.3

File:
1 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs/manpages/rpcclient.1

    r860 r988  
    22.\"     Title: rpcclient
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "RPCCLIENT" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "RPCCLIENT" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 rpcclient [\-A\ authfile] [\-c\ <command\ string>] [\-d\ debuglevel] [\-h] [\-l\ logdir] [\-N] [\-s\ <smb\ config\ file>] [\-U\ username[%password]] [\-W\ workgroup] [\-I\ destinationIP] {server}
     34rpcclient [\-A\ authfile] [\-c\ <command\ string>] [\-d\ debuglevel] [\-l\ logdir] [\-N] [\-s\ <smb\ config\ file>] [\-U\ username[%password]] [\-W\ workgroup] [\-I\ destinationIP] {server}
    3535.SH "DESCRIPTION"
    3636.PP
     
    7272This number is the TCP port number that will be used when making connections to the server\&. The standard (well\-known) TCP port number for an SMB/CIFS server is 139, which is the default\&.
    7373.RE
    74 .PP
    75 \-d|\-\-debuglevel=level
    76 .RS 4
    77 \fIlevel\fR
    78 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    79 .sp
    80 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    81 .sp
    82 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    83 .sp
    84 Note that specifying this parameter here will override the
    85 \m[blue]\fBlog level\fR\m[]
    86 parameter in the
    87 smb\&.conf
    88 file\&.
    89 .RE
    90 .PP
    91 \-V|\-\-version
    92 .RS 4
    93 Prints the program version number\&.
    94 .RE
    95 .PP
    96 \-s|\-\-configfile <configuration file>
    97 .RS 4
    98 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    99 smb\&.conf
    100 for more information\&. The default configuration file name is determined at compile time\&.
    101 .RE
    102 .PP
    103 \-l|\-\-log\-basename=logdirectory
    104 .RS 4
    105 Base directory name for log/debug files\&. The extension
    106 \fB"\&.progname"\fR
    107 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    108 .RE
    109 .PP
    110 \-N|\-\-no\-pass
    111 .RS 4
    112 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.
    113 .sp
    114 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.
    115 .sp
    116 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.
    117 .RE
    118 .PP
    119 \-k|\-\-kerberos
    120 .RS 4
    121 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.
    122 .RE
    123 .PP
    124 \-C|\-\-use\-ccache
    125 .RS 4
    126 Try to use the credentials cached by winbind\&.
    127 .RE
    128 .PP
    129 \-A|\-\-authentication\-file=filename
    130 .RS 4
    131 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is
    132 .sp
    133 .if n \{\
    134 .RS 4
    135 .\}
    136 .nf
    137 username = <value>
    138 password = <value>
    139 domain   = <value>
    140 .fi
    141 .if n \{\
    142 .RE
    143 .\}
    144 .sp
    145 Make certain that the permissions on the file restrict access from unwanted users\&.
    146 .RE
    147 .PP
    148 \-U|\-\-user=username[%password]
    149 .RS 4
    150 Sets the SMB username or username and password\&.
    151 .sp
    152 If %password is not specified, the user will be prompted\&. The client will first check the
    153 \fBUSER\fR
    154 environment variable, then the
    155 \fBLOGNAME\fR
    156 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username
    157 \fBGUEST\fR
    158 is used\&.
    159 .sp
    160 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the
    161 \fI\-A\fR
    162 for more details\&.
    163 .sp
    164 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the
    165 ps
    166 command\&. To be safe always allow
    167 rpcclient
    168 to prompt for a password and type it in directly\&.
    169 .RE
    170 .PP
    171 \-n|\-\-netbiosname <primary NetBIOS name>
    172 .RS 4
    173 This option allows you to override the NetBIOS name that Samba uses for itself\&. This is identical to setting the
    174 \m[blue]\fBnetbios name\fR\m[]
    175 parameter in the
    176 smb\&.conf
    177 file\&. However, a command line setting will take precedence over settings in
    178 smb\&.conf\&.
    179 .RE
    180 .PP
    181 \-i|\-\-scope <scope>
    182 .RS 4
    183 This specifies a NetBIOS scope that
    184 nmblookup
    185 will use to communicate with when generating NetBIOS names\&. For details on the use of NetBIOS scopes, see rfc1001\&.txt and rfc1002\&.txt\&. NetBIOS scopes are
    186 \fIvery\fR
    187 rarely used, only set this parameter if you are the system administrator in charge of all the NetBIOS systems you communicate with\&.
    188 .RE
    189 .PP
    190 \-W|\-\-workgroup=domain
    191 .RS 4
    192 Set the SMB domain of the username\&. This overrides the default domain which is the domain defined in smb\&.conf\&. If the domain specified is the same as the servers NetBIOS name, it causes the client to log on using the servers local SAM (as opposed to the Domain SAM)\&.
    193 .RE
    194 .PP
    195 \-O|\-\-socket\-options socket options
    196 .RS 4
    197 TCP socket options to set on the client socket\&. See the socket options parameter in the
    198 smb\&.conf
    199 manual page for the list of valid options\&.
    200 .RE
    201 .PP
    202 \-h|\-\-help
    203 .RS 4
    204 Print a summary of command line options\&.
    205 .RE
    20674.SH "COMMANDS"
    20775.SS "LSARPC"
     
    22290.RE
    22391.PP
    224 enumtrusts
     92enumtrust
    22593.RS 4
    22694Enumerate trusted domains
     
    333201.RE
    334202.PP
     203netshareenumall
     204.RS 4
     205Enumerate all shares
     206.RE
     207.PP
     208netsharegetinfo
     209.RS 4
     210Get Share Info
     211.RE
     212.PP
     213netsharesetinfo
     214.RS 4
     215Set Share Info
     216.RE
     217.PP
     218netsharesetdfsflags
     219.RS 4
     220Set DFS flags
     221.RE
     222.PP
    335223netfileenum
    336224.RS 4
     
    341229.RS 4
    342230Fetch remote time of day
     231.RE
     232.PP
     233netnamevalidate
     234.RS 4
     235Validate sharename
     236.RE
     237.PP
     238netfilegetsec
     239.RS 4
     240Get File security
     241.RE
     242.PP
     243netsessdel
     244.RS 4
     245Delete Session
     246.RE
     247.PP
     248netsessenum
     249.RS 4
     250Enumerate Sessions
     251.RE
     252.PP
     253netdiskenum
     254.RS 4
     255Enumerate Disks
     256.RE
     257.PP
     258netconnenum
     259.RS 4
     260Enumerate Connections
     261.RE
     262.PP
     263netshareadd
     264.RS 4
     265Add share
     266.RE
     267.PP
     268netsharedel
     269.RS 4
     270Delete share
    343271.RE
    344272.SS "SAMR"
     
    445373.\}
    446374.nf
    447 Long Printer Name:\e
     375Long Driver Name:\e
    448376Driver File Name:\e
    449377Data File Name:\e
     
    480408.RE
    481409.PP
    482 deldriverex <driver> [architecture] [version]
    483 .RS 4
    484 Delete the specified printer driver including driver files\&. You can limit this action to a specific architecture and a specific version\&. If no architecure is given, all driver files of that driver will be deleted\&.
     410deldriverex <driver> [architecture] [version] [flags]
     411.RS 4
     412Delete the specified printer driver and optionally files associated with the driver\&. You can limit this action to a specific architecture and a specific version\&. If no architecture is given, all driver files of that driver will be deleted\&.
     413\fIflags\fR
     414correspond to numeric DPD_* values, i\&.e\&. a value of 3 requests (DPD_DELETE_UNUSED_FILES | DPD_DELETE_SPECIFIC_VERSION)\&.
    485415.RE
    486416.PP
     
    640570Sam Logon
    641571.RE
     572.SS "FSRVP"
     573.PP
     574fss_is_path_sup <share>
     575.RS 4
     576Check whether a share supports shadow\-copy requests
     577.RE
     578.PP
     579fss_get_sup_version
     580.RS 4
     581Get supported FSRVP version from server
     582.RE
     583.PP
     584fss_create_expose <context> <[ro|rw]> <share1> [share2] \&.\&.\&. [shareN]
     585.RS 4
     586Request shadow\-copy creation and exposure as a new share
     587.RE
     588.PP
     589fss_delete <base_share> <shadow_copy_set_id> <shadow_copy_id>
     590.RS 4
     591Request shadow\-copy share deletion
     592.RE
     593.PP
     594fss_has_shadow_copy <base_share>
     595.RS 4
     596Check for an associated share shadow\-copy
     597.RE
     598.PP
     599fss_get_mapping <base_share> <shadow_copy_set_id> <shadow_copy_id>
     600.RS 4
     601Get shadow\-copy share mapping information
     602.RE
     603.PP
     604fss_recovery_complete <shadow_copy_set_id>
     605.RS 4
     606Flag read\-write shadow\-copy as recovery complete, allowing further shadow\-copy requests
     607.RE
    642608.SS "GENERAL COMMANDS"
    643609.PP
Note: See TracChangeset for help on using the changeset viewer.