Ignore:
Timestamp:
Nov 24, 2016, 1:14:11 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to version 4.4.3

File:
1 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs/manpages/smb.conf.5

    r860 r988  
    22.\"     Title: smb.conf
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: File Formats and Conventions
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMB\&.CONF" "5" "09/18/2013" "Samba 3\&.6" "File Formats and Conventions"
     10.TH "SMB\&.CONF" "5" "05/02/2016" "Samba 4\&.4" "File Formats and Conventions"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3636file is a configuration file for the Samba suite\&.
    3737smb\&.conf
    38 contains runtime configuration information for the Samba programs\&. The
    39 smb\&.conf
    40 file is designed to be configured and administered by the
    41 \fBswat\fR(8)
    42 program\&. The complete description of the file format and possible parameters held within are here for reference purposes\&.
     38contains runtime configuration information for the Samba programs\&. The complete description of the file format and possible parameters held within are here for reference purposes\&.
    4339.SH "FILE FORMAT"
    4440.PP
     
    457453%R
    458454.RS 4
    459 the selected protocol level after protocol negotiation\&. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2 or NT1\&.
     455the selected protocol level after protocol negotiation\&. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2, NT1, SMB2_02, SMB2_10, SMB2_22, SMB2_24, SMB3_00, SMB3_02, SMB3_10, SMB3_11 or SMB2_FF\&.
    460456.RE
    461457.PP
     
    475471the IP address of the client machine\&.
    476472.sp
    477 Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.
     473Before 4\&.0\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.
    478474.RE
    479475.PP
     
    482478the local IP address to which a client connected\&.
    483479.sp
    484 Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.
     480Before 4\&.0\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.
    485481.RE
    486482.PP
     
    598594.PP
    599595By default, Samba 3\&.0 has the same semantics as a Windows NT server, in that it is case insensitive but case preserving\&. As a special case for directories with large numbers of files, if the case options are set as follows, "case sensitive = yes", "case preserve = no", "short preserve case = no" then the "default case" option will be applied and will modify all filenames sent from the client when accessing this share\&.
    600 .SH "NOTE ABOUT USERNAME/PASSWORD VALIDATION"
    601 .PP
    602 There are a number of ways in which a user can connect to a service\&. The server uses the following steps in determining if it will allow a connection to a specified service\&. If all the steps fail, the connection request is rejected\&. However, if one of the steps succeeds, the following steps are not checked\&.
    603 .PP
    604 If the service is marked
    605 \(lqguest only = yes\(rq
    606 and the server is running with share\-level security (\(lqsecurity = share\(rq, steps 1 to 5 are skipped\&.
    607 .sp
    608 .RS 4
    609 .ie n \{\
    610 \h'-04' 1.\h'+01'\c
    611 .\}
    612 .el \{\
    613 .sp -1
    614 .IP "  1." 4.2
    615 .\}
    616 If the client has passed a username/password pair and that username/password pair is validated by the UNIX system\*(Aqs password programs, the connection is made as that username\&. This includes the
    617 \e\eserver\eservice%\fIusername\fR
    618 method of passing a username\&.
    619 .RE
    620 .sp
    621 .RS 4
    622 .ie n \{\
    623 \h'-04' 2.\h'+01'\c
    624 .\}
    625 .el \{\
    626 .sp -1
    627 .IP "  2." 4.2
    628 .\}
    629 If the client has previously registered a username with the system and now supplies a correct password for that username, the connection is allowed\&.
    630 .RE
    631 .sp
    632 .RS 4
    633 .ie n \{\
    634 \h'-04' 3.\h'+01'\c
    635 .\}
    636 .el \{\
    637 .sp -1
    638 .IP "  3." 4.2
    639 .\}
    640 The client\*(Aqs NetBIOS name and any previously used usernames are checked against the supplied password\&. If they match, the connection is allowed as the corresponding user\&.
    641 .RE
    642 .sp
    643 .RS 4
    644 .ie n \{\
    645 \h'-04' 4.\h'+01'\c
    646 .\}
    647 .el \{\
    648 .sp -1
    649 .IP "  4." 4.2
    650 .\}
    651 If the client has previously validated a username/password pair with the server and the client has passed the validation token, that username is used\&.
    652 .RE
    653 .sp
    654 .RS 4
    655 .ie n \{\
    656 \h'-04' 5.\h'+01'\c
    657 .\}
    658 .el \{\
    659 .sp -1
    660 .IP "  5." 4.2
    661 .\}
    662 If a
    663 user =
    664 field is given in the
    665 smb\&.conf
    666 file for the service and the client has supplied a password, and that password matches (according to the UNIX system\*(Aqs password checking) with one of the usernames from the
    667 user =
    668 field, the connection is made as the username in the
    669 user =
    670 line\&. If one of the usernames in the
    671 user =
    672 list begins with a
    673 @, that name expands to a list of names in the group of the same name\&.
    674 .RE
    675 .sp
    676 .RS 4
    677 .ie n \{\
    678 \h'-04' 6.\h'+01'\c
    679 .\}
    680 .el \{\
    681 .sp -1
    682 .IP "  6." 4.2
    683 .\}
    684 If the service is a guest service, a connection is made as the username given in the
    685 guest account =
    686 for the service, irrespective of the supplied password\&.
    687 .RE
    688596.SH "REGISTRY-BASED CONFIGURATION"
    689597.PP
     
    769677\m[blue]\fBshutdown script\fR\m[]\&.
    770678.sp
    771 If the connected user posseses the
     679If the connected user possesses the
    772680\fBSeRemoteShutdownPrivilege\fR, right, this command will be run as root\&.
    773681.sp
     
    785693If this parameter is
    786694\fByes\fR
    787 for a service, then the share hosted by the service will only be visible to users who have read or write access to the share during share enumeration (for example net view \e\esambaserver)\&. This has parallels to access based enumeration, the main difference being that only share permissions are evaluated, and security descriptors on files contained on the share are not used in computing enumeration access rights\&.
     695for a service, then the share hosted by the service will only be visible to users who have read or write access to the share during share enumeration (for example net view \e\esambaserver)\&. The share ACLs which allow or deny the access to the share can be modified using for example the
     696sharesec
     697command or using the appropriate Windows tools\&. This has parallels to access based enumeration, the main difference being that only share permissions are evaluated, and security descriptors on files contained on the share are not used in computing enumeration access rights\&.
    788698.sp
    789699Default:
    790700\fI\fIaccess based share enum\fR\fR\fI = \fR\fIno\fR\fI \fR
     701.RE
     702
     703acl allow execute always (S)
     704.\" acl allow execute always
     705.PP
     706.RS 4
     707This boolean parameter controls the behaviour of
     708\fBsmbd\fR(8)
     709when receiving a protocol request of "open for execution" from a Windows client\&. With Samba 3\&.6 and older, the execution right in the ACL was not checked, so a client could execute a file even if it did not have execute rights on the file\&. In Samba 4\&.0, this has been fixed, so that by default, i\&.e\&. when this parameter is set to "False", "open for execution" is now denied when execution permissions are not present\&.
     710.sp
     711If this parameter is set to "True", Samba does not check execute permissions on "open for execution", thus re\-establishing the behaviour of Samba 3\&.6\&. This can be useful to smoothen upgrades from older Samba versions to 4\&.0 and newer\&. This setting is not meant to be used as a permanent setting, but as a temporary relief: It is recommended to fix the permissions in the ACLs and reset this parameter to the default after a certain transition period\&.
     712.sp
     713Default:
     714\fI\fIacl allow execute always\fR\fR\fI = \fR\fIno\fR\fI \fR
    791715.RE
    792716
     
    795719.PP
    796720.RS 4
     721Please note this parameter is now deprecated in Samba 3\&.6\&.2 and will be removed in a future version of Samba\&.
     722.sp
    797723This boolean parameter controls what
    798 \fBsmbd\fR(8)does on receiving a protocol request of "open for delete" from a Windows client\&. If a Windows client doesn\*(Aqt have permissions to delete a file then they expect this to be denied at open time\&. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\&. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\&. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\&. This is not perfect, as it\*(Aqs possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\&. Samba will correctly check POSIX ACL semantics in this case\&.
     724\fBsmbd\fR(8)
     725does on receiving a protocol request of "open for delete" from a Windows client\&. If a Windows client doesn\*(Aqt have permissions to delete a file then they expect this to be denied at open time\&. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\&. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\&. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\&. This is not perfect, as it\*(Aqs possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\&. Samba will correctly check POSIX ACL semantics in this case\&.
    799726.sp
    800727If this parameter is set to "false" Samba doesn\*(Aqt check permissions on "open for delete" and allows the open\&. If the user doesn\*(Aqt have permission to delete the file this will only be discovered at close time, which is too late for the Windows user tools to display an error message to the user\&. The symptom of this is files that appear to have been deleted "magically" re\-appearing on a Windows explorer refresh\&. This is an extremely advanced protocol option which should not need to be changed\&. This parameter was introduced in its final form in 3\&.0\&.21, an earlier version with slightly different semantics was introduced in 3\&.0\&.20\&. That older version is not documented here\&.
    801728.sp
    802729Default:
    803 \fI\fIacl check permissions\fR\fR\fI = \fR\fITrue\fR\fI \fR
    804 .RE
    805 
    806 acl compatibility (G)
    807 .\" acl compatibility
    808 .PP
    809 .RS 4
    810 This parameter specifies what OS ACL semantics should be compatible with\&. Possible values are
    811 \fIwinnt\fR
    812 for Windows NT 4,
    813 \fIwin2k\fR
    814 for Windows 2000 and above and
    815 \fIauto\fR\&. If you specify
    816 \fIauto\fR, the value for this parameter will be based upon the version of the client\&. There should be no reason to change this parameter from the default\&.
    817 .sp
    818 Default:
    819 \fI\fIacl compatibility\fR\fR\fI = \fR\fIAuto\fR\fI \fR
    820 .sp
    821 Example:
    822 \fI\fIacl compatibility\fR\fR\fI = \fR\fIwin2k\fR\fI \fR
     730\fI\fIacl check permissions\fR\fR\fI = \fR\fIyes\fR\fI \fR
    823731.RE
    824732
     
    831739of a file or directory to modify the permissions and ACLs on that file\&.
    832740.sp
    833 On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\&. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\&. This means there are multiple people with permissions to modify ACLs on a file or directory, easing managability\&.
     741On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\&. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\&. This means there are multiple people with permissions to modify ACLs on a file or directory, easing manageability\&.
    834742.sp
    835743This parameter allows Samba to also permit delegation of the control over a point in the exported directory hierarchy in much the same way as Windows\&. This allows all members of a UNIX group to control the permissions on a file or directory they have group ownership on\&.
     
    837745This parameter is best used with the
    838746\m[blue]\fBinherit owner\fR\m[]
    839 option and also on on a share containing directories with the UNIX
     747option and also on a share containing directories with the UNIX
    840748\fIsetgid bit\fR
    841749set on them, which causes new files and directories created within it to inherit the group ownership from the containing directory\&.
    842750.sp
    843 This is parameter has been was deprecated in Samba 3\&.0\&.23, but re\-activated in Samba 3\&.0\&.31 and above, as it now only controls permission changes if the user is in the owning primary group\&. It is now no longer equivalent to the
     751This parameter was deprecated in Samba 3\&.0\&.23, but re\-activated in Samba 3\&.0\&.31 and above, as it now only controls permission changes if the user is in the owning primary group\&. It is now no longer equivalent to the
    844752\fIdos filemode\fR
    845753option\&.
     
    858766.sp
    859767Default:
    860 \fI\fIacl map full control\fR\fR\fI = \fR\fITrue\fR\fI \fR
     768\fI\fIacl map full control\fR\fR\fI = \fR\fIyes\fR\fI \fR
    861769.RE
    862770
     
    898806.RE
    899807
    900 add port command (G)
    901 .\" add port command
     808addport command (G)
     809.\" addport command
    902810.PP
    903811.RS 4
     
    930838.sp
    931839Default:
    932 \fI\fIadd port command\fR\fR\fI = \fR\fI\fR\fI \fR
    933 .sp
    934 Example:
    935 \fI\fIadd port command\fR\fR\fI = \fR\fI/etc/samba/scripts/addport\&.sh\fR\fI \fR
     840\fI\fIaddport command\fR\fR\fI = \fR\fI\fR\fI \fR
     841.sp
     842Example:
     843\fI\fIaddport command\fR\fR\fI = \fR\fI/etc/samba/scripts/addport\&.sh\fR\fI \fR
    936844.RE
    937845
     
    11521060\fION DEMAND\fR
    11531061when a user accesses the Samba server\&.
    1154 .sp
    1155 In order to use this option,
    1156 \fBsmbd\fR(8)
    1157 must
    1158 \fINOT\fR
    1159 be set to
    1160 \m[blue]\fBsecurity = share\fR\m[]
    1161 and
    1162 \m[blue]\fBadd user script\fR\m[]
    1163 must be set to a full pathname for a script that will create a UNIX user given one argument of
    1164 \fI%u\fR, which expands into the UNIX user name to create\&.
    11651062.sp
    11661063When the Windows user attempts to access the Samba server, at login (session setup in the SMB protocol) time,
     
    12001097.RS 4
    12011098Full path to the script that will be called when a user is added to a group using the Windows NT domain administration tools\&. It will be run by
    1202 \fBsmbd\fR(8)
    1203 \fIAS ROOT\fR\&. Any
     1099\fBsmbd\fR(8)\fIAS ROOT\fR\&. Any
    12041100\fI%g\fR
    12051101will be replaced with the group name and any
     
    12421138You should use this option very carefully, as any user in this list will be able to do anything they like on the share, irrespective of file permissions\&.
    12431139.sp
    1244 This parameter will not work with the
    1245 \m[blue]\fBsecurity = share\fR\m[]
    1246 in Samba 3\&.0\&. This is by design\&.
    1247 .sp
    12481140Default:
    12491141\fI\fIadmin users\fR\fR\fI = \fR\fI\fR\fI \fR
     
    12651157.RE
    12661158
     1159afs token lifetime (G)
     1160.\" afs token lifetime
     1161.PP
     1162.RS 4
     1163This parameter controls the lifetime of tokens that the AFS fake\-kaserver claims\&. In reality these never expire but this lifetime controls when the afs client will forget the token\&.
     1164.sp
     1165Set this parameter to 0 to get
     1166\fBNEVERDATE\fR\&.
     1167.sp
     1168Default:
     1169\fI\fIafs token lifetime\fR\fR\fI = \fR\fI604800\fR\fI \fR
     1170.RE
     1171
    12671172afs username map (G)
    12681173.\" afs username map
     
    12781183Example:
    12791184\fI\fIafs username map\fR\fR\fI = \fR\fI%u@afs\&.samba\&.org\fR\fI \fR
     1185.RE
     1186
     1187aio max threads (G)
     1188.\" aio max threads
     1189.PP
     1190.RS 4
     1191The integer parameter specifies the maximum number of threads each smbd process will create when doing parallel asynchronous IO calls\&. If the number of outstanding calls is greater than this number the requests will not be refused but go onto a queue and will be scheduled in turn as outstanding requests complete\&.
     1192.sp
     1193Related command:
     1194\m[blue]\fBaio read size\fR\m[]
     1195.sp
     1196Related command:
     1197\m[blue]\fBaio write size\fR\m[]
     1198.sp
     1199Default:
     1200\fI\fIaio max threads\fR\fR\fI = \fR\fI100\fR\fI \fR
    12801201.RE
    12811202
     
    13451266This determines how Samba will use its algorithmic mapping from uids/gid to the RIDs needed to construct NT Security Identifiers\&.
    13461267.sp
    1347 Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with sytem users etc\&.
     1268Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with system users etc\&.
    13481269.sp
    13491270All UIDs and GIDs must be able to be resolved into SIDs for the correct operation of ACLs on the server\&. As such the algorithmic mapping can\*(Aqt be \*(Aqturned off\*(Aq, but pushing it \*(Aqout of the way\*(Aq should resolve the issues\&. Users and groups can then be assigned \*(Aqlow\*(Aq RIDs in arbitrary\-rid supporting backends\&.
     
    13691290Example:
    13701291\fI\fIallocation roundup size\fR\fR\fI = \fR\fI0 # (to disable roundups)\fR\fI \fR
     1292.RE
     1293
     1294allow dcerpc auth level connect (G)
     1295.\" allow dcerpc auth level connect
     1296.PP
     1297.RS 4
     1298This option controls whether DCERPC services are allowed to be used with DCERPC_AUTH_LEVEL_CONNECT, which provides authentication, but no per message integrity nor privacy protection\&.
     1299.sp
     1300Some interfaces like samr, lsarpc and netlogon have a hard\-coded default of
     1301\fBno\fR
     1302and epmapper, mgmt and rpcecho have a hard\-coded default of
     1303\fByes\fR\&.
     1304.sp
     1305The behavior can be overwritten per interface name (e\&.g\&. lsarpc, netlogon, samr, srvsvc, winreg, wkssvc \&.\&.\&.) by using \*(Aqallow dcerpc auth level connect:interface = yes\*(Aq as option\&.
     1306.sp
     1307This option yields precedence to the implementation specific restrictions\&. E\&.g\&. the drsuapi and backupkey protocols require DCERPC_AUTH_LEVEL_PRIVACY\&. The dnsserver protocol requires DCERPC_AUTH_LEVEL_INTEGRITY\&.
     1308.sp
     1309Default:
     1310\fI\fIallow dcerpc auth level connect\fR\fR\fI = \fR\fIno\fR\fI \fR
     1311.sp
     1312Example:
     1313\fI\fIallow dcerpc auth level connect\fR\fR\fI = \fR\fIyes\fR\fI \fR
     1314.RE
     1315
     1316allow dns updates (G)
     1317.\" allow dns updates
     1318.PP
     1319.RS 4
     1320This option determines what kind of updates to the DNS are allowed\&.
     1321.sp
     1322DNS updates can either be disallowed completely by setting it to
     1323\fBdisabled\fR, enabled over secure connections only by setting it to
     1324\fBsecure only\fR
     1325or allowed in all cases by setting it to
     1326\fBnonsecure\fR\&.
     1327.sp
     1328Default:
     1329\fI\fIallow dns updates\fR\fR\fI = \fR\fIsecure only\fR\fI \fR
     1330.sp
     1331Example:
     1332\fI\fIallow dns updates\fR\fR\fI = \fR\fIdisabled\fR\fI \fR
    13711333.RE
    13721334
     
    13971359.RE
    13981360
     1361allow nt4 crypto (G)
     1362.\" allow nt4 crypto
     1363.PP
     1364.RS 4
     1365This option controls whether the netlogon server (currently only in \*(Aqactive directory domain controller\*(Aq mode), will reject clients which does not support NETLOGON_NEG_STRONG_KEYS nor NETLOGON_NEG_SUPPORTS_AES\&.
     1366.sp
     1367This option was added with Samba 4\&.2\&.0\&. It may lock out clients which worked fine with Samba versions up to 4\&.1\&.x\&. as the effective default was "yes" there, while it is "no" now\&.
     1368.sp
     1369If you have clients without RequireStrongKey = 1 in the registry, you may need to set "allow nt4 crypto = yes", until you have fixed all clients\&.
     1370.sp
     1371"allow nt4 crypto = yes" allows weak crypto to be negotiated, maybe via downgrade attacks\&.
     1372.sp
     1373This option yields precedence to the \*(Aqreject md5 clients\*(Aq option\&.
     1374.sp
     1375Default:
     1376\fI\fIallow nt4 crypto\fR\fR\fI = \fR\fIno\fR\fI \fR
     1377.RE
     1378
    13991379allow trusted domains (G)
    14001380.\" allow trusted domains
     
    14131393Default:
    14141394\fI\fIallow trusted domains\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1415 .RE
    1416 
    1417 announce as (G)
    1418 .\" announce as
    1419 .PP
    1420 .RS 4
    1421 This specifies what type of server
    1422 \fBnmbd\fR(8)
    1423 will announce itself as, to a network neighborhood browse list\&. By default this is set to Windows NT\&. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, Windows NT Workstation, Windows 95 and Windows for Workgroups respectively\&. Do not change this parameter unless you have a specific need to stop Samba appearing as an NT server as this may prevent Samba servers from participating as browser servers correctly\&.
    1424 .sp
    1425 Default:
    1426 \fI\fIannounce as\fR\fR\fI = \fR\fINT Server\fR\fI \fR
    1427 .sp
    1428 Example:
    1429 \fI\fIannounce as\fR\fR\fI = \fR\fIWin95\fR\fI \fR
    1430 .RE
    1431 
    1432 announce version (G)
    1433 .\" announce version
    1434 .PP
    1435 .RS 4
    1436 This specifies the major and minor version numbers that nmbd will use when announcing itself as a server\&. The default is 4\&.9\&. Do not change this parameter unless you have a specific need to set a Samba server to be a downlevel server\&.
    1437 .sp
    1438 Default:
    1439 \fI\fIannounce version\fR\fR\fI = \fR\fI4\&.9\fR\fI \fR
    1440 .sp
    1441 Example:
    1442 \fI\fIannounce version\fR\fR\fI = \fR\fI2\&.0\fR\fI \fR
    14431395.RE
    14441396
     
    14811433Example:
    14821434\fI\fIauth methods\fR\fR\fI = \fR\fIguest sam winbind\fR\fI \fR
     1435.RE
     1436
     1437preload
     1438.\" preload
     1439.PP
     1440.RS 4
     1441This parameter is a synonym for
     1442auto services\&.
     1443.RE
     1444
     1445auto services (G)
     1446.\" auto services
     1447.PP
     1448.RS 4
     1449This is a list of services that you want to be automatically added to the browse lists\&. This is most useful for homes and printers services that would otherwise not be visible\&.
     1450.sp
     1451Note that if you just want all printers in your printcap file loaded then the
     1452\m[blue]\fBload printers\fR\m[]
     1453option is easier\&.
     1454.sp
     1455Default:
     1456\fI\fIauto services\fR\fR\fI = \fR\fI\fR\fI \fR
     1457.sp
     1458Example:
     1459\fI\fIauto services\fR\fR\fI = \fR\fIfred lp colorlp\fR\fI \fR
    14831460.RE
    14841461
     
    15431520parameter list
    15441521\fBsmbpasswd\fR(8)
    1545 and
    1546 \fBswat\fR(8)
    15471522may not work as expected due to the reasons covered below\&.
    15481523.sp
     
    15621537smbpasswd
    15631538can be forced to use the primary IP interface of the local host by using its
    1564 \fBsmbpasswd\fR(8)
    1565 \fI\-r \fR\fI\fIremote machine\fR\fR
     1539\fBsmbpasswd\fR(8)\fI\-r \fR\fI\fIremote machine\fR\fR
    15661540parameter, with
    15671541\fIremote machine\fR
    15681542set to the IP name of the primary interface of the local host\&.
    1569 .sp
    1570 The
    1571 swat
    1572 status page tries to connect with
    1573 smbd
    1574 and
    1575 nmbd
    1576 at the address
    1577 \fI127\&.0\&.0\&.1\fR
    1578 to determine if they are running\&. Not adding
    1579 \fI127\&.0\&.0\&.1\fR
    1580 will cause
    1581 smbd
    1582 and
    1583 nmbd
    1584 to always show "not running" even if they really are\&. This can prevent
    1585 swat
    1586 from starting/stopping/restarting
    1587 smbd
    1588 and
    1589 nmbd\&.
    15901543.sp
    15911544Default:
     
    16761629.sp
    16771630Default:
    1678 \fI\fIcache directory\fR\fR\fI = \fR\fI${prefix}/var/locks\fR\fI \fR
     1631\fI\fIcache directory\fR\fR\fI = \fR\fI${prefix}/var/cache\fR\fI \fR
    16791632.sp
    16801633Example:
     
    17011654.RE
    17021655
    1703 change notify (S)
     1656change notify (G)
    17041657.\" change notify
    17051658.PP
     
    17341687will automatically invoke the
    17351688\fIchange share command\fR
    1736 with five parameters\&.
     1689with six parameters\&.
    17371690.sp
    17381691.RS 4
     
    17981751.RE
    17991752.sp
     1753.RS 4
     1754.ie n \{\
     1755\h'-04'\(bu\h'+03'\c
     1756.\}
     1757.el \{\
     1758.sp -1
     1759.IP \(bu 2.3
     1760.\}
     1761\fICSC policy\fR
     1762\- client side caching policy in string form\&. Valid values are: manual, documents, programs, disable\&.
     1763.RE
     1764.sp
    18001765.RE
    18011766This parameter is only used to modify existing file share definitions\&. To modify printer shares, use the "Printers\&.\&.\&." folder as seen when browsing the Samba host\&.
     
    18211786.sp
    18221787Default:
    1823 \fI\fIcheck password script\fR\fR\fI = \fR\fIDisabled\fR\fI \fR
     1788\fI\fIcheck password script\fR\fR\fI = \fR\fI # Disabled\fR\fI \fR
    18241789.sp
    18251790Example:
    18261791\fI\fIcheck password script\fR\fR\fI = \fR\fI/usr/local/sbin/crackcheck\fR\fI \fR
     1792.RE
     1793
     1794cldap port (G)
     1795.\" cldap port
     1796.PP
     1797.RS 4
     1798This option controls the port used by the CLDAP protocol\&.
     1799.sp
     1800Default:
     1801\fI\fIcldap port\fR\fR\fI = \fR\fI389\fR\fI \fR
     1802.sp
     1803Example:
     1804\fI\fIcldap port\fR\fR\fI = \fR\fI3389\fR\fI \fR
     1805.RE
     1806
     1807client ipc max protocol (G)
     1808.\" client ipc max protocol
     1809.PP
     1810.RS 4
     1811The value of the parameter (a string) is the highest protocol level that will be supported for IPC$ connections as DCERPC transport\&.
     1812.sp
     1813Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     1814.sp
     1815The value
     1816\fBdefault\fR
     1817refers to the latest supported protocol, currently
     1818\fBSMB3_11\fR\&.
     1819.sp
     1820See
     1821\m[blue]\fBclient max protocol\fR\m[]
     1822for a full list of available protocols\&. The values CORE, COREPLUS, LANMAN1, LANMAN2 are silently upgraded to NT1\&.
     1823.sp
     1824Default:
     1825\fI\fIclient ipc max protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR
     1826.sp
     1827Example:
     1828\fI\fIclient ipc max protocol\fR\fR\fI = \fR\fISMB2_10\fR\fI \fR
     1829.RE
     1830
     1831client ipc min protocol (G)
     1832.\" client ipc min protocol
     1833.PP
     1834.RS 4
     1835This setting controls the minimum protocol version that the will be attempted to use for IPC$ connections as DCERPC transport\&.
     1836.sp
     1837Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     1838.sp
     1839The value
     1840\fBdefault\fR
     1841refers to the higher value of
     1842\fBNT1\fR
     1843and the effective value of
     1844\m[blue]\fBclient min protocol\fR\m[]\&.
     1845.sp
     1846See
     1847\m[blue]\fBclient max protocol\fR\m[]
     1848for a full list of available protocols\&. The values CORE, COREPLUS, LANMAN1, LANMAN2 are silently upgraded to NT1\&.
     1849.sp
     1850Default:
     1851\fI\fIclient ipc min protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR
     1852.sp
     1853Example:
     1854\fI\fIclient ipc min protocol\fR\fR\fI = \fR\fISMB3_11\fR\fI \fR
     1855.RE
     1856
     1857client ipc signing (G)
     1858.\" client ipc signing
     1859.PP
     1860.RS 4
     1861This controls whether the client is allowed or required to use SMB signing for IPC$ connections as DCERPC transport\&. Possible values are
     1862\fIauto\fR,
     1863\fImandatory\fR
     1864and
     1865\fIdisabled\fR\&.
     1866.sp
     1867When set to mandatory or default, SMB signing is required\&.
     1868.sp
     1869When set to auto, SMB signing is offered, but not enforced and if set to disabled, SMB signing is not offered either\&.
     1870.sp
     1871Connections from winbindd to Active Directory Domain Controllers always enforce signing\&.
     1872.sp
     1873Default:
     1874\fI\fIclient ipc signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR
    18271875.RE
    18281876
     
    18671915are only available if Samba has been compiled against a modern OpenLDAP version (2\&.3\&.x or higher)\&.
    18681916.sp
    1869 This option is needed in the case of Domain Controllers enforcing the usage of signed LDAP connections (e\&.g\&. Windows 2000 SP3 or higher)\&. LDAP sign and seal can be controlled with the registry key "HKLM\eSystem\eCurrentControlSet\eServices\e
    1870 NTDS\eParameters\eLDAPServerIntegrity" on the Windows server side\&.
     1917This option is needed in the case of Domain Controllers enforcing the usage of signed LDAP connections (e\&.g\&. Windows 2000 SP3 or higher)\&. LDAP sign and seal can be controlled with the registry key "HKLM\eSystem\eCurrentControlSet\eServices\eNTDS\eParameters\eLDAPServerIntegrity" on the Windows server side\&.
    18711918.sp
    18721919Depending on the used KRB5 library (MIT and older Heimdal versions) it is possible that the message "integrity only" is not supported\&. In this case,
     
    18761923.sp
    18771924The default value is
    1878 \fIplain\fR
    1879 which is not irritable to KRB5 clock skew errors\&. That implies synchronizing the time with the KDC in the case of using
    1880 \fIsign\fR
    1881 or
    1882 \fIseal\fR\&.
    1883 .sp
    1884 Default:
    1885 \fI\fIclient ldap sasl wrapping\fR\fR\fI = \fR\fIplain\fR\fI \fR
    1886 .RE
    1887 
    1888 client ntlmv2 auth (G)
    1889 .\" client ntlmv2 auth
     1925\fIsign\fR\&. That implies synchronizing the time with the KDC in the case of using
     1926\fIKerberos\fR\&.
     1927.sp
     1928Default:
     1929\fI\fIclient ldap sasl wrapping\fR\fR\fI = \fR\fIsign\fR\fI \fR
     1930.RE
     1931
     1932client max protocol (G)
     1933.\" client max protocol
     1934.PP
     1935.RS 4
     1936The value of the parameter (a string) is the highest protocol level that will be supported by the client\&.
     1937.sp
     1938Possible values are :
     1939.sp
     1940.RS 4
     1941.ie n \{\
     1942\h'-04'\(bu\h'+03'\c
     1943.\}
     1944.el \{\
     1945.sp -1
     1946.IP \(bu 2.3
     1947.\}
     1948\fBCORE\fR: Earliest version\&. No concept of user names\&.
     1949.RE
     1950.sp
     1951.RS 4
     1952.ie n \{\
     1953\h'-04'\(bu\h'+03'\c
     1954.\}
     1955.el \{\
     1956.sp -1
     1957.IP \(bu 2.3
     1958.\}
     1959\fBCOREPLUS\fR: Slight improvements on CORE for efficiency\&.
     1960.RE
     1961.sp
     1962.RS 4
     1963.ie n \{\
     1964\h'-04'\(bu\h'+03'\c
     1965.\}
     1966.el \{\
     1967.sp -1
     1968.IP \(bu 2.3
     1969.\}
     1970\fBLANMAN1\fR: First
     1971\fImodern\fR
     1972version of the protocol\&. Long filename support\&.
     1973.RE
     1974.sp
     1975.RS 4
     1976.ie n \{\
     1977\h'-04'\(bu\h'+03'\c
     1978.\}
     1979.el \{\
     1980.sp -1
     1981.IP \(bu 2.3
     1982.\}
     1983\fBLANMAN2\fR: Updates to Lanman1 protocol\&.
     1984.RE
     1985.sp
     1986.RS 4
     1987.ie n \{\
     1988\h'-04'\(bu\h'+03'\c
     1989.\}
     1990.el \{\
     1991.sp -1
     1992.IP \(bu 2.3
     1993.\}
     1994\fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&.
     1995.RE
     1996.sp
     1997.RS 4
     1998.ie n \{\
     1999\h'-04'\(bu\h'+03'\c
     2000.\}
     2001.el \{\
     2002.sp -1
     2003.IP \(bu 2.3
     2004.\}
     2005\fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and later versions of Windows\&. SMB2 has sub protocols available\&.
     2006.sp
     2007.RS 4
     2008.ie n \{\
     2009\h'-04'\(bu\h'+03'\c
     2010.\}
     2011.el \{\
     2012.sp -1
     2013.IP \(bu 2.3
     2014.\}
     2015\fBSMB2_02\fR: The earliest SMB2 version\&.
     2016.RE
     2017.sp
     2018.RS 4
     2019.ie n \{\
     2020\h'-04'\(bu\h'+03'\c
     2021.\}
     2022.el \{\
     2023.sp -1
     2024.IP \(bu 2.3
     2025.\}
     2026\fBSMB2_10\fR: Windows 7 SMB2 version\&.
     2027.RE
     2028.sp
     2029.RS 4
     2030.ie n \{\
     2031\h'-04'\(bu\h'+03'\c
     2032.\}
     2033.el \{\
     2034.sp -1
     2035.IP \(bu 2.3
     2036.\}
     2037\fBSMB2_22\fR: Early Windows 8 SMB2 version\&.
     2038.RE
     2039.sp
     2040.RS 4
     2041.ie n \{\
     2042\h'-04'\(bu\h'+03'\c
     2043.\}
     2044.el \{\
     2045.sp -1
     2046.IP \(bu 2.3
     2047.\}
     2048\fBSMB2_24\fR: Windows 8 beta SMB2 version\&.
     2049.RE
     2050.sp
     2051.RE
     2052By default SMB2 selects the SMB2_10 variant\&.
     2053.RE
     2054.sp
     2055.RS 4
     2056.ie n \{\
     2057\h'-04'\(bu\h'+03'\c
     2058.\}
     2059.el \{\
     2060.sp -1
     2061.IP \(bu 2.3
     2062.\}
     2063\fBSMB3\fR: The same as SMB2\&. Used by Windows 8\&. SMB3 has sub protocols available\&.
     2064.sp
     2065.RS 4
     2066.ie n \{\
     2067\h'-04'\(bu\h'+03'\c
     2068.\}
     2069.el \{\
     2070.sp -1
     2071.IP \(bu 2.3
     2072.\}
     2073\fBSMB3_00\fR: Windows 8 SMB3 version\&. (mostly the same as SMB2_24)
     2074.RE
     2075.sp
     2076.RS 4
     2077.ie n \{\
     2078\h'-04'\(bu\h'+03'\c
     2079.\}
     2080.el \{\
     2081.sp -1
     2082.IP \(bu 2.3
     2083.\}
     2084\fBSMB3_02\fR: Windows 8\&.1 SMB3 version\&.
     2085.RE
     2086.sp
     2087.RS 4
     2088.ie n \{\
     2089\h'-04'\(bu\h'+03'\c
     2090.\}
     2091.el \{\
     2092.sp -1
     2093.IP \(bu 2.3
     2094.\}
     2095\fBSMB3_10\fR: early Windows 10 technical preview SMB3 version\&.
     2096.RE
     2097.sp
     2098.RS 4
     2099.ie n \{\
     2100\h'-04'\(bu\h'+03'\c
     2101.\}
     2102.el \{\
     2103.sp -1
     2104.IP \(bu 2.3
     2105.\}
     2106\fBSMB3_11\fR: Windows 10 technical preview SMB3 version (maybe final)\&.
     2107.RE
     2108.sp
     2109.RE
     2110By default SMB3 selects the SMB3_11 variant\&.
     2111.RE
     2112.sp
     2113.RE
     2114Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     2115.sp
     2116The value
     2117\fBdefault\fR
     2118refers to
     2119\fBNT1\fR\&.
     2120.sp
     2121IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the
     2122\m[blue]\fBclient ipc max protocol\fR\m[]
     2123option\&.
     2124.sp
     2125Default:
     2126\fI\fIclient max protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR
     2127.sp
     2128Example:
     2129\fI\fIclient max protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR
     2130.RE
     2131
     2132client min protocol (G)
     2133.\" client min protocol
     2134.PP
     2135.RS 4
     2136This setting controls the minimum protocol version that the client will attempt to use\&.
     2137.sp
     2138Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     2139.sp
     2140See
     2141Related command: \m[blue]\fBclient max protocol\fR\m[]
     2142for a full list of available protocols\&.
     2143.sp
     2144IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the
     2145\m[blue]\fBclient ipc min protocol\fR\m[]
     2146option\&.
     2147.sp
     2148Default:
     2149\fI\fIclient min protocol\fR\fR\fI = \fR\fICORE\fR\fI \fR
     2150.sp
     2151Example:
     2152\fI\fIclient min protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR
     2153.RE
     2154
     2155client NTLMv2 auth (G)
     2156.\" client NTLMv2 auth
    18902157.PP
    18912158.RS 4
     
    19072174Note that Windows Vista and later versions already use NTLMv2 by default, and some sites (particularly those following \*(Aqbest practice\*(Aq security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\&.
    19082175.sp
    1909 Default:
    1910 \fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fIyes\fR\fI \fR
     2176When
     2177\m[blue]\fBclient use spnego\fR\m[]
     2178is also set to
     2179\fByes\fR
     2180extended security (SPNEGO) is required in order to use NTLMv2 only within NTLMSSP\&. This behavior was introduced with the patches for CVE\-2016\-2111\&.
     2181.sp
     2182Default:
     2183\fI\fIclient NTLMv2 auth\fR\fR\fI = \fR\fIyes\fR\fI \fR
    19112184.RE
    19122185
     
    19332206denies access if the server is not able to speak netlogon schannel\&.
    19342207.sp
     2208Note that for active directory domains this is hardcoded to
     2209\m[blue]\fBclient schannel = yes\fR\m[]\&.
     2210.sp
     2211This option yields precedence to the
     2212\m[blue]\fBrequire strong key\fR\m[]
     2213option\&.
     2214.sp
    19352215Default:
    19362216\fI\fIclient schannel\fR\fR\fI = \fR\fIauto\fR\fI \fR
     
    19502230\fIdisabled\fR\&.
    19512231.sp
    1952 When set to auto, SMB signing is offered, but not enforced\&. When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\&.
    1953 .sp
    1954 Default:
    1955 \fI\fIclient signing\fR\fR\fI = \fR\fIauto\fR\fI \fR
     2232When set to auto or default, SMB signing is offered, but not enforced\&.
     2233.sp
     2234When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\&.
     2235.sp
     2236IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the
     2237\m[blue]\fBclient ipc signing\fR\m[]
     2238option\&.
     2239.sp
     2240Default:
     2241\fI\fIclient signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR
    19562242.RE
    19572243
     
    19662252If enabled, Samba can attempt to use Kerberos to contact servers known only by IP address\&. Kerberos relies on names, so ordinarily cannot function in this situation\&.
    19672253.sp
     2254This is a VERY BAD IDEA for security reasons, and so this parameter SHOULD NOT BE USED\&. It will be removed in a future version of Samba\&.
     2255.sp
    19682256If disabled, Samba will use the name used to look up the server when asking the KDC for a ticket\&. This avoids situations where a server may impersonate another, soliciting authentication as one principal while being known on the network as another\&.
    19692257.sp
    19702258Note that Windows XP SP2 and later versions already follow this behaviour, and Windows Vista and later servers no longer supply this \*(Aqrfc4178 hint\*(Aq principal on the server side\&.
     2259.sp
     2260This parameter is deprecated in Samba 4\&.2\&.1 and will be removed (along with the functionality) in a later release of Samba\&.
    19712261.sp
    19722262Default:
     
    19792269.RS 4
    19802270This variable controls whether Samba clients will try to use Simple and Protected NEGOciation (as specified by rfc2478) with supporting servers (including WindowsXP, Windows2000 and Samba 3\&.0) to agree upon an authentication mechanism\&. This enables Kerberos authentication in particular\&.
     2271.sp
     2272When
     2273\m[blue]\fBclient NTLMv2 auth\fR\m[]
     2274is also set to
     2275\fByes\fR
     2276extended security (SPNEGO) is required in order to use NTLMv2 only within NTLMSSP\&. This behavior was introduced with the patches for CVE\-2016\-2111\&.
    19812277.sp
    19822278Default:
     
    20922388.PP
    20932389.RS 4
    2094 Setting this paramter to
     2390Setting this parameter to
    20952391no
    20962392prevents winbind from creating custom krb5\&.conf files\&. Winbind normally does this because the krb5 libraries are not AD\-site\-aware and thus would pick any domain controller out of potentially very many\&. Winbind is site\-aware and makes the krb5 libraries use a local DC by creating its own krb5\&.conf files\&.
     
    21322428for details\&.
    21332429.sp
    2134 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\&. If the administrator wishes to enforce a mask on access control lists also, they need to set the
    2135 \m[blue]\fBsecurity mask\fR\m[]\&.
    2136 .sp
    21372430Default:
    21382431\fI\fIcreate mask\fR\fR\fI = \fR\fI0744\fR\fI \fR
     
    21932486.PP
    21942487.RS 4
    2195 This parameter specifies a timeout in seconds for the connection between Samba and ctdb\&. It is only valid if you have compiled Samba with clustering and if you have set
     2488This parameter specifies a timeout in milliseconds for the connection between Samba and ctdb\&. It is only valid if you have compiled Samba with clustering and if you have set
    21962489\fIclustering=yes\fR\&.
    21972490.sp
    21982491When something in the cluster blocks, it can happen that we wait indefinitely long for ctdb, just adding to the blocking condition\&. In a well\-running cluster this should never happen, but there are too many components in a cluster that might have hickups\&. Choosing the right balance for this value is very tricky, because on a busy cluster long service times to transfer something across the cluster might be valid\&. Setting it too short will degrade the service your cluster presents, setting it too long might make the cluster itself not recover from something severely broken for too long\&.
    21992492.sp
    2200 Be aware that if you set this parameter, this needs to be in the file smb\&.conf, it is not really helpful to put this into a registry configuration (typical on a cluster), because to access the registry contact to ctdb is requred\&.
     2493Be aware that if you set this parameter, this needs to be in the file smb\&.conf, it is not really helpful to put this into a registry configuration (typical on a cluster), because to access the registry contact to ctdb is required\&.
    22012494.sp
    22022495Setting
    22032496\fIctdb timeout\fR
    2204 to n makes any process waiting longer than n seconds for a reply by the cluster panic\&. Setting it to 0 (the default) makes Samba block forever, which is the highly recommended default\&.
     2497to n makes any process waiting longer than n milliseconds for a reply by the cluster panic\&. Setting it to 0 (the default) makes Samba block forever, which is the highly recommended default\&.
    22052498.sp
    22062499Default:
     
    22432536.sp
    22442537Default:
    2245 \fI\fIcups encrypt\fR\fR\fI = \fR\fI"no"\fR\fI \fR
     2538\fI\fIcups encrypt\fR\fR\fI = \fR\fIno\fR\fI \fR
    22462539.RE
    22472540
     
    22952588.RE
    22962589
     2590dcerpc endpoint servers (G)
     2591.\" dcerpc endpoint servers
     2592.PP
     2593.RS 4
     2594Specifies which DCE/RPC endpoint servers should be run\&.
     2595.sp
     2596Default:
     2597\fI\fIdcerpc endpoint servers\fR\fR\fI = \fR\fIepmapper, wkssvc, rpcecho, samr, netlogon, lsarpc, spoolss, drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver\fR\fI \fR
     2598.sp
     2599Example:
     2600\fI\fIdcerpc endpoint servers\fR\fR\fI = \fR\fIrpcecho\fR\fI \fR
     2601.RE
     2602
    22972603deadtime (G)
    22982604.\" deadtime
     
    23722678Default:
    23732679\fI\fIdebug prefix timestamp\fR\fR\fI = \fR\fIno\fR\fI \fR
    2374 .RE
    2375 
    2376 timestamp logs
    2377 .\" timestamp logs
    2378 .PP
    2379 .RS 4
    2380 This parameter is a synonym for
    2381 debug timestamp\&.
    2382 .RE
    2383 
    2384 debug timestamp (G)
    2385 .\" debug timestamp
    2386 .PP
    2387 .RS 4
    2388 Samba debug log messages are timestamped by default\&. If you are running at a high
    2389 \m[blue]\fBdebug level\fR\m[]
    2390 these timestamps can be distracting\&. This boolean parameter allows timestamping to be turned off\&.
    2391 .sp
    2392 Default:
    2393 \fI\fIdebug timestamp\fR\fR\fI = \fR\fIyes\fR\fI \fR
    23942680.RE
    23952681
     
    25042790.sp
    25052791Default:
    2506 \fI\fIdefer sharing violations\fR\fR\fI = \fR\fITrue\fR\fI \fR
     2792\fI\fIdefer sharing violations\fR\fR\fI = \fR\fIyes\fR\fI \fR
    25072793.RE
    25082794
     
    25122798.RS 4
    25132799This is the full pathname to a script that will be run
    2514 \fIAS ROOT\fR
    2515 \fBsmbd\fR(8)
     2800\fIAS ROOT\fR\fBsmbd\fR(8)
    25162801when a group is requested to be deleted\&. It will expand any
    25172802\fI%g\fR
     
    26322917.RS 4
    26332918Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration tools\&. It will be run by
    2634 \fBsmbd\fR(8)
    2635 \fIAS ROOT\fR\&. Any
     2919\fBsmbd\fR(8)\fIAS ROOT\fR\&. Any
    26362920\fI%g\fR
    26372921will be replaced with the group name and any
     
    27052989.sp
    27062990Example:
    2707 \fI\fIdfree cache time\fR\fR\fI = \fR\fIdfree cache time = 60\fR\fI \fR
     2991\fI\fIdfree cache time\fR\fR\fI = \fR\fI60\fR\fI \fR
    27082992.RE
    27092993
     
    27673051.RE
    27683052
     3053dgram port (G)
     3054.\" dgram port
     3055.PP
     3056.RS 4
     3057Specifies which ports the server should listen on for NetBIOS datagram traffic\&.
     3058.sp
     3059Default:
     3060\fI\fIdgram port\fR\fR\fI = \fR\fI138\fR\fI \fR
     3061.RE
     3062
    27693063directory mode
    27703064.\" directory mode
     
    27913085parameter\&. This parameter is set to 000 by default (i\&.e\&. no extra mode bits are added)\&.
    27923086.sp
    2793 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\&. If the administrator wishes to enforce a mask on access control lists also, they need to set the
    2794 \m[blue]\fBdirectory security mask\fR\m[]\&.
    2795 .sp
    27963087Default:
    27973088\fI\fIdirectory mask\fR\fR\fI = \fR\fI0755\fR\fI \fR
     
    28053096.PP
    28063097.RS 4
    2807 This parameter specifies the the size of the directory name cache\&. It will be needed to turn this off for *BSD systems\&.
     3098This parameter specifies the size of the directory name cache\&. It will be needed to turn this off for *BSD systems\&.
    28083099.sp
    28093100Default:
     
    28153106.PP
    28163107.RS 4
    2817 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\&.
    2818 .sp
    2819 This parameter is applied as a mask (AND\*(Aqed with) to the incoming permission bits, thus resetting any bits not in this mask\&. Make sure not to mix up this parameter with
    2820 \m[blue]\fBforce directory security mode\fR\m[], which works similar like this one but uses logical OR instead of AND\&. Essentially, zero bits in this mask are a set of bits that will always be set to zero\&.
    2821 .sp
    2822 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\&.
    2823 .sp
    2824 If not set explicitly this parameter is set to 0777 meaning a user is allowed to set all the user/group/world permissions on a directory\&.
    2825 .sp
    2826 \fINote\fR
    2827 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it as the default of
    2828 \fB0777\fR\&.
    2829 .sp
    2830 Default:
    2831 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI0777\fR\fI \fR
    2832 .sp
    2833 Example:
    2834 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI0700\fR\fI \fR
     3108This parameter has been removed for Samba 4\&.0\&.0\&.
     3109.sp
     3110\fINo default\fR
    28353111.RE
    28363112
     
    28703146.RE
    28713147
    2872 display charset (G)
    2873 .\" display charset
    2874 .PP
    2875 .RS 4
    2876 Specifies the charset that samba will use to print messages to stdout and stderr\&. The default value is "LOCALE", which means automatically set, depending on the current locale\&. The value should generally be the same as the value of the parameter
    2877 \m[blue]\fBunix charset\fR\m[]\&.
    2878 .sp
    2879 Default:
    2880 \fI\fIdisplay charset\fR\fR\fI = \fR\fI"LOCALE" or "ASCII" (depending on the system)\fR\fI \fR
    2881 .sp
    2882 Example:
    2883 \fI\fIdisplay charset\fR\fR\fI = \fR\fIUTF8\fR\fI \fR
    2884 .RE
    2885 
    28863148dmapi support (S)
    28873149.\" dmapi support
     
    28963158Default:
    28973159\fI\fIdmapi support\fR\fR\fI = \fR\fIno\fR\fI \fR
     3160.RE
     3161
     3162dns forwarder (G)
     3163.\" dns forwarder
     3164.PP
     3165.RS 4
     3166This option specifies the DNS server that DNS requests will be forwarded to if they can not be handled by Samba itself\&.
     3167.sp
     3168The DNS forwarder is only used if the internal DNS server in Samba is used\&.
     3169.sp
     3170Default:
     3171\fI\fIdns forwarder\fR\fR\fI = \fR\fI\fR\fI \fR
     3172.sp
     3173Example:
     3174\fI\fIdns forwarder\fR\fR\fI = \fR\fI192\&.168\&.0\&.1\fR\fI \fR
    28983175.RE
    28993176
     
    29133190Default:
    29143191\fI\fIdns proxy\fR\fR\fI = \fR\fIyes\fR\fI \fR
     3192.RE
     3193
     3194dns update command (G)
     3195.\" dns update command
     3196.PP
     3197.RS 4
     3198This option sets the command that is called when there are DNS updates\&. It should update the local machines DNS names using TSIG\-GSS\&.
     3199.sp
     3200Default:
     3201\fI\fIdns update command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_dnsupdate\fR\fI \fR
     3202.sp
     3203Example:
     3204\fI\fIdns update command\fR\fR\fI = \fR\fI/usr/local/sbin/dnsupdate\fR\fI \fR
    29153205.RE
    29163206
     
    30333323.PP
    30343324.RS 4
    3035 Under DOS and Windows, if a user can write to a file they can change the timestamp on it\&. Under POSIX semantics, only the owner of the file or root may change the timestamp\&. By default, Samba emulates the DOS semantics and allows to change the timestamp on a file if the user
     3325Under DOS and Windows, if a user can write to a file they can change the timestamp on it\&. Under POSIX semantics, only the owner of the file or root may change the timestamp\&. By default, Samba emulates the DOS semantics and allows one to change the timestamp on a file if the user
    30363326smbd
    30373327is acting on behalf has write permissions\&. Due to changes in Microsoft Office 2000 and beyond, the default for this parameter has been changed from "no" to "yes" in Samba 3\&.0\&.14 and above\&. Microsoft Excel will display dialog box warnings about the file being changed by another user if this parameter is not set to "yes" and files are being shared between users\&.
     
    30393329Default:
    30403330\fI\fIdos filetimes\fR\fR\fI = \fR\fIyes\fR\fI \fR
     3331.RE
     3332
     3333durable handles (S)
     3334.\" durable handles
     3335.PP
     3336.RS 4
     3337This boolean parameter controls whether Samba can grant SMB2 durable file handles on a share\&.
     3338.sp
     3339Note that durable handles are only enabled if
     3340\m[blue]\fBkernel oplocks = no\fR\m[],
     3341\m[blue]\fBkernel share modes = no\fR\m[], and
     3342\m[blue]\fBposix locking = no\fR\m[], i\&.e\&. if the share is configured for CIFS/SMB2 only access, not supporting interoperability features with local UNIX processes or NFS operations\&.
     3343.sp
     3344Also note that, for the time being, durability is not granted for a handle that has the delete on close flag set\&.
     3345.sp
     3346Default:
     3347\fI\fIdurable handles\fR\fR\fI = \fR\fIyes\fR\fI \fR
    30413348.RE
    30423349
     
    30573364.PP
    30583365.RS 4
    3059 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builtin [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$} file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&.
     3366Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builtin [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$] file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&.
    30603367.sp
    30613368Default:
     
    31213428\fBsmbpasswd\fR(8)
    31223429program for information on how to set up and maintain this file), or set the
    3123 \m[blue]\fBsecurity = [server|domain|ads]\fR\m[]
     3430\m[blue]\fBsecurity = [domain|ads]\fR\m[]
    31243431parameter which causes
    31253432smbd
     
    31683475.RS 4
    31693476This option defines a list of log names that Samba will report to the Microsoft EventViewer utility\&. The listed eventlogs will be associated with tdb file on disk in the
    3170 $(lockdir)/eventlog\&.
     3477$(statedir)/eventlog\&.
    31713478.sp
    31723479The administrator must use an external process to parse the normal Unix logs such as
     
    31893496This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\&. Visual C++ generated makefiles have the object directory as a dependency for each object file, and a make rule to create the directory\&. Also, when NMAKE compares timestamps it uses the creation time when examining a directory\&. Thus the object directory will be created if it does not exist, but once it does exist it will always have an earlier timestamp than the object files it contains\&.
    31903497.sp
    3191 However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or or deleted in the directory\&. NMAKE finds all object files in the object directory\&. The timestamp of the last one built is then compared to the timestamp of the object directory\&. If the directory\*(Aqs timestamp if newer, then all object files will be rebuilt\&. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\&.
     3498However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or deleted in the directory\&. NMAKE finds all object files in the object directory\&. The timestamp of the last one built is then compared to the timestamp of the object directory\&. If the directory\*(Aqs timestamp if newer, then all object files will be rebuilt\&. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\&.
    31923499.sp
    31933500Default:
     
    32493556.sp
    32503557Default:
    3251 \fI\fIforce create mode\fR\fR\fI = \fR\fI000\fR\fI \fR
     3558\fI\fIforce create mode\fR\fR\fI = \fR\fI0000\fR\fI \fR
    32523559.sp
    32533560Example:
     
    32683575.sp
    32693576Default:
    3270 \fI\fIforce directory mode\fR\fR\fI = \fR\fI000\fR\fI \fR
     3577\fI\fIforce directory mode\fR\fR\fI = \fR\fI0000\fR\fI \fR
    32713578.sp
    32723579Example:
     
    32783585.PP
    32793586.RS 4
    3280 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\&.
    3281 .sp
    3282 This parameter is applied as a mask (OR\*(Aqed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\&. Make sure not to mix up this parameter with
    3283 \m[blue]\fBdirectory security mask\fR\m[], which works in a similar manner to this one, but uses a logical AND instead of an OR\&.
    3284 .sp
    3285 Essentially, this mask may be treated as a set of bits that, when modifying security on a directory, to will enable (1) any flags that are off (0) but which the mask has set to on (1)\&.
    3286 .sp
    3287 If not set explicitly this parameter is 0000, which allows a user to modify all the user/group/world permissions on a directory without restrictions\&.
    3288 .if n \{\
    3289 .sp
    3290 .\}
    3291 .RS 4
    3292 .it 1 an-trap
    3293 .nr an-no-space-flag 1
    3294 .nr an-break-flag 1
    3295 .br
    3296 .ps +1
    3297 \fBNote\fR
    3298 .ps -1
    3299 .br
    3300 Users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it set as 0000\&.
    3301 .sp .5v
    3302 .RE
    3303 Default:
    3304 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI0\fR\fI \fR
    3305 .sp
    3306 Example:
    3307 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI700\fR\fI \fR
     3587This parameter has been removed for Samba 4\&.0\&.0\&.
     3588.sp
     3589\fINo default\fR
    33083590.RE
    33093591
     
    33653647.PP
    33663648.RS 4
    3367 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\&.
    3368 .sp
    3369 This parameter is applied as a mask (OR\*(Aqed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\&. Make sure not to mix up this parameter with
    3370 \m[blue]\fBsecurity mask\fR\m[], which works similar like this one but uses logical AND instead of OR\&.
    3371 .sp
    3372 Essentially, one bits in this mask may be treated as a set of bits that, when modifying security on a file, the user has always set to be on\&.
    3373 .sp
    3374 If not set explicitly this parameter is set to 0, and allows a user to modify all the user/group/world permissions on a file, with no restrictions\&.
    3375 .sp
    3376 \fI Note\fR
    3377 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave this set to 0000\&.
    3378 .sp
    3379 Default:
    3380 \fI\fIforce security mode\fR\fR\fI = \fR\fI0\fR\fI \fR
    3381 .sp
    3382 Example:
    3383 \fI\fIforce security mode\fR\fR\fI = \fR\fI700\fR\fI \fR
     3649This parameter has been removed for Samba 4\&.0\&.0\&.
     3650.sp
     3651\fINo default\fR
    33843652.RE
    33853653
     
    34133681Example:
    34143682\fI\fIforce user\fR\fR\fI = \fR\fIauser\fR\fI \fR
     3683.RE
     3684
     3685fss: prune stale (G)
     3686.\" fss: prune stale
     3687.PP
     3688.RS 4
     3689When enabled, Samba\*(Aqs File Server Remove VSS Protocol (FSRVP) server checks all FSRVP initiated snapshots on startup, and removes any corresponding state (including share definitions) for nonexistent snapshot paths\&.
     3690.sp
     3691Default:
     3692\fI\fIfss: prune stale\fR\fR\fI = \fR\fIno\fR\fI \fR
     3693.sp
     3694Example:
     3695\fI\fIfss: prune stale\fR\fR\fI = \fR\fIyes\fR\fI \fR
     3696.RE
     3697
     3698fss: sequence timeout (G)
     3699.\" fss: sequence timeout
     3700.PP
     3701.RS 4
     3702The File Server Remove VSS Protocol (FSRVP) server includes a message sequence timer to ensure cleanup on unexpected client disconnect\&. This parameter overrides the default timeout between FSRVP operations\&. FSRVP timeouts can be completely disabled via a value of 0\&.
     3703.sp
     3704Default:
     3705\fI\fIfss: sequence timeout\fR\fR\fI = \fR\fI180 or 1800, depending on operation\fR\fI \fR
     3706.sp
     3707Example:
     3708\fI\fIfss: sequence timeout\fR\fR\fI = \fR\fI0\fR\fI \fR
    34153709.RE
    34163710
     
    34443738should only be used whenever there is no operating system API available from the OS that samba can use\&.
    34453739.sp
    3446 This option is only available you have compiled Samba with the
    3447 \-\-with\-sys\-quotas
    3448 option or on Linux with
    3449 \-\-with\-quotas
    3450 and a working quota api was found in the system\&.
     3740This option is only available Samba was compiled with quotas support\&.
    34513741.sp
    34523742This parameter should specify the path to a script that queries the quota information for the specified user/group for the partition that the specified directory is on\&.
    34533743.sp
    3454 Such a script should take 3 arguments:
     3744Such a script is being given 3 arguments:
    34553745.sp
    34563746.RS 4
     
    34883778.sp
    34893779.RE
    3490 The type of query can be one of :
     3780The directory is actually mostly just "\&." \- It needs to be treated relatively to the current working directory that the script can also query\&.
     3781.sp
     3782The type of query can be one of:
    34913783.sp
    34923784.RS 4
     
    35353827.sp
    35363828.RE
    3537 This script should print one line as output with spaces between the arguments\&. The arguments are:
    3538 .sp
    3539 .RS 4
    3540 .ie n \{\
    3541 \h'-04'\(bu\h'+03'\c
    3542 .\}
    3543 .el \{\
    3544 .sp -1
    3545 .IP \(bu 2.3
    3546 .\}
    3547 Arg 1 \- quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced)
    3548 .RE
    3549 .sp
    3550 .RS 4
    3551 .ie n \{\
    3552 \h'-04'\(bu\h'+03'\c
    3553 .\}
    3554 .el \{\
    3555 .sp -1
    3556 .IP \(bu 2.3
    3557 .\}
    3558 Arg 2 \- number of currently used blocks
    3559 .RE
    3560 .sp
    3561 .RS 4
    3562 .ie n \{\
    3563 \h'-04'\(bu\h'+03'\c
    3564 .\}
    3565 .el \{\
    3566 .sp -1
    3567 .IP \(bu 2.3
    3568 .\}
    3569 Arg 3 \- the softlimit number of blocks
    3570 .RE
    3571 .sp
    3572 .RS 4
    3573 .ie n \{\
    3574 \h'-04'\(bu\h'+03'\c
    3575 .\}
    3576 .el \{\
    3577 .sp -1
    3578 .IP \(bu 2.3
    3579 .\}
    3580 Arg 4 \- the hardlimit number of blocks
    3581 .RE
    3582 .sp
    3583 .RS 4
    3584 .ie n \{\
    3585 \h'-04'\(bu\h'+03'\c
    3586 .\}
    3587 .el \{\
    3588 .sp -1
    3589 .IP \(bu 2.3
    3590 .\}
    3591 Arg 5 \- currently used number of inodes
    3592 .RE
    3593 .sp
    3594 .RS 4
    3595 .ie n \{\
    3596 \h'-04'\(bu\h'+03'\c
    3597 .\}
    3598 .el \{\
    3599 .sp -1
    3600 .IP \(bu 2.3
    3601 .\}
    3602 Arg 6 \- the softlimit number of inodes
    3603 .RE
    3604 .sp
    3605 .RS 4
    3606 .ie n \{\
    3607 \h'-04'\(bu\h'+03'\c
    3608 .\}
    3609 .el \{\
    3610 .sp -1
    3611 .IP \(bu 2.3
    3612 .\}
    3613 Arg 7 \- the hardlimit number of inodes
    3614 .RE
    3615 .sp
    3616 .RS 4
    3617 .ie n \{\
    3618 \h'-04'\(bu\h'+03'\c
    3619 .\}
    3620 .el \{\
    3621 .sp -1
    3622 .IP \(bu 2.3
    3623 .\}
    3624 Arg 8(optional) \- the number of bytes in a block(default is 1024)
     3829This script should print one line as output with spaces between the columns\&. The printed columns should be:
     3830.sp
     3831.RS 4
     3832.ie n \{\
     3833\h'-04'\(bu\h'+03'\c
     3834.\}
     3835.el \{\
     3836.sp -1
     3837.IP \(bu 2.3
     3838.\}
     38391 \- quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced)
     3840.RE
     3841.sp
     3842.RS 4
     3843.ie n \{\
     3844\h'-04'\(bu\h'+03'\c
     3845.\}
     3846.el \{\
     3847.sp -1
     3848.IP \(bu 2.3
     3849.\}
     38502 \- number of currently used blocks
     3851.RE
     3852.sp
     3853.RS 4
     3854.ie n \{\
     3855\h'-04'\(bu\h'+03'\c
     3856.\}
     3857.el \{\
     3858.sp -1
     3859.IP \(bu 2.3
     3860.\}
     38613 \- the softlimit number of blocks
     3862.RE
     3863.sp
     3864.RS 4
     3865.ie n \{\
     3866\h'-04'\(bu\h'+03'\c
     3867.\}
     3868.el \{\
     3869.sp -1
     3870.IP \(bu 2.3
     3871.\}
     38724 \- the hardlimit number of blocks
     3873.RE
     3874.sp
     3875.RS 4
     3876.ie n \{\
     3877\h'-04'\(bu\h'+03'\c
     3878.\}
     3879.el \{\
     3880.sp -1
     3881.IP \(bu 2.3
     3882.\}
     38835 \- currently used number of inodes
     3884.RE
     3885.sp
     3886.RS 4
     3887.ie n \{\
     3888\h'-04'\(bu\h'+03'\c
     3889.\}
     3890.el \{\
     3891.sp -1
     3892.IP \(bu 2.3
     3893.\}
     38946 \- the softlimit number of inodes
     3895.RE
     3896.sp
     3897.RS 4
     3898.ie n \{\
     3899\h'-04'\(bu\h'+03'\c
     3900.\}
     3901.el \{\
     3902.sp -1
     3903.IP \(bu 2.3
     3904.\}
     39057 \- the hardlimit number of inodes
     3906.RE
     3907.sp
     3908.RS 4
     3909.ie n \{\
     3910\h'-04'\(bu\h'+03'\c
     3911.\}
     3912.el \{\
     3913.sp -1
     3914.IP \(bu 2.3
     3915.\}
     39168 (optional) \- the number of bytes in a block(default is 1024)
    36253917.RE
    36263918.sp
     
    37844076This parameter prevents clients from seeing the existance of files that cannot be read\&. Defaults to off\&.
    37854077.sp
     4078Please note that enabling this can slow down listing large directories significantly\&. Samba has to evaluate the ACLs of all directory members, which can be a lot of effort\&.
     4079.sp
    37864080Default:
    37874081\fI\fIhide unreadable\fR\fR\fI = \fR\fIno\fR\fI \fR
     
    37934087.RS 4
    37944088This parameter prevents clients from seeing the existance of files that cannot be written to\&. Defaults to off\&. Note that unwriteable directories are shown as usual\&.
     4089.sp
     4090Please note that enabling this can slow down listing large directories significantly\&. Samba has to evaluate the ACLs of all directory members, which can be a lot of effort\&.
    37954091.sp
    37964092Default:
     
    39984294.PP
    39994295.RS 4
    4000 This parameter specifies the number of seconds that Winbind\*(Aqs idmap interface will cache positive SID/uid/gid query results\&.
    4001 .sp
    4002 Default:
    4003 \fI\fIidmap cache time\fR\fR\fI = \fR\fI604800 (one week)\fR\fI \fR
    4004 .RE
    4005 
    4006 idmap config (G)
    4007 .\" idmap config
     4296This parameter specifies the number of seconds that Winbind\*(Aqs idmap interface will cache positive SID/uid/gid query results\&. By default, Samba will cache these results for one week\&.
     4297.sp
     4298Default:
     4299\fI\fIidmap cache time\fR\fR\fI = \fR\fI604800\fR\fI \fR
     4300.RE
     4301
     4302idmap config DOMAIN : OPTION (G)
     4303.\" idmap config DOMAIN : OPTION
    40084304.PP
    40094305.RS 4
     
    40144310prefix, followed by a domain name or the asterisk character (*), a colon, and the name of an idmap setting for the chosen domain\&.
    40154311.sp
    4016 The idmap configuration is hence divided into groups, one group for each domain to be configured, and one group with the the asterisk instead of a proper domain name, which speifies the default configuration that is used to catch all domains that do not have an explicit idmap configuration of their own\&.
     4312The idmap configuration is hence divided into groups, one group for each domain to be configured, and one group with the asterisk instead of a proper domain name, which specifies the default configuration that is used to catch all domains that do not have an explicit idmap configuration of their own\&.
    40174313.sp
    40184314There are three general options available:
     
    40204316backend = backend_name
    40214317.RS 4
    4022 This specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. The standard backends are tdb (\fBidmap_tdb\fR(8)), tdb2 (\fBidmap_tdb2\fR(8)), ldap (\fBidmap_ldap\fR(8)), , rid (\fBidmap_rid\fR(8)), , hash (\fBidmap_hash\fR(8)), , autorid (\fBidmap_autorid\fR(8)), , ad (\fBidmap_ad\fR(8)), , adex (\fBidmap_adex\fR(8)), , and nss\&. (\fBidmap_nss\fR(8)), The corresponding manual pages contain the details, but here is a summary\&.
    4023 .sp
    4024 The first three of these create mappings of their own using internal unixid counters and store the mappings in a database\&. These are suitable for use in the default idmap configuration\&. The rid and hash backends use a pure algorithmic calculation to determine the unixid for a SID\&. The autorid module is a mixture of the tdb and rid backend\&. It creates ranges for each domain encountered and then uses the rid algorithm for each of these automatically configured domains individually\&. The ad and adex backends both use unix IDs stored in Active Directory via the standard schema extensions\&. The nss backend reverses the standard winbindd setup and gets the unixids via names from nsswitch which can be useful in an ldap setup\&.
     4318This specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. The standard backends are tdb (\fBidmap_tdb\fR(8)), tdb2 (\fBidmap_tdb2\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), hash (\fBidmap_hash\fR(8)), autorid (\fBidmap_autorid\fR(8)), ad (\fBidmap_ad\fR(8)) and nss (\fBidmap_nss\fR(8))\&. The corresponding manual pages contain the details, but here is a summary\&.
     4319.sp
     4320The first three of these create mappings of their own using internal unixid counters and store the mappings in a database\&. These are suitable for use in the default idmap configuration\&. The rid and hash backends use a pure algorithmic calculation to determine the unixid for a SID\&. The autorid module is a mixture of the tdb and rid backend\&. It creates ranges for each domain encountered and then uses the rid algorithm for each of these automatically configured domains individually\&. The ad backend uses unix ids stored in Active Directory via the standard schema extensions\&. The nss backend reverses the standard winbindd setup and gets the unix ids via names from nsswitch which can be useful in an ldap setup\&.
    40254321.RE
    40264322.PP
    40274323range = low \- high
    40284324.RS 4
    4029 Defines the available matching uid and gid range for which the backend is authoritative\&. For allocating backends, this also defines the start and the end of the range for allocating new unid IDs\&.
     4325Defines the available matching uid and gid range for which the backend is authoritative\&. For allocating backends, this also defines the start and the end of the range for allocating new unique IDs\&.
    40304326.sp
    40314327winbind uses this parameter to find the backend that is authoritative for a unix ID to SID mapping, so it must be set for each individually configured domain and for the default configuration\&. The configured ranges must be mutually disjoint\&.
     
    41234419.RE
    41244420
    4125 include (G)
     4421include (S)
    41264422.\" include
    41274423.PP
     
    41664462The ownership of new files and directories is normally governed by effective uid of the connected user\&. This option allows the Samba administrator to specify that the ownership for new files and directories should be controlled by the ownership of the parent directory\&.
    41674463.sp
    4168 Common scenarios where this behavior is useful is in implementing drop\-boxes where users can create and edit files but not delete them and to ensure that newly create files in a user\*(Aqs roaming profile directory are actually owner by the user\&.
     4464Common scenarios where this behavior is useful is in implementing drop\-boxes, where users can create and edit files but not delete them and ensuring that newly created files in a user\*(Aqs roaming profile directory are actually owned by the user\&.
    41694465.sp
    41704466Default:
     
    42034499.RE
    42044500
     4501init logon delay (G)
     4502.\" init logon delay
     4503.PP
     4504.RS 4
     4505This parameter specifies a delay in milliseconds for the hosts configured for delayed initial samlogon with
     4506\m[blue]\fBinit logon delayed hosts\fR\m[]\&.
     4507.sp
     4508Default:
     4509\fI\fIinit logon delay\fR\fR\fI = \fR\fI100\fR\fI \fR
     4510.RE
     4511
    42054512init logon delayed hosts (G)
    42064513.\" init logon delayed hosts
     
    42204527.RE
    42214528
    4222 init logon delay (G)
    4223 .\" init logon delay
    4224 .PP
    4225 .RS 4
    4226 This parameter specifies a delay in milliseconds for the hosts configured for delayed initial samlogon with
    4227 \m[blue]\fBinit logon delayed hosts\fR\m[]\&.
    4228 .sp
    4229 Default:
    4230 \fI\fIinit logon delay\fR\fR\fI = \fR\fI100\fR\fI \fR
    4231 .RE
    4232 
    42334529interfaces (G)
    42344530.\" interfaces
     
    42894585.sp
    42904586By default Samba enables all active interfaces that are broadcast capable except the loopback adaptor (IP address 127\&.0\&.0\&.1)\&.
     4587.sp
     4588In order to support SMB3 multi\-channel configurations, smbd understands some extra data that can be appended after the actual interface with this extended syntax:
     4589.sp
     4590interface[;key1=value1[,key2=value2[\&.\&.\&.]]]
     4591.sp
     4592Known keys are speed, capability, and if_index\&. Speed is specified in bits per second\&. Known capabilities are RSS and RDMA\&. The if_index should be used with care: the values must not coincide with indexes used by the kernel\&. Note that these options are mainly intended for testing and development rather than for production use\&. At least on Linux systems, these values should be auto\-detected, but the settings can serve as last a resort when autodetection is not working or is not available\&.
    42914593.sp
    42924594The example below configures three network interfaces corresponding to the eth0 device and IP addresses 192\&.168\&.2\&.10 and 192\&.168\&.3\&.10\&. The netmasks of the latter two interfaces would be set to 255\&.255\&.255\&.0\&.
     
    43554657\m[blue]\fBsocket options\fR\m[])\&. Basically you should only use this option if you strike difficulties\&.
    43564658.sp
     4659Please note this option only applies to SMB1 client connections, and has no effect on SMB2 clients\&.
     4660.sp
    43574661Default:
    43584662\fI\fIkeepalive\fR\fR\fI = \fR\fI300\fR\fI \fR
     
    44224726.sp
    44234727Default:
    4424 \fI\fIkerberos method\fR\fR\fI = \fR\fIsecrets only\fR\fI \fR
    4425 .RE
    4426 
    4427 kernel change notify (S)
     4728\fI\fIkerberos method\fR\fR\fI = \fR\fIdefault\fR\fI \fR
     4729.RE
     4730
     4731kernel change notify (G)
    44284732.\" kernel change notify
    44294733.PP
     
    44374741.RE
    44384742
    4439 kernel oplocks (G)
     4743kernel oplocks (S)
    44404744.\" kernel oplocks
    44414745.PP
     
    44434747For UNIXes that support kernel based
    44444748\m[blue]\fBoplocks\fR\m[]
    4445 (currently only IRIX and the Linux 2\&.4 kernel), this parameter allows the use of them to be turned on or off\&.
     4749(currently only IRIX and the Linux 2\&.4 kernel), this parameter allows the use of them to be turned on or off\&. However, this disables Level II oplocks for clients as the Linux and IRIX kernels do not support them properly\&.
    44464750.sp
    44474751Kernel oplocks support allows Samba
     
    44534757cool feature :\-)\&.
    44544758.sp
     4759If you do not need this interaction, you should disable the parameter on Linux and IRIX to get Level II oplocks and the associated performance benefit\&.
     4760.sp
    44554761This parameter defaults to
    4456 \fBon\fR, but is translated to a no\-op on systems that no not have the necessary kernel support\&. You should never need to touch this parameter\&.
    4457 .sp
    4458 Default:
    4459 \fI\fIkernel oplocks\fR\fR\fI = \fR\fIyes\fR\fI \fR
     4762\fBno\fR
     4763and is translated to a no\-op on systems that do not have the necessary kernel support\&.
     4764.sp
     4765Default:
     4766\fI\fIkernel oplocks\fR\fR\fI = \fR\fIno\fR\fI \fR
     4767.RE
     4768
     4769kernel share modes (S)
     4770.\" kernel share modes
     4771.PP
     4772.RS 4
     4773This parameter controls whether SMB share modes are translated into UNIX flocks\&.
     4774.sp
     4775Kernel share modes provide a minimal level of interoperability with local UNIX processes and NFS operations by preventing access with flocks corresponding to the SMB share modes\&. Generally, it is very desirable to leave this enabled\&.
     4776.sp
     4777Note that in order to use SMB2 durable file handles on a share, you have to turn kernel share modes off\&.
     4778.sp
     4779This parameter defaults to
     4780\fByes\fR
     4781and is translated to a no\-op on systems that do not have the necessary kernel flock support\&.
     4782.sp
     4783Default:
     4784\fI\fIkernel share modes\fR\fR\fI = \fR\fIyes\fR\fI \fR
     4785.RE
     4786
     4787kpasswd port (G)
     4788.\" kpasswd port
     4789.PP
     4790.RS 4
     4791Specifies which ports the Kerberos server should listen on for password changes\&.
     4792.sp
     4793Default:
     4794\fI\fIkpasswd port\fR\fR\fI = \fR\fI464\fR\fI \fR
     4795.RE
     4796
     4797krb5 port (G)
     4798.\" krb5 port
     4799.PP
     4800.RS 4
     4801Specifies which port the KDC should listen on for Kerberos traffic\&.
     4802.sp
     4803Default:
     4804\fI\fIkrb5 port\fR\fR\fI = \fR\fI88\fR\fI \fR
    44604805.RE
    44614806
     
    44724817When this parameter is set to
    44734818no
    4474 this will also result in sambaLMPassword in Samba\*(Aqs passdb being blanked after the next password change\&. As a result of that lanman clients won\*(Aqt be able to authenticate, even if lanman auth is reenabled later on\&.
     4819this will also result in sambaLMPassword in Samba\*(Aqs passdb being blanked after the next password change\&. As a result of that lanman clients won\*(Aqt be able to authenticate, even if lanman auth is re\-enabled later on\&.
    44754820.sp
    44764821Unlike the
     
    45484893for tracing function calls\&.
    45494894.sp
    4550 The debug ouput from the LDAP libraries appears with the prefix [LDAP] in Samba\*(Aqs logging output\&. The level at which LDAP logging is printed is controlled by the parameter
     4895The debug output from the LDAP libraries appears with the prefix [LDAP] in Samba\*(Aqs logging output\&. The level at which LDAP logging is printed is controlled by the parameter
    45514896\fIldap debug threshold\fR\&.
    45524897.sp
     
    46805025.sp
    46815026Default:
    4682 \fI\fIldap page size\fR\fR\fI = \fR\fI1024\fR\fI \fR
     5027\fI\fIldap page size\fR\fR\fI = \fR\fI1000\fR\fI \fR
    46835028.sp
    46845029Example:
    46855030\fI\fIldap page size\fR\fR\fI = \fR\fI512\fR\fI \fR
     5031.RE
     5032
     5033ldap password sync
     5034.\" ldap password sync
     5035.PP
     5036.RS 4
     5037This parameter is a synonym for
     5038ldap passwd sync\&.
    46865039.RE
    46875040
     
    47585111.sp
    47595112To use this option, a basic ldap tree must be provided and the ldap suffix parameters must be properly configured\&. On virgin servers the default users and groups (Administrator, Guest, Domain Users, Domain Admins, Domain Guests) can be precreated with the command
    4760 net sam provision\&. To run this command the ldap server must be running, Winindd must be running and the smb\&.conf ldap options must be properly configured\&. The typical ldap setup used with the
     5113net sam provision\&. To run this command the ldap server must be running, Winbindd must be running and the smb\&.conf ldap options must be properly configured\&. The typical ldap setup used with the
    47615114\m[blue]\fBldapsam:trusted = yes\fR\m[]
    47625115option is usually sufficient to use
     
    48595212.RE
    48605213
    4861 ldap ssl ads (G)
    4862 .\" ldap ssl ads
    4863 .PP
    4864 .RS 4
    4865 This option is used to define whether or not Samba should use SSL when connecting to the ldap server using
    4866 \fIads\fR
    4867 methods\&. Rpc methods are not affected by this parameter\&. Please note, that this parameter won\*(Aqt have any effect if
    4868 \m[blue]\fBldap ssl\fR\m[]
    4869 is set to
    4870 \fIno\fR\&.
    4871 .sp
    4872 See
    4873 smb\&.conf(5)
    4874 for more information on
    4875 \m[blue]\fBldap ssl\fR\m[]\&.
    4876 .sp
    4877 Default:
    4878 \fI\fIldap ssl ads\fR\fR\fI = \fR\fIno\fR\fI \fR
     5214ldap server require strong auth (G)
     5215.\" ldap server require strong auth
     5216.PP
     5217.RS 4
     5218The
     5219\m[blue]\fBldap server require strong auth\fR\m[]
     5220defines whether the ldap server requires ldap traffic to be signed or signed and encrypted (sealed)\&. Possible values are
     5221\fIno\fR,
     5222\fIallow_sasl_over_tls\fR
     5223and
     5224\fIyes\fR\&.
     5225.sp
     5226A value of
     5227\fIno\fR
     5228allows simple and sasl binds over all transports\&.
     5229.sp
     5230A value of
     5231\fIallow_sasl_over_tls\fR
     5232allows simple and sasl binds (without sign or seal) over TLS encrypted connections\&. Unencrypted connections only allow sasl binds with sign or seal\&.
     5233.sp
     5234A value of
     5235\fIyes\fR
     5236allows only simple binds over TLS encrypted connections\&. Unencrypted connections only allow sasl binds with sign or seal\&.
     5237.sp
     5238Default:
     5239\fI\fIldap server require strong auth\fR\fR\fI = \fR\fIyes\fR\fI \fR
    48795240.RE
    48805241
     
    48945255\fIeither\fR
    48955256this parameter to
    4896 \fIStart_tls\fR
    4897 \fIor\fR
     5257\fIStart_tls\fR\fIor\fR
    48985258by specifying
    48995259\fIldaps://\fR
     
    49345294methods\&. To enable the LDAPv3 StartTLS extended operation (RFC2830) for
    49355295\fIads\fR, set
    4936 \m[blue]\fBldap ssl = yes\fR\m[]
    4937 \fIand\fR
    4938 \m[blue]\fBldap ssl ads = yes\fR\m[]\&. See
     5296\m[blue]\fBldap ssl = yes\fR\m[]\fIand\fR\m[blue]\fBldap ssl ads = yes\fR\m[]\&. See
    49395297smb\&.conf(5)
    49405298for more information on
     
    49435301Default:
    49445302\fI\fIldap ssl\fR\fR\fI = \fR\fIstart tls\fR\fI \fR
     5303.RE
     5304
     5305ldap ssl ads (G)
     5306.\" ldap ssl ads
     5307.PP
     5308.RS 4
     5309This option is used to define whether or not Samba should use SSL when connecting to the ldap server using
     5310\fIads\fR
     5311methods\&. Rpc methods are not affected by this parameter\&. Please note, that this parameter won\*(Aqt have any effect if
     5312\m[blue]\fBldap ssl\fR\m[]
     5313is set to
     5314\fIno\fR\&.
     5315.sp
     5316See
     5317smb\&.conf(5)
     5318for more information on
     5319\m[blue]\fBldap ssl\fR\m[]\&.
     5320.sp
     5321Default:
     5322\fI\fIldap ssl ads\fR\fR\fI = \fR\fIno\fR\fI \fR
    49455323.RE
    49465324
     
    50995477\fBno\fR
    51005478will cause
    5101 nmbd
    5102 \fInever\fR
     5479nmbd\fInever\fR
    51035480to become a local master browser\&.
    51045481.sp
     
    51265503.sp
    51275504Default:
    5128 \fI\fIlock directory\fR\fR\fI = \fR\fI${prefix}/var/locks\fR\fI \fR
     5505\fI\fIlock directory\fR\fR\fI = \fR\fI${prefix}/var/lock\fR\fI \fR
    51295506.sp
    51305507Example:
     
    51545531Be careful about disabling locking either globally or in a specific service, as lack of locking may result in data corruption\&. You should never need to set this parameter\&.
    51555532.sp
    5156 \fINo default\fR
    5157 .RE
    5158 
    5159 lock spin count (G)
    5160 .\" lock spin count
    5161 .PP
    5162 .RS 4
    5163 This parameter has been made inoperative in Samba 3\&.0\&.24\&. The functionality it contolled is now controlled by the parameter
    5164 \m[blue]\fBlock spin time\fR\m[]\&.
    5165 .sp
    5166 Default:
    5167 \fI\fIlock spin count\fR\fR\fI = \fR\fI0\fR\fI \fR
     5533Default:
     5534\fI\fIlocking\fR\fR\fI = \fR\fIyes\fR\fI \fR
    51685535.RE
    51695536
     
    51945561.RE
    51955562
     5563logging (G)
     5564.\" logging
     5565.PP
     5566.RS 4
     5567This parameter configures logging backends\&. Multiple backends can be specified at the same time, with different log levels for each backend\&. The parameter is a list of backends, where each backend is specified as backend[:option][@loglevel]\&.
     5568.sp
     5569The \*(Aqoption\*(Aq parameter can be used to pass backend\-specific options\&.
     5570.sp
     5571The log level for a backend is optional, if it is not set for a backend, all messages are sent to this backend\&. The parameter
     5572\m[blue]\fBlog level\fR\m[]
     5573determines overall log levels, while the log levels specified here define what is sent to the individual backends\&.
     5574.sp
     5575When
     5576\m[blue]\fBlogging\fR\m[]
     5577is set, it overrides the
     5578\m[blue]\fBsyslog\fR\m[]
     5579and
     5580\m[blue]\fBsyslog only\fR\m[]
     5581parameters\&.
     5582.sp
     5583Some backends are only available when Samba has been compiled with the additional libraries\&. The overall list of logging backends:
     5584.sp
     5585.RS 4
     5586.ie n \{\
     5587\h'-04'\(bu\h'+03'\c
     5588.\}
     5589.el \{\
     5590.sp -1
     5591.IP \(bu 2.3
     5592.\}
     5593\fIsyslog\fR
     5594.RE
     5595.sp
     5596.RS 4
     5597.ie n \{\
     5598\h'-04'\(bu\h'+03'\c
     5599.\}
     5600.el \{\
     5601.sp -1
     5602.IP \(bu 2.3
     5603.\}
     5604\fIfile\fR
     5605.RE
     5606.sp
     5607.RS 4
     5608.ie n \{\
     5609\h'-04'\(bu\h'+03'\c
     5610.\}
     5611.el \{\
     5612.sp -1
     5613.IP \(bu 2.3
     5614.\}
     5615\fIsystemd\fR
     5616.RE
     5617.sp
     5618.RS 4
     5619.ie n \{\
     5620\h'-04'\(bu\h'+03'\c
     5621.\}
     5622.el \{\
     5623.sp -1
     5624.IP \(bu 2.3
     5625.\}
     5626\fIlttng\fR
     5627.RE
     5628.sp
     5629.RS 4
     5630.ie n \{\
     5631\h'-04'\(bu\h'+03'\c
     5632.\}
     5633.el \{\
     5634.sp -1
     5635.IP \(bu 2.3
     5636.\}
     5637\fIgpfs\fR
     5638.RE
     5639.sp
     5640.RE
     5641Default:
     5642\fI\fIlogging\fR\fR\fI = \fR\fI\fR\fI \fR
     5643.sp
     5644Example:
     5645\fI\fIlogging\fR\fR\fI = \fR\fIsyslog@1 file\fR\fI \fR
     5646.RE
     5647
    51965648debuglevel
    51975649.\" debuglevel
     
    52105662file\&.
    52115663.sp
    5212 This parameter has been extended since the 2\&.2\&.x series, now it allows to specify the debug level for multiple debug classes\&. This is to give greater flexibility in the configuration of the system\&. The following debug classes are currently implemented:
     5664This parameter has been extended since the 2\&.2\&.x series, now it allows one to specify the debug level for multiple debug classes\&. This is to give greater flexibility in the configuration of the system\&. The following debug classes are currently implemented:
    52135665.sp
    52145666.RS 4
     
    54385890Example:
    54395891\fI\fIlog level\fR\fR\fI = \fR\fI3 passdb:5 auth:10 winbind:2\fR\fI \fR
     5892.RE
     5893
     5894log nt token command (G)
     5895.\" log nt token command
     5896.PP
     5897.RS 4
     5898This option can be set to a command that will be called when new nt tokens are created\&.
     5899.sp
     5900This is only useful for development purposes\&.
     5901.sp
     5902Default:
     5903\fI\fIlog nt token command\fR\fR\fI = \fR\fI\fR\fI \fR
    54405904.RE
    54415905
     
    54625926This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC\&. It allows you to do
    54635927.sp
    5464 
    54655928C:\e>\fBNET USE H: /HOME\fR
    54665929.sp
     
    54715934This parameter can be used with Win9X workstations to ensure that roaming profiles are stored in a subdirectory of the user\*(Aqs home directory\&. This is done in the following way:
    54725935.sp
    5473 
    54745936logon home = \e\e%N\e%U\eprofile
    54755937.sp
     
    56406102Note that it is good practice to include the absolute path in the lppause command as the PATH may not be available to the server\&.
    56416103.sp
    5642 Default:
    5643 \fI\fIlppause command\fR\fR\fI = \fR\fI # Currently no default value is given to this string, unless the value of the \m[blue]\fBprinting\fR\m[] parameter is \fBSYSV\fR, in which case the default is : lp \-i %p\-%j \-H hold or if the value of the \fIprinting\fR parameter is \fBSOFTQ\fR, then the default is: qstat \-s \-j%j \-h\&. \fR\fI \fR
     6104Currently no default value is given to this string, unless the value of the
     6105\m[blue]\fBprinting\fR\m[]
     6106parameter is
     6107\fBSYSV\fR, in which case the default is :
     6108lp \-i %p\-%j \-H hold
     6109or if the value of the
     6110\fIprinting\fR
     6111parameter is
     6112\fBSOFTQ\fR, then the default is:
     6113qstat \-s \-j%j \-h\&.
     6114.sp
     6115Default:
     6116\fI\fIlppause command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    56446117.sp
    56456118Example:
     
    57086181.sp
    57096182Default:
    5710 \fI\fIlpq command\fR\fR\fI = \fR\fI\fR\fI \fR
     6183\fI\fIlpq command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    57116184.sp
    57126185Example:
     
    57526225qstat \-s \-j%j \-r
    57536226.sp
    5754 \fINo default\fR
     6227Default:
     6228\fI\fIlpresume command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    57556229.sp
    57566230Example:
     
    57936267.sp
    57946268Default:
    5795 \fI\fIlprm command\fR\fR\fI = \fR\fI determined by printing parameter\fR\fI \fR
     6269\fI\fIlprm command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    57966270.RE
    57976271
     
    58006274.PP
    58016275.RS 4
    5802 If a Samba server is a member of a Windows NT Domain (see the
     6276If a Samba server is a member of a Windows NT or Active Directory Domain (see the
    58036277\m[blue]\fBsecurity = domain\fR\m[]
    5804 parameter) then periodically a running smbd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called
    5805 private/secrets\&.tdb\&. This parameter specifies how often this password will be changed, in seconds\&. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\&.
     6278and
     6279\m[blue]\fBsecurity = ads\fR\m[]
     6280parameters), then periodically a running winbindd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called
     6281secrets\&.tdb\&. This parameter specifies how often this password will be changed, in seconds\&. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\&.
    58066282.sp
    58076283See also
    58086284\fBsmbpasswd\fR(8), and the
    58096285\m[blue]\fBsecurity = domain\fR\m[]
    5810 parameter\&.
     6286and
     6287\m[blue]\fBsecurity = ads\fR\m[]
     6288parameters\&.
    58116289.sp
    58126290Default:
     
    58396317.RE
    58406318Default:
    5841 \fI\fImagic output\fR\fR\fI = \fR\fI<magic script name>\&.out\fR\fI \fR
     6319\fI\fImagic output\fR\fR\fI = \fR\fI # <magic script name>\&.out\fR\fI \fR
    58426320.sp
    58436321Example:
     
    59696447.PP
    59706448.RS 4
    5971 controls the algorithm used for the generating the mangled names\&. Can take two different values, "hash" and "hash2"\&. "hash" is the algorithm that was used used in Samba for many years and was the default in Samba 2\&.2\&.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\&. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\&.
     6449controls the algorithm used for the generating the mangled names\&. Can take two different values, "hash" and "hash2"\&. "hash" is the algorithm that was used in Samba for many years and was the default in Samba 2\&.2\&.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\&. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\&.
    59726450.sp
    59736451Default:
     
    59956473.RS 4
    59966474This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit\&. The DOS archive bit is set when a file has been modified since its last backup\&. One motivation for this option is to keep Samba/your PC from making any file it touches from becoming executable under UNIX\&. This can be quite annoying for shared source code, documents, etc\&.\&.\&.
     6475.sp
     6476Note that this parameter will be ignored if the
     6477\m[blue]\fBstore dos attributes\fR\m[]
     6478parameter is set, as the DOS archive attribute will then be stored inside a UNIX extended attribute\&.
    59976479.sp
    59986480Note that this requires the
     
    60126494This controls whether DOS style hidden files should be mapped to the UNIX world execute bit\&.
    60136495.sp
     6496Note that this parameter will be ignored if the
     6497\m[blue]\fBstore dos attributes\fR\m[]
     6498parameter is set, as the DOS hidden attribute will then be stored inside a UNIX extended attribute\&.
     6499.sp
    60146500Note that this requires the
    60156501\m[blue]\fBcreate mask\fR\m[]
     
    60186504for details\&.
    60196505.sp
    6020 \fINo default\fR
     6506Default:
     6507\fI\fImap hidden\fR\fR\fI = \fR\fIno\fR\fI \fR
    60216508.RE
    60226509
     
    60496536.IP \(bu 2.3
    60506537.\}
    6051 
    60526538\fBYes\fR
    60536539\- The read only DOS attribute is mapped to the inverse of the user or owner write bit in the unix permission mode set\&. If the owner write bit is not set, the read only attribute is reported as being set on the file\&. If the read only DOS attribute is set, Samba sets the owner, group and others write bits to zero\&. Write bits set in an ACL are ignored by Samba\&. If the read only DOS attribute is unset, Samba simply sets the write bit of the owner to one\&.
     
    60626548.IP \(bu 2.3
    60636549.\}
    6064 
    60656550\fBPermissions\fR
    60666551\- The read only DOS attribute is mapped to the effective permissions of the connecting user, as evaluated by
     
    60776562.IP \(bu 2.3
    60786563.\}
    6079 
    60806564\fBNo\fR
    60816565\- The read only DOS attribute is unaffected by permissions, and can only be set by the
     
    60856569.sp
    60866570.RE
     6571Note that this parameter will be ignored if the
     6572\m[blue]\fBstore dos attributes\fR\m[]
     6573parameter is set, as the DOS \*(Aqread\-only\*(Aq attribute will then be stored inside a UNIX extended attribute\&.
     6574.sp
    60876575Default:
    60886576\fI\fImap readonly\fR\fR\fI = \fR\fIyes\fR\fI \fR
     
    60946582.RS 4
    60956583This controls whether DOS style system files should be mapped to the UNIX group execute bit\&.
     6584.sp
     6585Note that this parameter will be ignored if the
     6586\m[blue]\fBstore dos attributes\fR\m[]
     6587parameter is set, as the DOS system attribute will then be stored inside a UNIX extended attribute\&.
    60966588.sp
    60976589Note that this requires the
     
    61096601.PP
    61106602.RS 4
    6111 This parameter is only useful in
    6112 \m[blue]\fBSECURITY = security\fR\m[]
    6113 modes other than
    6114 \fIsecurity = share\fR
    6115 and
    6116 \fIsecurity = server\fR
    6117 \- i\&.e\&.
    6118 \fBuser\fR, and
    6119 \fBdomain\fR\&.
    6120 .sp
    61216603This parameter can take four different values, which tell
    61226604\fBsmbd\fR(8)
     
    61806662.sp
    61816663.RE
    6182 Note that this parameter is needed to set up "Guest" share services when using
    6183 \fIsecurity\fR
    6184 modes other than share and server\&. This is because in these modes the name of the resource being requested is
     6664Note that this parameter is needed to set up "Guest" share services\&. This is because in these modes the name of the resource being requested is
    61856665\fInot\fR
    6186 sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\&. This parameter is not useful with
    6187 \fIsecurity = server\fR
    6188 as in this security mode no information is returned about whether a user logon failed due to a bad username or bad password, the same error is returned from a modern server in both cases\&.
    6189 .sp
    6190 For people familiar with the older Samba releases, this parameter maps to the old compile\-time setting of the
    6191 \fB GUEST_SESSSETUP\fR
    6192 value in local\&.h\&.
     6666sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\&.
    61936667.sp
    61946668Default:
     
    62896763This parameter limits the maximum number of open files that one
    62906764\fBsmbd\fR(8)
    6291 file serving process may have open for a client at any one time\&. The This parameter can be set very high (16404) as Samba uses only one bit per unopened file\&. Setting this parameter lower than 16404 will cause Samba to complain and set this value back to the minimum of 16404, as Windows 7 depends on this number of open file handles being available\&.
     6765file serving process may have open for a client at any one time\&. This parameter can be set very high (16384) as Samba uses only one bit per unopened file\&. Setting this parameter lower than 16384 will cause Samba to complain and set this value back to the minimum of 16384, as Windows 7 depends on this number of open file handles being available\&.
    62926766.sp
    62936767The limit of the number of open files is usually set by the UNIX per\-process file descriptor limit rather than this parameter so you should never need to touch this parameter\&.
    62946768.sp
    62956769Default:
    6296 \fI\fImax open files\fR\fR\fI = \fR\fI16404\fR\fI \fR
     6770\fI\fImax open files\fR\fR\fI = \fR\fI16384\fR\fI \fR
    62976771.RE
    62986772
     
    63106784Example:
    63116785\fI\fImax print jobs\fR\fR\fI = \fR\fI5000\fR\fI \fR
    6312 .RE
    6313 
    6314 protocol
    6315 .\" protocol
    6316 .PP
    6317 .RS 4
    6318 This parameter is a synonym for
    6319 max protocol\&.
    6320 .RE
    6321 
    6322 max protocol (G)
    6323 .\" max protocol
    6324 .PP
    6325 .RS 4
    6326 The value of the parameter (a string) is the highest protocol level that will be supported by the server\&.
    6327 .sp
    6328 Possible values are :
    6329 .sp
    6330 .RS 4
    6331 .ie n \{\
    6332 \h'-04'\(bu\h'+03'\c
    6333 .\}
    6334 .el \{\
    6335 .sp -1
    6336 .IP \(bu 2.3
    6337 .\}
    6338 \fBCORE\fR: Earliest version\&. No concept of user names\&.
    6339 .RE
    6340 .sp
    6341 .RS 4
    6342 .ie n \{\
    6343 \h'-04'\(bu\h'+03'\c
    6344 .\}
    6345 .el \{\
    6346 .sp -1
    6347 .IP \(bu 2.3
    6348 .\}
    6349 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency\&.
    6350 .RE
    6351 .sp
    6352 .RS 4
    6353 .ie n \{\
    6354 \h'-04'\(bu\h'+03'\c
    6355 .\}
    6356 .el \{\
    6357 .sp -1
    6358 .IP \(bu 2.3
    6359 .\}
    6360 \fBLANMAN1\fR: First
    6361 \fI modern\fR
    6362 version of the protocol\&. Long filename support\&.
    6363 .RE
    6364 .sp
    6365 .RS 4
    6366 .ie n \{\
    6367 \h'-04'\(bu\h'+03'\c
    6368 .\}
    6369 .el \{\
    6370 .sp -1
    6371 .IP \(bu 2.3
    6372 .\}
    6373 \fBLANMAN2\fR: Updates to Lanman1 protocol\&.
    6374 .RE
    6375 .sp
    6376 .RS 4
    6377 .ie n \{\
    6378 \h'-04'\(bu\h'+03'\c
    6379 .\}
    6380 .el \{\
    6381 .sp -1
    6382 .IP \(bu 2.3
    6383 .\}
    6384 \fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&.
    6385 .RE
    6386 .sp
    6387 .RS 4
    6388 .ie n \{\
    6389 \h'-04'\(bu\h'+03'\c
    6390 .\}
    6391 .el \{\
    6392 .sp -1
    6393 .IP \(bu 2.3
    6394 .\}
    6395 \fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and newer\&.
    6396 .RE
    6397 .sp
    6398 .RE
    6399 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
    6400 .sp
    6401 Default:
    6402 \fI\fImax protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR
    6403 .sp
    6404 Example:
    6405 \fI\fImax protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR
    64066786.RE
    64076787
     
    66086988.RE
    66096989
    6610 min protocol (G)
    6611 .\" min protocol
    6612 .PP
    6613 .RS 4
    6614 The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support\&. Please refer to the
    6615 \m[blue]\fBmax protocol\fR\m[]
    6616 parameter for a list of valid protocol names and a brief description of each\&. You may also wish to refer to the C source code in
    6617 source/smbd/negprot\&.c
    6618 for a listing of known protocol dialects supported by clients\&.
    6619 .sp
    6620 If you are viewing this parameter as a security measure, you should also refer to the
    6621 \m[blue]\fBlanman auth\fR\m[]
    6622 parameter\&. Otherwise, you should never need to change this parameter\&.
    6623 .sp
    6624 Default:
    6625 \fI\fImin protocol\fR\fR\fI = \fR\fICORE\fR\fI \fR
    6626 .sp
    6627 Example:
    6628 \fI\fImin protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR
    6629 .RE
    6630 
    66316990min receivefile size (G)
    66326991.\" min receivefile size
     
    66396998Note this option will have NO EFFECT if set on a SMB signed connection\&.
    66406999.sp
    6641 The default is zero, which diables this option\&.
     7000The default is zero, which disables this option\&.
    66427001.sp
    66437002Default:
     
    66637022.PP
    66647023.RS 4
    6665 This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\&. When clients attempt to connect to this share, they are redirected to the proxied share using the SMB\-Dfs protocol\&.
     7024This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\&. When clients attempt to connect to this share, they are redirected to one or multiple, comma separated proxied shares using the SMB\-Dfs protocol\&.
    66667025.sp
    66677026Only Dfs roots can act as proxy shares\&. Take a look at the
     
    66747033.sp
    66757034Example:
    6676 \fI\fImsdfs proxy\fR\fR\fI = \fR\fI\eotherserver\esomeshare\fR\fI \fR
     7035\fI\fImsdfs proxy\fR\fR\fI = \fR\fI\eotherserver\esomeshare,\eotherserver2\esomeshare\fR\fI \fR
    66777036.RE
    66787037
     
    66907049.RE
    66917050
     7051msdfs shuffle referrals (S)
     7052.\" msdfs shuffle referrals
     7053.PP
     7054.RS 4
     7055If set to
     7056\fByes\fR, Samba will shuffle Dfs referrals for a given Dfs link if multiple are available, allowing for load balancing across clients\&. For more information on setting up a Dfs tree on Samba, refer to the MSDFS chapter in the Samba3\-HOWTO book\&.
     7057.sp
     7058Default:
     7059\fI\fImsdfs shuffle referrals\fR\fR\fI = \fR\fIno\fR\fI \fR
     7060.RE
     7061
    66927062multicast dns register (G)
    66937063.\" multicast dns register
     
    67317101.IP \(bu 2.3
    67327102.\}
    6733 
    67347103\fBlmhosts\fR
    67357104: Lookup an IP address in the Samba lmhosts file\&. If the line in lmhosts has no name type attached to the NetBIOS name (see the manpage for lmhosts for details) then any name type matches for lookup\&.
     
    67447113.IP \(bu 2.3
    67457114.\}
    6746 
    67477115\fBhost\fR
    67487116: Do a standard host name to IP address resolution, using the system
     
    67977165.RE
    67987166
     7167socket address
     7168.\" socket address
     7169.PP
     7170.RS 4
     7171This parameter is a synonym for
     7172nbt client socket address\&.
     7173.RE
     7174
     7175nbt client socket address (G)
     7176.\" nbt client socket address
     7177.PP
     7178.RS 4
     7179This option allows you to control what address Samba will send NBT client packets from, and process replies using, including in nmbd\&.
     7180.sp
     7181Setting this option should never be necessary on usual Samba servers running only one nmbd\&.
     7182.sp
     7183By default Samba will send UDP packets from the OS default address for the destination, and accept replies on 0\&.0\&.0\&.0\&.
     7184.sp
     7185This parameter is deprecated\&. See
     7186\m[blue]\fBbind interfaces only = Yes\fR\m[]
     7187and
     7188\m[blue]\fBinterfaces\fR\m[]
     7189for the previous behaviour of controlling the normal listening sockets\&.
     7190.sp
     7191Default:
     7192\fI\fInbt client socket address\fR\fR\fI = \fR\fI0\&.0\&.0\&.0\fR\fI \fR
     7193.sp
     7194Example:
     7195\fI\fInbt client socket address\fR\fR\fI = \fR\fI192\&.168\&.2\&.20\fR\fI \fR
     7196.RE
     7197
     7198nbt port (G)
     7199.\" nbt port
     7200.PP
     7201.RS 4
     7202Specifies which port the server should use for NetBIOS over IP name services traffic\&.
     7203.sp
     7204Default:
     7205\fI\fInbt port\fR\fR\fI = \fR\fI137\fR\fI \fR
     7206.RE
     7207
    67997208ncalrpc dir (G)
    68007209.\" ncalrpc dir
     
    68037212This directory will hold a series of named pipes to allow RPC over inter\-process communication\&.
    68047213.sp
    6805 \&.
    6806         This will allow Samba and other unix processes to interact over DCE/RPC without using TCP/IP\&. Additionally a sub\-directory \*(Aqnp\*(Aq has restricted permissions, and allows a trusted communication channel between Samba processes
    6807 .sp
    6808 Default:
    6809 \fI\fIncalrpc dir\fR\fR\fI = \fR\fI${prefix}/var/ncalrpc\fR\fI \fR
     7214This will allow Samba and other unix processes to interact over DCE/RPC without using TCP/IP\&. Additionally a sub\-directory \*(Aqnp\*(Aq has restricted permissions, and allows a trusted communication channel between Samba processes
     7215.sp
     7216Default:
     7217\fI\fIncalrpc dir\fR\fR\fI = \fR\fI${prefix}/var/run/ncalrpc\fR\fI \fR
    68107218.sp
    68117219Example:
     
    68327240This sets the NetBIOS name by which a Samba server is known\&. By default it is the same as the first component of the host\*(Aqs DNS name\&. If a machine is a browse server or logon server this name (or the first component of the hosts DNS name) will be the name that these services are advertised under\&.
    68337241.sp
    6834 There is a bug in Samba\-3 that breaks operation of browsing and access to shares if the netbios name is set to the literal name
    6835 PIPE\&. To avoid this problem, do not name your Samba\-3 server
     7242Note that the maximum length for a NetBIOS name is 15 charactars\&.
     7243.sp
     7244There is a bug in Samba that breaks operation of browsing and access to shares if the netbios name is set to the literal name
     7245PIPE\&. To avoid this problem, do not name your Samba server
    68367246PIPE\&.
    68377247.sp
     
    68537263.RE
    68547264
    6855 nis homedir (G)
    6856 .\" nis homedir
     7265neutralize nt4 emulation (G)
     7266.\" neutralize nt4 emulation
     7267.PP
     7268.RS 4
     7269This option controls whether winbindd sends the NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION flag in order to bypass the NT4 emulation of a domain controller\&.
     7270.sp
     7271Typically you should not need set this\&. It can be useful for upgrades from NT4 to AD domains\&.
     7272.sp
     7273The behavior can be controlled per netbios domain by using \*(Aqneutralize nt4 emulation:NETBIOSDOMAIN = yes\*(Aq as option\&.
     7274.sp
     7275Default:
     7276\fI\fIneutralize nt4 emulation\fR\fR\fI = \fR\fIno\fR\fI \fR
     7277.RE
     7278
     7279NIS homedir (G)
     7280.\" NIS homedir
    68577281.PP
    68587282.RS 4
     
    68687292.sp
    68697293Default:
    6870 \fI\fInis homedir\fR\fR\fI = \fR\fIno\fR\fI \fR
     7294\fI\fINIS homedir\fR\fR\fI = \fR\fIno\fR\fI \fR
    68717295.RE
    68727296
     
    68857309.RE
    68867310
     7311nsupdate command (G)
     7312.\" nsupdate command
     7313.PP
     7314.RS 4
     7315This option sets the path to the
     7316nsupdate
     7317command which is used for GSS\-TSIG dynamic DNS updates\&.
     7318.sp
     7319Default:
     7320\fI\fInsupdate command\fR\fR\fI = \fR\fI/usr/bin/nsupdate \-g\fR\fI \fR
     7321.RE
     7322
    68877323nt acl support (S)
    68887324.\" nt acl support
     
    68917327This boolean parameter controls whether
    68927328\fBsmbd\fR(8)
    6893 will attempt to map UNIX permissions into Windows NT access control lists\&. The UNIX permissions considered are the the traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\&. This parameter was formally a global parameter in releases prior to 2\&.2\&.2\&.
     7329will attempt to map UNIX permissions into Windows NT access control lists\&. The UNIX permissions considered are the traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\&. This parameter was formally a global parameter in releases prior to 2\&.2\&.2\&.
    68947330.sp
    68957331Default:
     
    69277363.RE
    69287364
     7365ntp signd socket directory (G)
     7366.\" ntp signd socket directory
     7367.PP
     7368.RS 4
     7369This setting controls the location of the socket that the NTP daemon uses to communicate with Samba for signing packets\&.
     7370.sp
     7371If a non\-default path is specified here, then it is also necessary to make NTP aware of the new path using the
     7372\fBntpsigndsocket\fR
     7373directive in
     7374ntp\&.conf\&.
     7375.sp
     7376Default:
     7377\fI\fIntp signd socket directory\fR\fR\fI = \fR\fI${prefix}/var/lib/ntp_signd\fR\fI \fR
     7378.RE
     7379
    69297380nt status support (G)
    69307381.\" nt status support
     
    69437394.RE
    69447395
     7396ntvfs handler (S)
     7397.\" ntvfs handler
     7398.PP
     7399.RS 4
     7400This specifies the NTVFS handlers for this share\&.
     7401.sp
     7402.RS 4
     7403.ie n \{\
     7404\h'-04'\(bu\h'+03'\c
     7405.\}
     7406.el \{\
     7407.sp -1
     7408.IP \(bu 2.3
     7409.\}
     7410posix: Maps POSIX FS semantics to NT semantics
     7411.RE
     7412.sp
     7413.RS 4
     7414.ie n \{\
     7415\h'-04'\(bu\h'+03'\c
     7416.\}
     7417.el \{\
     7418.sp -1
     7419.IP \(bu 2.3
     7420.\}
     7421unixuid: Sets up user credentials based on POSIX gid/uid\&.
     7422.RE
     7423.sp
     7424.RS 4
     7425.ie n \{\
     7426\h'-04'\(bu\h'+03'\c
     7427.\}
     7428.el \{\
     7429.sp -1
     7430.IP \(bu 2.3
     7431.\}
     7432cifs: Proxies a remote CIFS FS\&. Mainly useful for testing\&.
     7433.RE
     7434.sp
     7435.RS 4
     7436.ie n \{\
     7437\h'-04'\(bu\h'+03'\c
     7438.\}
     7439.el \{\
     7440.sp -1
     7441.IP \(bu 2.3
     7442.\}
     7443nbench: Filter module that saves data useful to the nbench benchmark suite\&.
     7444.RE
     7445.sp
     7446.RS 4
     7447.ie n \{\
     7448\h'-04'\(bu\h'+03'\c
     7449.\}
     7450.el \{\
     7451.sp -1
     7452.IP \(bu 2.3
     7453.\}
     7454ipc: Allows using SMB for inter process communication\&. Only used for the IPC$ share\&.
     7455.RE
     7456.sp
     7457.RS 4
     7458.ie n \{\
     7459\h'-04'\(bu\h'+03'\c
     7460.\}
     7461.el \{\
     7462.sp -1
     7463.IP \(bu 2.3
     7464.\}
     7465posix: Maps POSIX FS semantics to NT semantics
     7466.RE
     7467.sp
     7468.RS 4
     7469.ie n \{\
     7470\h'-04'\(bu\h'+03'\c
     7471.\}
     7472.el \{\
     7473.sp -1
     7474.IP \(bu 2.3
     7475.\}
     7476print: Allows printing over SMB\&. This is LANMAN\-style printing, not the be confused with the spoolss DCE/RPC interface used by later versions of Windows\&.
     7477.RE
     7478.sp
     7479.RE
     7480Note that this option is only used when the NTVFS file server is in use\&. It is not used with the (default) s3fs file server\&.
     7481.sp
     7482Default:
     7483\fI\fIntvfs handler\fR\fR\fI = \fR\fIunixuid, default\fR\fI \fR
     7484.RE
     7485
    69457486null passwords (G)
    69467487.\" null passwords
     
    69677508.RE
    69687509
     7510old password allowed period (G)
     7511.\" old password allowed period
     7512.PP
     7513.RS 4
     7514Number of minutes to permit an NTLM login after a password change or reset using the old password\&. This allows the user to re\-cache the new password on multiple clients without disrupting a network reconnection in the meantime\&.
     7515.sp
     7516This parameter only applies when
     7517\m[blue]\fBserver role\fR\m[]
     7518is set to Active Directory Domain Controller
     7519.sp
     7520Default:
     7521\fI\fIold password allowed period\fR\fR\fI = \fR\fI60\fR\fI \fR
     7522.RE
     7523
    69697524only user (S)
    69707525.\" only user
    69717526.PP
    69727527.RS 4
    6973 This is a boolean option that controls whether connections with usernames not in the
    6974 \fIuser\fR
    6975 list will be allowed\&. By default this option is disabled so that a client can supply a username to be used by the server\&. Enabling this parameter will force the server to only use the login names from the
    6976 \fIuser\fR
    6977 list and is only really useful in
    6978 \m[blue]\fBsecurity = share\fR\m[]
    6979 level security\&.
    6980 .sp
    6981 Note that this also means Samba won\*(Aqt try to deduce usernames from the service name\&. This can be annoying for the [homes] section\&. To get around this you could use
    6982 user = %S
    6983 which means your
    6984 \fIuser\fR
    6985 list will be just the service name, which for home directories is the name of the user\&.
     7528To restrict a service to a particular set of users you can use the
     7529\m[blue]\fBvalid users\fR\m[]
     7530parameter\&.
     7531.sp
     7532This parameter is deprecated
     7533.sp
     7534However, it currently operates only in conjunction with
     7535\m[blue]\fBusername\fR\m[]\&. The supported way to restrict a service to a particular set of users is the
     7536\m[blue]\fBvalid users\fR\m[]
     7537parameter\&.
    69867538.sp
    69877539Default:
     
    71337685.RE
    71347686
    7135 paranoid server security (G)
    7136 .\" paranoid server security
    7137 .PP
    7138 .RS 4
    7139 Some version of NT 4\&.x allow non\-guest users with a bad passowrd\&. When this option is enabled, samba will not use a broken NT 4\&.x server as password server, but instead complain to the logs and exit\&.
    7140 .sp
    7141 Disabling this option prevents Samba from making this check, which involves deliberatly attempting a bad logon to the remote server\&.
    7142 .sp
    7143 Default:
    7144 \fI\fIparanoid server security\fR\fR\fI = \fR\fIyes\fR\fI \fR
    7145 .RE
    7146 
    71477687passdb backend (G)
    71487688.\" passdb backend
     
    72357775Default:
    72367776\fI\fIpassdb expand explicit\fR\fR\fI = \fR\fIno\fR\fI \fR
     7777.RE
     7778
     7779passwd chat (G)
     7780.\" passwd chat
     7781.PP
     7782.RS 4
     7783This string controls the
     7784\fI"chat"\fR
     7785conversation that takes places between
     7786\fBsmbd\fR(8)
     7787and the local password changing program to change the user\*(Aqs password\&. The string describes a sequence of response\-receive pairs that
     7788\fBsmbd\fR(8)
     7789uses to determine what to send to the
     7790\m[blue]\fBpasswd program\fR\m[]
     7791and what to expect back\&. If the expected output is not received then the password is not changed\&.
     7792.sp
     7793This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\&.
     7794.sp
     7795Note that this parameter only is used if the
     7796\m[blue]\fBunix password sync\fR\m[]
     7797parameter is set to
     7798\fByes\fR\&. This sequence is then called
     7799\fIAS ROOT\fR
     7800when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\&. This means that root must be able to reset the user\*(Aqs password without knowing the text of the previous password\&. In the presence of NIS/YP, this means that the
     7801\m[blue]\fBpasswd program\fR\m[]
     7802must be executed on the NIS master\&.
     7803.sp
     7804The string can contain the macro
     7805\fI%n\fR
     7806which is substituted for the new password\&. The old passsword (\fI%o\fR) is only available when
     7807\m[blue]\fBencrypt passwords\fR\m[]
     7808has been disabled\&. The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\&. The chat sequence string can also contain a \*(Aq*\*(Aq which matches any sequence of characters\&. Double quotes can be used to collect strings with spaces in them into a single string\&.
     7809.sp
     7810If the send string in any part of the chat sequence is a full stop "\&.", then no string is sent\&. Similarly, if the expect string is a full stop then no string is expected\&.
     7811.sp
     7812If the
     7813\m[blue]\fBpam password change\fR\m[]
     7814parameter is set to
     7815\fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\&. The \en macro is ignored for PAM conversions\&.
     7816.sp
     7817Default:
     7818\fI\fIpasswd chat\fR\fR\fI = \fR\fI*new*password* %n\en *new*password* %n\en *changed*\fR\fI \fR
     7819.sp
     7820Example:
     7821\fI\fIpasswd chat\fR\fR\fI = \fR\fI"*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\fR\fI \fR
    72377822.RE
    72387823
     
    72717856.RE
    72727857
    7273 passwd chat (G)
    7274 .\" passwd chat
    7275 .PP
    7276 .RS 4
    7277 This string controls the
    7278 \fI"chat"\fR
    7279 conversation that takes places between
    7280 \fBsmbd\fR(8)
    7281 and the local password changing program to change the user\*(Aqs password\&. The string describes a sequence of response\-receive pairs that
    7282 \fBsmbd\fR(8)
    7283 uses to determine what to send to the
    7284 \m[blue]\fBpasswd program\fR\m[]
    7285 and what to expect back\&. If the expected output is not received then the password is not changed\&.
    7286 .sp
    7287 This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\&.
    7288 .sp
    7289 Note that this parameter only is used if the
    7290 \m[blue]\fBunix password sync\fR\m[]
    7291 parameter is set to
    7292 \fByes\fR\&. This sequence is then called
    7293 \fIAS ROOT\fR
    7294 when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\&. This means that root must be able to reset the user\*(Aqs password without knowing the text of the previous password\&. In the presence of NIS/YP, this means that the
    7295 \m[blue]\fBpasswd program\fR\m[]
    7296 must be executed on the NIS master\&.
    7297 .sp
    7298 The string can contain the macro
    7299 \fI%n\fR
    7300 which is substituted for the new password\&. The old passsword (\fI%o\fR) is only available when
    7301 \m[blue]\fBencrypt passwords\fR\m[]
    7302 has been disabled\&. The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\&. The chat sequence string can also contain a \*(Aq*\*(Aq which matches any sequence of characters\&. Double quotes can be used to collect strings with spaces in them into a single string\&.
    7303 .sp
    7304 If the send string in any part of the chat sequence is a full stop "\&.", then no string is sent\&. Similarly, if the expect string is a full stop then no string is expected\&.
    7305 .sp
    7306 If the
    7307 \m[blue]\fBpam password change\fR\m[]
    7308 parameter is set to
    7309 \fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\&. The \en macro is ignored for PAM conversions\&.
    7310 .sp
    7311 Default:
    7312 \fI\fIpasswd chat\fR\fR\fI = \fR\fI*new*password* %n\en*new*password* %n\en *changed*\fR\fI \fR
    7313 .sp
    7314 Example:
    7315 \fI\fIpasswd chat\fR\fR\fI = \fR\fI"*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\fR\fI \fR
    7316 .RE
    7317 
    73187858passwd program (G)
    73197859.\" passwd program
     
    73577897.RE
    73587898
    7359 password level (G)
    7360 .\" password level
    7361 .PP
    7362 .RS 4
    7363 Some client/server combinations have difficulty with mixed\-case passwords\&. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! Another problem child is the Windows 95/98 family of operating systems\&. These clients upper case clear text passwords even when NT LM 0\&.12 selected by the protocol negotiation request/response\&.
    7364 .sp
    7365 This deprecated parameter defines the maximum number of characters that may be upper case in passwords\&.
    7366 .sp
    7367 For example, say the password given was "FRED"\&. If
    7368 \fI password level\fR
    7369 is set to 1, the following combinations would be tried if "FRED" failed:
    7370 .sp
    7371 "Fred", "fred", "fRed", "frEd","freD"
    7372 .sp
    7373 If
    7374 \fIpassword level\fR
    7375 was set to 2, the following combinations would also be tried:
    7376 .sp
    7377 "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", \&.\&.
    7378 .sp
    7379 And so on\&.
    7380 .sp
    7381 The higher value this parameter is set to the more likely it is that a mixed case password will be matched against a single case password\&. However, you should be aware that use of this parameter reduces security and increases the time taken to process a new connection\&.
    7382 .sp
    7383 A value of zero will cause only two attempts to be made \- the password as is and the password in all\-lower case\&.
    7384 .sp
    7385 This parameter is used only when using plain\-text passwords\&. It is not at all used when encrypted passwords as in use (that is the default since samba\-3\&.0\&.0)\&. Use this only when
    7386 \m[blue]\fBencrypt passwords = No\fR\m[]\&.
    7387 .sp
    7388 Default:
    7389 \fI\fIpassword level\fR\fR\fI = \fR\fI0\fR\fI \fR
    7390 .sp
    7391 Example:
    7392 \fI\fIpassword level\fR\fR\fI = \fR\fI4\fR\fI \fR
    7393 .RE
    7394 
    73957899password server (G)
    73967900.\" password server
    73977901.PP
    73987902.RS 4
    7399 By specifying the name of another SMB server or Active Directory domain controller with this option, and using
    7400 security = [ads|domain|server]
     7903By specifying the name of a domain controller with this option, and using
     7904security = [ads|domain]
    74017905it is possible to get Samba to do all its username/password validation using a specific remote server\&.
    74027906.sp
    7403 If the
    7404 \fIsecurity\fR
    7405 parameter is set to
    7406 \fBdomain\fR
    7407 or
    7408 \fBads\fR, then this option
     7907Ideally, this option
    74097908\fIshould not\fR
    7410 be used, as the default \*(Aq*\*(Aq indicates to Samba to determine the best DC to contact dynamically, just as all other hosts in an AD domain do\&. This allows the domain to be maintained without modification to the smb\&.conf file\&. The cryptograpic protection on the authenticated RPC calls used to verify passwords ensures that this default is safe\&.
     7909be used, as the default \*(Aq*\*(Aq indicates to Samba to determine the best DC to contact dynamically, just as all other hosts in an AD domain do\&. This allows the domain to be maintained (addition and removal of domain controllers) without modification to the smb\&.conf file\&. The cryptographic protection on the authenticated RPC calls used to verify passwords ensures that this default is safe\&.
    74117910.sp
    74127911\fIIt is strongly recommended that you use the default of \*(Aq*\*(Aq\fR, however if in your particular environment you have reason to specify a particular DC list, then the list of machines in this option must be a list of names or IP addresses of Domain controllers for the Domain\&. If you use the default of \*(Aq*\*(Aq, or list several hosts in the
     
    74227921and so may resolved by any method and order described in that parameter\&.
    74237922.sp
    7424 If the
    7425 \fIsecurity\fR
    7426 parameter is set to
    7427 \fBserver\fR, these additional restrictions apply:
    7428 .sp
    7429 .RS 4
    7430 .ie n \{\
    7431 \h'-04'\(bu\h'+03'\c
    7432 .\}
    7433 .el \{\
    7434 .sp -1
    7435 .IP \(bu 2.3
    7436 .\}
    7437 You may list several password servers in the
    7438 \fIpassword server\fR
    7439 parameter, however if an
    7440 smbd
    7441 makes a connection to a password server, and then the password server fails, no more users will be able to be authenticated from this
    7442 smbd\&. This is a restriction of the SMB/CIFS protocol when in
    7443 security = server
    7444 mode and cannot be fixed in Samba\&.
    7445 .RE
    7446 .sp
    7447 .RS 4
    7448 .ie n \{\
    7449 \h'-04'\(bu\h'+03'\c
    7450 .\}
    7451 .el \{\
    7452 .sp -1
    7453 .IP \(bu 2.3
    7454 .\}
    7455 You will have to ensure that your users are able to login from the Samba server, as when in
    7456 security = server
    7457 mode the network logon will appear to come from the Samba server rather than from the users workstation\&.
    7458 .RE
    7459 .sp
    7460 .RS 4
    7461 .ie n \{\
    7462 \h'-04'\(bu\h'+03'\c
    7463 .\}
    7464 .el \{\
    7465 .sp -1
    7466 .IP \(bu 2.3
    7467 .\}
    7468 The client must not select NTLMv2 authentication\&.
    7469 .RE
    7470 .sp
    7471 .RS 4
    7472 .ie n \{\
    7473 \h'-04'\(bu\h'+03'\c
    7474 .\}
    7475 .el \{\
    7476 .sp -1
    7477 .IP \(bu 2.3
    7478 .\}
    7479 The password server must be a machine capable of using the "LM1\&.2X002" or the "NT LM 0\&.12" protocol, and it must be in user level security mode\&.
    7480 .RE
    7481 .sp
    7482 .RS 4
    7483 .ie n \{\
    7484 \h'-04'\(bu\h'+03'\c
    7485 .\}
    7486 .el \{\
    7487 .sp -1
    7488 .IP \(bu 2.3
    7489 .\}
    7490 Using a password server means your UNIX box (running Samba) is only as secure as (a host masqurading as) your password server\&.
    7491 \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\*(AqT COMPLETELY TRUST\fR\&.
    7492 .RE
    7493 .sp
    7494 .RS 4
    7495 .ie n \{\
    7496 \h'-04'\(bu\h'+03'\c
    7497 .\}
    7498 .el \{\
    7499 .sp -1
    7500 .IP \(bu 2.3
    7501 .\}
    7502 Never point a Samba server at itself for password serving\&. This will cause a loop and could lock up your Samba server!
    7503 .RE
    7504 .sp
    7505 .RS 4
    7506 .ie n \{\
    7507 \h'-04'\(bu\h'+03'\c
    7508 .\}
    7509 .el \{\
    7510 .sp -1
    7511 .IP \(bu 2.3
    7512 .\}
    7513 The name of the password server takes the standard substitutions, but probably the only useful one is
    7514 \fI%m \fR, which means the Samba server will use the incoming client as the password server\&. If you use this then you better trust your clients, and you had better restrict them with hosts allow!
    7515 .RE
    7516 .sp
    7517 .RE
    75187923Default:
    75197924\fI\fIpassword server\fR\fR\fI = \fR\fI*\fR\fI \fR
     
    75757980.sp
    75767981Default:
    7577 \fI\fIpid directory\fR\fR\fI = \fR\fI${prefix}/var/locks\fR\fI \fR
    7578 .sp
    7579 Example:
    7580 \fI\fIpid directory\fR\fR\fI = \fR\fIpid directory = /var/run/\fR\fI \fR
     7982\fI\fIpid directory\fR\fR\fI = \fR\fI${prefix}/var/run\fR\fI \fR
     7983.sp
     7984Example:
     7985\fI\fIpid directory\fR\fR\fI = \fR\fI/var/run/\fR\fI \fR
    75817986.RE
    75827987
     
    76108015.RE
    76118016
    7612 preexec close (S)
    7613 .\" preexec close
    7614 .PP
    7615 .RS 4
    7616 This boolean option controls whether a non\-zero return code from
    7617 \m[blue]\fBpreexec\fR\m[]
    7618 should close the service being connected to\&.
    7619 .sp
    7620 Default:
    7621 \fI\fIpreexec close\fR\fR\fI = \fR\fIno\fR\fI \fR
    7622 .RE
    7623 
    76248017exec
    76258018.\" exec
     
    76388031An interesting example is to send the users a welcome message every time they log in\&. Maybe a message of the day? Here is an example:
    76398032.sp
    7640 
    76418033preexec = csh \-c \*(Aqecho \e"Welcome to %S!\e" | /usr/local/samba/bin/smbclient \-M %m \-I %I\*(Aq &
    76428034.sp
     
    76538045Example:
    76548046\fI\fIpreexec\fR\fR\fI = \fR\fIecho \e"%u connected to %S from %m (%I)\e" >> /tmp/log\fR\fI \fR
     8047.RE
     8048
     8049preexec close (S)
     8050.\" preexec close
     8051.PP
     8052.RS 4
     8053This boolean option controls whether a non\-zero return code from
     8054\m[blue]\fBpreexec\fR\m[]
     8055should close the service being connected to\&.
     8056.sp
     8057Default:
     8058\fI\fIpreexec close\fR\fR\fI = \fR\fIno\fR\fI \fR
    76558059.RE
    76568060
     
    76988102.RE
    76998103
    7700 auto services
    7701 .\" auto services
    7702 .PP
    7703 .RS 4
    7704 This parameter is a synonym for
    7705 preload\&.
    7706 .RE
    7707 
    7708 preload (G)
    7709 .\" preload
    7710 .PP
    7711 .RS 4
    7712 This is a list of services that you want to be automatically added to the browse lists\&. This is most useful for homes and printers services that would otherwise not be visible\&.
    7713 .sp
    7714 Note that if you just want all printers in your printcap file loaded then the
    7715 \m[blue]\fBload printers\fR\m[]
    7716 option is easier\&.
    7717 .sp
    7718 Default:
    7719 \fI\fIpreload\fR\fR\fI = \fR\fI\fR\fI \fR
    7720 .sp
    7721 Example:
    7722 \fI\fIpreload\fR\fR\fI = \fR\fIfred lp colorlp\fR\fI \fR
    7723 .RE
    7724 
    77258104preserve case (S)
    77268105.\" preserve case
     
    77948173.sp
    77958174To use the CUPS printing interface set
    7796 printcap name = cups\&. This should be supplemented by an addtional setting
     8175printcap name = cups\&. This should be supplemented by an additional setting
    77978176\m[blue]\fBprinting = cups\fR\m[]
    77988177in the [global] section\&.
     
    79338312.RE
    79348313
    7935 printer admin (S)
    7936 .\" printer admin
    7937 .PP
    7938 .RS 4
    7939 This lists users who can do anything to printers via the remote administration interfaces offered by MS\-RPC (usually using a NT workstation)\&. This parameter can be set per\-share or globally\&. Note: The root user always has admin rights\&. Use caution with use in the global stanza as this can cause side effects\&.
    7940 .sp
    7941 This parameter has been marked deprecated in favor of using the SePrintOperatorPrivilege and individual print security descriptors\&. It will be removed in a future release\&.
    7942 .sp
    7943 Default:
    7944 \fI\fIprinter admin\fR\fR\fI = \fR\fI\fR\fI \fR
    7945 .sp
    7946 Example:
    7947 \fI\fIprinter admin\fR\fR\fI = \fR\fIadmin, @staff\fR\fI \fR
    7948 .RE
    7949 
    79508314printer
    79518315.\" printer
     
    79718335.sp
    79728336Default:
    7973 \fI\fIprinter name\fR\fR\fI = \fR\fInone\fR\fI \fR
     8337\fI\fIprinter name\fR\fR\fI = \fR\fI\fR\fI \fR
    79748338.sp
    79758339Example:
     
    79978361\fBHPUX\fR,
    79988362\fBQNX\fR,
    7999 \fBSOFTQ\fR, and
    8000 \fBCUPS\fR\&.
     8363\fBSOFTQ\fR,
     8364\fBCUPS\fR
     8365and
     8366\fBIPRINT\fR\&.
     8367.sp
     8368Be aware that CUPS and IPRINT are only available if the CUPS development library was available at the time Samba was compiled or packaged\&.
    80018369.sp
    80028370To see what the defaults are for the other print commands when using the various options use the
     
    80128380section\&.
    80138381.sp
    8014 Default:
    8015 \fI\fIprinting\fR\fR\fI = \fR\fIDepends on the operating system, see testparm \-v\&.\fR\fI \fR
     8382See
     8383testparm \-v\&.
     8384for the default value on your system
     8385.sp
     8386Default:
     8387\fI\fIprinting\fR\fR\fI = \fR\fI # Depends on the operating system\fR\fI \fR
    80168388.RE
    80178389
     
    80338405.PP
    80348406.RS 4
    8035 Windows print clients can update print queue status by expecting the server to open a backchannel SMB connection to them\&. Due to client firewall settings this can cause considerable timeouts and will often fail, as there is no guarantee the client is even running an SMB server\&. By setting this parameter to
    8036 \fBno\fR
    8037 the Samba print server will not try to connect back to clients and treat corresponding requests as if the connection back to the client failed\&. The default setting of
    8038 \fByes\fR
    8039 causes smbd to attempt this connection\&.
    8040 .sp
    8041 Default:
    8042 \fI\fIprint notify backchannel\fR\fR\fI = \fR\fIyes\fR\fI \fR
     8407Windows print clients can update print queue status by expecting the server to open a backchannel SMB connection to them\&. Due to client firewall settings this can cause considerable timeouts and will often fail, as there is no guarantee the client is even running an SMB server\&. By default, the Samba print server will not try to connect back to clients, and will treat corresponding requests as if the connection back to the client failed\&.
     8408.sp
     8409Default:
     8410\fI\fIprint notify backchannel\fR\fR\fI = \fR\fIno\fR\fI \fR
     8411.RE
     8412
     8413private directory
     8414.\" private directory
     8415.PP
     8416.RS 4
     8417This parameter is a synonym for
     8418private dir\&.
    80438419.RE
    80448420
     
    80888464Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\&.
    80898465.sp
    8090 \fINo default\fR
     8466Default:
     8467\fI\fIqueuepause command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    80918468.sp
    80928469Example:
     
    81118488.sp
    81128489Default:
    8113 \fI\fIqueueresume command\fR\fR\fI = \fR\fI\fR\fI \fR
     8490\fI\fIqueueresume command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    81148491.sp
    81158492Example:
    81168493\fI\fIqueueresume command\fR\fR\fI = \fR\fIenable %p\fR\fI \fR
     8494.RE
     8495
     8496raw NTLMv2 auth (G)
     8497.\" raw NTLMv2 auth
     8498.PP
     8499.RS 4
     8500This parameter determines whether or not
     8501\fBsmbd\fR(8)
     8502will allow SMB1 clients without extended security (without SPNEGO) to use NTLMv2 authentication\&.
     8503.sp
     8504If this option,
     8505lanman auth
     8506and
     8507ntlm auth
     8508are all disabled, then only clients with SPNEGO support will be permitted\&. That means NTLMv2 is only supported within NTLMSSP\&.
     8509.sp
     8510Default:
     8511\fI\fIraw NTLMv2 auth\fR\fR\fI = \fR\fIno\fR\fI \fR
    81178512.RE
    81188513
     
    81278522parameter\&.
    81288523.sp
    8129 This parameter will not work with the
    8130 \m[blue]\fBsecurity = share\fR\m[]
    8131 in Samba 3\&.0\&. This is by design\&.
    8132 .sp
    81338524Default:
    81348525\fI\fIread list\fR\fR\fI = \fR\fI\fR\fI \fR
     
    81608551.PP
    81618552.RS 4
    8162 This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients\&.
    8163 .sp
    8164 If enabled, raw reads allow reads of 65535 bytes in one packet\&. This typically provides a major performance benefit\&.
     8553This is ignored if
     8554\m[blue]\fBasync smb echo handler\fR\m[]
     8555is set, because this feature is incompatible with raw read SMB requests
     8556.sp
     8557If enabled, raw reads allow reads of 65535 bytes in one packet\&. This typically provides a major performance benefit for some very, very old clients\&.
    81658558.sp
    81668559However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw reads\&.
     
    82078600Example:
    82088601\fI\fIregistry shares\fR\fR\fI = \fR\fIyes\fR\fI \fR
     8602.RE
     8603
     8604reject md5 clients (G)
     8605.\" reject md5 clients
     8606.PP
     8607.RS 4
     8608This option controls whether the netlogon server (currently only in \*(Aqactive directory domain controller\*(Aq mode), will reject clients which does not support NETLOGON_NEG_SUPPORTS_AES\&.
     8609.sp
     8610You can set this to yes if all domain members support aes\&. This will prevent downgrade attacks\&.
     8611.sp
     8612This option takes precedence to the \*(Aqallow nt4 crypto\*(Aq option\&.
     8613.sp
     8614Default:
     8615\fI\fIreject md5 clients\fR\fR\fI = \fR\fIno\fR\fI \fR
     8616.RE
     8617
     8618reject md5 servers (G)
     8619.\" reject md5 servers
     8620.PP
     8621.RS 4
     8622This option controls whether winbindd requires support for aes support for the netlogon secure channel\&.
     8623.sp
     8624The following flags will be required NETLOGON_NEG_ARCFOUR, NETLOGON_NEG_SUPPORTS_AES, NETLOGON_NEG_PASSWORD_SET2 and NETLOGON_NEG_AUTHENTICATED_RPC\&.
     8625.sp
     8626You can set this to yes if all domain controllers support aes\&. This will prevent downgrade attacks\&.
     8627.sp
     8628The behavior can be controlled per netbios domain by using \*(Aqreject md5 servers:NETBIOSDOMAIN = yes\*(Aq as option\&.
     8629.sp
     8630This option takes precedence to the
     8631\m[blue]\fBrequire strong key\fR\m[]
     8632option\&.
     8633.sp
     8634Default:
     8635\fI\fIreject md5 servers\fR\fR\fI = \fR\fIno\fR\fI \fR
    82098636.RE
    82108637
     
    83098736.RE
    83108737Default:
    8311 \fI\fIrename user script\fR\fR\fI = \fR\fIno\fR\fI \fR
     8738\fI\fIrename user script\fR\fR\fI = \fR\fI\fR\fI \fR
     8739.RE
     8740
     8741require strong key (G)
     8742.\" require strong key
     8743.PP
     8744.RS 4
     8745This option controls whether winbindd requires support for md5 strong key support for the netlogon secure channel\&.
     8746.sp
     8747The following flags will be required NETLOGON_NEG_STRONG_KEYS, NETLOGON_NEG_ARCFOUR and NETLOGON_NEG_AUTHENTICATED_RPC\&.
     8748.sp
     8749You can set this to no if some domain controllers only support des\&. This might allows weak crypto to be negotiated, may via downgrade attacks\&.
     8750.sp
     8751The behavior can be controlled per netbios domain by using \*(Aqrequire strong key:NETBIOSDOMAIN = no\*(Aq as option\&.
     8752.sp
     8753Note for active directory domain this option is hardcoded to \*(Aqyes\*(Aq
     8754.sp
     8755This option yields precedence to the
     8756\m[blue]\fBreject md5 servers\fR\m[]
     8757option\&.
     8758.sp
     8759This option takes precedence to the
     8760\m[blue]\fBclient schannel\fR\m[]
     8761option\&.
     8762.sp
     8763Default:
     8764\fI\fIrequire strong key\fR\fR\fI = \fR\fIyes\fR\fI \fR
    83128765.RE
    83138766
     
    83398792.\}
    83408793.sp
    8341 registry key in Windows 2000 and Windows NT\&. When set to 0, user and group list information is returned to anyone who asks\&. When set to 1, only an authenticated user can retrive user and group list information\&. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\&. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\&.
     8794registry key in Windows 2000 and Windows NT\&. When set to 0, user and group list information is returned to anyone who asks\&. When set to 1, only an authenticated user can retrieve user and group list information\&. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\&. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\&.
    83428795.sp
    83438796The security advantage of using restrict anonymous = 1 is dubious, as user and group list information can be obtained using other means\&.
     
    83638816.RE
    83648817
     8818rndc command (G)
     8819.\" rndc command
     8820.PP
     8821.RS 4
     8822This option specifies the path to the name server control utility\&.
     8823.sp
     8824The
     8825rndc
     8826utility should be a part of the bind installation\&.
     8827.sp
     8828Default:
     8829\fI\fIrndc command\fR\fR\fI = \fR\fI/usr/sbin/rndc\fR\fI \fR
     8830.sp
     8831Example:
     8832\fI\fIrndc command\fR\fR\fI = \fR\fI/usr/local/bind9/sbin/rndc\fR\fI \fR
     8833.RE
     8834
    83658835root
    83668836.\" root
     
    84028872.sp
    84038873Default:
    8404 \fI\fIroot directory\fR\fR\fI = \fR\fI/\fR\fI \fR
     8874\fI\fIroot directory\fR\fR\fI = \fR\fI\fR\fI \fR
    84058875.sp
    84068876Example:
     
    84208890.RE
    84218891
     8892root preexec (S)
     8893.\" root preexec
     8894.PP
     8895.RS 4
     8896This is the same as the
     8897\fIpreexec\fR
     8898parameter except that the command is run as root\&. This is useful for mounting filesystems (such as CDROMs) when a connection is opened\&.
     8899.sp
     8900Default:
     8901\fI\fIroot preexec\fR\fR\fI = \fR\fI\fR\fI \fR
     8902.RE
     8903
    84228904root preexec close (S)
    84238905.\" root preexec close
     
    84328914.RE
    84338915
    8434 root preexec (S)
    8435 .\" root preexec
    8436 .PP
    8437 .RS 4
    8438 This is the same as the
    8439 \fIpreexec\fR
    8440 parameter except that the command is run as root\&. This is useful for mounting filesystems (such as CDROMs) when a connection is opened\&.
    8441 .sp
    8442 Default:
    8443 \fI\fIroot preexec\fR\fR\fI = \fR\fI\fR\fI \fR
    8444 .RE
    8445 
    8446 rpc_server (G)
    8447 .\" rpc_server
    8448 .PP
    8449 .RS 4
    8450 Defines what kind of rpc server to use for a named pipe\&. The rpc_server prefix must be followed by the pipe name, and a value\&.
    8451 .sp
    8452 Three possible values are currently supported:
    8453 embedded
    8454 daemon
    8455 external
    8456 .sp
    8457 The classic method is to run every pipe as an internal function
    8458 \fIembedded\fR
    8459 in smbd\&.
    8460 .sp
    8461 An alternative method is to fork a
    8462 \fIdaemon\fR
    8463 early on at smbd startup time\&. This is supported only for selected pipes\&.
    8464 .sp
    8465 Choosing the
    8466 \fIexternal\fR
    8467 option allows to run a completely independent (3rd party) server capable of interfacing with samba via the MS\-RPC interface over named pipes\&.
    8468 .sp
    8469 Currently only the spoolss pipe can be configured in
    8470 \fIdaemon\fR
    8471 mode like this:
     8916rpc big endian (G)
     8917.\" rpc big endian
     8918.PP
     8919.RS 4
     8920Setting this option will force the RPC client and server to transfer data in big endian\&.
     8921.sp
     8922If it is disabled, data will be transferred in little endian\&.
     8923.sp
     8924The behaviour is independent of the endianness of the host machine\&.
     8925.sp
     8926Default:
     8927\fI\fIrpc big endian\fR\fR\fI = \fR\fIno\fR\fI \fR
     8928.RE
     8929
     8930rpc_daemon:DAEMON (G)
     8931.\" rpc_daemon:DAEMON
     8932.PP
     8933.RS 4
     8934Defines whether to use the embedded code or start a separate daemon for the defined rpc services\&. The rpc_daemon prefix must be followed by the server name, and a value\&.
     8935.sp
     8936Two possible values are currently supported:
    84728937.sp
    84738938.if n \{\
     
    84758940.\}
    84768941.nf
    8477         rpc_server:spoolss = daemon
     8942                disabled
     8943                fork
    84788944       
    84798945.fi
     
    84828948.\}
    84838949.sp
    8484 Default:
    8485 \fI\fIrpc_server\fR\fR\fI = \fR\fInone\fR\fI \fR
    8486 .RE
    8487 
    8488 security mask (S)
    8489 .\" security mask
    8490 .PP
    8491 .RS 4
    8492 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\&.
    8493 .sp
    8494 This parameter is applied as a mask (AND\*(Aqed with) to the incoming permission bits, thus resetting any bits not in this mask\&. Make sure not to mix up this parameter with
    8495 \m[blue]\fBforce security mode\fR\m[], which works in a manner similar to this one but uses a logical OR instead of an AND\&.
    8496 .sp
    8497 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\&.
    8498 .sp
    8499 If not set explicitly this parameter is 0777, allowing a user to set all the user/group/world permissions on a file\&.
    8500 .sp
    8501 \fI Note\fR
    8502 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it set to
    8503 \fB0777\fR\&.
    8504 .sp
    8505 Default:
    8506 \fI\fIsecurity mask\fR\fR\fI = \fR\fI0777\fR\fI \fR
    8507 .sp
    8508 Example:
    8509 \fI\fIsecurity mask\fR\fR\fI = \fR\fI0770\fR\fI \fR
     8950The classic method is to run rpc services as internal daemons embedded in smbd, therefore the external daemons are
     8951\fIdisabled\fR
     8952by default\&.
     8953.sp
     8954Choosing the
     8955\fIfork\fR
     8956option will cause samba to fork a separate process for each daemon configured this way\&. Each daemon may in turn fork a number of children used to handle requests from multiple smbds and direct tcp/ip connections (if the Endpoint Mapper is enabled)\&. Communication with smbd happens over named pipes and require that said pipes are forward to the external daemon (see
     8957\m[blue]\fBrpc_server\fR\m[])\&.
     8958.sp
     8959Forked RPC Daemons support dynamically forking children to handle connections\&. The heuristics about how many children to keep around and how fast to allow them to fork and also how many clients each child is allowed to handle concurrently is defined by parametrical options named after the daemon\&. Five options are currently supported:
     8960.sp
     8961.if n \{\
     8962.RS 4
     8963.\}
     8964.nf
     8965                prefork_min_children
     8966                prefork_max_children
     8967                prefork_spawn_rate
     8968                prefork_max_allowed_clients
     8969                prefork_child_min_life
     8970       
     8971.fi
     8972.if n \{\
     8973.RE
     8974.\}
     8975.sp
     8976To set one of these options use the follwing syntax:
     8977.sp
     8978.if n \{\
     8979.RS 4
     8980.\}
     8981.nf
     8982        damonname:prefork_min_children = 5
     8983       
     8984.fi
     8985.if n \{\
     8986.RE
     8987.\}
     8988.sp
     8989Samba includes separate daemons for spoolss, lsarpc/lsass, netlogon, samr, FSRVP and mdssvc(Spotlight)\&. Currently five daemons are available and they are called:
     8990.sp
     8991.if n \{\
     8992.RS 4
     8993.\}
     8994.nf
     8995                epmd
     8996                lsasd
     8997                spoolssd
     8998                fssd
     8999                mdssd
     9000       
     9001.fi
     9002.if n \{\
     9003.RE
     9004.\}
     9005.sp
     9006Example:
     9007.sp
     9008.if n \{\
     9009.RS 4
     9010.\}
     9011.nf
     9012        rpc_daemon:spoolssd = fork
     9013       
     9014.fi
     9015.if n \{\
     9016.RE
     9017.\}
     9018.sp
     9019Default:
     9020\fI\fIrpc_daemon:DAEMON\fR\fR\fI = \fR\fIdisabled\fR\fI \fR
     9021.RE
     9022
     9023rpc_server:SERVER (G)
     9024.\" rpc_server:SERVER
     9025.PP
     9026.RS 4
     9027With this option you can define if a rpc service should be running internal/embedded in smbd or should be redirected to an external daemon like Samba4, the endpoint mapper daemon, the spoolss daemon or the new LSA service daemon\&. The rpc_server prefix must be followed by the pipe name, and a value\&.
     9028.sp
     9029This option can be set for each available rpc service in Samba\&. The following list shows all available pipe names services you can modify with this option\&.
     9030.sp
     9031.RS 4
     9032.ie n \{\
     9033\h'-04'\(bu\h'+03'\c
     9034.\}
     9035.el \{\
     9036.sp -1
     9037.IP \(bu 2.3
     9038.\}
     9039epmapper \- Endpoint Mapper
     9040.RE
     9041.sp
     9042.RS 4
     9043.ie n \{\
     9044\h'-04'\(bu\h'+03'\c
     9045.\}
     9046.el \{\
     9047.sp -1
     9048.IP \(bu 2.3
     9049.\}
     9050winreg \- Remote Registry Service
     9051.RE
     9052.sp
     9053.RS 4
     9054.ie n \{\
     9055\h'-04'\(bu\h'+03'\c
     9056.\}
     9057.el \{\
     9058.sp -1
     9059.IP \(bu 2.3
     9060.\}
     9061srvsvc \- Remote Server Services
     9062.RE
     9063.sp
     9064.RS 4
     9065.ie n \{\
     9066\h'-04'\(bu\h'+03'\c
     9067.\}
     9068.el \{\
     9069.sp -1
     9070.IP \(bu 2.3
     9071.\}
     9072lsarpc \- Local Security Authority
     9073.RE
     9074.sp
     9075.RS 4
     9076.ie n \{\
     9077\h'-04'\(bu\h'+03'\c
     9078.\}
     9079.el \{\
     9080.sp -1
     9081.IP \(bu 2.3
     9082.\}
     9083samr \- Security Account Management
     9084.RE
     9085.sp
     9086.RS 4
     9087.ie n \{\
     9088\h'-04'\(bu\h'+03'\c
     9089.\}
     9090.el \{\
     9091.sp -1
     9092.IP \(bu 2.3
     9093.\}
     9094netlogon \- Netlogon Remote Protocol
     9095.RE
     9096.sp
     9097.RS 4
     9098.ie n \{\
     9099\h'-04'\(bu\h'+03'\c
     9100.\}
     9101.el \{\
     9102.sp -1
     9103.IP \(bu 2.3
     9104.\}
     9105netdfs \- Settings for Distributed File System
     9106.RE
     9107.sp
     9108.RS 4
     9109.ie n \{\
     9110\h'-04'\(bu\h'+03'\c
     9111.\}
     9112.el \{\
     9113.sp -1
     9114.IP \(bu 2.3
     9115.\}
     9116dssetup \- Active Directory Setup
     9117.RE
     9118.sp
     9119.RS 4
     9120.ie n \{\
     9121\h'-04'\(bu\h'+03'\c
     9122.\}
     9123.el \{\
     9124.sp -1
     9125.IP \(bu 2.3
     9126.\}
     9127wkssvc \- Workstation Services
     9128.RE
     9129.sp
     9130.RS 4
     9131.ie n \{\
     9132\h'-04'\(bu\h'+03'\c
     9133.\}
     9134.el \{\
     9135.sp -1
     9136.IP \(bu 2.3
     9137.\}
     9138spoolss \- Network Printing Spooler
     9139.RE
     9140.sp
     9141.RS 4
     9142.ie n \{\
     9143\h'-04'\(bu\h'+03'\c
     9144.\}
     9145.el \{\
     9146.sp -1
     9147.IP \(bu 2.3
     9148.\}
     9149svcctl \- Service Control
     9150.RE
     9151.sp
     9152.RS 4
     9153.ie n \{\
     9154\h'-04'\(bu\h'+03'\c
     9155.\}
     9156.el \{\
     9157.sp -1
     9158.IP \(bu 2.3
     9159.\}
     9160ntsvcs \- Plug and Play Services
     9161.RE
     9162.sp
     9163.RS 4
     9164.ie n \{\
     9165\h'-04'\(bu\h'+03'\c
     9166.\}
     9167.el \{\
     9168.sp -1
     9169.IP \(bu 2.3
     9170.\}
     9171eventlog \- Event Logger
     9172.RE
     9173.sp
     9174.RS 4
     9175.ie n \{\
     9176\h'-04'\(bu\h'+03'\c
     9177.\}
     9178.el \{\
     9179.sp -1
     9180.IP \(bu 2.3
     9181.\}
     9182initshutdown \- Init Shutdown Service
     9183.RE
     9184.sp
     9185.RS 4
     9186.ie n \{\
     9187\h'-04'\(bu\h'+03'\c
     9188.\}
     9189.el \{\
     9190.sp -1
     9191.IP \(bu 2.3
     9192.\}
     9193mdssvc \- Spotlight
     9194.RE
     9195.sp
     9196.RE
     9197Three possible values currently supported are:
     9198embeddedexternaldisabled
     9199.sp
     9200The classic method is to run every pipe as an internal function
     9201\fIembedded\fR
     9202in smbd\&. The defaults may vary depending on the service\&.
     9203.sp
     9204Choosing the
     9205\fIexternal\fR
     9206option allows one to run a separate daemon or even a completely independent (3rd party) server capable of interfacing with samba via the MS\-RPC interface over named pipes\&.
     9207.sp
     9208Currently in Samba3 we support four daemons, spoolssd, epmd, lsasd and mdssd\&. These daemons can be enabled using the
     9209\fIrpc_daemon\fR
     9210option\&. For spoolssd you have to enable the daemon and proxy the named pipe with:
     9211.sp
     9212Examples:
     9213.sp
     9214.if n \{\
     9215.RS 4
     9216.\}
     9217.nf
     9218                        rpc_daemon:lsasd = fork
     9219                        rpc_server:lsarpc = external
     9220                        rpc_server:samr = external
     9221                        rpc_server:netlogon = external
     9222
     9223                        rpc_server:spoolss = external
     9224                        rpc_server:epmapper = disabled
     9225
     9226                        rpc_daemon:mdssd = fork
     9227                        rpc_server:mdssvc = external
     9228               
     9229.fi
     9230.if n \{\
     9231.RE
     9232.\}
     9233.sp
     9234There is one special option which allows you to enable rpc services to listen for ncacn_ip_tcp connections too\&. Currently this is only used for testing and doesn\*(Aqt scale!
     9235.sp
     9236.if n \{\
     9237.RS 4
     9238.\}
     9239.nf
     9240                        rpc_server:tcpip = yes
     9241               
     9242.fi
     9243.if n \{\
     9244.RE
     9245.\}
     9246.sp
     9247Default:
     9248\fI\fIrpc_server:SERVER\fR\fR\fI = \fR\fIembedded\fR\fI \fR
     9249.RE
     9250
     9251samba kcc command (G)
     9252.\" samba kcc command
     9253.PP
     9254.RS 4
     9255This option specifies the path to the Samba KCC command\&. This script is used for replication topology replication\&.
     9256.sp
     9257It should not be necessary to modify this option except for testing purposes or if the
     9258samba_kcc
     9259was installed in a non\-default location\&.
     9260.sp
     9261Default:
     9262\fI\fIsamba kcc command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_kcc\fR\fI \fR
     9263.sp
     9264Example:
     9265\fI\fIsamba kcc command\fR\fR\fI = \fR\fI/usr/local/bin/kcc\fR\fI \fR
    85109266.RE
    85119267
     
    85189274file\&.
    85199275.sp
    8520 The option sets the "security mode bit" in replies to protocol negotiations with
    8521 \fBsmbd\fR(8)
    8522 to turn share level security on or off\&. Clients decide based on this bit whether (and how) to transfer user and password information to the server\&.
    8523 .sp
    85249276The default is
    8525 security = user, as this is the most common setting needed when talking to Windows 98 and Windows NT\&.
     9277security = user, as this is the most common setting, used for a standalone file server or a DC\&.
    85269278.sp
    85279279The alternatives are
    85289280security = ads
    85299281or
    8530 security = domain, which support joining Samba to a Windows domain, along with
    8531 security = share
    8532 and
    8533 security = server, both of which are deprecated\&.
    8534 .sp
    8535 In versions of Samba prior to 2\&.0\&.0, the default was
    8536 security = share
    8537 mainly because that was the only option at one stage\&.
     9282security = domain, which support joining Samba to a Windows domain
    85389283.sp
    85399284You should use
     
    85439288if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&.
    85449289.sp
    8545 It is possible to use
    8546 smbd
    8547 in a
    8548 \fI hybrid mode\fR
    8549 where it is offers both user and share level security under different
    8550 \m[blue]\fBNetBIOS aliases\fR\m[]\&.
    8551 .sp
    85529290The different settings will now be explained\&.
    85539291.sp
     9292\fISECURITY = AUTO\fR
     9293.sp
     9294This is the default security setting in Samba, and causes Samba to consult the
     9295\m[blue]\fBserver role\fR\m[]
     9296parameter (if set) to determine the security mode\&.
     9297.sp
    85549298\fISECURITY = USER\fR
    85559299.sp
    8556 This is the default security setting in Samba\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the
     9300If
     9301\m[blue]\fBserver role\fR\m[]
     9302is not specified, this is the default security setting in Samba\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the
    85579303\m[blue]\fBusername map\fR\m[]
    85589304parameter)\&. Encrypted passwords (see the
     
    85729318parameter for details on doing this\&.
    85739319.sp
    8574 See also the section
    8575 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.
    8576 .sp
    85779320\fISECURITY = DOMAIN\fR
    85789321.sp
     
    86019344parameter for details on doing this\&.
    86029345.sp
    8603 See also the section
    8604 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.
    8605 .sp
    86069346See also the
    86079347\m[blue]\fBpassword server\fR\m[]
     
    86109350parameter\&.
    86119351.sp
    8612 \fISECURITY = SHARE\fR
    8613 .if n \{\
    8614 .sp
    8615 .\}
    8616 .RS 4
    8617 .it 1 an-trap
    8618 .nr an-no-space-flag 1
    8619 .nr an-break-flag 1
    8620 .br
    8621 .ps +1
    8622 \fBNote\fR
    8623 .ps -1
    8624 .br
    8625 This option is deprecated as it is incompatible with SMB2
    8626 .sp .5v
    8627 .RE
    8628 When clients connect to a share level security server, they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a
    8629 security = share
    8630 server)\&. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\&.
    8631 .sp
    8632 Note that
    8633 smbd
    8634 \fIALWAYS\fR
    8635 uses a valid UNIX user to act on behalf of the client, even in
    8636 security = share
    8637 level security\&.
    8638 .sp
    8639 As clients are not required to send a username to the server in share level security,
    8640 smbd
    8641 uses several techniques to determine the correct UNIX user to use on behalf of the client\&.
    8642 .sp
    8643 A list of possible UNIX usernames to match with the given client password is constructed using the following methods :
    8644 .sp
    8645 .RS 4
    8646 .ie n \{\
    8647 \h'-04'\(bu\h'+03'\c
    8648 .\}
    8649 .el \{\
    8650 .sp -1
    8651 .IP \(bu 2.3
    8652 .\}
    8653 If the
    8654 \m[blue]\fBguest only\fR\m[]
    8655 parameter is set, then all the other stages are missed and only the
    8656 \m[blue]\fBguest account\fR\m[]
    8657 username is checked\&.
    8658 .RE
    8659 .sp
    8660 .RS 4
    8661 .ie n \{\
    8662 \h'-04'\(bu\h'+03'\c
    8663 .\}
    8664 .el \{\
    8665 .sp -1
    8666 .IP \(bu 2.3
    8667 .\}
    8668 Is a username is sent with the share connection request, then this username (after mapping \- see
    8669 \m[blue]\fBusername map\fR\m[]), is added as a potential username\&.
    8670 .RE
    8671 .sp
    8672 .RS 4
    8673 .ie n \{\
    8674 \h'-04'\(bu\h'+03'\c
    8675 .\}
    8676 .el \{\
    8677 .sp -1
    8678 .IP \(bu 2.3
    8679 .\}
    8680 If the client did a previous
    8681 \fIlogon \fR
    8682 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\&.
    8683 .RE
    8684 .sp
    8685 .RS 4
    8686 .ie n \{\
    8687 \h'-04'\(bu\h'+03'\c
    8688 .\}
    8689 .el \{\
    8690 .sp -1
    8691 .IP \(bu 2.3
    8692 .\}
    8693 The name of the service the client requested is added as a potential username\&.
    8694 .RE
    8695 .sp
    8696 .RS 4
    8697 .ie n \{\
    8698 \h'-04'\(bu\h'+03'\c
    8699 .\}
    8700 .el \{\
    8701 .sp -1
    8702 .IP \(bu 2.3
    8703 .\}
    8704 The NetBIOS name of the client is added to the list as a potential username\&.
    8705 .RE
    8706 .sp
    8707 .RS 4
    8708 .ie n \{\
    8709 \h'-04'\(bu\h'+03'\c
    8710 .\}
    8711 .el \{\
    8712 .sp -1
    8713 .IP \(bu 2.3
    8714 .\}
    8715 Any users on the
    8716 \m[blue]\fBuser\fR\m[]
    8717 list are added as potential usernames\&.
    8718 .RE
    8719 .sp
    8720 .RE
    8721 If the
    8722 \fIguest only\fR
    8723 parameter is not set, then this list is then tried with the supplied password\&. The first user for whom the password matches will be used as the UNIX user\&.
    8724 .sp
    8725 If the
    8726 \fIguest only\fR
    8727 parameter is set, or no username can be determined then if the share is marked as available to the
    8728 \fIguest account\fR, then this guest user will be used, otherwise access is denied\&.
    8729 .sp
    8730 Note that it can be
    8731 \fIvery\fR
    8732 confusing in share\-level security as to which UNIX username will eventually be used in granting access\&.
    8733 .sp
    8734 See also the section
    8735 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.
    8736 .sp
    8737 \fISECURITY = SERVER\fR
    8738 .sp
    8739 In this depicted mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\&. If this fails it will revert to
    8740 security = user\&. It expects the
    8741 \m[blue]\fBencrypted passwords\fR\m[]
    8742 parameter to be set to
    8743 \fByes\fR, unless the remote server does not support them\&. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid
    8744 smbpasswd
    8745 file to check users against\&. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\&.
    8746 .if n \{\
    8747 .sp
    8748 .\}
    8749 .RS 4
    8750 .it 1 an-trap
    8751 .nr an-no-space-flag 1
    8752 .nr an-break-flag 1
    8753 .br
    8754 .ps +1
    8755 \fBNote\fR
    8756 .ps -1
    8757 .br
    8758 This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\&. In particular, this mode of operation can cause significant resource consumption on the PDC, as it must maintain an active connection for the duration of the user\*(Aqs session\&. Furthermore, if this connection is lost, there is no way to reestablish it, and further authentications to the Samba server may fail (from a single client, till it disconnects)\&.
    8759 .sp .5v
    8760 .RE
    8761 .if n \{\
    8762 .sp
    8763 .\}
    8764 .RS 4
    8765 .it 1 an-trap
    8766 .nr an-no-space-flag 1
    8767 .nr an-break-flag 1
    8768 .br
    8769 .ps +1
    8770 \fBNote\fR
    8771 .ps -1
    8772 .br
    8773 If the client selects NTLMv2 authentication, then this mode of operation
    8774 \fIwill fail\fR
    8775 .sp .5v
    8776 .RE
    8777 .if n \{\
    8778 .sp
    8779 .\}
    8780 .RS 4
    8781 .it 1 an-trap
    8782 .nr an-no-space-flag 1
    8783 .nr an-break-flag 1
    8784 .br
    8785 .ps +1
    8786 \fBNote\fR
    8787 .ps -1
    8788 .br
    8789 From the client\*(Aqs point of view,
    8790 security = server
    8791 is the same as
    8792 security = user\&. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\&.
    8793 .sp .5v
    8794 .RE
    8795 .if n \{\
    8796 .sp
    8797 .\}
    8798 .RS 4
    8799 .it 1 an-trap
    8800 .nr an-no-space-flag 1
    8801 .nr an-break-flag 1
    8802 .br
    8803 .ps +1
    8804 \fBNote\fR
    8805 .ps -1
    8806 .br
    8807 This option is deprecated, and may be removed in future
    8808 .sp .5v
    8809 .RE
    88109352\fINote\fR
    88119353that the name of the resource being requested is
     
    88169358parameter for details on doing this\&.
    88179359.sp
    8818 See also the section
    8819 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.
    8820 .sp
    88219360See also the
    88229361\m[blue]\fBpassword server\fR\m[]
     
    88319370Note that this mode does NOT make Samba operate as a Active Directory Domain Controller\&.
    88329371.sp
     9372Note that this forces
     9373\m[blue]\fBrequire strong key = yes\fR\m[]
     9374and
     9375\m[blue]\fBclient schannel = yes\fR\m[]
     9376for the primary domain\&.
     9377.sp
    88339378Read the chapter about Domain Membership in the HOWTO for details\&.
    88349379.sp
    88359380Default:
    8836 \fI\fIsecurity\fR\fR\fI = \fR\fIUSER\fR\fI \fR
     9381\fI\fIsecurity\fR\fR\fI = \fR\fIAUTO\fR\fI \fR
    88379382.sp
    88389383Example:
     
    88409385.RE
    88419386
    8842 send spnego principal (G)
    8843 .\" send spnego principal
    8844 .PP
    8845 .RS 4
    8846 This parameter determines whether or not
     9387security mask (S)
     9388.\" security mask
     9389.PP
     9390.RS 4
     9391This parameter has been removed for Samba 4\&.0\&.0\&.
     9392.sp
     9393\fINo default\fR
     9394.RE
     9395
     9396max protocol
     9397.\" max protocol
     9398.PP
     9399.RS 4
     9400This parameter is a synonym for
     9401server max protocol\&.
     9402.RE
     9403
     9404protocol
     9405.\" protocol
     9406.PP
     9407.RS 4
     9408This parameter is a synonym for
     9409server max protocol\&.
     9410.RE
     9411
     9412server max protocol (G)
     9413.\" server max protocol
     9414.PP
     9415.RS 4
     9416The value of the parameter (a string) is the highest protocol level that will be supported by the server\&.
     9417.sp
     9418Possible values are :
     9419.sp
     9420.RS 4
     9421.ie n \{\
     9422\h'-04'\(bu\h'+03'\c
     9423.\}
     9424.el \{\
     9425.sp -1
     9426.IP \(bu 2.3
     9427.\}
     9428\fBLANMAN1\fR: First
     9429\fImodern\fR
     9430version of the protocol\&. Long filename support\&.
     9431.RE
     9432.sp
     9433.RS 4
     9434.ie n \{\
     9435\h'-04'\(bu\h'+03'\c
     9436.\}
     9437.el \{\
     9438.sp -1
     9439.IP \(bu 2.3
     9440.\}
     9441\fBLANMAN2\fR: Updates to Lanman1 protocol\&.
     9442.RE
     9443.sp
     9444.RS 4
     9445.ie n \{\
     9446\h'-04'\(bu\h'+03'\c
     9447.\}
     9448.el \{\
     9449.sp -1
     9450.IP \(bu 2.3
     9451.\}
     9452\fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&.
     9453.RE
     9454.sp
     9455.RS 4
     9456.ie n \{\
     9457\h'-04'\(bu\h'+03'\c
     9458.\}
     9459.el \{\
     9460.sp -1
     9461.IP \(bu 2.3
     9462.\}
     9463\fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and later versions of Windows\&. SMB2 has sub protocols available\&.
     9464.sp
     9465.RS 4
     9466.ie n \{\
     9467\h'-04'\(bu\h'+03'\c
     9468.\}
     9469.el \{\
     9470.sp -1
     9471.IP \(bu 2.3
     9472.\}
     9473\fBSMB2_02\fR: The earliest SMB2 version\&.
     9474.RE
     9475.sp
     9476.RS 4
     9477.ie n \{\
     9478\h'-04'\(bu\h'+03'\c
     9479.\}
     9480.el \{\
     9481.sp -1
     9482.IP \(bu 2.3
     9483.\}
     9484\fBSMB2_10\fR: Windows 7 SMB2 version\&.
     9485.RE
     9486.sp
     9487.RS 4
     9488.ie n \{\
     9489\h'-04'\(bu\h'+03'\c
     9490.\}
     9491.el \{\
     9492.sp -1
     9493.IP \(bu 2.3
     9494.\}
     9495\fBSMB2_22\fR: Early Windows 8 SMB2 version\&.
     9496.RE
     9497.sp
     9498.RS 4
     9499.ie n \{\
     9500\h'-04'\(bu\h'+03'\c
     9501.\}
     9502.el \{\
     9503.sp -1
     9504.IP \(bu 2.3
     9505.\}
     9506\fBSMB2_24\fR: Windows 8 beta SMB2 version\&.
     9507.RE
     9508.sp
     9509.RE
     9510By default SMB2 selects the SMB2_10 variant\&.
     9511.RE
     9512.sp
     9513.RS 4
     9514.ie n \{\
     9515\h'-04'\(bu\h'+03'\c
     9516.\}
     9517.el \{\
     9518.sp -1
     9519.IP \(bu 2.3
     9520.\}
     9521\fBSMB3\fR: The same as SMB2\&. Used by Windows 8\&. SMB3 has sub protocols available\&.
     9522.sp
     9523.RS 4
     9524.ie n \{\
     9525\h'-04'\(bu\h'+03'\c
     9526.\}
     9527.el \{\
     9528.sp -1
     9529.IP \(bu 2.3
     9530.\}
     9531\fBSMB3_00\fR: Windows 8 SMB3 version\&. (mostly the same as SMB2_24)
     9532.RE
     9533.sp
     9534.RS 4
     9535.ie n \{\
     9536\h'-04'\(bu\h'+03'\c
     9537.\}
     9538.el \{\
     9539.sp -1
     9540.IP \(bu 2.3
     9541.\}
     9542\fBSMB3_02\fR: Windows 8\&.1 SMB3 version\&.
     9543.RE
     9544.sp
     9545.RS 4
     9546.ie n \{\
     9547\h'-04'\(bu\h'+03'\c
     9548.\}
     9549.el \{\
     9550.sp -1
     9551.IP \(bu 2.3
     9552.\}
     9553\fBSMB3_10\fR: early Windows 10 technical preview SMB3 version\&.
     9554.RE
     9555.sp
     9556.RS 4
     9557.ie n \{\
     9558\h'-04'\(bu\h'+03'\c
     9559.\}
     9560.el \{\
     9561.sp -1
     9562.IP \(bu 2.3
     9563.\}
     9564\fBSMB3_11\fR: Windows 10 technical preview SMB3 version (maybe final)\&.
     9565.RE
     9566.sp
     9567.RE
     9568By default SMB3 selects the SMB3_11 variant\&.
     9569.RE
     9570.sp
     9571.RE
     9572Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     9573.sp
     9574Default:
     9575\fI\fIserver max protocol\fR\fR\fI = \fR\fISMB3\fR\fI \fR
     9576.sp
     9577Example:
     9578\fI\fIserver max protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR
     9579.RE
     9580
     9581min protocol
     9582.\" min protocol
     9583.PP
     9584.RS 4
     9585This parameter is a synonym for
     9586server min protocol\&.
     9587.RE
     9588
     9589server min protocol (G)
     9590.\" server min protocol
     9591.PP
     9592.RS 4
     9593This setting controls the minimum protocol version that the server will allow the client to use\&.
     9594.sp
     9595Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     9596.sp
     9597See
     9598Related command: \m[blue]\fBserver max protocol\fR\m[]
     9599for a full list of available protocols\&.
     9600.sp
     9601Default:
     9602\fI\fIserver min protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR
     9603.sp
     9604Example:
     9605\fI\fIserver min protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR
     9606.RE
     9607
     9608server multi channel support (G)
     9609.\" server multi channel support
     9610.PP
     9611.RS 4
     9612This boolean parameter controls whether
    88479613\fBsmbd\fR(8)
    8848 will send the server\-supplied principal sometimes given in the SPNEGO exchange\&.
    8849 .sp
    8850 If enabled, Samba can attempt to help clients to use Kerberos to contact it, even when known only by IP address or a name not registered with our KDC as a service principal name\&. Kerberos relies on names, so ordinarily cannot function in this situation\&.
    8851 .sp
    8852 If disabled, Samba will send the string not_defined_in_RFC4178@please_ignore as the \*(Aqrfc4178 hint\*(Aq, following the updated RFC and Windows 2008 behaviour in this area\&.
    8853 .sp
    8854 Note that Windows XP SP2 and later versions already ignored this value in all circumstances\&.
    8855 .sp
    8856 Default:
    8857 \fI\fIsend spnego principal\fR\fR\fI = \fR\fIno\fR\fI \fR
     9614will support SMB3 multi\-channel\&.
     9615.sp
     9616This parameter has been added with version 4\&.4\&.
     9617.sp
     9618Warning: Note that this feature is considered experimental in Samba 4\&.4\&. Use it at your own risk: Even though it may seem to work well in testing, it may result in data corruption under some race conditions\&. Future 4\&.4\&.x release may improve this situation\&.
     9619.sp
     9620Default:
     9621\fI\fIserver multi channel support\fR\fR\fI = \fR\fIno\fR\fI \fR
     9622.RE
     9623
     9624server role (G)
     9625.\" server role
     9626.PP
     9627.RS 4
     9628This option determines the basic operating mode of a Samba server and is one of the most important settings in the
     9629smb\&.conf
     9630file\&.
     9631.sp
     9632The default is
     9633server role = auto, as causes Samba to operate according to the
     9634\m[blue]\fBsecurity\fR\m[]
     9635setting, or if not specified as a simple file server that is not connected to any domain\&.
     9636.sp
     9637The alternatives are
     9638server role = standalone
     9639or
     9640server role = member server, which support joining Samba to a Windows domain, along with
     9641server role = domain controller, which run Samba as a Windows domain controller\&.
     9642.sp
     9643You should use
     9644server role = standalone
     9645and
     9646\m[blue]\fBmap to guest\fR\m[]
     9647if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&.
     9648.sp
     9649\fISERVER ROLE = AUTO\fR
     9650.sp
     9651This is the default server role in Samba, and causes Samba to consult the
     9652\m[blue]\fBsecurity\fR\m[]
     9653parameter (if set) to determine the server role, giving compatible behaviours to previous Samba versions\&.
     9654.sp
     9655\fISERVER ROLE = STANDALONE\fR
     9656.sp
     9657If
     9658\m[blue]\fBsecurity\fR\m[]
     9659is also not specified, this is the default security setting in Samba\&. In standalone operation, a client must first "log\-on" with a valid username and password (which can be mapped using the
     9660\m[blue]\fBusername map\fR\m[]
     9661parameter) stored on this machine\&. Encrypted passwords (see the
     9662\m[blue]\fBencrypted passwords\fR\m[]
     9663parameter) are by default used in this security mode\&. Parameters such as
     9664\m[blue]\fBuser\fR\m[]
     9665and
     9666\m[blue]\fBguest only\fR\m[]
     9667if set are then applied and may change the UNIX user to use on this connection, but only after the user has been successfully authenticated\&.
     9668.sp
     9669\fISERVER ROLE = MEMBER SERVER\fR
     9670.sp
     9671This mode will only work correctly if
     9672\fBnet\fR(8)
     9673has been used to add this machine into a Windows Domain\&. It expects the
     9674\m[blue]\fBencrypted passwords\fR\m[]
     9675parameter to be set to
     9676\fByes\fR\&. In this mode Samba will try to validate the username/password by passing it to a Windows or Samba Domain Controller, in exactly the same way that a Windows Server would do\&.
     9677.sp
     9678\fINote\fR
     9679that a valid UNIX user must still exist as well as the account on the Domain Controller to allow Samba to have a valid UNIX account to map file access to\&. Winbind can provide this\&.
     9680.sp
     9681\fISERVER ROLE = CLASSIC PRIMARY DOMAIN CONTROLLER\fR
     9682.sp
     9683This mode of operation runs a classic Samba primary domain controller, providing domain logon services to Windows and Samba clients of an NT4\-like domain\&. Clients must be joined to the domain to create a secure, trusted path across the network\&. There must be only one PDC per NetBIOS scope (typcially a broadcast network or clients served by a single WINS server)\&.
     9684.sp
     9685\fISERVER ROLE = CLASSIC BACKUP DOMAIN CONTROLLER\fR
     9686.sp
     9687This mode of operation runs a classic Samba backup domain controller, providing domain logon services to Windows and Samba clients of an NT4\-like domain\&. As a BDC, this allows multiple Samba servers to provide redundant logon services to a single NetBIOS scope\&.
     9688.sp
     9689\fISERVER ROLE = ACTIVE DIRECTORY DOMAIN CONTROLLER\fR
     9690.sp
     9691This mode of operation runs Samba as an active directory domain controller, providing domain logon services to Windows and Samba clients of the domain\&. This role requires special configuration, see the
     9692Samba4 HOWTO
     9693.sp
     9694Default:
     9695\fI\fIserver role\fR\fR\fI = \fR\fIAUTO\fR\fI \fR
     9696.sp
     9697Example:
     9698\fI\fIserver role\fR\fR\fI = \fR\fIACTIVE DIRECTORY DOMAIN CONTROLLER\fR\fI \fR
    88589699.RE
    88599700
     
    88829723.RE
    88839724
     9725server services (G)
     9726.\" server services
     9727.PP
     9728.RS 4
     9729This option contains the services that the Samba daemon will run\&.
     9730.sp
     9731An entry in the
     9732smb\&.conf
     9733file can either override the previous value completely or entries can be removed from or added to it by prefixing them with
     9734\fB+\fR
     9735or
     9736\fB\-\fR\&.
     9737.sp
     9738Default:
     9739\fI\fIserver services\fR\fR\fI = \fR\fIs3fs, rpc, nbt, wrepl, ldap, cldap, kdc, drepl, winbindd, ntp_signd, kcc, dnsupdate, dns\fR\fI \fR
     9740.sp
     9741Example:
     9742\fI\fIserver services\fR\fR\fI = \fR\fI\-s3fs, +smb\fR\fI \fR
     9743.RE
     9744
    88849745server signing (G)
    88859746.\" server signing
     
    88879748.RS 4
    88889749This controls whether the client is allowed or required to use SMB1 and SMB2 signing\&. Possible values are
     9750\fIdefault\fR,
    88899751\fIauto\fR,
    88909752\fImandatory\fR
    88919753and
    88929754\fIdisabled\fR\&.
     9755.sp
     9756By default, and when smb signing is set to
     9757\fIdefault\fR, smb signing is required when
     9758\m[blue]\fBserver role\fR\m[]
     9759is
     9760\fIactive directory domain controller\fR
     9761and disabled otherwise\&.
    88939762.sp
    88949763When set to auto, SMB1 signing is offered, but not enforced\&. When set to mandatory, SMB1 signing is required and if set to disabled, SMB signing is not offered either\&.
     
    89019770.sp
    89029771Default:
    8903 \fI\fIserver signing\fR\fR\fI = \fR\fIDisabled\fR\fI \fR
     9772\fI\fIserver signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR
    89049773.RE
    89059774
     
    89289797.RE
    89299798
    8930 set directory (S)
    8931 .\" set directory
    8932 .PP
    8933 .RS 4
    8934 If
    8935 set directory = no, then users of the service may not use the setdir command to change directory\&.
    8936 .sp
    8937 The
    8938 setdir
    8939 command is only implemented in the Digital Pathworks client\&. See the Pathworks documentation for details\&.
    8940 .sp
    8941 Default:
    8942 \fI\fIset directory\fR\fR\fI = \fR\fIno\fR\fI \fR
    8943 .RE
    8944 
    89459799set primary group script (G)
    89469800.\" set primary group script
    89479801.PP
    89489802.RS 4
    8949 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\&. This script sets the primary group in the unix userdatase when an administrator sets the primary group from the windows user manager or when fetching a SAM with
     9803Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\&. This script sets the primary group in the unix user database when an administrator sets the primary group from the windows user manager or when fetching a SAM with
    89509804net rpc vampire\&.
    89519805\fI%u\fR
     
    89699823should only be used whenever there is no operating system API available from the OS that samba can use\&.
    89709824.sp
    8971 This option is only available if Samba was configured with the argument
    8972 \-\-with\-sys\-quotas
    8973 or on linux when
    8974 \&./configure \-\-with\-quotas
    8975 was used and a working quota api was found in the system\&. Most packages are configured with these options already\&.
     9825This option is only available if Samba was compiled with quota support\&.
    89769826.sp
    89779827This parameter should specify the path to a script that can set quota for the specified arguments\&.
     
    89879837.IP \(bu 2.3
    89889838.\}
    8989 1 \- quota type
     98391 \- path to where the quota needs to be set\&. This needs to be interpreted relative to the current working directory that the script may also check for\&.
     9840.RE
     9841.sp
     9842.RS 4
     9843.ie n \{\
     9844\h'-04'\(bu\h'+03'\c
     9845.\}
     9846.el \{\
     9847.sp -1
     9848.IP \(bu 2.3
     9849.\}
     98502 \- quota type
    89909851.sp
    89919852.RS 4
     
    90449905.IP \(bu 2.3
    90459906.\}
    9046 2 \- id (uid for user, gid for group, \-1 if N/A)
    9047 .RE
    9048 .sp
    9049 .RS 4
    9050 .ie n \{\
    9051 \h'-04'\(bu\h'+03'\c
    9052 .\}
    9053 .el \{\
    9054 .sp -1
    9055 .IP \(bu 2.3
    9056 .\}
    9057 3 \- quota state (0 = disable, 1 = enable, 2 = enable and enforce)
    9058 .RE
    9059 .sp
    9060 .RS 4
    9061 .ie n \{\
    9062 \h'-04'\(bu\h'+03'\c
    9063 .\}
    9064 .el \{\
    9065 .sp -1
    9066 .IP \(bu 2.3
    9067 .\}
    9068 4 \- block softlimit
    9069 .RE
    9070 .sp
    9071 .RS 4
    9072 .ie n \{\
    9073 \h'-04'\(bu\h'+03'\c
    9074 .\}
    9075 .el \{\
    9076 .sp -1
    9077 .IP \(bu 2.3
    9078 .\}
    9079 5 \- block hardlimit
    9080 .RE
    9081 .sp
    9082 .RS 4
    9083 .ie n \{\
    9084 \h'-04'\(bu\h'+03'\c
    9085 .\}
    9086 .el \{\
    9087 .sp -1
    9088 .IP \(bu 2.3
    9089 .\}
    9090 6 \- inode softlimit
    9091 .RE
    9092 .sp
    9093 .RS 4
    9094 .ie n \{\
    9095 \h'-04'\(bu\h'+03'\c
    9096 .\}
    9097 .el \{\
    9098 .sp -1
    9099 .IP \(bu 2.3
    9100 .\}
    9101 7 \- inode hardlimit
    9102 .RE
    9103 .sp
    9104 .RS 4
    9105 .ie n \{\
    9106 \h'-04'\(bu\h'+03'\c
    9107 .\}
    9108 .el \{\
    9109 .sp -1
    9110 .IP \(bu 2.3
    9111 .\}
    9112 8(optional) \- block size, defaults to 1024
     99073 \- id (uid for user, gid for group, \-1 if N/A)
     9908.RE
     9909.sp
     9910.RS 4
     9911.ie n \{\
     9912\h'-04'\(bu\h'+03'\c
     9913.\}
     9914.el \{\
     9915.sp -1
     9916.IP \(bu 2.3
     9917.\}
     99184 \- quota state (0 = disable, 1 = enable, 2 = enable and enforce)
     9919.RE
     9920.sp
     9921.RS 4
     9922.ie n \{\
     9923\h'-04'\(bu\h'+03'\c
     9924.\}
     9925.el \{\
     9926.sp -1
     9927.IP \(bu 2.3
     9928.\}
     99295 \- block softlimit
     9930.RE
     9931.sp
     9932.RS 4
     9933.ie n \{\
     9934\h'-04'\(bu\h'+03'\c
     9935.\}
     9936.el \{\
     9937.sp -1
     9938.IP \(bu 2.3
     9939.\}
     99406 \- block hardlimit
     9941.RE
     9942.sp
     9943.RS 4
     9944.ie n \{\
     9945\h'-04'\(bu\h'+03'\c
     9946.\}
     9947.el \{\
     9948.sp -1
     9949.IP \(bu 2.3
     9950.\}
     99517 \- inode softlimit
     9952.RE
     9953.sp
     9954.RS 4
     9955.ie n \{\
     9956\h'-04'\(bu\h'+03'\c
     9957.\}
     9958.el \{\
     9959.sp -1
     9960.IP \(bu 2.3
     9961.\}
     99628 \- inode hardlimit
     9963.RE
     9964.sp
     9965.RS 4
     9966.ie n \{\
     9967\h'-04'\(bu\h'+03'\c
     9968.\}
     9969.el \{\
     9970.sp -1
     9971.IP \(bu 2.3
     9972.\}
     99739(optional) \- block size, defaults to 1024
    91139974.RE
    91149975.sp
     
    91219982Example:
    91229983\fI\fIset quota command\fR\fR\fI = \fR\fI/usr/local/sbin/set_quota\fR\fI \fR
     9984.RE
     9985
     9986share backend (G)
     9987.\" share backend
     9988.PP
     9989.RS 4
     9990This option specifies the backend that will be used to access the configuration of file shares\&.
     9991.sp
     9992Traditionally, Samba file shares have been configured in the
     9993\fBsmb\&.conf\fR
     9994file and this is still the default\&.
     9995.sp
     9996At the moment there are no other supported backends\&.
     9997.sp
     9998Default:
     9999\fI\fIshare backend\fR\fR\fI = \fR\fIclassic\fR\fI \fR
    912310000.RE
    912410001
     
    913310010Default:
    913410011\fI\fIshare:fake_fscaps\fR\fR\fI = \fR\fI0\fR\fI \fR
    9135 .RE
    9136 
    9137 share modes (S)
    9138 .\" share modes
    9139 .PP
    9140 .RS 4
    9141 This enables or disables the honoring of the
    9142 \fIshare modes\fR
    9143 during a file open\&. These modes are used by clients to gain exclusive read or write access to a file\&.
    9144 .sp
    9145 This is a deprecated option from old versions of Samba, and will be removed in the next major release\&.
    9146 .sp
    9147 These open modes are not directly supported by UNIX, so they are simulated using shared memory\&.
    9148 .sp
    9149 The share modes that are enabled by this option are the standard Windows share modes\&.
    9150 .sp
    9151 This option gives full share compatibility and is enabled by default\&.
    9152 .sp
    9153 You should
    9154 \fINEVER\fR
    9155 turn this parameter off as many Windows applications will break if you do so\&.
    9156 .sp
    9157 Default:
    9158 \fI\fIshare modes\fR\fR\fI = \fR\fIyes\fR\fI \fR
    915910012.RE
    916010013
     
    918110034With the introduction of MS\-RPC based printing support for Windows NT/2000 client in Samba 2\&.2, a "Printers\&.\&.\&." folder will appear on Samba hosts in the share listing\&. Normally this folder will contain an icon for the MS Add Printer Wizard (APW)\&. However, it is possible to disable this feature regardless of the level of privilege of the connected user\&.
    918210035.sp
    9183 Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\&. If the user does not have administrative access on the print server (i\&.e is not root or a member of the
    9184 \fIprinter admin\fR
    9185 group), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\&. This should succeed, however the APW icon will not be displayed\&.
     10036Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\&. If the user does not have administrative access on the print server (i\&.e is not root or has granted the SePrintOperatorPrivilege), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\&. This should succeed, however the APW icon will not be displayed\&.
    918610037.sp
    918710038Disabling the
     
    921510066that should start a shutdown procedure\&.
    921610067.sp
    9217 If the connected user posseses the
     10068If the connected user possesses the
    921810069\fBSeRemoteShutdownPrivilege\fR, right, this command will be run as root\&.
    921910070.sp
     
    929910150.RE
    930010151
     10152smb2 leases (G)
     10153.\" smb2 leases
     10154.PP
     10155.RS 4
     10156This boolean option tells
     10157smbd
     10158whether to globally negotiate SMB2 leases on file open requests\&. Leasing is an SMB2\-only feature which allows clients to aggressively cache files locally above and beyond the caching allowed by SMB1 oplocks\&. This (experimental) parameter is set to off by default until the SMB2 leasing code is declared fully stable\&.
     10159.sp
     10160This is only available with
     10161\m[blue]\fBoplocks = yes\fR\m[]
     10162and
     10163\m[blue]\fBkernel oplocks = no\fR\m[]\&.
     10164.sp
     10165Note that the write cache won\*(Aqt be used for file handles with a smb2 write lease\&.
     10166.sp
     10167The Samba implementation of leases is currently marked as experimental!
     10168.sp
     10169Default:
     10170\fI\fIsmb2 leases\fR\fR\fI = \fR\fIno\fR\fI \fR
     10171.RE
     10172
    930110173smb2 max credits (G)
    930210174.\" smb2 max credits
     
    932110193will return to a client, informing the client of the largest size that may be returned by a single SMB2 read call\&.
    932210194.sp
    9323 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&.
    9324 .sp
    9325 Default:
    9326 \fI\fIsmb2 max read\fR\fR\fI = \fR\fI65536\fR\fI \fR
     10195The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&.
     10196.sp
     10197Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 8MiB for SMB >= 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&.
     10198.sp
     10199Default:
     10200\fI\fIsmb2 max read\fR\fR\fI = \fR\fI8388608\fR\fI \fR
    932710201.RE
    932810202
     
    933510209will return to a client, informing the client of the largest size of buffer that may be used in querying file meta\-data via QUERY_INFO and related SMB2 calls\&.
    933610210.sp
    9337 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&.
    9338 .sp
    9339 Default:
    9340 \fI\fIsmb2 max trans\fR\fR\fI = \fR\fI65536\fR\fI \fR
     10211The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&.
     10212.sp
     10213Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 1MiB for SMB >= 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&.
     10214.sp
     10215Default:
     10216\fI\fIsmb2 max trans\fR\fR\fI = \fR\fI8388608\fR\fI \fR
    934110217.RE
    934210218
     
    934910225will return to a client, informing the client of the largest size that may be sent to the server by a single SMB2 write call\&.
    935010226.sp
    9351 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&.
    9352 .sp
    9353 Default:
    9354 \fI\fIsmb2 max write\fR\fR\fI = \fR\fI65536\fR\fI \fR
     10227The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&.
     10228.sp
     10229Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 8MiB for SMB => 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&.
     10230.sp
     10231Default:
     10232\fI\fIsmb2 max write\fR\fR\fI = \fR\fI8388608\fR\fI \fR
     10233.RE
     10234
     10235smbd profiling level (G)
     10236.\" smbd profiling level
     10237.PP
     10238.RS 4
     10239This parameter allows the administrator to enable profiling support\&.
     10240.sp
     10241Possible values are
     10242\fBoff\fR,
     10243\fBcount\fR
     10244and
     10245\fBon\fR\&.
     10246.sp
     10247Default:
     10248\fI\fIsmbd profiling level\fR\fR\fI = \fR\fIoff\fR\fI \fR
     10249.sp
     10250Example:
     10251\fI\fIsmbd profiling level\fR\fR\fI = \fR\fIon\fR\fI \fR
    935510252.RE
    935610253
     
    935910256.PP
    936010257.RS 4
    9361 This is a new feature introduced with Samba 3\&.2 and above\&. It is an extension to the SMB/CIFS protocol negotiated as part of the UNIX extensions\&. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\&. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\&. Currently this is only supported by Samba 3\&.2 smbclient, and hopefully soon Linux CIFSFS and MacOS/X clients\&. Windows clients do not support this feature\&.
    9362 .sp
    9363 This controls whether the remote client is allowed or required to use SMB encryption\&. Possible values are
    9364 \fIauto\fR,
    9365 \fImandatory\fR
    9366 and
    9367 \fIdisabled\fR\&. This may be set on a per\-share basis, but clients may chose to encrypt the entire session, not just traffic to a specific share\&. If this is set to mandatory then all traffic to a share
     10258This parameter controls whether a remote client is allowed or required to use SMB encryption\&. It has different effects depending on whether the connection uses SMB1 or SMB2 and newer:
     10259.sp
     10260.RS 4
     10261.ie n \{\
     10262\h'-04'\(bu\h'+03'\c
     10263.\}
     10264.el \{\
     10265.sp -1
     10266.IP \(bu 2.3
     10267.\}
     10268If the connection uses SMB1, then this option controls the use of a Samba\-specific extension to the SMB protocol introduced in Samba 3\&.2 that makes use of the Unix extensions\&.
     10269.RE
     10270.sp
     10271.RS 4
     10272.ie n \{\
     10273\h'-04'\(bu\h'+03'\c
     10274.\}
     10275.el \{\
     10276.sp -1
     10277.IP \(bu 2.3
     10278.\}
     10279If the connection uses SMB2 or newer, then this option controls the use of the SMB\-level encryption that is supported in SMB version 3\&.0 and above and available in Windows 8 and newer\&.
     10280.RE
     10281.sp
     10282.RE
     10283This parameter can be set globally and on a per\-share bases\&. Possible values are
     10284\fIoff\fR
     10285(or
     10286\fIdisabled\fR),
     10287\fIenabled\fR
     10288(or
     10289\fIauto\fR, or
     10290\fIif_required\fR),
     10291\fIdesired\fR, and
     10292\fIrequired\fR
     10293(or
     10294\fImandatory\fR)\&. A special value is
     10295\fIdefault\fR
     10296which is the implicit default setting of
     10297\fIenabled\fR\&.
     10298.PP
     10299\fIEffects for SMB1\fR
     10300.RS 4
     10301The Samba\-specific encryption of SMB1 connections is an extension to the SMB protocol negotiated as part of the UNIX extensions\&. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\&. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\&. Currently this is only supported smbclient of by Samba 3\&.2 and newer, and hopefully soon Linux CIFSFS and MacOS/X clients\&. Windows clients do not support this feature\&.
     10302.sp
     10303This may be set on a per\-share basis, but clients may chose to encrypt the entire session, not just traffic to a specific share\&. If this is set to mandatory then all traffic to a share
    936810304\fImust\fR
    9369 must be encrypted once the connection has been made to the share\&. The server would return "access denied" to all non\-encrypted requests on such a share\&. Selecting encrypted traffic reduces throughput as smaller packet sizes must be used (no huge UNIX style read/writes allowed) as well as the overhead of encrypting and signing all the data\&.
     10305be encrypted once the connection has been made to the share\&. The server would return "access denied" to all non\-encrypted requests on such a share\&. Selecting encrypted traffic reduces throughput as smaller packet sizes must be used (no huge UNIX style read/writes allowed) as well as the overhead of encrypting and signing all the data\&.
    937010306.sp
    937110307If SMB encryption is selected, Windows style SMB signing (see the
     
    937310309option) is no longer necessary, as the GSSAPI flags use select both signing and sealing of the data\&.
    937410310.sp
    9375 When set to auto, SMB encryption is offered, but not enforced\&. When set to mandatory, SMB encryption is required and if set to disabled, SMB encryption can not be negotiated\&.
    9376 .sp
    9377 Default:
    9378 \fI\fIsmb encrypt\fR\fR\fI = \fR\fIauto\fR\fI \fR
     10311When set to auto or default, SMB encryption is offered, but not enforced\&. When set to mandatory, SMB encryption is required and if set to disabled, SMB encryption can not be negotiated\&.
     10312.RE
     10313.PP
     10314\fIEffects for SMB2\fR
     10315.RS 4
     10316Native SMB transport encryption is available in SMB version 3\&.0 or newer\&. It is only offered by Samba if
     10317\fIserver max protocol\fR
     10318is set to
     10319\fISMB3\fR
     10320or newer\&. Clients supporting this type of encryption include Windows 8 and newer, Windows server 2012 and newer, and smbclient of Samba 4\&.1 and newer\&.
     10321.sp
     10322The protocol implementation offers various options:
     10323.sp
     10324.RS 4
     10325.ie n \{\
     10326\h'-04'\(bu\h'+03'\c
     10327.\}
     10328.el \{\
     10329.sp -1
     10330.IP \(bu 2.3
     10331.\}
     10332The capability to perform SMB encryption can be negotiated during protocol negotiation\&.
     10333.RE
     10334.sp
     10335.RS 4
     10336.ie n \{\
     10337\h'-04'\(bu\h'+03'\c
     10338.\}
     10339.el \{\
     10340.sp -1
     10341.IP \(bu 2.3
     10342.\}
     10343Data encryption can be enabled globally\&. In that case, an encryption\-capable connection will have all traffic in all its sessions encrypted\&. In particular all share connections will be encrypted\&.
     10344.RE
     10345.sp
     10346.RS 4
     10347.ie n \{\
     10348\h'-04'\(bu\h'+03'\c
     10349.\}
     10350.el \{\
     10351.sp -1
     10352.IP \(bu 2.3
     10353.\}
     10354Data encryption can also be enabled per share if not enabled globally\&. For an encryption\-capable connection, all connections to an encryption\-enabled share will be encrypted\&.
     10355.RE
     10356.sp
     10357.RS 4
     10358.ie n \{\
     10359\h'-04'\(bu\h'+03'\c
     10360.\}
     10361.el \{\
     10362.sp -1
     10363.IP \(bu 2.3
     10364.\}
     10365Encryption can be enforced\&. This means that session setups will be denied on non\-encryption\-capable connections if data encryption has been enabled globally\&. And tree connections will be denied for non\-encryption capable connections to shares with data encryption enabled\&.
     10366.RE
     10367.sp
     10368.RE
     10369These features can be controlled with settings of
     10370\fIsmb encrypt\fR
     10371as follows:
     10372.sp
     10373.RS 4
     10374.ie n \{\
     10375\h'-04'\(bu\h'+03'\c
     10376.\}
     10377.el \{\
     10378.sp -1
     10379.IP \(bu 2.3
     10380.\}
     10381Leaving it as default, explicitly setting
     10382\fIdefault\fR, or setting it to
     10383\fIenabled\fR
     10384globally will enable negotiation of encryption but will not turn on data encryption globally or per share\&.
     10385.RE
     10386.sp
     10387.RS 4
     10388.ie n \{\
     10389\h'-04'\(bu\h'+03'\c
     10390.\}
     10391.el \{\
     10392.sp -1
     10393.IP \(bu 2.3
     10394.\}
     10395Setting it to
     10396\fIdesired\fR
     10397globally will enable negotiation and will turn on data encryption on sessions and share connections for those clients that support it\&.
     10398.RE
     10399.sp
     10400.RS 4
     10401.ie n \{\
     10402\h'-04'\(bu\h'+03'\c
     10403.\}
     10404.el \{\
     10405.sp -1
     10406.IP \(bu 2.3
     10407.\}
     10408Setting it to
     10409\fIrequired\fR
     10410globally will enable negotiation and turn on data encryption on sessions and share connections\&. Clients that do not support encryption will be denied access to the server\&.
     10411.RE
     10412.sp
     10413.RS 4
     10414.ie n \{\
     10415\h'-04'\(bu\h'+03'\c
     10416.\}
     10417.el \{\
     10418.sp -1
     10419.IP \(bu 2.3
     10420.\}
     10421Setting it to
     10422\fIoff\fR
     10423globally will completely disable the encryption feature\&.
     10424.RE
     10425.sp
     10426.RS 4
     10427.ie n \{\
     10428\h'-04'\(bu\h'+03'\c
     10429.\}
     10430.el \{\
     10431.sp -1
     10432.IP \(bu 2.3
     10433.\}
     10434Setting it to
     10435\fIdesired\fR
     10436on a share will turn on data encryption for this share for clients that support encryption if negotiation has been enabled globally\&.
     10437.RE
     10438.sp
     10439.RS 4
     10440.ie n \{\
     10441\h'-04'\(bu\h'+03'\c
     10442.\}
     10443.el \{\
     10444.sp -1
     10445.IP \(bu 2.3
     10446.\}
     10447Setting it to
     10448\fIrequired\fR
     10449on a share will enforce data encryption for this share if negotiation has been enabled globally\&. I\&.e\&. clients that do not support encryption will be denied access to the share\&.
     10450.sp
     10451Note that this allows per\-share enforcing to be controlled in Samba differently from Windows: In Windows,
     10452\fIRejectUnencryptedAccess\fR
     10453is a global setting, and if it is set, all shares with data encryption turned on are automatically enforcing encryption\&. In order to achieve the same effect in Samba, one has to globally set
     10454\fIsmb encrypt\fR
     10455to
     10456\fIenabled\fR, and then set all shares that should be encrypted to
     10457\fIrequired\fR\&. Additionally, it is possible in Samba to have some shares with encryption
     10458\fIrequired\fR
     10459and some other shares with encryption only
     10460\fIdesired\fR, which is not possible in Windows\&.
     10461.RE
     10462.sp
     10463.RS 4
     10464.ie n \{\
     10465\h'-04'\(bu\h'+03'\c
     10466.\}
     10467.el \{\
     10468.sp -1
     10469.IP \(bu 2.3
     10470.\}
     10471Setting it to
     10472\fIoff\fR
     10473or
     10474\fIenabled\fR
     10475for a share has no effect\&.
     10476.RE
     10477.sp
     10478.RE
     10479.RE
     10480.sp
     10481Default:
     10482\fI\fIsmb encrypt\fR\fR\fI = \fR\fIdefault\fR\fI \fR
    937910483.RE
    938010484
     
    941110515.RE
    941210516
    9413 socket address (G)
    9414 .\" socket address
    9415 .PP
    9416 .RS 4
    9417 This option allows you to control what address Samba will listen for connections on\&. This is used to support multiple virtual interfaces on the one server, each with a different configuration\&.
    9418 .sp
    9419 Setting this option should never be necessary on usual Samba servers running only one nmbd\&.
    9420 .sp
    9421 By default Samba will accept connections on any address\&.
    9422 .sp
    9423 Default:
    9424 \fI\fIsocket address\fR\fR\fI = \fR\fI\fR\fI \fR
    9425 .sp
    9426 Example:
    9427 \fI\fIsocket address\fR\fR\fI = \fR\fI192\&.168\&.2\&.20\fR\fI \fR
    9428 .RE
    9429 
    943010517socket options (G)
    943110518.\" socket options
    943210519.PP
    943310520.RS 4
     10521.if n \{\
     10522.sp
     10523.\}
     10524.RS 4
     10525.it 1 an-trap
     10526.nr an-no-space-flag 1
     10527.nr an-break-flag 1
     10528.br
     10529.ps +1
     10530\fBWarning\fR
     10531.ps -1
     10532.br
     10533Modern server operating systems are tuned for high network performance in the majority of situations; when you set socket options you are overriding those settings\&. Linux in particular has an auto\-tuning mechanism for buffer sizes that will be disabled if you specify a socket buffer size\&. This can potentially cripple your TCP/IP stack\&.
     10534.sp
     10535Getting the socket options correct can make a big difference to your performance, but getting them wrong can degrade it by just as much\&. As with any other low level setting, if you must make changes to it, make small changes and
     10536\fItest\fR
     10537the effect before making any large changes\&.
     10538.sp .5v
     10539.RE
     10540.sp
    943410541This option allows you to set socket options to be used when talking with the client\&.
    943510542.sp
     
    944110548.sp
    944210549You may find that on some systems Samba will say "Unknown socket option" when you supply an option\&. This means you either incorrectly typed it or you need to add an include file to includes\&.h for your OS\&. If the latter is the case please send the patch to
    9443 samba\-technical@samba\&.org\&.
     10550samba\-technical@lists\&.samba\&.org\&.
    944410551.sp
    944510552Any of the supported socket options may be combined in any way you like, as long as your OS allows it\&.
     
    949910606.IP \(bu 2.3
    950010607.\}
     10608TCP_KEEPCNT *
     10609.RE
     10610.sp
     10611.RS 4
     10612.ie n \{\
     10613\h'-04'\(bu\h'+03'\c
     10614.\}
     10615.el \{\
     10616.sp -1
     10617.IP \(bu 2.3
     10618.\}
     10619TCP_KEEPIDLE *
     10620.RE
     10621.sp
     10622.RS 4
     10623.ie n \{\
     10624\h'-04'\(bu\h'+03'\c
     10625.\}
     10626.el \{\
     10627.sp -1
     10628.IP \(bu 2.3
     10629.\}
     10630TCP_KEEPINTVL *
     10631.RE
     10632.sp
     10633.RS 4
     10634.ie n \{\
     10635\h'-04'\(bu\h'+03'\c
     10636.\}
     10637.el \{\
     10638.sp -1
     10639.IP \(bu 2.3
     10640.\}
    950110641IPTOS_LOWDELAY
    950210642.RE
     
    952110661.IP \(bu 2.3
    952210662.\}
     10663SO_REUSEPORT
     10664.RE
     10665.sp
     10666.RS 4
     10667.ie n \{\
     10668\h'-04'\(bu\h'+03'\c
     10669.\}
     10670.el \{\
     10671.sp -1
     10672.IP \(bu 2.3
     10673.\}
    952310674SO_SNDBUF *
    952410675.RE
     
    955510706.\}
    955610707SO_RCVLOWAT *
     10708.RE
     10709.sp
     10710.RS 4
     10711.ie n \{\
     10712\h'-04'\(bu\h'+03'\c
     10713.\}
     10714.el \{\
     10715.sp -1
     10716.IP \(bu 2.3
     10717.\}
     10718SO_SNDTIMEO *
     10719.RE
     10720.sp
     10721.RS 4
     10722.ie n \{\
     10723\h'-04'\(bu\h'+03'\c
     10724.\}
     10725.el \{\
     10726.sp -1
     10727.IP \(bu 2.3
     10728.\}
     10729SO_RCVTIMEO *
     10730.RE
     10731.sp
     10732.RS 4
     10733.ie n \{\
     10734\h'-04'\(bu\h'+03'\c
     10735.\}
     10736.el \{\
     10737.sp -1
     10738.IP \(bu 2.3
     10739.\}
     10740TCP_FASTACK *
     10741.RE
     10742.sp
     10743.RS 4
     10744.ie n \{\
     10745\h'-04'\(bu\h'+03'\c
     10746.\}
     10747.el \{\
     10748.sp -1
     10749.IP \(bu 2.3
     10750.\}
     10751TCP_QUICKACK
     10752.RE
     10753.sp
     10754.RS 4
     10755.ie n \{\
     10756\h'-04'\(bu\h'+03'\c
     10757.\}
     10758.el \{\
     10759.sp -1
     10760.IP \(bu 2.3
     10761.\}
     10762TCP_NODELAYACK
     10763.RE
     10764.sp
     10765.RS 4
     10766.ie n \{\
     10767\h'-04'\(bu\h'+03'\c
     10768.\}
     10769.el \{\
     10770.sp -1
     10771.IP \(bu 2.3
     10772.\}
     10773TCP_KEEPALIVE_THRESHOLD *
     10774.RE
     10775.sp
     10776.RS 4
     10777.ie n \{\
     10778\h'-04'\(bu\h'+03'\c
     10779.\}
     10780.el \{\
     10781.sp -1
     10782.IP \(bu 2.3
     10783.\}
     10784TCP_KEEPALIVE_ABORT_THRESHOLD *
     10785.RE
     10786.sp
     10787.RS 4
     10788.ie n \{\
     10789\h'-04'\(bu\h'+03'\c
     10790.\}
     10791.el \{\
     10792.sp -1
     10793.IP \(bu 2.3
     10794.\}
     10795TCP_DEFER_ACCEPT *
    955710796.RE
    955810797.sp
     
    958210821Example:
    958310822\fI\fIsocket options\fR\fR\fI = \fR\fIIPTOS_LOWDELAY\fR\fI \fR
     10823.RE
     10824
     10825spn update command (G)
     10826.\" spn update command
     10827.PP
     10828.RS 4
     10829This option sets the command that for updating servicePrincipalName names from
     10830spn_update_list\&.
     10831.sp
     10832Default:
     10833\fI\fIspn update command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_spnupdate\fR\fI \fR
     10834.sp
     10835Example:
     10836\fI\fIspn update command\fR\fR\fI = \fR\fI/usr/local/sbin/spnupdate\fR\fI \fR
     10837.RE
     10838
     10839spoolss: architecture (G)
     10840.\" spoolss: architecture
     10841.PP
     10842.RS 4
     10843Windows spoolss print clients only allow association of server\-side drivers with printers when the driver architecture matches the advertised print server architecture\&. Samba\*(Aqs spoolss print server architecture can be changed using this parameter\&.
     10844.sp
     10845Default:
     10846\fI\fIspoolss: architecture\fR\fR\fI = \fR\fIWindows NT x86\fR\fI \fR
     10847.sp
     10848Example:
     10849\fI\fIspoolss: architecture\fR\fR\fI = \fR\fIWindows x64\fR\fI \fR
     10850.RE
     10851
     10852spoolss: os_major (G)
     10853.\" spoolss: os_major
     10854.PP
     10855.RS 4
     10856Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&.
     10857.sp
     10858Default:
     10859\fI\fIspoolss: os_major\fR\fR\fI = \fR\fI5\fR\fI \fR
     10860.sp
     10861Example:
     10862\fI\fIspoolss: os_major\fR\fR\fI = \fR\fI6\fR\fI \fR
     10863.RE
     10864
     10865spoolss: os_minor (G)
     10866.\" spoolss: os_minor
     10867.PP
     10868.RS 4
     10869Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&.
     10870.sp
     10871Default:
     10872\fI\fIspoolss: os_minor\fR\fR\fI = \fR\fI0\fR\fI \fR
     10873.sp
     10874Example:
     10875\fI\fIspoolss: os_minor\fR\fR\fI = \fR\fI1\fR\fI \fR
     10876.RE
     10877
     10878spoolss: os_build (G)
     10879.\" spoolss: os_build
     10880.PP
     10881.RS 4
     10882Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&.
     10883.sp
     10884Default:
     10885\fI\fIspoolss: os_build\fR\fR\fI = \fR\fI2195\fR\fI \fR
     10886.sp
     10887Example:
     10888\fI\fIspoolss: os_build\fR\fR\fI = \fR\fI7601\fR\fI \fR
     10889.RE
     10890
     10891spotlight (S)
     10892.\" spotlight
     10893.PP
     10894.RS 4
     10895This parameter controls whether Samba allows Spotlight queries on a share\&. For controlling indexing of filesystems you also have to use Tracker\*(Aqs own configuration system\&.
     10896.sp
     10897Spotlight has several prerequisites:
     10898.sp
     10899.RS 4
     10900.ie n \{\
     10901\h'-04'\(bu\h'+03'\c
     10902.\}
     10903.el \{\
     10904.sp -1
     10905.IP \(bu 2.3
     10906.\}
     10907Samba must be configured and built with Spotlight support\&.
     10908.RE
     10909.sp
     10910.RS 4
     10911.ie n \{\
     10912\h'-04'\(bu\h'+03'\c
     10913.\}
     10914.el \{\
     10915.sp -1
     10916.IP \(bu 2.3
     10917.\}
     10918The
     10919\fImdssvc\fR
     10920RPC service must be enabled, see below\&.
     10921.RE
     10922.sp
     10923.RS 4
     10924.ie n \{\
     10925\h'-04'\(bu\h'+03'\c
     10926.\}
     10927.el \{\
     10928.sp -1
     10929.IP \(bu 2.3
     10930.\}
     10931Tracker intergration must be setup and the share must be indexed by Tracker\&.
     10932.RE
     10933.sp
     10934.RE
     10935For a detailed set of instructions please see
     10936https://wiki\&.samba\&.org/index\&.php/Spotlight\&.
     10937.sp
     10938The Spotlight RPC service can either be enabled as embedded RPC service:
     10939.sp
     10940.if n \{\
     10941.RS 4
     10942.\}
     10943.nf
     10944\fI[Global]\fR
     10945\m[blue]\fBrpc_server:mdsvc = embedded\fR\m[]
     10946.fi
     10947.if n \{\
     10948.RE
     10949.\}
     10950.sp
     10951Or it can be run in a seperate RPC service daemon:
     10952.sp
     10953.if n \{\
     10954.RS 4
     10955.\}
     10956.nf
     10957\fI[Global]\fR
     10958\m[blue]\fBrpc_server:mdssd = fork\fR\m[]
     10959\m[blue]\fBrpc_server:mdsvc = external\fR\m[]
     10960.fi
     10961.if n \{\
     10962.RE
     10963.\}
     10964.sp
     10965Default:
     10966\fI\fIspotlight\fR\fR\fI = \fR\fIno\fR\fI \fR
    958410967.RE
    958510968
     
    962311006\m[blue]\fBmap hidden\fR\m[]
    962411007and
    9625 \m[blue]\fBmap readonly\fR\m[])\&. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\&. For no other mapping to occur as a fall\-back, the parameters
     11008\m[blue]\fBmap readonly\fR\m[])\&. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\&. When this parameter is set it will override the parameters
    962611009\m[blue]\fBmap hidden\fR\m[],
    962711010\m[blue]\fBmap system\fR\m[],
     
    962911012and
    963011013\m[blue]\fBmap readonly\fR\m[]
    9631 must be set to off\&. This parameter writes the DOS attributes as a string into the extended attribute named "user\&.DOSATTRIB"\&. This extended attribute is explicitly hidden from smbd clients requesting an EA list\&. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\&. In Samba 3\&.5\&.0 and above the "user\&.DOSATTRIB" extended attribute has been extended to store the create time for a file as well as the DOS attributes\&. This is done in a backwards compatible way so files created by Samba 3\&.5\&.0 and above can still have the DOS attribute read from this extended attribute by earlier versions of Samba, but they will not be able to read the create time stored there\&. Storing the create time separately from the normal filesystem meta\-data allows Samba to faithfully reproduce NTFS semantics on top of a POSIX filesystem\&.
     11014and they will behave as if they were set to off\&. This parameter writes the DOS attributes as a string into the extended attribute named "user\&.DOSATTRIB"\&. This extended attribute is explicitly hidden from smbd clients requesting an EA list\&. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\&. In Samba 3\&.5\&.0 and above the "user\&.DOSATTRIB" extended attribute has been extended to store the create time for a file as well as the DOS attributes\&. This is done in a backwards compatible way so files created by Samba 3\&.5\&.0 and above can still have the DOS attribute read from this extended attribute by earlier versions of Samba, but they will not be able to read the create time stored there\&. Storing the create time separately from the normal filesystem meta\-data allows Samba to faithfully reproduce NTFS semantics on top of a POSIX filesystem\&.
    963211015.sp
    963311016Default:
     
    964311026the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\&. In UNIX terminology this means that Samba will stop creating sparse files\&.
    964411027.sp
    9645 This option is really desgined for file systems that support fast allocation of large numbers of blocks such as extent\-based file systems\&. On file systems that don\*(Aqt support extents (most notably ext3) this can make Samba slower\&. When you work with large files over >100MB on file systems without extents you may even run into problems with clients running into timeouts\&.
     11028This option is really designed for file systems that support fast allocation of large numbers of blocks such as extent\-based file systems\&. On file systems that don\*(Aqt support extents (most notably ext3) this can make Samba slower\&. When you work with large files over >100MB on file systems without extents you may even run into problems with clients running into timeouts\&.
    964611029.sp
    964711030When you have an extent based filesystem it\*(Aqs likely that we can make use of unwritten extents which allows Samba to allocate even large amounts of space very fast and you will not see any timeout problems caused by strict allocate\&. With strict allocate in use you will also get much better out of quota messages in case you use quotas\&. Another advantage of activating this setting is that it will help to reduce file fragmentation\&.
     
    967411057.RE
    967511058
     11059strict rename (S)
     11060.\" strict rename
     11061.PP
     11062.RS 4
     11063By default a Windows SMB server prevents directory renames when there are open file or directory handles below it in the filesystem hierarchy\&. Historically Samba has always allowed this as POSIX filesystem semantics require it\&.
     11064.sp
     11065This boolean parameter allows Samba to match the Windows behavior\&. Setting this to "yes" is a very expensive change, as it forces Samba to travers the entire open file handle database on every directory rename request\&. In a clustered Samba system the cost is even greater than the non\-clustered case\&.
     11066.sp
     11067When set to "no" smbd only checks the local process the client is attached to for open files below a directory being renamed, instead of checking for open files across all smbd processes\&.
     11068.sp
     11069Because of the expense in fully searching the database, the default is "no", and it is recommended to be left that way unless a specific Windows application requires it to be changed\&.
     11070.sp
     11071If the client has requested UNIX extensions (POSIX pathnames) then renames are always allowed and this parameter has no effect\&.
     11072.sp
     11073Default:
     11074\fI\fIstrict rename\fR\fR\fI = \fR\fIno\fR\fI \fR
     11075.RE
     11076
    967611077strict sync (S)
    967711078.\" strict sync
    967811079.PP
    967911080.RS 4
    9680 Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\&. Under UNIX, a sync call forces the process to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\&. This is very slow and should only be done rarely\&. Setting this parameter to
     11081Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\&. Under UNIX, a sync call forces the thread to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\&. This is very slow and should only be done rarely\&. Setting this parameter to
    968111082\fBno\fR
    968211083(the default) means that
    968311084\fBsmbd\fR(8)
    968411085ignores the Windows applications requests for a sync call\&. There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting\&. In addition, this fixes many performance problems that people have reported with the new Windows98 explorer shell file copies\&.
     11086.sp
     11087The flush request from SMB2/3 clients is handled asynchronously, so for these clients setting the parameter to
     11088\fByes\fR
     11089does not block the processing of other requests in the smbd process\&.
    968511090.sp
    968611091Default:
     
    972711132.RE
    972811133
    9729 syslog only (G)
    9730 .\" syslog only
    9731 .PP
    9732 .RS 4
    9733 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\&. There still will be some logging to log\&.[sn]mbd even if
    9734 \fIsyslog only\fR
    9735 is enabled\&.
    9736 .sp
    9737 Default:
    9738 \fI\fIsyslog only\fR\fR\fI = \fR\fIno\fR\fI \fR
    9739 .RE
    9740 
    974111134syslog (G)
    974211135.\" syslog
     
    975311146is enabled\&.
    975411147.sp
     11148The
     11149\m[blue]\fBlogging\fR\m[]
     11150parameter should be used instead\&. When
     11151\m[blue]\fBlogging\fR\m[]
     11152is set, it overrides the
     11153\m[blue]\fBsyslog\fR\m[]
     11154parameter\&.
     11155.sp
    975511156Default:
    975611157\fI\fIsyslog\fR\fR\fI = \fR\fI1\fR\fI \fR
     11158.RE
     11159
     11160syslog only (G)
     11161.\" syslog only
     11162.PP
     11163.RS 4
     11164If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\&. There still will be some logging to log\&.[sn]mbd even if
     11165\fIsyslog only\fR
     11166is enabled\&.
     11167.sp
     11168The
     11169\m[blue]\fBlogging\fR\m[]
     11170parameter should be used instead\&. When
     11171\m[blue]\fBlogging\fR\m[]
     11172is set, it overrides the
     11173\m[blue]\fBsyslog only\fR\m[]
     11174parameter\&.
     11175.sp
     11176Default:
     11177\fI\fIsyslog only\fR\fR\fI = \fR\fIno\fR\fI \fR
    975711178.RE
    975811179
     
    978111202daemon uses this parameter to fill in the login shell for that user\&.
    978211203.sp
    9783 \fINo default\fR
    9784 .RE
    9785 
    9786 time offset (G)
    9787 .\" time offset
    9788 .PP
    9789 .RS 4
    9790 This deprecated parameter is a setting in minutes to add to the normal GMT to local time conversion\&. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\&.
    9791 .if n \{\
    9792 .sp
    9793 .\}
    9794 .RS 4
    9795 .it 1 an-trap
    9796 .nr an-no-space-flag 1
    9797 .nr an-break-flag 1
    9798 .br
    9799 .ps +1
    9800 \fBNote\fR
    9801 .ps -1
    9802 .br
    9803 This option is deprecated, and will be removed in the next major release
    9804 .sp .5v
    9805 .RE
    9806 Default:
    9807 \fI\fItime offset\fR\fR\fI = \fR\fI0\fR\fI \fR
    9808 .sp
    9809 Example:
    9810 \fI\fItime offset\fR\fR\fI = \fR\fI60\fR\fI \fR
     11204Default:
     11205\fI\fItemplate shell\fR\fR\fI = \fR\fI/bin/false\fR\fI \fR
    981111206.RE
    981211207
     
    982311218.RE
    982411219
     11220debug timestamp
     11221.\" debug timestamp
     11222.PP
     11223.RS 4
     11224This parameter is a synonym for
     11225timestamp logs\&.
     11226.RE
     11227
     11228timestamp logs (G)
     11229.\" timestamp logs
     11230.PP
     11231.RS 4
     11232Samba debug log messages are timestamped by default\&. If you are running at a high
     11233\m[blue]\fBdebug level\fR\m[]
     11234these timestamps can be distracting\&. This boolean parameter allows timestamping to be turned off\&.
     11235.sp
     11236Default:
     11237\fI\fItimestamp logs\fR\fR\fI = \fR\fIyes\fR\fI \fR
     11238.RE
     11239
     11240tls cafile (G)
     11241.\" tls cafile
     11242.PP
     11243.RS 4
     11244This option can be set to a file (PEM format) containing CA certificates of root CAs to trust to sign certificates or intermediate CA certificates\&.
     11245.sp
     11246This path is relative to
     11247\m[blue]\fBprivate dir\fR\m[]
     11248if the path does not start with a /\&.
     11249.sp
     11250Default:
     11251\fI\fItls cafile\fR\fR\fI = \fR\fItls/ca\&.pem\fR\fI \fR
     11252.RE
     11253
     11254tls certfile (G)
     11255.\" tls certfile
     11256.PP
     11257.RS 4
     11258This option can be set to a file (PEM format) containing the RSA certificate\&.
     11259.sp
     11260This path is relative to
     11261\m[blue]\fBprivate dir\fR\m[]
     11262if the path does not start with a /\&.
     11263.sp
     11264Default:
     11265\fI\fItls certfile\fR\fR\fI = \fR\fItls/cert\&.pem\fR\fI \fR
     11266.RE
     11267
     11268tls crlfile (G)
     11269.\" tls crlfile
     11270.PP
     11271.RS 4
     11272This option can be set to a file containing a certificate revocation list (CRL)\&.
     11273.sp
     11274This path is relative to
     11275\m[blue]\fBprivate dir\fR\m[]
     11276if the path does not start with a /\&.
     11277.sp
     11278Default:
     11279\fI\fItls crlfile\fR\fR\fI = \fR\fI\fR\fI \fR
     11280.RE
     11281
     11282tls dh params file (G)
     11283.\" tls dh params file
     11284.PP
     11285.RS 4
     11286This option can be set to a file with Diffie\-Hellman parameters which will be used with DH ciphers\&.
     11287.sp
     11288This path is relative to
     11289\m[blue]\fBprivate dir\fR\m[]
     11290if the path does not start with a /\&.
     11291.sp
     11292Default:
     11293\fI\fItls dh params file\fR\fR\fI = \fR\fI\fR\fI \fR
     11294.RE
     11295
     11296tls enabled (G)
     11297.\" tls enabled
     11298.PP
     11299.RS 4
     11300If this option is set to
     11301\fByes\fR, then Samba will use TLS when possible in communication\&.
     11302.sp
     11303Default:
     11304\fI\fItls enabled\fR\fR\fI = \fR\fIyes\fR\fI \fR
     11305.RE
     11306
     11307tls keyfile (G)
     11308.\" tls keyfile
     11309.PP
     11310.RS 4
     11311This option can be set to a file (PEM format) containing the RSA private key\&. This file must be accessible without a pass\-phrase, i\&.e\&. it must not be encrypted\&.
     11312.sp
     11313This path is relative to
     11314\m[blue]\fBprivate dir\fR\m[]
     11315if the path does not start with a /\&.
     11316.sp
     11317Default:
     11318\fI\fItls keyfile\fR\fR\fI = \fR\fItls/key\&.pem\fR\fI \fR
     11319.RE
     11320
     11321tls priority (G)
     11322.\" tls priority
     11323.PP
     11324.RS 4
     11325This option can be set to a string describing the TLS protocols to be supported in the parts of Samba that use GnuTLS, specifically the AD DC\&.
     11326.sp
     11327The default turns off SSLv3, as this protocol is no longer considered secure after CVE\-2014\-3566 (otherwise known as POODLE) impacted SSLv3 use in HTTPS applications\&.
     11328.sp
     11329The valid options are described in the
     11330GNUTLS Priority\-Strings documentation at http://gnutls\&.org/manual/html_node/Priority\-Strings\&.html
     11331.sp
     11332Default:
     11333\fI\fItls priority\fR\fR\fI = \fR\fINORMAL:\-VERS\-SSL3\&.0\fR\fI \fR
     11334.RE
     11335
     11336tls verify peer (G)
     11337.\" tls verify peer
     11338.PP
     11339.RS 4
     11340This controls if and how strict the client will verify the peer\*(Aqs certificate and name\&. Possible values are (in increasing order):
     11341\fBno_check\fR,
     11342\fBca_only\fR,
     11343\fBca_and_name_if_available\fR,
     11344\fBca_and_name\fR
     11345and
     11346\fBas_strict_as_possible\fR\&.
     11347.sp
     11348When set to
     11349\fBno_check\fR
     11350the certificate is not verified at all, which allows trivial man in the middle attacks\&.
     11351.sp
     11352When set to
     11353\fBca_only\fR
     11354the certificate is verified to be signed from a ca specified in the
     11355\m[blue]\fBtls ca file\fR\m[]
     11356option\&. Setting
     11357\m[blue]\fBtls ca file\fR\m[]
     11358to a valid file is required\&. The certificate lifetime is also verified\&. If the
     11359\m[blue]\fBtls crl file\fR\m[]
     11360option is configured, the certificate is also verified against the ca crl\&.
     11361.sp
     11362When set to
     11363\fBca_and_name_if_available\fR
     11364all checks from
     11365\fBca_only\fR
     11366are performed\&. In addition, the peer hostname is verified against the certificate\*(Aqs name, if it is provided by the application layer and not given as an ip address string\&.
     11367.sp
     11368When set to
     11369\fBca_and_name\fR
     11370all checks from
     11371\fBca_and_name_if_available\fR
     11372are performed\&. In addition the peer hostname needs to be provided and even an ip address is checked against the certificate\*(Aqs name\&.
     11373.sp
     11374When set to
     11375\fBas_strict_as_possible\fR
     11376all checks from
     11377\fBca_and_name\fR
     11378are performed\&. In addition the
     11379\m[blue]\fBtls crl file\fR\m[]
     11380needs to be configured\&. Future versions of Samba may implement additional checks\&.
     11381.sp
     11382Default:
     11383\fI\fItls verify peer\fR\fR\fI = \fR\fIas_strict_as_possible\fR\fI \fR
     11384.RE
     11385
     11386unicode (G)
     11387.\" unicode
     11388.PP
     11389.RS 4
     11390Specifies whether the server and client should support unicode\&.
     11391.sp
     11392If this option is set to false, the use of ASCII will be forced\&.
     11393.sp
     11394Default:
     11395\fI\fIunicode\fR\fR\fI = \fR\fIyes\fR\fI \fR
     11396.RE
     11397
    982511398unix charset (G)
    982611399.\" unix charset
     
    983211405.sp
    983311406Default:
    9834 \fI\fIunix charset\fR\fR\fI = \fR\fIUTF8\fR\fI \fR
     11407\fI\fIunix charset\fR\fR\fI = \fR\fIUTF\-8\fR\fI \fR
    983511408.sp
    983611409Example:
     
    987911452disable spoolss = yes\&.
    988011453.sp
    9881 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\&. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\&. If the user possesses local administator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\&. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\&.
     11454The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\&. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\&. If the user possesses local administrator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\&. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\&.
    988211455.sp
    988311456If this parameter is enabled for a printer, then any attempt to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped to PRINTER_ACCESS_USE instead\&. Thus allowing the OpenPrinterEx() call to succeed\&.
     
    990011473.RE
    990111474
     11475user
     11476.\" user
     11477.PP
     11478.RS 4
     11479This parameter is a synonym for
     11480username\&.
     11481.RE
     11482
     11483users
     11484.\" users
     11485.PP
     11486.RS 4
     11487This parameter is a synonym for
     11488username\&.
     11489.RE
     11490
     11491username (S)
     11492.\" username
     11493.PP
     11494.RS 4
     11495To restrict a service to a particular set of users you can use the
     11496\m[blue]\fBvalid users\fR\m[]
     11497parameter\&.
     11498.sp
     11499This parameter is deprecated
     11500.sp
     11501However, it currently operates only in conjunction with
     11502\m[blue]\fBonly user\fR\m[]\&. The supported way to restrict a service to a particular set of users is the
     11503\m[blue]\fBvalid users\fR\m[]
     11504parameter\&.
     11505.sp
     11506Default:
     11507\fI\fIusername\fR\fR\fI = \fR\fI # The guest account if a guest service, else <empty string>\&.\fR\fI \fR
     11508.sp
     11509Example:
     11510\fI\fIusername\fR\fR\fI = \fR\fIfred, mary, jack, jane, @users, @pcgroup\fR\fI \fR
     11511.RE
     11512
    990211513username level (G)
    990311514.\" username level
     
    991611527Example:
    991711528\fI\fIusername level\fR\fR\fI = \fR\fI5\fR\fI \fR
     11529.RE
     11530
     11531username map (G)
     11532.\" username map
     11533.PP
     11534.RS 4
     11535This option allows you to specify a file containing a mapping of usernames from the clients to the server\&. This can be used for several purposes\&. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\&. The other is to map multiple users to a single username so that they can more easily share files\&.
     11536.sp
     11537Please note that for user mode security, the username map is applied prior to validating the user credentials\&. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified entries in the map table (e\&.g\&. biddle =
     11538DOMAIN\efoo)\&.
     11539.sp
     11540The map file is parsed line by line\&. Each line should contain a single UNIX username on the left then a \*(Aq=\*(Aq followed by a list of usernames on the right\&. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\&. The special client name \*(Aq*\*(Aq is a wildcard and matches any name\&. Each line of the map file may be up to 1023 characters long\&.
     11541.sp
     11542The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \*(Aq=\*(Aq signs\&. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\&. Processing then continues with the next line\&.
     11543.sp
     11544If any line begins with a \*(Aq#\*(Aq or a \*(Aq;\*(Aq then it is ignored\&.
     11545.sp
     11546If any line begins with an \*(Aq!\*(Aq then the processing will stop after that line if a mapping was done by the line\&. Otherwise mapping continues with every line being processed\&. Using \*(Aq!\*(Aq is most useful when you have a wildcard mapping line later in the file\&.
     11547.sp
     11548For example to map from the name
     11549\fBadmin\fR
     11550or
     11551\fBadministrator\fR
     11552to the UNIX name
     11553\fB root\fR
     11554you would use:
     11555.sp
     11556.if n \{\
     11557.RS 4
     11558.\}
     11559.nf
     11560root = admin administrator
     11561.fi
     11562.if n \{\
     11563.RE
     11564.\}
     11565.sp
     11566Or to map anyone in the UNIX group
     11567\fBsystem\fR
     11568to the UNIX name
     11569\fBsys\fR
     11570you would use:
     11571.sp
     11572.if n \{\
     11573.RS 4
     11574.\}
     11575.nf
     11576sys = @system
     11577.fi
     11578.if n \{\
     11579.RE
     11580.\}
     11581.sp
     11582You can have as many mappings as you like in a username map file\&.
     11583.sp
     11584If your system supports the NIS NETGROUP option then the netgroup database is checked before the
     11585/etc/group
     11586database for matching groups\&.
     11587.sp
     11588You can map Windows usernames that have spaces in them by using double quotes around the name\&. For example:
     11589.sp
     11590.if n \{\
     11591.RS 4
     11592.\}
     11593.nf
     11594tridge = "Andrew Tridgell"
     11595.fi
     11596.if n \{\
     11597.RE
     11598.\}
     11599.sp
     11600would map the windows username "Andrew Tridgell" to the unix username "tridge"\&.
     11601.sp
     11602The following example would map mary and fred to the unix user sys, and map the rest to guest\&. Note the use of the \*(Aq!\*(Aq to tell Samba to stop processing if it gets a match on that line:
     11603.sp
     11604.if n \{\
     11605.RS 4
     11606.\}
     11607.nf
     11608!sys = mary fred
     11609guest = *
     11610.fi
     11611.if n \{\
     11612.RE
     11613.\}
     11614.sp
     11615Note that the remapping is applied to all occurrences of usernames\&. Thus if you connect to \e\eserver\efred and
     11616\fBfred\fR
     11617is remapped to
     11618\fBmary\fR
     11619then you will actually be connecting to \e\eserver\emary and will need to supply a password suitable for
     11620\fBmary\fR
     11621not
     11622\fBfred\fR\&. The only exception to this is the username passed to a Domain Controller (if you have one)\&. The DC will receive whatever username the client supplies without modification\&.
     11623.sp
     11624Also note that no reverse mapping is done\&. The main effect this has is with printing\&. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\*(Aqt own the print job\&.
     11625.sp
     11626Samba versions prior to 3\&.0\&.8 would only support reading the fully qualified username (e\&.g\&.:
     11627DOMAIN\euser) from the username map when performing a kerberos login from a client\&. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\&. This resulted in inconsistent behavior sometimes even on the same server\&.
     11628.sp
     11629The following functionality is obeyed in version 3\&.0\&.8 and later:
     11630.sp
     11631When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\&.
     11632.sp
     11633When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\&.e\&.
     11634DOMAIN\euser) only after the user has been successfully authenticated\&.
     11635.sp
     11636An example of use is:
     11637.sp
     11638.if n \{\
     11639.RS 4
     11640.\}
     11641.nf
     11642username map = /usr/local/samba/lib/users\&.map
     11643.fi
     11644.if n \{\
     11645.RE
     11646.\}
     11647.sp
     11648Default:
     11649\fI\fIusername map\fR\fR\fI = \fR\fI # no username map\fR\fI \fR
    991811650.RE
    991911651
     
    994711679This script is a mutually exclusive alternative to the
    994811680\m[blue]\fBusername map\fR\m[]
    9949 parameter\&. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line line on standard output (the name to which the account should mapped)\&. In this way, it is possible to store username map tables in an LDAP or NIS directory services\&.
     11681parameter\&. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line on standard output (the name to which the account should mapped)\&. In this way, it is possible to store username map tables in an LDAP or NIS directory services\&.
    995011682.sp
    995111683Default:
     
    995411686Example:
    995511687\fI\fIusername map script\fR\fR\fI = \fR\fI/etc/samba/scripts/mapusers\&.sh\fR\fI \fR
    9956 .RE
    9957 
    9958 username map (G)
    9959 .\" username map
    9960 .PP
    9961 .RS 4
    9962 This option allows you to specify a file containing a mapping of usernames from the clients to the server\&. This can be used for several purposes\&. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\&. The other is to map multiple users to a single username so that they can more easily share files\&.
    9963 .sp
    9964 Please note that for user or share mode security, the username map is applied prior to validating the user credentials\&. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified enties in the map table (e\&.g\&. biddle =
    9965 DOMAIN\efoo)\&.
    9966 .sp
    9967 The map file is parsed line by line\&. Each line should contain a single UNIX username on the left then a \*(Aq=\*(Aq followed by a list of usernames on the right\&. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\&. The special client name \*(Aq*\*(Aq is a wildcard and matches any name\&. Each line of the map file may be up to 1023 characters long\&.
    9968 .sp
    9969 The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \*(Aq=\*(Aq signs\&. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\&. Processing then continues with the next line\&.
    9970 .sp
    9971 If any line begins with a \*(Aq#\*(Aq or a \*(Aq;\*(Aq then it is ignored\&.
    9972 .sp
    9973 If any line begins with an \*(Aq!\*(Aq then the processing will stop after that line if a mapping was done by the line\&. Otherwise mapping continues with every line being processed\&. Using \*(Aq!\*(Aq is most useful when you have a wildcard mapping line later in the file\&.
    9974 .sp
    9975 For example to map from the name
    9976 \fBadmin\fR
    9977 or
    9978 \fBadministrator\fR
    9979 to the UNIX name
    9980 \fB root\fR
    9981 you would use:
    9982 .sp
    9983 .if n \{\
    9984 .RS 4
    9985 .\}
    9986 .nf
    9987 root = admin administrator
    9988 .fi
    9989 .if n \{\
    9990 .RE
    9991 .\}
    9992 .sp
    9993 Or to map anyone in the UNIX group
    9994 \fBsystem\fR
    9995 to the UNIX name
    9996 \fBsys\fR
    9997 you would use:
    9998 .sp
    9999 .if n \{\
    10000 .RS 4
    10001 .\}
    10002 .nf
    10003 sys = @system
    10004 .fi
    10005 .if n \{\
    10006 .RE
    10007 .\}
    10008 .sp
    10009 You can have as many mappings as you like in a username map file\&.
    10010 .sp
    10011 If your system supports the NIS NETGROUP option then the netgroup database is checked before the
    10012 /etc/group
    10013 database for matching groups\&.
    10014 .sp
    10015 You can map Windows usernames that have spaces in them by using double quotes around the name\&. For example:
    10016 .sp
    10017 .if n \{\
    10018 .RS 4
    10019 .\}
    10020 .nf
    10021 tridge = "Andrew Tridgell"
    10022 .fi
    10023 .if n \{\
    10024 .RE
    10025 .\}
    10026 .sp
    10027 would map the windows username "Andrew Tridgell" to the unix username "tridge"\&.
    10028 .sp
    10029 The following example would map mary and fred to the unix user sys, and map the rest to guest\&. Note the use of the \*(Aq!\*(Aq to tell Samba to stop processing if it gets a match on that line:
    10030 .sp
    10031 .if n \{\
    10032 .RS 4
    10033 .\}
    10034 .nf
    10035 !sys = mary fred
    10036 guest = *
    10037 .fi
    10038 .if n \{\
    10039 .RE
    10040 .\}
    10041 .sp
    10042 Note that the remapping is applied to all occurrences of usernames\&. Thus if you connect to \e\eserver\efred and
    10043 \fBfred\fR
    10044 is remapped to
    10045 \fBmary\fR
    10046 then you will actually be connecting to \e\eserver\emary and will need to supply a password suitable for
    10047 \fBmary\fR
    10048 not
    10049 \fBfred\fR\&. The only exception to this is the username passed to the
    10050 \m[blue]\fBpassword server\fR\m[]
    10051 (if you have one)\&. The password server will receive whatever username the client supplies without modification\&.
    10052 .sp
    10053 Also note that no reverse mapping is done\&. The main effect this has is with printing\&. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\*(Aqt own the print job\&.
    10054 .sp
    10055 Samba versions prior to 3\&.0\&.8 would only support reading the fully qualified username (e\&.g\&.:
    10056 DOMAIN\euser) from the username map when performing a kerberos login from a client\&. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\&. This resulted in inconsistent behavior sometimes even on the same server\&.
    10057 .sp
    10058 The following functionality is obeyed in version 3\&.0\&.8 and later:
    10059 .sp
    10060 When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\&.
    10061 .sp
    10062 When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\&.e\&.
    10063 DOMAIN\euser) only after the user has been successfully authenticated\&.
    10064 .sp
    10065 An example of use is:
    10066 .sp
    10067 .if n \{\
    10068 .RS 4
    10069 .\}
    10070 .nf
    10071 username map = /usr/local/samba/lib/users\&.map
    10072 .fi
    10073 .if n \{\
    10074 .RE
    10075 .\}
    10076 .sp
    10077 Default:
    10078 \fI\fIusername map\fR\fR\fI = \fR\fI # no username map\fR\fI \fR
    10079 .RE
    10080 
    10081 user
    10082 .\" user
    10083 .PP
    10084 .RS 4
    10085 This parameter is a synonym for
    10086 username\&.
    10087 .RE
    10088 
    10089 users
    10090 .\" users
    10091 .PP
    10092 .RS 4
    10093 This parameter is a synonym for
    10094 username\&.
    10095 .RE
    10096 
    10097 username (S)
    10098 .\" username
    10099 .PP
    10100 .RS 4
    10101 Multiple users may be specified in a comma\-delimited list, in which case the supplied password will be tested against each username in turn (left to right)\&.
    10102 .sp
    10103 The deprecated
    10104 \fIusername\fR
    10105 line is needed only when the PC is unable to supply its own username\&. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames\&. In both these cases you may also be better using the \e\eserver\eshare%user syntax instead\&.
    10106 .sp
    10107 The
    10108 \fIusername\fR
    10109 line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the
    10110 \fIusername\fR
    10111 line in turn\&. This is slow and a bad idea for lots of users in case of duplicate passwords\&. You may get timeouts or security breaches using this parameter unwisely\&.
    10112 .sp
    10113 Samba relies on the underlying UNIX security\&. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password\&. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session\&. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do\&.
    10114 .sp
    10115 To restrict a service to a particular set of users you can use the
    10116 \m[blue]\fBvalid users\fR\m[]
    10117 parameter\&.
    10118 .sp
    10119 If any of the usernames begin with a \*(Aq@\*(Aq then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name\&.
    10120 .sp
    10121 If any of the usernames begin with a \*(Aq+\*(Aq then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name\&.
    10122 .sp
    10123 If any of the usernames begin with a \*(Aq&\*(Aq then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name\&.
    10124 .sp
    10125 Note that searching though a groups database can take quite some time, and some clients may time out during the search\&.
    10126 .sp
    10127 See the section
    10128 NOTE ABOUT USERNAME/PASSWORD VALIDATION
    10129 for more information on how this parameter determines access to the services\&.
    10130 .sp
    10131 Default:
    10132 \fI\fIusername\fR\fR\fI = \fR\fI # The guest account if a guest service, else <empty string>\&.\fR\fI \fR
    10133 .sp
    10134 Example:
    10135 \fI\fIusername\fR\fR\fI = \fR\fIfred, mary, jack, jane, @users, @pcgroup\fR\fI \fR
    1013611688.RE
    1013711689
     
    1016511717.sp
    1016611718Default:
    10167 \fI\fIusershare owner only\fR\fR\fI = \fR\fITrue\fR\fI \fR
     11719\fI\fIusershare owner only\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1016811720.RE
    1016911721
     
    1017211724.PP
    1017311725.RS 4
    10174 This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\&. This directory must be owned by root, and have no access for other, and be writable only by the group owner\&. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\&. Members of the group owner of this directory are the users allowed to create usershares\&. If this parameter is undefined then no user defined shares are allowed\&.
     11726This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\&. This directory must be owned by root, and have no access for other, and be writable only by the group owner\&. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\&. Members of the group owner of this directory are the users allowed to create usershares\&.
    1017511727.sp
    1017611728For example, a valid usershare directory might be /usr/local/samba/lib/usershares, set up as follows\&.
    10177 .sp
    10178 
    1017911729.sp
    1018011730.if n \{\
     
    1019311743.sp
    1019411744Default:
    10195 \fI\fIusershare path\fR\fR\fI = \fR\fINULL\fR\fI \fR
     11745\fI\fIusershare path\fR\fR\fI = \fR\fI${prefix}/var/locks/usershares\fR\fI \fR
    1019611746.RE
    1019711747
     
    1020511755.sp
    1020611756Default:
    10207 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fINULL\fR\fI \fR
     11757\fI\fIusershare prefix allow list\fR\fR\fI = \fR\fI\fR\fI \fR
    1020811758.sp
    1020911759Example:
     
    1022011770.sp
    1022111771Default:
    10222 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fINULL\fR\fI \fR
     11772\fI\fIusershare prefix deny list\fR\fR\fI = \fR\fI\fR\fI \fR
    1022311773.sp
    1022411774Example:
     
    1023511785.sp
    1023611786Default:
    10237 \fI\fIusershare template share\fR\fR\fI = \fR\fINULL\fR\fI \fR
     11787\fI\fIusershare template share\fR\fR\fI = \fR\fI\fR\fI \fR
    1023811788.sp
    1023911789Example:
     
    1025111801.sp
    1025211802Default:
    10253 \fI\fIuse sendfile\fR\fR\fI = \fR\fIfalse\fR\fI \fR
     11803\fI\fIuse sendfile\fR\fR\fI = \fR\fIno\fR\fI \fR
    1025411804.RE
    1025511805
     
    1025811808.PP
    1025911809.RS 4
    10260 This deprecated variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&.
     11810This deprecated variable controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&.
    1026111811.sp
    1026211812Unless further issues are discovered with our SPNEGO implementation, there is no reason this should ever be disabled\&.
     
    1026411814Default:
    1026511815\fI\fIuse spnego\fR\fR\fI = \fR\fIyes\fR\fI \fR
     11816.RE
     11817
     11818utmp (G)
     11819.\" utmp
     11820.PP
     11821.RS 4
     11822This boolean parameter is only available if Samba has been configured and compiled with the option
     11823\-\-with\-utmp\&. If set to
     11824\fByes\fR
     11825then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\&. Sites may use this to record the user connecting to a Samba share\&.
     11826.sp
     11827Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\&. Enabling this option creates an n^2 algorithm to find this number\&. This may impede performance on large installations\&.
     11828.sp
     11829Default:
     11830\fI\fIutmp\fR\fR\fI = \fR\fIno\fR\fI \fR
    1026611831.RE
    1026711832
     
    1028211847.RE
    1028311848
    10284 utmp (G)
    10285 .\" utmp
    10286 .PP
    10287 .RS 4
    10288 This boolean parameter is only available if Samba has been configured and compiled with the option
    10289 \-\-with\-utmp\&. If set to
    10290 \fByes\fR
    10291 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\&. Sites may use this to record the user connecting to a Samba share\&.
    10292 .sp
    10293 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\&. Enabling this option creates an n^2 algorithm to find this number\&. This may impede performance on large installations\&.
    10294 .sp
    10295 Default:
    10296 \fI\fIutmp\fR\fR\fI = \fR\fIno\fR\fI \fR
     11849\-valid (S)
     11850.\" -valid
     11851.PP
     11852.RS 4
     11853This parameter indicates whether a share is valid and thus can be used\&. When this parameter is set to false, the share will be in no way visible nor accessible\&.
     11854.sp
     11855This option should not be used by regular users but might be of help to developers\&. Samba uses this option internally to mark shares as deleted\&.
     11856.sp
     11857Default:
     11858\fI\fI\-valid\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1029711859.RE
    1029811860
     
    1031211874\fI%S\fR\&. This is useful in the [homes] section\&.
    1031311875.sp
     11876\fINote: \fRWhen used in the [global] section this parameter may have unwanted side effects\&. For example: If samba is configured as a MASTER BROWSER (see
     11877\fIlocal master\fR,
     11878\fIos level\fR,
     11879\fIdomain master\fR,
     11880\fIpreferred master\fR) this option will prevent workstations from being able to browse the network\&.
     11881.sp
    1031411882Default:
    1031511883\fI\fIvalid users\fR\fR\fI = \fR\fI # No valid users list (anyone can login) \fR\fI \fR
     
    1031711885Example:
    1031811886\fI\fIvalid users\fR\fR\fI = \fR\fIgreg, @pcusers\fR\fI \fR
    10319 .RE
    10320 
    10321 \-valid (S)
    10322 .\" -valid
    10323 .PP
    10324 .RS 4
    10325 This parameter indicates whether a share is valid and thus can be used\&. When this parameter is set to false, the share will be in no way visible nor accessible\&.
    10326 .sp
    10327 This option should not be used by regular users but might be of help to developers\&. Samba uses this option internally to mark shares as deleted\&.
    10328 .sp
    10329 Default:
    10330 \fI\fI\-valid\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1033111887.RE
    1033211888
     
    1037411930.sp
    1037511931Default:
    10376 \fI\fIveto files\fR\fR\fI = \fR\fINo files or directories are vetoed\&.\fR\fI \fR
     11932\fI\fIveto files\fR\fR\fI = \fR\fI # No files or directories are vetoed\fR\fI \fR
    1037711933.RE
    1037811934
     
    1043711993.RE
    1043811994
     11995web port (G)
     11996.\" web port
     11997.PP
     11998.RS 4
     11999Specifies which port the Samba web server should listen on\&.
     12000.sp
     12001Default:
     12002\fI\fIweb port\fR\fR\fI = \fR\fI901\fR\fI \fR
     12003.sp
     12004Example:
     12005\fI\fIweb port\fR\fR\fI = \fR\fI80\fR\fI \fR
     12006.RE
     12007
    1043912008wide links (S)
    1044012009.\" wide links
     
    1046912038Default:
    1047012039\fI\fIwinbind cache time\fR\fR\fI = \fR\fI300\fR\fI \fR
     12040.RE
     12041
     12042winbindd privileged socket directory (G)
     12043.\" winbindd privileged socket directory
     12044.PP
     12045.RS 4
     12046This setting controls the location of the winbind daemon\*(Aqs privileged socket\&.
     12047.sp
     12048Default:
     12049\fI\fIwinbindd privileged socket directory\fR\fR\fI = \fR\fI${prefix}/var/lib/winbindd_privileged\fR\fI \fR
     12050.RE
     12051
     12052winbindd socket directory (G)
     12053.\" winbindd socket directory
     12054.PP
     12055.RS 4
     12056This setting controls the location of the winbind daemon\*(Aqs socket\&.
     12057.sp
     12058Except within automated test scripts, this should not be altered, as the client tools (nss_winbind etc) do not honour this parameter\&. Client tools must then be advised of the altered path with the WINBINDD_SOCKET_DIR environment varaible\&.
     12059.sp
     12060Default:
     12061\fI\fIwinbindd socket directory\fR\fR\fI = \fR\fI${prefix}/var/run/winbindd\fR\fI \fR
    1047112062.RE
    1047212063
     
    1055312144Be aware that a high value for this parameter can result in system slowdown as the main parent winbindd daemon must perform the group unrolling and will be unable to answer incoming NSS or authentication requests during this time\&.
    1055412145.sp
    10555 Default:
    10556 \fI\fIwinbind expand groups\fR\fR\fI = \fR\fI1\fR\fI \fR
     12146The default value was changed from 1 to 0 with Samba 4\&.2\&. Some broken applications calculate the group memberships of users by traversing groups, such applications will require "winbind expand groups = 1"\&. But the new default makes winbindd more reliable as it doesn\*(Aqt require SAMR access to domain controllers of trusted domains\&.
     12147.sp
     12148Default:
     12149\fI\fIwinbind expand groups\fR\fR\fI = \fR\fI0\fR\fI \fR
    1055712150.RE
    1055812151
     
    1056312156This parameter specifies the maximum number of clients the
    1056412157\fBwinbindd\fR(8)
    10565 daemon can connect with\&.
     12158daemon can connect with\&. The parameter is not a hard limit\&. The
     12159\fBwinbindd\fR(8)
     12160daemon configures itself to be able to accept at least that many connections, and if the limit is reached, an attempt is made to disconnect idle clients\&.
    1056612161.sp
    1056712162Default:
     
    1060512200This parameter controls whether winbindd will replace whitespace in user and group names with an underscore (_) character\&. For example, whether the name "Space Kadet" should be replaced with the string "space_kadet"\&. Frequently Unix shell scripts will have difficulty with usernames contains whitespace due to the default field separator in the shell\&. If your domain possesses names containing the underscore character, this option may cause problems unless the name aliasing feature is supported by your nss_info plugin\&.
    1060612201.sp
    10607 This feature also enables the name aliasing API which can be used to make domain user and group names to a non\-qualified version\&. Please refer to the manpage for the configured idmap and nss_info plugin for the specifics on how to configure name aliasing for a specific configuration\&. Name aliasing takes precedence (and is mutually exclusive) over the whitespace replacement mechanism discussed previsouly\&.
     12202This feature also enables the name aliasing API which can be used to make domain user and group names to a non\-qualified version\&. Please refer to the manpage for the configured idmap and nss_info plugin for the specifics on how to configure name aliasing for a specific configuration\&. Name aliasing takes precedence (and is mutually exclusive) over the whitespace replacement mechanism discussed previously\&.
    1060812203.sp
    1060912204Default:
     
    1064312238.IP \(bu 2.3
    1064412239.\}
    10645 \fI<sfu | rfc2307 >\fR
    10646 \- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\&. Note that retrieving UID and GID from your ADS\-Server requires to use
     12240\fI<sfu | sfu20 | rfc2307 >\fR
     12241\- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\&. For SFU 3\&.0 or 3\&.5 simply choose "sfu", if you use SFU 2\&.0 please choose "sfu20"\&. Note that retrieving UID and GID from your ADS\-Server requires to use
    1064712242\fIidmap config DOMAIN:backend\fR
    10648 = ad as well\&.
     12243= ad as well\&. The primary group membership is currently always calculated via the "primaryGroupID" LDAP attribute\&.
    1064912244.RE
    1065012245.sp
     
    1066212257.PP
    1066312258.RS 4
    10664 This parameter is designed to control whether Winbind should allow to login with the
     12259This parameter is designed to control whether Winbind should allow one to login with the
    1066512260\fIpam_winbind\fR
    1066612261module using Cached Credentials\&. If enabled, winbindd will store user credentials from successful logins encrypted in a local cache\&.
    1066712262.sp
    1066812263Default:
    10669 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fIfalse\fR\fI \fR
    10670 .sp
    10671 Example:
    10672 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fItrue\fR\fI \fR
     12264\fI\fIwinbind offline logon\fR\fR\fI = \fR\fIno\fR\fI \fR
     12265.sp
     12266Example:
     12267\fI\fIwinbind offline logon\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1067312268.RE
    1067412269
     
    1069412289.sp
    1069512290Default:
    10696 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIfalse\fR\fI \fR
    10697 .sp
    10698 Example:
    10699 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fItrue\fR\fI \fR
     12291\fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIno\fR\fI \fR
     12292.sp
     12293Example:
     12294\fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIyes\fR\fI \fR
     12295.RE
     12296
     12297winbind request timeout (G)
     12298.\" winbind request timeout
     12299.PP
     12300.RS 4
     12301This parameter specifies the number of seconds the
     12302\fBwinbindd\fR(8)
     12303daemon will wait before disconnecting either a client connection with no outstanding requests (idle) or a client connection with a request that has remained outstanding (hung) for longer than this number of seconds\&.
     12304.sp
     12305Default:
     12306\fI\fIwinbind request timeout\fR\fR\fI = \fR\fI60\fR\fI \fR
    1070012307.RE
    1070112308
     
    1071012317Default:
    1071112318\fI\fIwinbind rpc only\fR\fR\fI = \fR\fIno\fR\fI \fR
     12319.RE
     12320
     12321winbind sealed pipes (G)
     12322.\" winbind sealed pipes
     12323.PP
     12324.RS 4
     12325This option controls whether any requests from winbindd to domain controllers pipe will be sealed\&. Disabling sealing can be useful for debugging purposes\&.
     12326.sp
     12327The behavior can be controlled per netbios domain by using \*(Aqwinbind sealed pipes:NETBIOSDOMAIN = no\*(Aq as option\&.
     12328.sp
     12329Default:
     12330\fI\fIwinbind sealed pipes\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1071212331.RE
    1071312332
     
    1072612345.sp
    1072712346Default:
    10728 \fI\fIwinbind separator\fR\fR\fI = \fR\fI\*(Aq\e\*(Aq\fR\fI \fR
     12347\fI\fIwinbind separator\fR\fR\fI = \fR\fI\e\fR\fI \fR
    1072912348.sp
    1073012349Example:
     
    1093312552.RE
    1093412553
     12554write ok
     12555.\" write ok
     12556.PP
     12557.RS 4
     12558This parameter is a synonym for
     12559writeable\&.
     12560.RE
     12561
    1093512562writeable (S)
    1093612563.\" writeable
     
    1095612583The integer parameter specifies the size of this cache (per oplocked file) in bytes\&.
    1095712584.sp
     12585Note that the write cache won\*(Aqt be used for file handles with a smb2 write lease\&.
     12586.sp
    1095812587Default:
    1095912588\fI\fIwrite cache size\fR\fR\fI = \fR\fI0\fR\fI \fR
     
    1097312602Note that if a user is in both the read list and the write list then they will be given write access\&.
    1097412603.sp
    10975 By design, this parameter will not work with the
    10976 \m[blue]\fBsecurity = share\fR\m[]
    10977 in Samba 3\&.0\&.
    10978 .sp
    1097912604Default:
    1098012605\fI\fIwrite list\fR\fR\fI = \fR\fI\fR\fI \fR
     
    1098812613.PP
    1098912614.RS 4
    10990 This parameter controls whether or not the server will support raw write SMB\*(Aqs when transferring data from clients\&. You should never need to change this parameter\&.
     12615This is ignored if
     12616\m[blue]\fBasync smb echo handler\fR\m[]
     12617is set, because this feature is incompatible with raw write SMB requests
     12618.sp
     12619If enabled, raw writes allow writes of 65535 bytes in one packet\&. This typically provides a major performance benefit for some very, very old clients\&.
     12620.sp
     12621However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw writes\&.
     12622.sp
     12623In general this parameter should be viewed as a system tuning tool and left severely alone\&.
    1099112624.sp
    1099212625Default:
     
    1102612659.SH "VERSION"
    1102712660.PP
    11028 This man page is correct for version 3 of the Samba suite\&.
     12661This man page is correct for version 4 of the Samba suite\&.
    1102912662.SH "SEE ALSO"
    1103012663.PP
    11031 
    1103212664\fBsamba\fR(7),
    1103312665\fBsmbpasswd\fR(8),
    11034 \fBswat\fR(8),
    1103512666\fBsmbd\fR(8),
    1103612667\fBnmbd\fR(8),
     12668\fBwinbindd\fR(8),
     12669\fBsamba\fR(8),
     12670\fBsamba-tool\fR(8),
    1103712671\fBsmbclient\fR(1),
    1103812672\fBnmblookup\fR(1),
    11039 \fBtestparm\fR(1),
    11040 \fBtestprns\fR(1)\&.
     12673\fBtestparm\fR(1)\&.
    1104112674.SH "AUTHOR"
    1104212675.PP
Note: See TracChangeset for help on using the changeset viewer.