Changeset 988 for vendor/current/docs/manpages/smb.conf.5
- Timestamp:
- Nov 24, 2016, 1:14:11 PM (9 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/docs/manpages/smb.conf.5
r860 r988 2 2 .\" Title: smb.conf 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: File Formats and Conventions 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "SMB\&.CONF" "5" "0 9/18/2013" "Samba 3\&.6" "File Formats and Conventions"10 .TH "SMB\&.CONF" "5" "05/02/2016" "Samba 4\&.4" "File Formats and Conventions" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 36 36 file is a configuration file for the Samba suite\&. 37 37 smb\&.conf 38 contains runtime configuration information for the Samba programs\&. The 39 smb\&.conf 40 file is designed to be configured and administered by the 41 \fBswat\fR(8) 42 program\&. The complete description of the file format and possible parameters held within are here for reference purposes\&. 38 contains runtime configuration information for the Samba programs\&. The complete description of the file format and possible parameters held within are here for reference purposes\&. 43 39 .SH "FILE FORMAT" 44 40 .PP … … 457 453 %R 458 454 .RS 4 459 the selected protocol level after protocol negotiation\&. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2 or NT1\&.455 the selected protocol level after protocol negotiation\&. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2, NT1, SMB2_02, SMB2_10, SMB2_22, SMB2_24, SMB3_00, SMB3_02, SMB3_10, SMB3_11 or SMB2_FF\&. 460 456 .RE 461 457 .PP … … 475 471 the IP address of the client machine\&. 476 472 .sp 477 Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.473 Before 4\&.0\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&. 478 474 .RE 479 475 .PP … … 482 478 the local IP address to which a client connected\&. 483 479 .sp 484 Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.480 Before 4\&.0\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&. 485 481 .RE 486 482 .PP … … 598 594 .PP 599 595 By default, Samba 3\&.0 has the same semantics as a Windows NT server, in that it is case insensitive but case preserving\&. As a special case for directories with large numbers of files, if the case options are set as follows, "case sensitive = yes", "case preserve = no", "short preserve case = no" then the "default case" option will be applied and will modify all filenames sent from the client when accessing this share\&. 600 .SH "NOTE ABOUT USERNAME/PASSWORD VALIDATION"601 .PP602 There are a number of ways in which a user can connect to a service\&. The server uses the following steps in determining if it will allow a connection to a specified service\&. If all the steps fail, the connection request is rejected\&. However, if one of the steps succeeds, the following steps are not checked\&.603 .PP604 If the service is marked605 \(lqguest only = yes\(rq606 and the server is running with share\-level security (\(lqsecurity = share\(rq, steps 1 to 5 are skipped\&.607 .sp608 .RS 4609 .ie n \{\610 \h'-04' 1.\h'+01'\c611 .\}612 .el \{\613 .sp -1614 .IP " 1." 4.2615 .\}616 If the client has passed a username/password pair and that username/password pair is validated by the UNIX system\*(Aqs password programs, the connection is made as that username\&. This includes the617 \e\eserver\eservice%\fIusername\fR618 method of passing a username\&.619 .RE620 .sp621 .RS 4622 .ie n \{\623 \h'-04' 2.\h'+01'\c624 .\}625 .el \{\626 .sp -1627 .IP " 2." 4.2628 .\}629 If the client has previously registered a username with the system and now supplies a correct password for that username, the connection is allowed\&.630 .RE631 .sp632 .RS 4633 .ie n \{\634 \h'-04' 3.\h'+01'\c635 .\}636 .el \{\637 .sp -1638 .IP " 3." 4.2639 .\}640 The client\*(Aqs NetBIOS name and any previously used usernames are checked against the supplied password\&. If they match, the connection is allowed as the corresponding user\&.641 .RE642 .sp643 .RS 4644 .ie n \{\645 \h'-04' 4.\h'+01'\c646 .\}647 .el \{\648 .sp -1649 .IP " 4." 4.2650 .\}651 If the client has previously validated a username/password pair with the server and the client has passed the validation token, that username is used\&.652 .RE653 .sp654 .RS 4655 .ie n \{\656 \h'-04' 5.\h'+01'\c657 .\}658 .el \{\659 .sp -1660 .IP " 5." 4.2661 .\}662 If a663 user =664 field is given in the665 smb\&.conf666 file for the service and the client has supplied a password, and that password matches (according to the UNIX system\*(Aqs password checking) with one of the usernames from the667 user =668 field, the connection is made as the username in the669 user =670 line\&. If one of the usernames in the671 user =672 list begins with a673 @, that name expands to a list of names in the group of the same name\&.674 .RE675 .sp676 .RS 4677 .ie n \{\678 \h'-04' 6.\h'+01'\c679 .\}680 .el \{\681 .sp -1682 .IP " 6." 4.2683 .\}684 If the service is a guest service, a connection is made as the username given in the685 guest account =686 for the service, irrespective of the supplied password\&.687 .RE688 596 .SH "REGISTRY-BASED CONFIGURATION" 689 597 .PP … … 769 677 \m[blue]\fBshutdown script\fR\m[]\&. 770 678 .sp 771 If the connected user posses es the679 If the connected user possesses the 772 680 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as root\&. 773 681 .sp … … 785 693 If this parameter is 786 694 \fByes\fR 787 for a service, then the share hosted by the service will only be visible to users who have read or write access to the share during share enumeration (for example net view \e\esambaserver)\&. This has parallels to access based enumeration, the main difference being that only share permissions are evaluated, and security descriptors on files contained on the share are not used in computing enumeration access rights\&. 695 for a service, then the share hosted by the service will only be visible to users who have read or write access to the share during share enumeration (for example net view \e\esambaserver)\&. The share ACLs which allow or deny the access to the share can be modified using for example the 696 sharesec 697 command or using the appropriate Windows tools\&. This has parallels to access based enumeration, the main difference being that only share permissions are evaluated, and security descriptors on files contained on the share are not used in computing enumeration access rights\&. 788 698 .sp 789 699 Default: 790 700 \fI\fIaccess based share enum\fR\fR\fI = \fR\fIno\fR\fI \fR 701 .RE 702 703 acl allow execute always (S) 704 .\" acl allow execute always 705 .PP 706 .RS 4 707 This boolean parameter controls the behaviour of 708 \fBsmbd\fR(8) 709 when receiving a protocol request of "open for execution" from a Windows client\&. With Samba 3\&.6 and older, the execution right in the ACL was not checked, so a client could execute a file even if it did not have execute rights on the file\&. In Samba 4\&.0, this has been fixed, so that by default, i\&.e\&. when this parameter is set to "False", "open for execution" is now denied when execution permissions are not present\&. 710 .sp 711 If this parameter is set to "True", Samba does not check execute permissions on "open for execution", thus re\-establishing the behaviour of Samba 3\&.6\&. This can be useful to smoothen upgrades from older Samba versions to 4\&.0 and newer\&. This setting is not meant to be used as a permanent setting, but as a temporary relief: It is recommended to fix the permissions in the ACLs and reset this parameter to the default after a certain transition period\&. 712 .sp 713 Default: 714 \fI\fIacl allow execute always\fR\fR\fI = \fR\fIno\fR\fI \fR 791 715 .RE 792 716 … … 795 719 .PP 796 720 .RS 4 721 Please note this parameter is now deprecated in Samba 3\&.6\&.2 and will be removed in a future version of Samba\&. 722 .sp 797 723 This boolean parameter controls what 798 \fBsmbd\fR(8)does on receiving a protocol request of "open for delete" from a Windows client\&. If a Windows client doesn\*(Aqt have permissions to delete a file then they expect this to be denied at open time\&. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\&. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\&. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\&. This is not perfect, as it\*(Aqs possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\&. Samba will correctly check POSIX ACL semantics in this case\&. 724 \fBsmbd\fR(8) 725 does on receiving a protocol request of "open for delete" from a Windows client\&. If a Windows client doesn\*(Aqt have permissions to delete a file then they expect this to be denied at open time\&. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\&. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\&. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\&. This is not perfect, as it\*(Aqs possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\&. Samba will correctly check POSIX ACL semantics in this case\&. 799 726 .sp 800 727 If this parameter is set to "false" Samba doesn\*(Aqt check permissions on "open for delete" and allows the open\&. If the user doesn\*(Aqt have permission to delete the file this will only be discovered at close time, which is too late for the Windows user tools to display an error message to the user\&. The symptom of this is files that appear to have been deleted "magically" re\-appearing on a Windows explorer refresh\&. This is an extremely advanced protocol option which should not need to be changed\&. This parameter was introduced in its final form in 3\&.0\&.21, an earlier version with slightly different semantics was introduced in 3\&.0\&.20\&. That older version is not documented here\&. 801 728 .sp 802 729 Default: 803 \fI\fIacl check permissions\fR\fR\fI = \fR\fITrue\fR\fI \fR 804 .RE 805 806 acl compatibility (G) 807 .\" acl compatibility 808 .PP 809 .RS 4 810 This parameter specifies what OS ACL semantics should be compatible with\&. Possible values are 811 \fIwinnt\fR 812 for Windows NT 4, 813 \fIwin2k\fR 814 for Windows 2000 and above and 815 \fIauto\fR\&. If you specify 816 \fIauto\fR, the value for this parameter will be based upon the version of the client\&. There should be no reason to change this parameter from the default\&. 817 .sp 818 Default: 819 \fI\fIacl compatibility\fR\fR\fI = \fR\fIAuto\fR\fI \fR 820 .sp 821 Example: 822 \fI\fIacl compatibility\fR\fR\fI = \fR\fIwin2k\fR\fI \fR 730 \fI\fIacl check permissions\fR\fR\fI = \fR\fIyes\fR\fI \fR 823 731 .RE 824 732 … … 831 739 of a file or directory to modify the permissions and ACLs on that file\&. 832 740 .sp 833 On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\&. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\&. This means there are multiple people with permissions to modify ACLs on a file or directory, easing manag ability\&.741 On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\&. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\&. This means there are multiple people with permissions to modify ACLs on a file or directory, easing manageability\&. 834 742 .sp 835 743 This parameter allows Samba to also permit delegation of the control over a point in the exported directory hierarchy in much the same way as Windows\&. This allows all members of a UNIX group to control the permissions on a file or directory they have group ownership on\&. … … 837 745 This parameter is best used with the 838 746 \m[blue]\fBinherit owner\fR\m[] 839 option and also on ona share containing directories with the UNIX747 option and also on a share containing directories with the UNIX 840 748 \fIsetgid bit\fR 841 749 set on them, which causes new files and directories created within it to inherit the group ownership from the containing directory\&. 842 750 .sp 843 This is parameter has beenwas deprecated in Samba 3\&.0\&.23, but re\-activated in Samba 3\&.0\&.31 and above, as it now only controls permission changes if the user is in the owning primary group\&. It is now no longer equivalent to the751 This parameter was deprecated in Samba 3\&.0\&.23, but re\-activated in Samba 3\&.0\&.31 and above, as it now only controls permission changes if the user is in the owning primary group\&. It is now no longer equivalent to the 844 752 \fIdos filemode\fR 845 753 option\&. … … 858 766 .sp 859 767 Default: 860 \fI\fIacl map full control\fR\fR\fI = \fR\fI True\fR\fI \fR768 \fI\fIacl map full control\fR\fR\fI = \fR\fIyes\fR\fI \fR 861 769 .RE 862 770 … … 898 806 .RE 899 807 900 add 901 .\" add 808 addport command (G) 809 .\" addport command 902 810 .PP 903 811 .RS 4 … … 930 838 .sp 931 839 Default: 932 \fI\fIadd 933 .sp 934 Example: 935 \fI\fIadd 840 \fI\fIaddport command\fR\fR\fI = \fR\fI\fR\fI \fR 841 .sp 842 Example: 843 \fI\fIaddport command\fR\fR\fI = \fR\fI/etc/samba/scripts/addport\&.sh\fR\fI \fR 936 844 .RE 937 845 … … 1152 1060 \fION DEMAND\fR 1153 1061 when a user accesses the Samba server\&. 1154 .sp1155 In order to use this option,1156 \fBsmbd\fR(8)1157 must1158 \fINOT\fR1159 be set to1160 \m[blue]\fBsecurity = share\fR\m[]1161 and1162 \m[blue]\fBadd user script\fR\m[]1163 must be set to a full pathname for a script that will create a UNIX user given one argument of1164 \fI%u\fR, which expands into the UNIX user name to create\&.1165 1062 .sp 1166 1063 When the Windows user attempts to access the Samba server, at login (session setup in the SMB protocol) time, … … 1200 1097 .RS 4 1201 1098 Full path to the script that will be called when a user is added to a group using the Windows NT domain administration tools\&. It will be run by 1202 \fBsmbd\fR(8) 1203 \fIAS ROOT\fR\&. Any 1099 \fBsmbd\fR(8)\fIAS ROOT\fR\&. Any 1204 1100 \fI%g\fR 1205 1101 will be replaced with the group name and any … … 1242 1138 You should use this option very carefully, as any user in this list will be able to do anything they like on the share, irrespective of file permissions\&. 1243 1139 .sp 1244 This parameter will not work with the1245 \m[blue]\fBsecurity = share\fR\m[]1246 in Samba 3\&.0\&. This is by design\&.1247 .sp1248 1140 Default: 1249 1141 \fI\fIadmin users\fR\fR\fI = \fR\fI\fR\fI \fR … … 1265 1157 .RE 1266 1158 1159 afs token lifetime (G) 1160 .\" afs token lifetime 1161 .PP 1162 .RS 4 1163 This parameter controls the lifetime of tokens that the AFS fake\-kaserver claims\&. In reality these never expire but this lifetime controls when the afs client will forget the token\&. 1164 .sp 1165 Set this parameter to 0 to get 1166 \fBNEVERDATE\fR\&. 1167 .sp 1168 Default: 1169 \fI\fIafs token lifetime\fR\fR\fI = \fR\fI604800\fR\fI \fR 1170 .RE 1171 1267 1172 afs username map (G) 1268 1173 .\" afs username map … … 1278 1183 Example: 1279 1184 \fI\fIafs username map\fR\fR\fI = \fR\fI%u@afs\&.samba\&.org\fR\fI \fR 1185 .RE 1186 1187 aio max threads (G) 1188 .\" aio max threads 1189 .PP 1190 .RS 4 1191 The integer parameter specifies the maximum number of threads each smbd process will create when doing parallel asynchronous IO calls\&. If the number of outstanding calls is greater than this number the requests will not be refused but go onto a queue and will be scheduled in turn as outstanding requests complete\&. 1192 .sp 1193 Related command: 1194 \m[blue]\fBaio read size\fR\m[] 1195 .sp 1196 Related command: 1197 \m[blue]\fBaio write size\fR\m[] 1198 .sp 1199 Default: 1200 \fI\fIaio max threads\fR\fR\fI = \fR\fI100\fR\fI \fR 1280 1201 .RE 1281 1202 … … 1345 1266 This determines how Samba will use its algorithmic mapping from uids/gid to the RIDs needed to construct NT Security Identifiers\&. 1346 1267 .sp 1347 Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with sy tem users etc\&.1268 Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with system users etc\&. 1348 1269 .sp 1349 1270 All UIDs and GIDs must be able to be resolved into SIDs for the correct operation of ACLs on the server\&. As such the algorithmic mapping can\*(Aqt be \*(Aqturned off\*(Aq, but pushing it \*(Aqout of the way\*(Aq should resolve the issues\&. Users and groups can then be assigned \*(Aqlow\*(Aq RIDs in arbitrary\-rid supporting backends\&. … … 1369 1290 Example: 1370 1291 \fI\fIallocation roundup size\fR\fR\fI = \fR\fI0 # (to disable roundups)\fR\fI \fR 1292 .RE 1293 1294 allow dcerpc auth level connect (G) 1295 .\" allow dcerpc auth level connect 1296 .PP 1297 .RS 4 1298 This option controls whether DCERPC services are allowed to be used with DCERPC_AUTH_LEVEL_CONNECT, which provides authentication, but no per message integrity nor privacy protection\&. 1299 .sp 1300 Some interfaces like samr, lsarpc and netlogon have a hard\-coded default of 1301 \fBno\fR 1302 and epmapper, mgmt and rpcecho have a hard\-coded default of 1303 \fByes\fR\&. 1304 .sp 1305 The behavior can be overwritten per interface name (e\&.g\&. lsarpc, netlogon, samr, srvsvc, winreg, wkssvc \&.\&.\&.) by using \*(Aqallow dcerpc auth level connect:interface = yes\*(Aq as option\&. 1306 .sp 1307 This option yields precedence to the implementation specific restrictions\&. E\&.g\&. the drsuapi and backupkey protocols require DCERPC_AUTH_LEVEL_PRIVACY\&. The dnsserver protocol requires DCERPC_AUTH_LEVEL_INTEGRITY\&. 1308 .sp 1309 Default: 1310 \fI\fIallow dcerpc auth level connect\fR\fR\fI = \fR\fIno\fR\fI \fR 1311 .sp 1312 Example: 1313 \fI\fIallow dcerpc auth level connect\fR\fR\fI = \fR\fIyes\fR\fI \fR 1314 .RE 1315 1316 allow dns updates (G) 1317 .\" allow dns updates 1318 .PP 1319 .RS 4 1320 This option determines what kind of updates to the DNS are allowed\&. 1321 .sp 1322 DNS updates can either be disallowed completely by setting it to 1323 \fBdisabled\fR, enabled over secure connections only by setting it to 1324 \fBsecure only\fR 1325 or allowed in all cases by setting it to 1326 \fBnonsecure\fR\&. 1327 .sp 1328 Default: 1329 \fI\fIallow dns updates\fR\fR\fI = \fR\fIsecure only\fR\fI \fR 1330 .sp 1331 Example: 1332 \fI\fIallow dns updates\fR\fR\fI = \fR\fIdisabled\fR\fI \fR 1371 1333 .RE 1372 1334 … … 1397 1359 .RE 1398 1360 1361 allow nt4 crypto (G) 1362 .\" allow nt4 crypto 1363 .PP 1364 .RS 4 1365 This option controls whether the netlogon server (currently only in \*(Aqactive directory domain controller\*(Aq mode), will reject clients which does not support NETLOGON_NEG_STRONG_KEYS nor NETLOGON_NEG_SUPPORTS_AES\&. 1366 .sp 1367 This option was added with Samba 4\&.2\&.0\&. It may lock out clients which worked fine with Samba versions up to 4\&.1\&.x\&. as the effective default was "yes" there, while it is "no" now\&. 1368 .sp 1369 If you have clients without RequireStrongKey = 1 in the registry, you may need to set "allow nt4 crypto = yes", until you have fixed all clients\&. 1370 .sp 1371 "allow nt4 crypto = yes" allows weak crypto to be negotiated, maybe via downgrade attacks\&. 1372 .sp 1373 This option yields precedence to the \*(Aqreject md5 clients\*(Aq option\&. 1374 .sp 1375 Default: 1376 \fI\fIallow nt4 crypto\fR\fR\fI = \fR\fIno\fR\fI \fR 1377 .RE 1378 1399 1379 allow trusted domains (G) 1400 1380 .\" allow trusted domains … … 1413 1393 Default: 1414 1394 \fI\fIallow trusted domains\fR\fR\fI = \fR\fIyes\fR\fI \fR 1415 .RE1416 1417 announce as (G)1418 .\" announce as1419 .PP1420 .RS 41421 This specifies what type of server1422 \fBnmbd\fR(8)1423 will announce itself as, to a network neighborhood browse list\&. By default this is set to Windows NT\&. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, Windows NT Workstation, Windows 95 and Windows for Workgroups respectively\&. Do not change this parameter unless you have a specific need to stop Samba appearing as an NT server as this may prevent Samba servers from participating as browser servers correctly\&.1424 .sp1425 Default:1426 \fI\fIannounce as\fR\fR\fI = \fR\fINT Server\fR\fI \fR1427 .sp1428 Example:1429 \fI\fIannounce as\fR\fR\fI = \fR\fIWin95\fR\fI \fR1430 .RE1431 1432 announce version (G)1433 .\" announce version1434 .PP1435 .RS 41436 This specifies the major and minor version numbers that nmbd will use when announcing itself as a server\&. The default is 4\&.9\&. Do not change this parameter unless you have a specific need to set a Samba server to be a downlevel server\&.1437 .sp1438 Default:1439 \fI\fIannounce version\fR\fR\fI = \fR\fI4\&.9\fR\fI \fR1440 .sp1441 Example:1442 \fI\fIannounce version\fR\fR\fI = \fR\fI2\&.0\fR\fI \fR1443 1395 .RE 1444 1396 … … 1481 1433 Example: 1482 1434 \fI\fIauth methods\fR\fR\fI = \fR\fIguest sam winbind\fR\fI \fR 1435 .RE 1436 1437 preload 1438 .\" preload 1439 .PP 1440 .RS 4 1441 This parameter is a synonym for 1442 auto services\&. 1443 .RE 1444 1445 auto services (G) 1446 .\" auto services 1447 .PP 1448 .RS 4 1449 This is a list of services that you want to be automatically added to the browse lists\&. This is most useful for homes and printers services that would otherwise not be visible\&. 1450 .sp 1451 Note that if you just want all printers in your printcap file loaded then the 1452 \m[blue]\fBload printers\fR\m[] 1453 option is easier\&. 1454 .sp 1455 Default: 1456 \fI\fIauto services\fR\fR\fI = \fR\fI\fR\fI \fR 1457 .sp 1458 Example: 1459 \fI\fIauto services\fR\fR\fI = \fR\fIfred lp colorlp\fR\fI \fR 1483 1460 .RE 1484 1461 … … 1543 1520 parameter list 1544 1521 \fBsmbpasswd\fR(8) 1545 and1546 \fBswat\fR(8)1547 1522 may not work as expected due to the reasons covered below\&. 1548 1523 .sp … … 1562 1537 smbpasswd 1563 1538 can be forced to use the primary IP interface of the local host by using its 1564 \fBsmbpasswd\fR(8) 1565 \fI\-r \fR\fI\fIremote machine\fR\fR 1539 \fBsmbpasswd\fR(8)\fI\-r \fR\fI\fIremote machine\fR\fR 1566 1540 parameter, with 1567 1541 \fIremote machine\fR 1568 1542 set to the IP name of the primary interface of the local host\&. 1569 .sp1570 The1571 swat1572 status page tries to connect with1573 smbd1574 and1575 nmbd1576 at the address1577 \fI127\&.0\&.0\&.1\fR1578 to determine if they are running\&. Not adding1579 \fI127\&.0\&.0\&.1\fR1580 will cause1581 smbd1582 and1583 nmbd1584 to always show "not running" even if they really are\&. This can prevent1585 swat1586 from starting/stopping/restarting1587 smbd1588 and1589 nmbd\&.1590 1543 .sp 1591 1544 Default: … … 1676 1629 .sp 1677 1630 Default: 1678 \fI\fIcache directory\fR\fR\fI = \fR\fI${prefix}/var/ locks\fR\fI \fR1631 \fI\fIcache directory\fR\fR\fI = \fR\fI${prefix}/var/cache\fR\fI \fR 1679 1632 .sp 1680 1633 Example: … … 1701 1654 .RE 1702 1655 1703 change notify ( S)1656 change notify (G) 1704 1657 .\" change notify 1705 1658 .PP … … 1734 1687 will automatically invoke the 1735 1688 \fIchange share command\fR 1736 with fiveparameters\&.1689 with six parameters\&. 1737 1690 .sp 1738 1691 .RS 4 … … 1798 1751 .RE 1799 1752 .sp 1753 .RS 4 1754 .ie n \{\ 1755 \h'-04'\(bu\h'+03'\c 1756 .\} 1757 .el \{\ 1758 .sp -1 1759 .IP \(bu 2.3 1760 .\} 1761 \fICSC policy\fR 1762 \- client side caching policy in string form\&. Valid values are: manual, documents, programs, disable\&. 1763 .RE 1764 .sp 1800 1765 .RE 1801 1766 This parameter is only used to modify existing file share definitions\&. To modify printer shares, use the "Printers\&.\&.\&." folder as seen when browsing the Samba host\&. … … 1821 1786 .sp 1822 1787 Default: 1823 \fI\fIcheck password script\fR\fR\fI = \fR\fI Disabled\fR\fI \fR1788 \fI\fIcheck password script\fR\fR\fI = \fR\fI # Disabled\fR\fI \fR 1824 1789 .sp 1825 1790 Example: 1826 1791 \fI\fIcheck password script\fR\fR\fI = \fR\fI/usr/local/sbin/crackcheck\fR\fI \fR 1792 .RE 1793 1794 cldap port (G) 1795 .\" cldap port 1796 .PP 1797 .RS 4 1798 This option controls the port used by the CLDAP protocol\&. 1799 .sp 1800 Default: 1801 \fI\fIcldap port\fR\fR\fI = \fR\fI389\fR\fI \fR 1802 .sp 1803 Example: 1804 \fI\fIcldap port\fR\fR\fI = \fR\fI3389\fR\fI \fR 1805 .RE 1806 1807 client ipc max protocol (G) 1808 .\" client ipc max protocol 1809 .PP 1810 .RS 4 1811 The value of the parameter (a string) is the highest protocol level that will be supported for IPC$ connections as DCERPC transport\&. 1812 .sp 1813 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 1814 .sp 1815 The value 1816 \fBdefault\fR 1817 refers to the latest supported protocol, currently 1818 \fBSMB3_11\fR\&. 1819 .sp 1820 See 1821 \m[blue]\fBclient max protocol\fR\m[] 1822 for a full list of available protocols\&. The values CORE, COREPLUS, LANMAN1, LANMAN2 are silently upgraded to NT1\&. 1823 .sp 1824 Default: 1825 \fI\fIclient ipc max protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR 1826 .sp 1827 Example: 1828 \fI\fIclient ipc max protocol\fR\fR\fI = \fR\fISMB2_10\fR\fI \fR 1829 .RE 1830 1831 client ipc min protocol (G) 1832 .\" client ipc min protocol 1833 .PP 1834 .RS 4 1835 This setting controls the minimum protocol version that the will be attempted to use for IPC$ connections as DCERPC transport\&. 1836 .sp 1837 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 1838 .sp 1839 The value 1840 \fBdefault\fR 1841 refers to the higher value of 1842 \fBNT1\fR 1843 and the effective value of 1844 \m[blue]\fBclient min protocol\fR\m[]\&. 1845 .sp 1846 See 1847 \m[blue]\fBclient max protocol\fR\m[] 1848 for a full list of available protocols\&. The values CORE, COREPLUS, LANMAN1, LANMAN2 are silently upgraded to NT1\&. 1849 .sp 1850 Default: 1851 \fI\fIclient ipc min protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR 1852 .sp 1853 Example: 1854 \fI\fIclient ipc min protocol\fR\fR\fI = \fR\fISMB3_11\fR\fI \fR 1855 .RE 1856 1857 client ipc signing (G) 1858 .\" client ipc signing 1859 .PP 1860 .RS 4 1861 This controls whether the client is allowed or required to use SMB signing for IPC$ connections as DCERPC transport\&. Possible values are 1862 \fIauto\fR, 1863 \fImandatory\fR 1864 and 1865 \fIdisabled\fR\&. 1866 .sp 1867 When set to mandatory or default, SMB signing is required\&. 1868 .sp 1869 When set to auto, SMB signing is offered, but not enforced and if set to disabled, SMB signing is not offered either\&. 1870 .sp 1871 Connections from winbindd to Active Directory Domain Controllers always enforce signing\&. 1872 .sp 1873 Default: 1874 \fI\fIclient ipc signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR 1827 1875 .RE 1828 1876 … … 1867 1915 are only available if Samba has been compiled against a modern OpenLDAP version (2\&.3\&.x or higher)\&. 1868 1916 .sp 1869 This option is needed in the case of Domain Controllers enforcing the usage of signed LDAP connections (e\&.g\&. Windows 2000 SP3 or higher)\&. LDAP sign and seal can be controlled with the registry key "HKLM\eSystem\eCurrentControlSet\eServices\e 1870 NTDS\eParameters\eLDAPServerIntegrity" on the Windows server side\&. 1917 This option is needed in the case of Domain Controllers enforcing the usage of signed LDAP connections (e\&.g\&. Windows 2000 SP3 or higher)\&. LDAP sign and seal can be controlled with the registry key "HKLM\eSystem\eCurrentControlSet\eServices\eNTDS\eParameters\eLDAPServerIntegrity" on the Windows server side\&. 1871 1918 .sp 1872 1919 Depending on the used KRB5 library (MIT and older Heimdal versions) it is possible that the message "integrity only" is not supported\&. In this case, … … 1876 1923 .sp 1877 1924 The default value is 1878 \fIplain\fR 1879 which is not irritable to KRB5 clock skew errors\&. That implies synchronizing the time with the KDC in the case of using 1880 \fIsign\fR 1881 or 1882 \fIseal\fR\&. 1883 .sp 1884 Default: 1885 \fI\fIclient ldap sasl wrapping\fR\fR\fI = \fR\fIplain\fR\fI \fR 1886 .RE 1887 1888 client ntlmv2 auth (G) 1889 .\" client ntlmv2 auth 1925 \fIsign\fR\&. That implies synchronizing the time with the KDC in the case of using 1926 \fIKerberos\fR\&. 1927 .sp 1928 Default: 1929 \fI\fIclient ldap sasl wrapping\fR\fR\fI = \fR\fIsign\fR\fI \fR 1930 .RE 1931 1932 client max protocol (G) 1933 .\" client max protocol 1934 .PP 1935 .RS 4 1936 The value of the parameter (a string) is the highest protocol level that will be supported by the client\&. 1937 .sp 1938 Possible values are : 1939 .sp 1940 .RS 4 1941 .ie n \{\ 1942 \h'-04'\(bu\h'+03'\c 1943 .\} 1944 .el \{\ 1945 .sp -1 1946 .IP \(bu 2.3 1947 .\} 1948 \fBCORE\fR: Earliest version\&. No concept of user names\&. 1949 .RE 1950 .sp 1951 .RS 4 1952 .ie n \{\ 1953 \h'-04'\(bu\h'+03'\c 1954 .\} 1955 .el \{\ 1956 .sp -1 1957 .IP \(bu 2.3 1958 .\} 1959 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency\&. 1960 .RE 1961 .sp 1962 .RS 4 1963 .ie n \{\ 1964 \h'-04'\(bu\h'+03'\c 1965 .\} 1966 .el \{\ 1967 .sp -1 1968 .IP \(bu 2.3 1969 .\} 1970 \fBLANMAN1\fR: First 1971 \fImodern\fR 1972 version of the protocol\&. Long filename support\&. 1973 .RE 1974 .sp 1975 .RS 4 1976 .ie n \{\ 1977 \h'-04'\(bu\h'+03'\c 1978 .\} 1979 .el \{\ 1980 .sp -1 1981 .IP \(bu 2.3 1982 .\} 1983 \fBLANMAN2\fR: Updates to Lanman1 protocol\&. 1984 .RE 1985 .sp 1986 .RS 4 1987 .ie n \{\ 1988 \h'-04'\(bu\h'+03'\c 1989 .\} 1990 .el \{\ 1991 .sp -1 1992 .IP \(bu 2.3 1993 .\} 1994 \fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&. 1995 .RE 1996 .sp 1997 .RS 4 1998 .ie n \{\ 1999 \h'-04'\(bu\h'+03'\c 2000 .\} 2001 .el \{\ 2002 .sp -1 2003 .IP \(bu 2.3 2004 .\} 2005 \fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and later versions of Windows\&. SMB2 has sub protocols available\&. 2006 .sp 2007 .RS 4 2008 .ie n \{\ 2009 \h'-04'\(bu\h'+03'\c 2010 .\} 2011 .el \{\ 2012 .sp -1 2013 .IP \(bu 2.3 2014 .\} 2015 \fBSMB2_02\fR: The earliest SMB2 version\&. 2016 .RE 2017 .sp 2018 .RS 4 2019 .ie n \{\ 2020 \h'-04'\(bu\h'+03'\c 2021 .\} 2022 .el \{\ 2023 .sp -1 2024 .IP \(bu 2.3 2025 .\} 2026 \fBSMB2_10\fR: Windows 7 SMB2 version\&. 2027 .RE 2028 .sp 2029 .RS 4 2030 .ie n \{\ 2031 \h'-04'\(bu\h'+03'\c 2032 .\} 2033 .el \{\ 2034 .sp -1 2035 .IP \(bu 2.3 2036 .\} 2037 \fBSMB2_22\fR: Early Windows 8 SMB2 version\&. 2038 .RE 2039 .sp 2040 .RS 4 2041 .ie n \{\ 2042 \h'-04'\(bu\h'+03'\c 2043 .\} 2044 .el \{\ 2045 .sp -1 2046 .IP \(bu 2.3 2047 .\} 2048 \fBSMB2_24\fR: Windows 8 beta SMB2 version\&. 2049 .RE 2050 .sp 2051 .RE 2052 By default SMB2 selects the SMB2_10 variant\&. 2053 .RE 2054 .sp 2055 .RS 4 2056 .ie n \{\ 2057 \h'-04'\(bu\h'+03'\c 2058 .\} 2059 .el \{\ 2060 .sp -1 2061 .IP \(bu 2.3 2062 .\} 2063 \fBSMB3\fR: The same as SMB2\&. Used by Windows 8\&. SMB3 has sub protocols available\&. 2064 .sp 2065 .RS 4 2066 .ie n \{\ 2067 \h'-04'\(bu\h'+03'\c 2068 .\} 2069 .el \{\ 2070 .sp -1 2071 .IP \(bu 2.3 2072 .\} 2073 \fBSMB3_00\fR: Windows 8 SMB3 version\&. (mostly the same as SMB2_24) 2074 .RE 2075 .sp 2076 .RS 4 2077 .ie n \{\ 2078 \h'-04'\(bu\h'+03'\c 2079 .\} 2080 .el \{\ 2081 .sp -1 2082 .IP \(bu 2.3 2083 .\} 2084 \fBSMB3_02\fR: Windows 8\&.1 SMB3 version\&. 2085 .RE 2086 .sp 2087 .RS 4 2088 .ie n \{\ 2089 \h'-04'\(bu\h'+03'\c 2090 .\} 2091 .el \{\ 2092 .sp -1 2093 .IP \(bu 2.3 2094 .\} 2095 \fBSMB3_10\fR: early Windows 10 technical preview SMB3 version\&. 2096 .RE 2097 .sp 2098 .RS 4 2099 .ie n \{\ 2100 \h'-04'\(bu\h'+03'\c 2101 .\} 2102 .el \{\ 2103 .sp -1 2104 .IP \(bu 2.3 2105 .\} 2106 \fBSMB3_11\fR: Windows 10 technical preview SMB3 version (maybe final)\&. 2107 .RE 2108 .sp 2109 .RE 2110 By default SMB3 selects the SMB3_11 variant\&. 2111 .RE 2112 .sp 2113 .RE 2114 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 2115 .sp 2116 The value 2117 \fBdefault\fR 2118 refers to 2119 \fBNT1\fR\&. 2120 .sp 2121 IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the 2122 \m[blue]\fBclient ipc max protocol\fR\m[] 2123 option\&. 2124 .sp 2125 Default: 2126 \fI\fIclient max protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR 2127 .sp 2128 Example: 2129 \fI\fIclient max protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR 2130 .RE 2131 2132 client min protocol (G) 2133 .\" client min protocol 2134 .PP 2135 .RS 4 2136 This setting controls the minimum protocol version that the client will attempt to use\&. 2137 .sp 2138 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 2139 .sp 2140 See 2141 Related command: \m[blue]\fBclient max protocol\fR\m[] 2142 for a full list of available protocols\&. 2143 .sp 2144 IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the 2145 \m[blue]\fBclient ipc min protocol\fR\m[] 2146 option\&. 2147 .sp 2148 Default: 2149 \fI\fIclient min protocol\fR\fR\fI = \fR\fICORE\fR\fI \fR 2150 .sp 2151 Example: 2152 \fI\fIclient min protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR 2153 .RE 2154 2155 client NTLMv2 auth (G) 2156 .\" client NTLMv2 auth 1890 2157 .PP 1891 2158 .RS 4 … … 1907 2174 Note that Windows Vista and later versions already use NTLMv2 by default, and some sites (particularly those following \*(Aqbest practice\*(Aq security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\&. 1908 2175 .sp 1909 Default: 1910 \fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 2176 When 2177 \m[blue]\fBclient use spnego\fR\m[] 2178 is also set to 2179 \fByes\fR 2180 extended security (SPNEGO) is required in order to use NTLMv2 only within NTLMSSP\&. This behavior was introduced with the patches for CVE\-2016\-2111\&. 2181 .sp 2182 Default: 2183 \fI\fIclient NTLMv2 auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 1911 2184 .RE 1912 2185 … … 1933 2206 denies access if the server is not able to speak netlogon schannel\&. 1934 2207 .sp 2208 Note that for active directory domains this is hardcoded to 2209 \m[blue]\fBclient schannel = yes\fR\m[]\&. 2210 .sp 2211 This option yields precedence to the 2212 \m[blue]\fBrequire strong key\fR\m[] 2213 option\&. 2214 .sp 1935 2215 Default: 1936 2216 \fI\fIclient schannel\fR\fR\fI = \fR\fIauto\fR\fI \fR … … 1950 2230 \fIdisabled\fR\&. 1951 2231 .sp 1952 When set to auto, SMB signing is offered, but not enforced\&. When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\&. 1953 .sp 1954 Default: 1955 \fI\fIclient signing\fR\fR\fI = \fR\fIauto\fR\fI \fR 2232 When set to auto or default, SMB signing is offered, but not enforced\&. 2233 .sp 2234 When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\&. 2235 .sp 2236 IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the 2237 \m[blue]\fBclient ipc signing\fR\m[] 2238 option\&. 2239 .sp 2240 Default: 2241 \fI\fIclient signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR 1956 2242 .RE 1957 2243 … … 1966 2252 If enabled, Samba can attempt to use Kerberos to contact servers known only by IP address\&. Kerberos relies on names, so ordinarily cannot function in this situation\&. 1967 2253 .sp 2254 This is a VERY BAD IDEA for security reasons, and so this parameter SHOULD NOT BE USED\&. It will be removed in a future version of Samba\&. 2255 .sp 1968 2256 If disabled, Samba will use the name used to look up the server when asking the KDC for a ticket\&. This avoids situations where a server may impersonate another, soliciting authentication as one principal while being known on the network as another\&. 1969 2257 .sp 1970 2258 Note that Windows XP SP2 and later versions already follow this behaviour, and Windows Vista and later servers no longer supply this \*(Aqrfc4178 hint\*(Aq principal on the server side\&. 2259 .sp 2260 This parameter is deprecated in Samba 4\&.2\&.1 and will be removed (along with the functionality) in a later release of Samba\&. 1971 2261 .sp 1972 2262 Default: … … 1979 2269 .RS 4 1980 2270 This variable controls whether Samba clients will try to use Simple and Protected NEGOciation (as specified by rfc2478) with supporting servers (including WindowsXP, Windows2000 and Samba 3\&.0) to agree upon an authentication mechanism\&. This enables Kerberos authentication in particular\&. 2271 .sp 2272 When 2273 \m[blue]\fBclient NTLMv2 auth\fR\m[] 2274 is also set to 2275 \fByes\fR 2276 extended security (SPNEGO) is required in order to use NTLMv2 only within NTLMSSP\&. This behavior was introduced with the patches for CVE\-2016\-2111\&. 1981 2277 .sp 1982 2278 Default: … … 2092 2388 .PP 2093 2389 .RS 4 2094 Setting this param ter to2390 Setting this parameter to 2095 2391 no 2096 2392 prevents winbind from creating custom krb5\&.conf files\&. Winbind normally does this because the krb5 libraries are not AD\-site\-aware and thus would pick any domain controller out of potentially very many\&. Winbind is site\-aware and makes the krb5 libraries use a local DC by creating its own krb5\&.conf files\&. … … 2132 2428 for details\&. 2133 2429 .sp 2134 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\&. If the administrator wishes to enforce a mask on access control lists also, they need to set the2135 \m[blue]\fBsecurity mask\fR\m[]\&.2136 .sp2137 2430 Default: 2138 2431 \fI\fIcreate mask\fR\fR\fI = \fR\fI0744\fR\fI \fR … … 2193 2486 .PP 2194 2487 .RS 4 2195 This parameter specifies a timeout in seconds for the connection between Samba and ctdb\&. It is only valid if you have compiled Samba with clustering and if you have set2488 This parameter specifies a timeout in milliseconds for the connection between Samba and ctdb\&. It is only valid if you have compiled Samba with clustering and if you have set 2196 2489 \fIclustering=yes\fR\&. 2197 2490 .sp 2198 2491 When something in the cluster blocks, it can happen that we wait indefinitely long for ctdb, just adding to the blocking condition\&. In a well\-running cluster this should never happen, but there are too many components in a cluster that might have hickups\&. Choosing the right balance for this value is very tricky, because on a busy cluster long service times to transfer something across the cluster might be valid\&. Setting it too short will degrade the service your cluster presents, setting it too long might make the cluster itself not recover from something severely broken for too long\&. 2199 2492 .sp 2200 Be aware that if you set this parameter, this needs to be in the file smb\&.conf, it is not really helpful to put this into a registry configuration (typical on a cluster), because to access the registry contact to ctdb is requ red\&.2493 Be aware that if you set this parameter, this needs to be in the file smb\&.conf, it is not really helpful to put this into a registry configuration (typical on a cluster), because to access the registry contact to ctdb is required\&. 2201 2494 .sp 2202 2495 Setting 2203 2496 \fIctdb timeout\fR 2204 to n makes any process waiting longer than n seconds for a reply by the cluster panic\&. Setting it to 0 (the default) makes Samba block forever, which is the highly recommended default\&.2497 to n makes any process waiting longer than n milliseconds for a reply by the cluster panic\&. Setting it to 0 (the default) makes Samba block forever, which is the highly recommended default\&. 2205 2498 .sp 2206 2499 Default: … … 2243 2536 .sp 2244 2537 Default: 2245 \fI\fIcups encrypt\fR\fR\fI = \fR\fI "no"\fR\fI \fR2538 \fI\fIcups encrypt\fR\fR\fI = \fR\fIno\fR\fI \fR 2246 2539 .RE 2247 2540 … … 2295 2588 .RE 2296 2589 2590 dcerpc endpoint servers (G) 2591 .\" dcerpc endpoint servers 2592 .PP 2593 .RS 4 2594 Specifies which DCE/RPC endpoint servers should be run\&. 2595 .sp 2596 Default: 2597 \fI\fIdcerpc endpoint servers\fR\fR\fI = \fR\fIepmapper, wkssvc, rpcecho, samr, netlogon, lsarpc, spoolss, drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver\fR\fI \fR 2598 .sp 2599 Example: 2600 \fI\fIdcerpc endpoint servers\fR\fR\fI = \fR\fIrpcecho\fR\fI \fR 2601 .RE 2602 2297 2603 deadtime (G) 2298 2604 .\" deadtime … … 2372 2678 Default: 2373 2679 \fI\fIdebug prefix timestamp\fR\fR\fI = \fR\fIno\fR\fI \fR 2374 .RE2375 2376 timestamp logs2377 .\" timestamp logs2378 .PP2379 .RS 42380 This parameter is a synonym for2381 debug timestamp\&.2382 .RE2383 2384 debug timestamp (G)2385 .\" debug timestamp2386 .PP2387 .RS 42388 Samba debug log messages are timestamped by default\&. If you are running at a high2389 \m[blue]\fBdebug level\fR\m[]2390 these timestamps can be distracting\&. This boolean parameter allows timestamping to be turned off\&.2391 .sp2392 Default:2393 \fI\fIdebug timestamp\fR\fR\fI = \fR\fIyes\fR\fI \fR2394 2680 .RE 2395 2681 … … 2504 2790 .sp 2505 2791 Default: 2506 \fI\fIdefer sharing violations\fR\fR\fI = \fR\fI True\fR\fI \fR2792 \fI\fIdefer sharing violations\fR\fR\fI = \fR\fIyes\fR\fI \fR 2507 2793 .RE 2508 2794 … … 2512 2798 .RS 4 2513 2799 This is the full pathname to a script that will be run 2514 \fIAS ROOT\fR 2515 \fBsmbd\fR(8) 2800 \fIAS ROOT\fR\fBsmbd\fR(8) 2516 2801 when a group is requested to be deleted\&. It will expand any 2517 2802 \fI%g\fR … … 2632 2917 .RS 4 2633 2918 Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration tools\&. It will be run by 2634 \fBsmbd\fR(8) 2635 \fIAS ROOT\fR\&. Any 2919 \fBsmbd\fR(8)\fIAS ROOT\fR\&. Any 2636 2920 \fI%g\fR 2637 2921 will be replaced with the group name and any … … 2705 2989 .sp 2706 2990 Example: 2707 \fI\fIdfree cache time\fR\fR\fI = \fR\fI dfree cache time =60\fR\fI \fR2991 \fI\fIdfree cache time\fR\fR\fI = \fR\fI60\fR\fI \fR 2708 2992 .RE 2709 2993 … … 2767 3051 .RE 2768 3052 3053 dgram port (G) 3054 .\" dgram port 3055 .PP 3056 .RS 4 3057 Specifies which ports the server should listen on for NetBIOS datagram traffic\&. 3058 .sp 3059 Default: 3060 \fI\fIdgram port\fR\fR\fI = \fR\fI138\fR\fI \fR 3061 .RE 3062 2769 3063 directory mode 2770 3064 .\" directory mode … … 2791 3085 parameter\&. This parameter is set to 000 by default (i\&.e\&. no extra mode bits are added)\&. 2792 3086 .sp 2793 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\&. If the administrator wishes to enforce a mask on access control lists also, they need to set the2794 \m[blue]\fBdirectory security mask\fR\m[]\&.2795 .sp2796 3087 Default: 2797 3088 \fI\fIdirectory mask\fR\fR\fI = \fR\fI0755\fR\fI \fR … … 2805 3096 .PP 2806 3097 .RS 4 2807 This parameter specifies the thesize of the directory name cache\&. It will be needed to turn this off for *BSD systems\&.3098 This parameter specifies the size of the directory name cache\&. It will be needed to turn this off for *BSD systems\&. 2808 3099 .sp 2809 3100 Default: … … 2815 3106 .PP 2816 3107 .RS 4 2817 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\&. 2818 .sp 2819 This parameter is applied as a mask (AND\*(Aqed with) to the incoming permission bits, thus resetting any bits not in this mask\&. Make sure not to mix up this parameter with 2820 \m[blue]\fBforce directory security mode\fR\m[], which works similar like this one but uses logical OR instead of AND\&. Essentially, zero bits in this mask are a set of bits that will always be set to zero\&. 2821 .sp 2822 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\&. 2823 .sp 2824 If not set explicitly this parameter is set to 0777 meaning a user is allowed to set all the user/group/world permissions on a directory\&. 2825 .sp 2826 \fINote\fR 2827 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it as the default of 2828 \fB0777\fR\&. 2829 .sp 2830 Default: 2831 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI0777\fR\fI \fR 2832 .sp 2833 Example: 2834 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI0700\fR\fI \fR 3108 This parameter has been removed for Samba 4\&.0\&.0\&. 3109 .sp 3110 \fINo default\fR 2835 3111 .RE 2836 3112 … … 2870 3146 .RE 2871 3147 2872 display charset (G)2873 .\" display charset2874 .PP2875 .RS 42876 Specifies the charset that samba will use to print messages to stdout and stderr\&. The default value is "LOCALE", which means automatically set, depending on the current locale\&. The value should generally be the same as the value of the parameter2877 \m[blue]\fBunix charset\fR\m[]\&.2878 .sp2879 Default:2880 \fI\fIdisplay charset\fR\fR\fI = \fR\fI"LOCALE" or "ASCII" (depending on the system)\fR\fI \fR2881 .sp2882 Example:2883 \fI\fIdisplay charset\fR\fR\fI = \fR\fIUTF8\fR\fI \fR2884 .RE2885 2886 3148 dmapi support (S) 2887 3149 .\" dmapi support … … 2896 3158 Default: 2897 3159 \fI\fIdmapi support\fR\fR\fI = \fR\fIno\fR\fI \fR 3160 .RE 3161 3162 dns forwarder (G) 3163 .\" dns forwarder 3164 .PP 3165 .RS 4 3166 This option specifies the DNS server that DNS requests will be forwarded to if they can not be handled by Samba itself\&. 3167 .sp 3168 The DNS forwarder is only used if the internal DNS server in Samba is used\&. 3169 .sp 3170 Default: 3171 \fI\fIdns forwarder\fR\fR\fI = \fR\fI\fR\fI \fR 3172 .sp 3173 Example: 3174 \fI\fIdns forwarder\fR\fR\fI = \fR\fI192\&.168\&.0\&.1\fR\fI \fR 2898 3175 .RE 2899 3176 … … 2913 3190 Default: 2914 3191 \fI\fIdns proxy\fR\fR\fI = \fR\fIyes\fR\fI \fR 3192 .RE 3193 3194 dns update command (G) 3195 .\" dns update command 3196 .PP 3197 .RS 4 3198 This option sets the command that is called when there are DNS updates\&. It should update the local machines DNS names using TSIG\-GSS\&. 3199 .sp 3200 Default: 3201 \fI\fIdns update command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_dnsupdate\fR\fI \fR 3202 .sp 3203 Example: 3204 \fI\fIdns update command\fR\fR\fI = \fR\fI/usr/local/sbin/dnsupdate\fR\fI \fR 2915 3205 .RE 2916 3206 … … 3033 3323 .PP 3034 3324 .RS 4 3035 Under DOS and Windows, if a user can write to a file they can change the timestamp on it\&. Under POSIX semantics, only the owner of the file or root may change the timestamp\&. By default, Samba emulates the DOS semantics and allows to change the timestamp on a file if the user3325 Under DOS and Windows, if a user can write to a file they can change the timestamp on it\&. Under POSIX semantics, only the owner of the file or root may change the timestamp\&. By default, Samba emulates the DOS semantics and allows one to change the timestamp on a file if the user 3036 3326 smbd 3037 3327 is acting on behalf has write permissions\&. Due to changes in Microsoft Office 2000 and beyond, the default for this parameter has been changed from "no" to "yes" in Samba 3\&.0\&.14 and above\&. Microsoft Excel will display dialog box warnings about the file being changed by another user if this parameter is not set to "yes" and files are being shared between users\&. … … 3039 3329 Default: 3040 3330 \fI\fIdos filetimes\fR\fR\fI = \fR\fIyes\fR\fI \fR 3331 .RE 3332 3333 durable handles (S) 3334 .\" durable handles 3335 .PP 3336 .RS 4 3337 This boolean parameter controls whether Samba can grant SMB2 durable file handles on a share\&. 3338 .sp 3339 Note that durable handles are only enabled if 3340 \m[blue]\fBkernel oplocks = no\fR\m[], 3341 \m[blue]\fBkernel share modes = no\fR\m[], and 3342 \m[blue]\fBposix locking = no\fR\m[], i\&.e\&. if the share is configured for CIFS/SMB2 only access, not supporting interoperability features with local UNIX processes or NFS operations\&. 3343 .sp 3344 Also note that, for the time being, durability is not granted for a handle that has the delete on close flag set\&. 3345 .sp 3346 Default: 3347 \fI\fIdurable handles\fR\fR\fI = \fR\fIyes\fR\fI \fR 3041 3348 .RE 3042 3349 … … 3057 3364 .PP 3058 3365 .RS 4 3059 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builtin [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$ }file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&.3366 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builtin [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$] file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&. 3060 3367 .sp 3061 3368 Default: … … 3121 3428 \fBsmbpasswd\fR(8) 3122 3429 program for information on how to set up and maintain this file), or set the 3123 \m[blue]\fBsecurity = [ server|domain|ads]\fR\m[]3430 \m[blue]\fBsecurity = [domain|ads]\fR\m[] 3124 3431 parameter which causes 3125 3432 smbd … … 3168 3475 .RS 4 3169 3476 This option defines a list of log names that Samba will report to the Microsoft EventViewer utility\&. The listed eventlogs will be associated with tdb file on disk in the 3170 $( lockdir)/eventlog\&.3477 $(statedir)/eventlog\&. 3171 3478 .sp 3172 3479 The administrator must use an external process to parse the normal Unix logs such as … … 3189 3496 This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\&. Visual C++ generated makefiles have the object directory as a dependency for each object file, and a make rule to create the directory\&. Also, when NMAKE compares timestamps it uses the creation time when examining a directory\&. Thus the object directory will be created if it does not exist, but once it does exist it will always have an earlier timestamp than the object files it contains\&. 3190 3497 .sp 3191 However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or ordeleted in the directory\&. NMAKE finds all object files in the object directory\&. The timestamp of the last one built is then compared to the timestamp of the object directory\&. If the directory\*(Aqs timestamp if newer, then all object files will be rebuilt\&. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\&.3498 However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or deleted in the directory\&. NMAKE finds all object files in the object directory\&. The timestamp of the last one built is then compared to the timestamp of the object directory\&. If the directory\*(Aqs timestamp if newer, then all object files will be rebuilt\&. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\&. 3192 3499 .sp 3193 3500 Default: … … 3249 3556 .sp 3250 3557 Default: 3251 \fI\fIforce create mode\fR\fR\fI = \fR\fI000 \fR\fI \fR3558 \fI\fIforce create mode\fR\fR\fI = \fR\fI0000\fR\fI \fR 3252 3559 .sp 3253 3560 Example: … … 3268 3575 .sp 3269 3576 Default: 3270 \fI\fIforce directory mode\fR\fR\fI = \fR\fI000 \fR\fI \fR3577 \fI\fIforce directory mode\fR\fR\fI = \fR\fI0000\fR\fI \fR 3271 3578 .sp 3272 3579 Example: … … 3278 3585 .PP 3279 3586 .RS 4 3280 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\&. 3281 .sp 3282 This parameter is applied as a mask (OR\*(Aqed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\&. Make sure not to mix up this parameter with 3283 \m[blue]\fBdirectory security mask\fR\m[], which works in a similar manner to this one, but uses a logical AND instead of an OR\&. 3284 .sp 3285 Essentially, this mask may be treated as a set of bits that, when modifying security on a directory, to will enable (1) any flags that are off (0) but which the mask has set to on (1)\&. 3286 .sp 3287 If not set explicitly this parameter is 0000, which allows a user to modify all the user/group/world permissions on a directory without restrictions\&. 3288 .if n \{\ 3289 .sp 3290 .\} 3291 .RS 4 3292 .it 1 an-trap 3293 .nr an-no-space-flag 1 3294 .nr an-break-flag 1 3295 .br 3296 .ps +1 3297 \fBNote\fR 3298 .ps -1 3299 .br 3300 Users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it set as 0000\&. 3301 .sp .5v 3302 .RE 3303 Default: 3304 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI0\fR\fI \fR 3305 .sp 3306 Example: 3307 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI700\fR\fI \fR 3587 This parameter has been removed for Samba 4\&.0\&.0\&. 3588 .sp 3589 \fINo default\fR 3308 3590 .RE 3309 3591 … … 3365 3647 .PP 3366 3648 .RS 4 3367 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\&. 3368 .sp 3369 This parameter is applied as a mask (OR\*(Aqed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\&. Make sure not to mix up this parameter with 3370 \m[blue]\fBsecurity mask\fR\m[], which works similar like this one but uses logical AND instead of OR\&. 3371 .sp 3372 Essentially, one bits in this mask may be treated as a set of bits that, when modifying security on a file, the user has always set to be on\&. 3373 .sp 3374 If not set explicitly this parameter is set to 0, and allows a user to modify all the user/group/world permissions on a file, with no restrictions\&. 3375 .sp 3376 \fI Note\fR 3377 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave this set to 0000\&. 3378 .sp 3379 Default: 3380 \fI\fIforce security mode\fR\fR\fI = \fR\fI0\fR\fI \fR 3381 .sp 3382 Example: 3383 \fI\fIforce security mode\fR\fR\fI = \fR\fI700\fR\fI \fR 3649 This parameter has been removed for Samba 4\&.0\&.0\&. 3650 .sp 3651 \fINo default\fR 3384 3652 .RE 3385 3653 … … 3413 3681 Example: 3414 3682 \fI\fIforce user\fR\fR\fI = \fR\fIauser\fR\fI \fR 3683 .RE 3684 3685 fss: prune stale (G) 3686 .\" fss: prune stale 3687 .PP 3688 .RS 4 3689 When enabled, Samba\*(Aqs File Server Remove VSS Protocol (FSRVP) server checks all FSRVP initiated snapshots on startup, and removes any corresponding state (including share definitions) for nonexistent snapshot paths\&. 3690 .sp 3691 Default: 3692 \fI\fIfss: prune stale\fR\fR\fI = \fR\fIno\fR\fI \fR 3693 .sp 3694 Example: 3695 \fI\fIfss: prune stale\fR\fR\fI = \fR\fIyes\fR\fI \fR 3696 .RE 3697 3698 fss: sequence timeout (G) 3699 .\" fss: sequence timeout 3700 .PP 3701 .RS 4 3702 The File Server Remove VSS Protocol (FSRVP) server includes a message sequence timer to ensure cleanup on unexpected client disconnect\&. This parameter overrides the default timeout between FSRVP operations\&. FSRVP timeouts can be completely disabled via a value of 0\&. 3703 .sp 3704 Default: 3705 \fI\fIfss: sequence timeout\fR\fR\fI = \fR\fI180 or 1800, depending on operation\fR\fI \fR 3706 .sp 3707 Example: 3708 \fI\fIfss: sequence timeout\fR\fR\fI = \fR\fI0\fR\fI \fR 3415 3709 .RE 3416 3710 … … 3444 3738 should only be used whenever there is no operating system API available from the OS that samba can use\&. 3445 3739 .sp 3446 This option is only available you have compiled Samba with the 3447 \-\-with\-sys\-quotas 3448 option or on Linux with 3449 \-\-with\-quotas 3450 and a working quota api was found in the system\&. 3740 This option is only available Samba was compiled with quotas support\&. 3451 3741 .sp 3452 3742 This parameter should specify the path to a script that queries the quota information for the specified user/group for the partition that the specified directory is on\&. 3453 3743 .sp 3454 Such a script should take3 arguments:3744 Such a script is being given 3 arguments: 3455 3745 .sp 3456 3746 .RS 4 … … 3488 3778 .sp 3489 3779 .RE 3490 The type of query can be one of : 3780 The directory is actually mostly just "\&." \- It needs to be treated relatively to the current working directory that the script can also query\&. 3781 .sp 3782 The type of query can be one of: 3491 3783 .sp 3492 3784 .RS 4 … … 3535 3827 .sp 3536 3828 .RE 3537 This script should print one line as output with spaces between the arguments\&. The arguments are:3538 .sp 3539 .RS 4 3540 .ie n \{\ 3541 \h'-04'\(bu\h'+03'\c 3542 .\} 3543 .el \{\ 3544 .sp -1 3545 .IP \(bu 2.3 3546 .\} 3547 Arg1 \- quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced)3548 .RE 3549 .sp 3550 .RS 4 3551 .ie n \{\ 3552 \h'-04'\(bu\h'+03'\c 3553 .\} 3554 .el \{\ 3555 .sp -1 3556 .IP \(bu 2.3 3557 .\} 3558 Arg2 \- number of currently used blocks3559 .RE 3560 .sp 3561 .RS 4 3562 .ie n \{\ 3563 \h'-04'\(bu\h'+03'\c 3564 .\} 3565 .el \{\ 3566 .sp -1 3567 .IP \(bu 2.3 3568 .\} 3569 Arg3 \- the softlimit number of blocks3570 .RE 3571 .sp 3572 .RS 4 3573 .ie n \{\ 3574 \h'-04'\(bu\h'+03'\c 3575 .\} 3576 .el \{\ 3577 .sp -1 3578 .IP \(bu 2.3 3579 .\} 3580 Arg4 \- the hardlimit number of blocks3581 .RE 3582 .sp 3583 .RS 4 3584 .ie n \{\ 3585 \h'-04'\(bu\h'+03'\c 3586 .\} 3587 .el \{\ 3588 .sp -1 3589 .IP \(bu 2.3 3590 .\} 3591 Arg5 \- currently used number of inodes3592 .RE 3593 .sp 3594 .RS 4 3595 .ie n \{\ 3596 \h'-04'\(bu\h'+03'\c 3597 .\} 3598 .el \{\ 3599 .sp -1 3600 .IP \(bu 2.3 3601 .\} 3602 Arg6 \- the softlimit number of inodes3603 .RE 3604 .sp 3605 .RS 4 3606 .ie n \{\ 3607 \h'-04'\(bu\h'+03'\c 3608 .\} 3609 .el \{\ 3610 .sp -1 3611 .IP \(bu 2.3 3612 .\} 3613 Arg7 \- the hardlimit number of inodes3614 .RE 3615 .sp 3616 .RS 4 3617 .ie n \{\ 3618 \h'-04'\(bu\h'+03'\c 3619 .\} 3620 .el \{\ 3621 .sp -1 3622 .IP \(bu 2.3 3623 .\} 3624 Arg 8(optional) \- the number of bytes in a block(default is 1024)3829 This script should print one line as output with spaces between the columns\&. The printed columns should be: 3830 .sp 3831 .RS 4 3832 .ie n \{\ 3833 \h'-04'\(bu\h'+03'\c 3834 .\} 3835 .el \{\ 3836 .sp -1 3837 .IP \(bu 2.3 3838 .\} 3839 1 \- quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced) 3840 .RE 3841 .sp 3842 .RS 4 3843 .ie n \{\ 3844 \h'-04'\(bu\h'+03'\c 3845 .\} 3846 .el \{\ 3847 .sp -1 3848 .IP \(bu 2.3 3849 .\} 3850 2 \- number of currently used blocks 3851 .RE 3852 .sp 3853 .RS 4 3854 .ie n \{\ 3855 \h'-04'\(bu\h'+03'\c 3856 .\} 3857 .el \{\ 3858 .sp -1 3859 .IP \(bu 2.3 3860 .\} 3861 3 \- the softlimit number of blocks 3862 .RE 3863 .sp 3864 .RS 4 3865 .ie n \{\ 3866 \h'-04'\(bu\h'+03'\c 3867 .\} 3868 .el \{\ 3869 .sp -1 3870 .IP \(bu 2.3 3871 .\} 3872 4 \- the hardlimit number of blocks 3873 .RE 3874 .sp 3875 .RS 4 3876 .ie n \{\ 3877 \h'-04'\(bu\h'+03'\c 3878 .\} 3879 .el \{\ 3880 .sp -1 3881 .IP \(bu 2.3 3882 .\} 3883 5 \- currently used number of inodes 3884 .RE 3885 .sp 3886 .RS 4 3887 .ie n \{\ 3888 \h'-04'\(bu\h'+03'\c 3889 .\} 3890 .el \{\ 3891 .sp -1 3892 .IP \(bu 2.3 3893 .\} 3894 6 \- the softlimit number of inodes 3895 .RE 3896 .sp 3897 .RS 4 3898 .ie n \{\ 3899 \h'-04'\(bu\h'+03'\c 3900 .\} 3901 .el \{\ 3902 .sp -1 3903 .IP \(bu 2.3 3904 .\} 3905 7 \- the hardlimit number of inodes 3906 .RE 3907 .sp 3908 .RS 4 3909 .ie n \{\ 3910 \h'-04'\(bu\h'+03'\c 3911 .\} 3912 .el \{\ 3913 .sp -1 3914 .IP \(bu 2.3 3915 .\} 3916 8 (optional) \- the number of bytes in a block(default is 1024) 3625 3917 .RE 3626 3918 .sp … … 3784 4076 This parameter prevents clients from seeing the existance of files that cannot be read\&. Defaults to off\&. 3785 4077 .sp 4078 Please note that enabling this can slow down listing large directories significantly\&. Samba has to evaluate the ACLs of all directory members, which can be a lot of effort\&. 4079 .sp 3786 4080 Default: 3787 4081 \fI\fIhide unreadable\fR\fR\fI = \fR\fIno\fR\fI \fR … … 3793 4087 .RS 4 3794 4088 This parameter prevents clients from seeing the existance of files that cannot be written to\&. Defaults to off\&. Note that unwriteable directories are shown as usual\&. 4089 .sp 4090 Please note that enabling this can slow down listing large directories significantly\&. Samba has to evaluate the ACLs of all directory members, which can be a lot of effort\&. 3795 4091 .sp 3796 4092 Default: … … 3998 4294 .PP 3999 4295 .RS 4 4000 This parameter specifies the number of seconds that Winbind\*(Aqs idmap interface will cache positive SID/uid/gid query results\&. 4001 .sp 4002 Default: 4003 \fI\fIidmap cache time\fR\fR\fI = \fR\fI604800 (one week)\fR\fI \fR4004 .RE 4005 4006 idmap config (G)4007 .\" idmap config 4296 This parameter specifies the number of seconds that Winbind\*(Aqs idmap interface will cache positive SID/uid/gid query results\&. By default, Samba will cache these results for one week\&. 4297 .sp 4298 Default: 4299 \fI\fIidmap cache time\fR\fR\fI = \fR\fI604800\fR\fI \fR 4300 .RE 4301 4302 idmap config DOMAIN : OPTION (G) 4303 .\" idmap config DOMAIN : OPTION 4008 4304 .PP 4009 4305 .RS 4 … … 4014 4310 prefix, followed by a domain name or the asterisk character (*), a colon, and the name of an idmap setting for the chosen domain\&. 4015 4311 .sp 4016 The idmap configuration is hence divided into groups, one group for each domain to be configured, and one group with the the asterisk instead of a proper domain name, which speifies the default configuration that is used to catch all domains that do not have an explicit idmap configuration of their own\&.4312 The idmap configuration is hence divided into groups, one group for each domain to be configured, and one group with the asterisk instead of a proper domain name, which specifies the default configuration that is used to catch all domains that do not have an explicit idmap configuration of their own\&. 4017 4313 .sp 4018 4314 There are three general options available: … … 4020 4316 backend = backend_name 4021 4317 .RS 4 4022 This specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. The standard backends are tdb (\fBidmap_tdb\fR(8)), tdb2 (\fBidmap_tdb2\fR(8)), ldap (\fBidmap_ldap\fR(8)), , rid (\fBidmap_rid\fR(8)), , hash (\fBidmap_hash\fR(8)), , autorid (\fBidmap_autorid\fR(8)), , ad (\fBidmap_ad\fR(8)), , adex (\fBidmap_adex\fR(8)), , and nss\&. (\fBidmap_nss\fR(8)),The corresponding manual pages contain the details, but here is a summary\&.4023 .sp 4024 The first three of these create mappings of their own using internal unixid counters and store the mappings in a database\&. These are suitable for use in the default idmap configuration\&. The rid and hash backends use a pure algorithmic calculation to determine the unixid for a SID\&. The autorid module is a mixture of the tdb and rid backend\&. It creates ranges for each domain encountered and then uses the rid algorithm for each of these automatically configured domains individually\&. The ad and adex backends both use unix IDs stored in Active Directory via the standard schema extensions\&. The nss backend reverses the standard winbindd setup and gets the unixids via names from nsswitch which can be useful in an ldap setup\&.4318 This specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. The standard backends are tdb (\fBidmap_tdb\fR(8)), tdb2 (\fBidmap_tdb2\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), hash (\fBidmap_hash\fR(8)), autorid (\fBidmap_autorid\fR(8)), ad (\fBidmap_ad\fR(8)) and nss (\fBidmap_nss\fR(8))\&. The corresponding manual pages contain the details, but here is a summary\&. 4319 .sp 4320 The first three of these create mappings of their own using internal unixid counters and store the mappings in a database\&. These are suitable for use in the default idmap configuration\&. The rid and hash backends use a pure algorithmic calculation to determine the unixid for a SID\&. The autorid module is a mixture of the tdb and rid backend\&. It creates ranges for each domain encountered and then uses the rid algorithm for each of these automatically configured domains individually\&. The ad backend uses unix ids stored in Active Directory via the standard schema extensions\&. The nss backend reverses the standard winbindd setup and gets the unix ids via names from nsswitch which can be useful in an ldap setup\&. 4025 4321 .RE 4026 4322 .PP 4027 4323 range = low \- high 4028 4324 .RS 4 4029 Defines the available matching uid and gid range for which the backend is authoritative\&. For allocating backends, this also defines the start and the end of the range for allocating new uni dIDs\&.4325 Defines the available matching uid and gid range for which the backend is authoritative\&. For allocating backends, this also defines the start and the end of the range for allocating new unique IDs\&. 4030 4326 .sp 4031 4327 winbind uses this parameter to find the backend that is authoritative for a unix ID to SID mapping, so it must be set for each individually configured domain and for the default configuration\&. The configured ranges must be mutually disjoint\&. … … 4123 4419 .RE 4124 4420 4125 include ( G)4421 include (S) 4126 4422 .\" include 4127 4423 .PP … … 4166 4462 The ownership of new files and directories is normally governed by effective uid of the connected user\&. This option allows the Samba administrator to specify that the ownership for new files and directories should be controlled by the ownership of the parent directory\&. 4167 4463 .sp 4168 Common scenarios where this behavior is useful is in implementing drop\-boxes where users can create and edit files but not delete them and to ensure that newly create files in a user\*(Aqs roaming profile directory are actually ownerby the user\&.4464 Common scenarios where this behavior is useful is in implementing drop\-boxes, where users can create and edit files but not delete them and ensuring that newly created files in a user\*(Aqs roaming profile directory are actually owned by the user\&. 4169 4465 .sp 4170 4466 Default: … … 4203 4499 .RE 4204 4500 4501 init logon delay (G) 4502 .\" init logon delay 4503 .PP 4504 .RS 4 4505 This parameter specifies a delay in milliseconds for the hosts configured for delayed initial samlogon with 4506 \m[blue]\fBinit logon delayed hosts\fR\m[]\&. 4507 .sp 4508 Default: 4509 \fI\fIinit logon delay\fR\fR\fI = \fR\fI100\fR\fI \fR 4510 .RE 4511 4205 4512 init logon delayed hosts (G) 4206 4513 .\" init logon delayed hosts … … 4220 4527 .RE 4221 4528 4222 init logon delay (G)4223 .\" init logon delay4224 .PP4225 .RS 44226 This parameter specifies a delay in milliseconds for the hosts configured for delayed initial samlogon with4227 \m[blue]\fBinit logon delayed hosts\fR\m[]\&.4228 .sp4229 Default:4230 \fI\fIinit logon delay\fR\fR\fI = \fR\fI100\fR\fI \fR4231 .RE4232 4233 4529 interfaces (G) 4234 4530 .\" interfaces … … 4289 4585 .sp 4290 4586 By default Samba enables all active interfaces that are broadcast capable except the loopback adaptor (IP address 127\&.0\&.0\&.1)\&. 4587 .sp 4588 In order to support SMB3 multi\-channel configurations, smbd understands some extra data that can be appended after the actual interface with this extended syntax: 4589 .sp 4590 interface[;key1=value1[,key2=value2[\&.\&.\&.]]] 4591 .sp 4592 Known keys are speed, capability, and if_index\&. Speed is specified in bits per second\&. Known capabilities are RSS and RDMA\&. The if_index should be used with care: the values must not coincide with indexes used by the kernel\&. Note that these options are mainly intended for testing and development rather than for production use\&. At least on Linux systems, these values should be auto\-detected, but the settings can serve as last a resort when autodetection is not working or is not available\&. 4291 4593 .sp 4292 4594 The example below configures three network interfaces corresponding to the eth0 device and IP addresses 192\&.168\&.2\&.10 and 192\&.168\&.3\&.10\&. The netmasks of the latter two interfaces would be set to 255\&.255\&.255\&.0\&. … … 4355 4657 \m[blue]\fBsocket options\fR\m[])\&. Basically you should only use this option if you strike difficulties\&. 4356 4658 .sp 4659 Please note this option only applies to SMB1 client connections, and has no effect on SMB2 clients\&. 4660 .sp 4357 4661 Default: 4358 4662 \fI\fIkeepalive\fR\fR\fI = \fR\fI300\fR\fI \fR … … 4422 4726 .sp 4423 4727 Default: 4424 \fI\fIkerberos method\fR\fR\fI = \fR\fI secrets only\fR\fI \fR4425 .RE 4426 4427 kernel change notify ( S)4728 \fI\fIkerberos method\fR\fR\fI = \fR\fIdefault\fR\fI \fR 4729 .RE 4730 4731 kernel change notify (G) 4428 4732 .\" kernel change notify 4429 4733 .PP … … 4437 4741 .RE 4438 4742 4439 kernel oplocks ( G)4743 kernel oplocks (S) 4440 4744 .\" kernel oplocks 4441 4745 .PP … … 4443 4747 For UNIXes that support kernel based 4444 4748 \m[blue]\fBoplocks\fR\m[] 4445 (currently only IRIX and the Linux 2\&.4 kernel), this parameter allows the use of them to be turned on or off\&. 4749 (currently only IRIX and the Linux 2\&.4 kernel), this parameter allows the use of them to be turned on or off\&. However, this disables Level II oplocks for clients as the Linux and IRIX kernels do not support them properly\&. 4446 4750 .sp 4447 4751 Kernel oplocks support allows Samba … … 4453 4757 cool feature :\-)\&. 4454 4758 .sp 4759 If you do not need this interaction, you should disable the parameter on Linux and IRIX to get Level II oplocks and the associated performance benefit\&. 4760 .sp 4455 4761 This parameter defaults to 4456 \fBon\fR, but is translated to a no\-op on systems that no not have the necessary kernel support\&. You should never need to touch this parameter\&. 4457 .sp 4458 Default: 4459 \fI\fIkernel oplocks\fR\fR\fI = \fR\fIyes\fR\fI \fR 4762 \fBno\fR 4763 and is translated to a no\-op on systems that do not have the necessary kernel support\&. 4764 .sp 4765 Default: 4766 \fI\fIkernel oplocks\fR\fR\fI = \fR\fIno\fR\fI \fR 4767 .RE 4768 4769 kernel share modes (S) 4770 .\" kernel share modes 4771 .PP 4772 .RS 4 4773 This parameter controls whether SMB share modes are translated into UNIX flocks\&. 4774 .sp 4775 Kernel share modes provide a minimal level of interoperability with local UNIX processes and NFS operations by preventing access with flocks corresponding to the SMB share modes\&. Generally, it is very desirable to leave this enabled\&. 4776 .sp 4777 Note that in order to use SMB2 durable file handles on a share, you have to turn kernel share modes off\&. 4778 .sp 4779 This parameter defaults to 4780 \fByes\fR 4781 and is translated to a no\-op on systems that do not have the necessary kernel flock support\&. 4782 .sp 4783 Default: 4784 \fI\fIkernel share modes\fR\fR\fI = \fR\fIyes\fR\fI \fR 4785 .RE 4786 4787 kpasswd port (G) 4788 .\" kpasswd port 4789 .PP 4790 .RS 4 4791 Specifies which ports the Kerberos server should listen on for password changes\&. 4792 .sp 4793 Default: 4794 \fI\fIkpasswd port\fR\fR\fI = \fR\fI464\fR\fI \fR 4795 .RE 4796 4797 krb5 port (G) 4798 .\" krb5 port 4799 .PP 4800 .RS 4 4801 Specifies which port the KDC should listen on for Kerberos traffic\&. 4802 .sp 4803 Default: 4804 \fI\fIkrb5 port\fR\fR\fI = \fR\fI88\fR\fI \fR 4460 4805 .RE 4461 4806 … … 4472 4817 When this parameter is set to 4473 4818 no 4474 this will also result in sambaLMPassword in Samba\*(Aqs passdb being blanked after the next password change\&. As a result of that lanman clients won\*(Aqt be able to authenticate, even if lanman auth is re enabled later on\&.4819 this will also result in sambaLMPassword in Samba\*(Aqs passdb being blanked after the next password change\&. As a result of that lanman clients won\*(Aqt be able to authenticate, even if lanman auth is re\-enabled later on\&. 4475 4820 .sp 4476 4821 Unlike the … … 4548 4893 for tracing function calls\&. 4549 4894 .sp 4550 The debug ou put from the LDAP libraries appears with the prefix [LDAP] in Samba\*(Aqs logging output\&. The level at which LDAP logging is printed is controlled by the parameter4895 The debug output from the LDAP libraries appears with the prefix [LDAP] in Samba\*(Aqs logging output\&. The level at which LDAP logging is printed is controlled by the parameter 4551 4896 \fIldap debug threshold\fR\&. 4552 4897 .sp … … 4680 5025 .sp 4681 5026 Default: 4682 \fI\fIldap page size\fR\fR\fI = \fR\fI10 24\fR\fI \fR5027 \fI\fIldap page size\fR\fR\fI = \fR\fI1000\fR\fI \fR 4683 5028 .sp 4684 5029 Example: 4685 5030 \fI\fIldap page size\fR\fR\fI = \fR\fI512\fR\fI \fR 5031 .RE 5032 5033 ldap password sync 5034 .\" ldap password sync 5035 .PP 5036 .RS 4 5037 This parameter is a synonym for 5038 ldap passwd sync\&. 4686 5039 .RE 4687 5040 … … 4758 5111 .sp 4759 5112 To use this option, a basic ldap tree must be provided and the ldap suffix parameters must be properly configured\&. On virgin servers the default users and groups (Administrator, Guest, Domain Users, Domain Admins, Domain Guests) can be precreated with the command 4760 net sam provision\&. To run this command the ldap server must be running, Win indd must be running and the smb\&.conf ldap options must be properly configured\&. The typical ldap setup used with the5113 net sam provision\&. To run this command the ldap server must be running, Winbindd must be running and the smb\&.conf ldap options must be properly configured\&. The typical ldap setup used with the 4761 5114 \m[blue]\fBldapsam:trusted = yes\fR\m[] 4762 5115 option is usually sufficient to use … … 4859 5212 .RE 4860 5213 4861 ldap ssl ads (G) 4862 .\" ldap ssl ads 4863 .PP 4864 .RS 4 4865 This option is used to define whether or not Samba should use SSL when connecting to the ldap server using 4866 \fIads\fR 4867 methods\&. Rpc methods are not affected by this parameter\&. Please note, that this parameter won\*(Aqt have any effect if 4868 \m[blue]\fBldap ssl\fR\m[] 4869 is set to 4870 \fIno\fR\&. 4871 .sp 4872 See 4873 smb\&.conf(5) 4874 for more information on 4875 \m[blue]\fBldap ssl\fR\m[]\&. 4876 .sp 4877 Default: 4878 \fI\fIldap ssl ads\fR\fR\fI = \fR\fIno\fR\fI \fR 5214 ldap server require strong auth (G) 5215 .\" ldap server require strong auth 5216 .PP 5217 .RS 4 5218 The 5219 \m[blue]\fBldap server require strong auth\fR\m[] 5220 defines whether the ldap server requires ldap traffic to be signed or signed and encrypted (sealed)\&. Possible values are 5221 \fIno\fR, 5222 \fIallow_sasl_over_tls\fR 5223 and 5224 \fIyes\fR\&. 5225 .sp 5226 A value of 5227 \fIno\fR 5228 allows simple and sasl binds over all transports\&. 5229 .sp 5230 A value of 5231 \fIallow_sasl_over_tls\fR 5232 allows simple and sasl binds (without sign or seal) over TLS encrypted connections\&. Unencrypted connections only allow sasl binds with sign or seal\&. 5233 .sp 5234 A value of 5235 \fIyes\fR 5236 allows only simple binds over TLS encrypted connections\&. Unencrypted connections only allow sasl binds with sign or seal\&. 5237 .sp 5238 Default: 5239 \fI\fIldap server require strong auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 4879 5240 .RE 4880 5241 … … 4894 5255 \fIeither\fR 4895 5256 this parameter to 4896 \fIStart_tls\fR 4897 \fIor\fR 5257 \fIStart_tls\fR\fIor\fR 4898 5258 by specifying 4899 5259 \fIldaps://\fR … … 4934 5294 methods\&. To enable the LDAPv3 StartTLS extended operation (RFC2830) for 4935 5295 \fIads\fR, set 4936 \m[blue]\fBldap ssl = yes\fR\m[] 4937 \fIand\fR 4938 \m[blue]\fBldap ssl ads = yes\fR\m[]\&. See 5296 \m[blue]\fBldap ssl = yes\fR\m[]\fIand\fR\m[blue]\fBldap ssl ads = yes\fR\m[]\&. See 4939 5297 smb\&.conf(5) 4940 5298 for more information on … … 4943 5301 Default: 4944 5302 \fI\fIldap ssl\fR\fR\fI = \fR\fIstart tls\fR\fI \fR 5303 .RE 5304 5305 ldap ssl ads (G) 5306 .\" ldap ssl ads 5307 .PP 5308 .RS 4 5309 This option is used to define whether or not Samba should use SSL when connecting to the ldap server using 5310 \fIads\fR 5311 methods\&. Rpc methods are not affected by this parameter\&. Please note, that this parameter won\*(Aqt have any effect if 5312 \m[blue]\fBldap ssl\fR\m[] 5313 is set to 5314 \fIno\fR\&. 5315 .sp 5316 See 5317 smb\&.conf(5) 5318 for more information on 5319 \m[blue]\fBldap ssl\fR\m[]\&. 5320 .sp 5321 Default: 5322 \fI\fIldap ssl ads\fR\fR\fI = \fR\fIno\fR\fI \fR 4945 5323 .RE 4946 5324 … … 5099 5477 \fBno\fR 5100 5478 will cause 5101 nmbd 5102 \fInever\fR 5479 nmbd\fInever\fR 5103 5480 to become a local master browser\&. 5104 5481 .sp … … 5126 5503 .sp 5127 5504 Default: 5128 \fI\fIlock directory\fR\fR\fI = \fR\fI${prefix}/var/lock s\fR\fI \fR5505 \fI\fIlock directory\fR\fR\fI = \fR\fI${prefix}/var/lock\fR\fI \fR 5129 5506 .sp 5130 5507 Example: … … 5154 5531 Be careful about disabling locking either globally or in a specific service, as lack of locking may result in data corruption\&. You should never need to set this parameter\&. 5155 5532 .sp 5156 \fINo default\fR 5157 .RE 5158 5159 lock spin count (G) 5160 .\" lock spin count 5161 .PP 5162 .RS 4 5163 This parameter has been made inoperative in Samba 3\&.0\&.24\&. The functionality it contolled is now controlled by the parameter 5164 \m[blue]\fBlock spin time\fR\m[]\&. 5165 .sp 5166 Default: 5167 \fI\fIlock spin count\fR\fR\fI = \fR\fI0\fR\fI \fR 5533 Default: 5534 \fI\fIlocking\fR\fR\fI = \fR\fIyes\fR\fI \fR 5168 5535 .RE 5169 5536 … … 5194 5561 .RE 5195 5562 5563 logging (G) 5564 .\" logging 5565 .PP 5566 .RS 4 5567 This parameter configures logging backends\&. Multiple backends can be specified at the same time, with different log levels for each backend\&. The parameter is a list of backends, where each backend is specified as backend[:option][@loglevel]\&. 5568 .sp 5569 The \*(Aqoption\*(Aq parameter can be used to pass backend\-specific options\&. 5570 .sp 5571 The log level for a backend is optional, if it is not set for a backend, all messages are sent to this backend\&. The parameter 5572 \m[blue]\fBlog level\fR\m[] 5573 determines overall log levels, while the log levels specified here define what is sent to the individual backends\&. 5574 .sp 5575 When 5576 \m[blue]\fBlogging\fR\m[] 5577 is set, it overrides the 5578 \m[blue]\fBsyslog\fR\m[] 5579 and 5580 \m[blue]\fBsyslog only\fR\m[] 5581 parameters\&. 5582 .sp 5583 Some backends are only available when Samba has been compiled with the additional libraries\&. The overall list of logging backends: 5584 .sp 5585 .RS 4 5586 .ie n \{\ 5587 \h'-04'\(bu\h'+03'\c 5588 .\} 5589 .el \{\ 5590 .sp -1 5591 .IP \(bu 2.3 5592 .\} 5593 \fIsyslog\fR 5594 .RE 5595 .sp 5596 .RS 4 5597 .ie n \{\ 5598 \h'-04'\(bu\h'+03'\c 5599 .\} 5600 .el \{\ 5601 .sp -1 5602 .IP \(bu 2.3 5603 .\} 5604 \fIfile\fR 5605 .RE 5606 .sp 5607 .RS 4 5608 .ie n \{\ 5609 \h'-04'\(bu\h'+03'\c 5610 .\} 5611 .el \{\ 5612 .sp -1 5613 .IP \(bu 2.3 5614 .\} 5615 \fIsystemd\fR 5616 .RE 5617 .sp 5618 .RS 4 5619 .ie n \{\ 5620 \h'-04'\(bu\h'+03'\c 5621 .\} 5622 .el \{\ 5623 .sp -1 5624 .IP \(bu 2.3 5625 .\} 5626 \fIlttng\fR 5627 .RE 5628 .sp 5629 .RS 4 5630 .ie n \{\ 5631 \h'-04'\(bu\h'+03'\c 5632 .\} 5633 .el \{\ 5634 .sp -1 5635 .IP \(bu 2.3 5636 .\} 5637 \fIgpfs\fR 5638 .RE 5639 .sp 5640 .RE 5641 Default: 5642 \fI\fIlogging\fR\fR\fI = \fR\fI\fR\fI \fR 5643 .sp 5644 Example: 5645 \fI\fIlogging\fR\fR\fI = \fR\fIsyslog@1 file\fR\fI \fR 5646 .RE 5647 5196 5648 debuglevel 5197 5649 .\" debuglevel … … 5210 5662 file\&. 5211 5663 .sp 5212 This parameter has been extended since the 2\&.2\&.x series, now it allows to specify the debug level for multiple debug classes\&. This is to give greater flexibility in the configuration of the system\&. The following debug classes are currently implemented:5664 This parameter has been extended since the 2\&.2\&.x series, now it allows one to specify the debug level for multiple debug classes\&. This is to give greater flexibility in the configuration of the system\&. The following debug classes are currently implemented: 5213 5665 .sp 5214 5666 .RS 4 … … 5438 5890 Example: 5439 5891 \fI\fIlog level\fR\fR\fI = \fR\fI3 passdb:5 auth:10 winbind:2\fR\fI \fR 5892 .RE 5893 5894 log nt token command (G) 5895 .\" log nt token command 5896 .PP 5897 .RS 4 5898 This option can be set to a command that will be called when new nt tokens are created\&. 5899 .sp 5900 This is only useful for development purposes\&. 5901 .sp 5902 Default: 5903 \fI\fIlog nt token command\fR\fR\fI = \fR\fI\fR\fI \fR 5440 5904 .RE 5441 5905 … … 5462 5926 This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC\&. It allows you to do 5463 5927 .sp 5464 5465 5928 C:\e>\fBNET USE H: /HOME\fR 5466 5929 .sp … … 5471 5934 This parameter can be used with Win9X workstations to ensure that roaming profiles are stored in a subdirectory of the user\*(Aqs home directory\&. This is done in the following way: 5472 5935 .sp 5473 5474 5936 logon home = \e\e%N\e%U\eprofile 5475 5937 .sp … … 5640 6102 Note that it is good practice to include the absolute path in the lppause command as the PATH may not be available to the server\&. 5641 6103 .sp 5642 Default: 5643 \fI\fIlppause command\fR\fR\fI = \fR\fI # Currently no default value is given to this string, unless the value of the \m[blue]\fBprinting\fR\m[] parameter is \fBSYSV\fR, in which case the default is : lp \-i %p\-%j \-H hold or if the value of the \fIprinting\fR parameter is \fBSOFTQ\fR, then the default is: qstat \-s \-j%j \-h\&. \fR\fI \fR 6104 Currently no default value is given to this string, unless the value of the 6105 \m[blue]\fBprinting\fR\m[] 6106 parameter is 6107 \fBSYSV\fR, in which case the default is : 6108 lp \-i %p\-%j \-H hold 6109 or if the value of the 6110 \fIprinting\fR 6111 parameter is 6112 \fBSOFTQ\fR, then the default is: 6113 qstat \-s \-j%j \-h\&. 6114 .sp 6115 Default: 6116 \fI\fIlppause command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 5644 6117 .sp 5645 6118 Example: … … 5708 6181 .sp 5709 6182 Default: 5710 \fI\fIlpq command\fR\fR\fI = \fR\fI \fR\fI \fR6183 \fI\fIlpq command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 5711 6184 .sp 5712 6185 Example: … … 5752 6225 qstat \-s \-j%j \-r 5753 6226 .sp 5754 \fINo default\fR 6227 Default: 6228 \fI\fIlpresume command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 5755 6229 .sp 5756 6230 Example: … … 5793 6267 .sp 5794 6268 Default: 5795 \fI\fIlprm command\fR\fR\fI = \fR\fI determined by printing parameter\fR\fI \fR6269 \fI\fIlprm command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 5796 6270 .RE 5797 6271 … … 5800 6274 .PP 5801 6275 .RS 4 5802 If a Samba server is a member of a Windows NT Domain (see the6276 If a Samba server is a member of a Windows NT or Active Directory Domain (see the 5803 6277 \m[blue]\fBsecurity = domain\fR\m[] 5804 parameter) then periodically a running smbd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called 5805 private/secrets\&.tdb\&. This parameter specifies how often this password will be changed, in seconds\&. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\&. 6278 and 6279 \m[blue]\fBsecurity = ads\fR\m[] 6280 parameters), then periodically a running winbindd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called 6281 secrets\&.tdb\&. This parameter specifies how often this password will be changed, in seconds\&. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\&. 5806 6282 .sp 5807 6283 See also 5808 6284 \fBsmbpasswd\fR(8), and the 5809 6285 \m[blue]\fBsecurity = domain\fR\m[] 5810 parameter\&. 6286 and 6287 \m[blue]\fBsecurity = ads\fR\m[] 6288 parameters\&. 5811 6289 .sp 5812 6290 Default: … … 5839 6317 .RE 5840 6318 Default: 5841 \fI\fImagic output\fR\fR\fI = \fR\fI <magic script name>\&.out\fR\fI \fR6319 \fI\fImagic output\fR\fR\fI = \fR\fI # <magic script name>\&.out\fR\fI \fR 5842 6320 .sp 5843 6321 Example: … … 5969 6447 .PP 5970 6448 .RS 4 5971 controls the algorithm used for the generating the mangled names\&. Can take two different values, "hash" and "hash2"\&. "hash" is the algorithm that was used usedin Samba for many years and was the default in Samba 2\&.2\&.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\&. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\&.6449 controls the algorithm used for the generating the mangled names\&. Can take two different values, "hash" and "hash2"\&. "hash" is the algorithm that was used in Samba for many years and was the default in Samba 2\&.2\&.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\&. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\&. 5972 6450 .sp 5973 6451 Default: … … 5995 6473 .RS 4 5996 6474 This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit\&. The DOS archive bit is set when a file has been modified since its last backup\&. One motivation for this option is to keep Samba/your PC from making any file it touches from becoming executable under UNIX\&. This can be quite annoying for shared source code, documents, etc\&.\&.\&. 6475 .sp 6476 Note that this parameter will be ignored if the 6477 \m[blue]\fBstore dos attributes\fR\m[] 6478 parameter is set, as the DOS archive attribute will then be stored inside a UNIX extended attribute\&. 5997 6479 .sp 5998 6480 Note that this requires the … … 6012 6494 This controls whether DOS style hidden files should be mapped to the UNIX world execute bit\&. 6013 6495 .sp 6496 Note that this parameter will be ignored if the 6497 \m[blue]\fBstore dos attributes\fR\m[] 6498 parameter is set, as the DOS hidden attribute will then be stored inside a UNIX extended attribute\&. 6499 .sp 6014 6500 Note that this requires the 6015 6501 \m[blue]\fBcreate mask\fR\m[] … … 6018 6504 for details\&. 6019 6505 .sp 6020 \fINo default\fR 6506 Default: 6507 \fI\fImap hidden\fR\fR\fI = \fR\fIno\fR\fI \fR 6021 6508 .RE 6022 6509 … … 6049 6536 .IP \(bu 2.3 6050 6537 .\} 6051 6052 6538 \fBYes\fR 6053 6539 \- The read only DOS attribute is mapped to the inverse of the user or owner write bit in the unix permission mode set\&. If the owner write bit is not set, the read only attribute is reported as being set on the file\&. If the read only DOS attribute is set, Samba sets the owner, group and others write bits to zero\&. Write bits set in an ACL are ignored by Samba\&. If the read only DOS attribute is unset, Samba simply sets the write bit of the owner to one\&. … … 6062 6548 .IP \(bu 2.3 6063 6549 .\} 6064 6065 6550 \fBPermissions\fR 6066 6551 \- The read only DOS attribute is mapped to the effective permissions of the connecting user, as evaluated by … … 6077 6562 .IP \(bu 2.3 6078 6563 .\} 6079 6080 6564 \fBNo\fR 6081 6565 \- The read only DOS attribute is unaffected by permissions, and can only be set by the … … 6085 6569 .sp 6086 6570 .RE 6571 Note that this parameter will be ignored if the 6572 \m[blue]\fBstore dos attributes\fR\m[] 6573 parameter is set, as the DOS \*(Aqread\-only\*(Aq attribute will then be stored inside a UNIX extended attribute\&. 6574 .sp 6087 6575 Default: 6088 6576 \fI\fImap readonly\fR\fR\fI = \fR\fIyes\fR\fI \fR … … 6094 6582 .RS 4 6095 6583 This controls whether DOS style system files should be mapped to the UNIX group execute bit\&. 6584 .sp 6585 Note that this parameter will be ignored if the 6586 \m[blue]\fBstore dos attributes\fR\m[] 6587 parameter is set, as the DOS system attribute will then be stored inside a UNIX extended attribute\&. 6096 6588 .sp 6097 6589 Note that this requires the … … 6109 6601 .PP 6110 6602 .RS 4 6111 This parameter is only useful in6112 \m[blue]\fBSECURITY = security\fR\m[]6113 modes other than6114 \fIsecurity = share\fR6115 and6116 \fIsecurity = server\fR6117 \- i\&.e\&.6118 \fBuser\fR, and6119 \fBdomain\fR\&.6120 .sp6121 6603 This parameter can take four different values, which tell 6122 6604 \fBsmbd\fR(8) … … 6180 6662 .sp 6181 6663 .RE 6182 Note that this parameter is needed to set up "Guest" share services when using 6183 \fIsecurity\fR 6184 modes other than share and server\&. This is because in these modes the name of the resource being requested is 6664 Note that this parameter is needed to set up "Guest" share services\&. This is because in these modes the name of the resource being requested is 6185 6665 \fInot\fR 6186 sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\&. This parameter is not useful with 6187 \fIsecurity = server\fR 6188 as in this security mode no information is returned about whether a user logon failed due to a bad username or bad password, the same error is returned from a modern server in both cases\&. 6189 .sp 6190 For people familiar with the older Samba releases, this parameter maps to the old compile\-time setting of the 6191 \fB GUEST_SESSSETUP\fR 6192 value in local\&.h\&. 6666 sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\&. 6193 6667 .sp 6194 6668 Default: … … 6289 6763 This parameter limits the maximum number of open files that one 6290 6764 \fBsmbd\fR(8) 6291 file serving process may have open for a client at any one time\&. Th e This parameter can be set very high (16404) as Samba uses only one bit per unopened file\&. Setting this parameter lower than 16404 will cause Samba to complain and set this value back to the minimum of 16404, as Windows 7 depends on this number of open file handles being available\&.6765 file serving process may have open for a client at any one time\&. This parameter can be set very high (16384) as Samba uses only one bit per unopened file\&. Setting this parameter lower than 16384 will cause Samba to complain and set this value back to the minimum of 16384, as Windows 7 depends on this number of open file handles being available\&. 6292 6766 .sp 6293 6767 The limit of the number of open files is usually set by the UNIX per\-process file descriptor limit rather than this parameter so you should never need to touch this parameter\&. 6294 6768 .sp 6295 6769 Default: 6296 \fI\fImax open files\fR\fR\fI = \fR\fI16 404\fR\fI \fR6770 \fI\fImax open files\fR\fR\fI = \fR\fI16384\fR\fI \fR 6297 6771 .RE 6298 6772 … … 6310 6784 Example: 6311 6785 \fI\fImax print jobs\fR\fR\fI = \fR\fI5000\fR\fI \fR 6312 .RE6313 6314 protocol6315 .\" protocol6316 .PP6317 .RS 46318 This parameter is a synonym for6319 max protocol\&.6320 .RE6321 6322 max protocol (G)6323 .\" max protocol6324 .PP6325 .RS 46326 The value of the parameter (a string) is the highest protocol level that will be supported by the server\&.6327 .sp6328 Possible values are :6329 .sp6330 .RS 46331 .ie n \{\6332 \h'-04'\(bu\h'+03'\c6333 .\}6334 .el \{\6335 .sp -16336 .IP \(bu 2.36337 .\}6338 \fBCORE\fR: Earliest version\&. No concept of user names\&.6339 .RE6340 .sp6341 .RS 46342 .ie n \{\6343 \h'-04'\(bu\h'+03'\c6344 .\}6345 .el \{\6346 .sp -16347 .IP \(bu 2.36348 .\}6349 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency\&.6350 .RE6351 .sp6352 .RS 46353 .ie n \{\6354 \h'-04'\(bu\h'+03'\c6355 .\}6356 .el \{\6357 .sp -16358 .IP \(bu 2.36359 .\}6360 \fBLANMAN1\fR: First6361 \fI modern\fR6362 version of the protocol\&. Long filename support\&.6363 .RE6364 .sp6365 .RS 46366 .ie n \{\6367 \h'-04'\(bu\h'+03'\c6368 .\}6369 .el \{\6370 .sp -16371 .IP \(bu 2.36372 .\}6373 \fBLANMAN2\fR: Updates to Lanman1 protocol\&.6374 .RE6375 .sp6376 .RS 46377 .ie n \{\6378 \h'-04'\(bu\h'+03'\c6379 .\}6380 .el \{\6381 .sp -16382 .IP \(bu 2.36383 .\}6384 \fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&.6385 .RE6386 .sp6387 .RS 46388 .ie n \{\6389 \h'-04'\(bu\h'+03'\c6390 .\}6391 .el \{\6392 .sp -16393 .IP \(bu 2.36394 .\}6395 \fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and newer\&.6396 .RE6397 .sp6398 .RE6399 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.6400 .sp6401 Default:6402 \fI\fImax protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR6403 .sp6404 Example:6405 \fI\fImax protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR6406 6786 .RE 6407 6787 … … 6608 6988 .RE 6609 6989 6610 min protocol (G)6611 .\" min protocol6612 .PP6613 .RS 46614 The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support\&. Please refer to the6615 \m[blue]\fBmax protocol\fR\m[]6616 parameter for a list of valid protocol names and a brief description of each\&. You may also wish to refer to the C source code in6617 source/smbd/negprot\&.c6618 for a listing of known protocol dialects supported by clients\&.6619 .sp6620 If you are viewing this parameter as a security measure, you should also refer to the6621 \m[blue]\fBlanman auth\fR\m[]6622 parameter\&. Otherwise, you should never need to change this parameter\&.6623 .sp6624 Default:6625 \fI\fImin protocol\fR\fR\fI = \fR\fICORE\fR\fI \fR6626 .sp6627 Example:6628 \fI\fImin protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR6629 .RE6630 6631 6990 min receivefile size (G) 6632 6991 .\" min receivefile size … … 6639 6998 Note this option will have NO EFFECT if set on a SMB signed connection\&. 6640 6999 .sp 6641 The default is zero, which di ables this option\&.7000 The default is zero, which disables this option\&. 6642 7001 .sp 6643 7002 Default: … … 6663 7022 .PP 6664 7023 .RS 4 6665 This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\&. When clients attempt to connect to this share, they are redirected to the proxied shareusing the SMB\-Dfs protocol\&.7024 This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\&. When clients attempt to connect to this share, they are redirected to one or multiple, comma separated proxied shares using the SMB\-Dfs protocol\&. 6666 7025 .sp 6667 7026 Only Dfs roots can act as proxy shares\&. Take a look at the … … 6674 7033 .sp 6675 7034 Example: 6676 \fI\fImsdfs proxy\fR\fR\fI = \fR\fI\eotherserver\esomeshare \fR\fI \fR7035 \fI\fImsdfs proxy\fR\fR\fI = \fR\fI\eotherserver\esomeshare,\eotherserver2\esomeshare\fR\fI \fR 6677 7036 .RE 6678 7037 … … 6690 7049 .RE 6691 7050 7051 msdfs shuffle referrals (S) 7052 .\" msdfs shuffle referrals 7053 .PP 7054 .RS 4 7055 If set to 7056 \fByes\fR, Samba will shuffle Dfs referrals for a given Dfs link if multiple are available, allowing for load balancing across clients\&. For more information on setting up a Dfs tree on Samba, refer to the MSDFS chapter in the Samba3\-HOWTO book\&. 7057 .sp 7058 Default: 7059 \fI\fImsdfs shuffle referrals\fR\fR\fI = \fR\fIno\fR\fI \fR 7060 .RE 7061 6692 7062 multicast dns register (G) 6693 7063 .\" multicast dns register … … 6731 7101 .IP \(bu 2.3 6732 7102 .\} 6733 6734 7103 \fBlmhosts\fR 6735 7104 : Lookup an IP address in the Samba lmhosts file\&. If the line in lmhosts has no name type attached to the NetBIOS name (see the manpage for lmhosts for details) then any name type matches for lookup\&. … … 6744 7113 .IP \(bu 2.3 6745 7114 .\} 6746 6747 7115 \fBhost\fR 6748 7116 : Do a standard host name to IP address resolution, using the system … … 6797 7165 .RE 6798 7166 7167 socket address 7168 .\" socket address 7169 .PP 7170 .RS 4 7171 This parameter is a synonym for 7172 nbt client socket address\&. 7173 .RE 7174 7175 nbt client socket address (G) 7176 .\" nbt client socket address 7177 .PP 7178 .RS 4 7179 This option allows you to control what address Samba will send NBT client packets from, and process replies using, including in nmbd\&. 7180 .sp 7181 Setting this option should never be necessary on usual Samba servers running only one nmbd\&. 7182 .sp 7183 By default Samba will send UDP packets from the OS default address for the destination, and accept replies on 0\&.0\&.0\&.0\&. 7184 .sp 7185 This parameter is deprecated\&. See 7186 \m[blue]\fBbind interfaces only = Yes\fR\m[] 7187 and 7188 \m[blue]\fBinterfaces\fR\m[] 7189 for the previous behaviour of controlling the normal listening sockets\&. 7190 .sp 7191 Default: 7192 \fI\fInbt client socket address\fR\fR\fI = \fR\fI0\&.0\&.0\&.0\fR\fI \fR 7193 .sp 7194 Example: 7195 \fI\fInbt client socket address\fR\fR\fI = \fR\fI192\&.168\&.2\&.20\fR\fI \fR 7196 .RE 7197 7198 nbt port (G) 7199 .\" nbt port 7200 .PP 7201 .RS 4 7202 Specifies which port the server should use for NetBIOS over IP name services traffic\&. 7203 .sp 7204 Default: 7205 \fI\fInbt port\fR\fR\fI = \fR\fI137\fR\fI \fR 7206 .RE 7207 6799 7208 ncalrpc dir (G) 6800 7209 .\" ncalrpc dir … … 6803 7212 This directory will hold a series of named pipes to allow RPC over inter\-process communication\&. 6804 7213 .sp 6805 \&. 6806 This will allow Samba and other unix processes to interact over DCE/RPC without using TCP/IP\&. Additionally a sub\-directory \*(Aqnp\*(Aq has restricted permissions, and allows a trusted communication channel between Samba processes 6807 .sp 6808 Default: 6809 \fI\fIncalrpc dir\fR\fR\fI = \fR\fI${prefix}/var/ncalrpc\fR\fI \fR 7214 This will allow Samba and other unix processes to interact over DCE/RPC without using TCP/IP\&. Additionally a sub\-directory \*(Aqnp\*(Aq has restricted permissions, and allows a trusted communication channel between Samba processes 7215 .sp 7216 Default: 7217 \fI\fIncalrpc dir\fR\fR\fI = \fR\fI${prefix}/var/run/ncalrpc\fR\fI \fR 6810 7218 .sp 6811 7219 Example: … … 6832 7240 This sets the NetBIOS name by which a Samba server is known\&. By default it is the same as the first component of the host\*(Aqs DNS name\&. If a machine is a browse server or logon server this name (or the first component of the hosts DNS name) will be the name that these services are advertised under\&. 6833 7241 .sp 6834 There is a bug in Samba\-3 that breaks operation of browsing and access to shares if the netbios name is set to the literal name 6835 PIPE\&. To avoid this problem, do not name your Samba\-3 server 7242 Note that the maximum length for a NetBIOS name is 15 charactars\&. 7243 .sp 7244 There is a bug in Samba that breaks operation of browsing and access to shares if the netbios name is set to the literal name 7245 PIPE\&. To avoid this problem, do not name your Samba server 6836 7246 PIPE\&. 6837 7247 .sp … … 6853 7263 .RE 6854 7264 6855 nis homedir (G) 6856 .\" nis homedir 7265 neutralize nt4 emulation (G) 7266 .\" neutralize nt4 emulation 7267 .PP 7268 .RS 4 7269 This option controls whether winbindd sends the NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION flag in order to bypass the NT4 emulation of a domain controller\&. 7270 .sp 7271 Typically you should not need set this\&. It can be useful for upgrades from NT4 to AD domains\&. 7272 .sp 7273 The behavior can be controlled per netbios domain by using \*(Aqneutralize nt4 emulation:NETBIOSDOMAIN = yes\*(Aq as option\&. 7274 .sp 7275 Default: 7276 \fI\fIneutralize nt4 emulation\fR\fR\fI = \fR\fIno\fR\fI \fR 7277 .RE 7278 7279 NIS homedir (G) 7280 .\" NIS homedir 6857 7281 .PP 6858 7282 .RS 4 … … 6868 7292 .sp 6869 7293 Default: 6870 \fI\fI nishomedir\fR\fR\fI = \fR\fIno\fR\fI \fR7294 \fI\fINIS homedir\fR\fR\fI = \fR\fIno\fR\fI \fR 6871 7295 .RE 6872 7296 … … 6885 7309 .RE 6886 7310 7311 nsupdate command (G) 7312 .\" nsupdate command 7313 .PP 7314 .RS 4 7315 This option sets the path to the 7316 nsupdate 7317 command which is used for GSS\-TSIG dynamic DNS updates\&. 7318 .sp 7319 Default: 7320 \fI\fInsupdate command\fR\fR\fI = \fR\fI/usr/bin/nsupdate \-g\fR\fI \fR 7321 .RE 7322 6887 7323 nt acl support (S) 6888 7324 .\" nt acl support … … 6891 7327 This boolean parameter controls whether 6892 7328 \fBsmbd\fR(8) 6893 will attempt to map UNIX permissions into Windows NT access control lists\&. The UNIX permissions considered are the t he traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\&. This parameter was formally a global parameter in releases prior to 2\&.2\&.2\&.7329 will attempt to map UNIX permissions into Windows NT access control lists\&. The UNIX permissions considered are the traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\&. This parameter was formally a global parameter in releases prior to 2\&.2\&.2\&. 6894 7330 .sp 6895 7331 Default: … … 6927 7363 .RE 6928 7364 7365 ntp signd socket directory (G) 7366 .\" ntp signd socket directory 7367 .PP 7368 .RS 4 7369 This setting controls the location of the socket that the NTP daemon uses to communicate with Samba for signing packets\&. 7370 .sp 7371 If a non\-default path is specified here, then it is also necessary to make NTP aware of the new path using the 7372 \fBntpsigndsocket\fR 7373 directive in 7374 ntp\&.conf\&. 7375 .sp 7376 Default: 7377 \fI\fIntp signd socket directory\fR\fR\fI = \fR\fI${prefix}/var/lib/ntp_signd\fR\fI \fR 7378 .RE 7379 6929 7380 nt status support (G) 6930 7381 .\" nt status support … … 6943 7394 .RE 6944 7395 7396 ntvfs handler (S) 7397 .\" ntvfs handler 7398 .PP 7399 .RS 4 7400 This specifies the NTVFS handlers for this share\&. 7401 .sp 7402 .RS 4 7403 .ie n \{\ 7404 \h'-04'\(bu\h'+03'\c 7405 .\} 7406 .el \{\ 7407 .sp -1 7408 .IP \(bu 2.3 7409 .\} 7410 posix: Maps POSIX FS semantics to NT semantics 7411 .RE 7412 .sp 7413 .RS 4 7414 .ie n \{\ 7415 \h'-04'\(bu\h'+03'\c 7416 .\} 7417 .el \{\ 7418 .sp -1 7419 .IP \(bu 2.3 7420 .\} 7421 unixuid: Sets up user credentials based on POSIX gid/uid\&. 7422 .RE 7423 .sp 7424 .RS 4 7425 .ie n \{\ 7426 \h'-04'\(bu\h'+03'\c 7427 .\} 7428 .el \{\ 7429 .sp -1 7430 .IP \(bu 2.3 7431 .\} 7432 cifs: Proxies a remote CIFS FS\&. Mainly useful for testing\&. 7433 .RE 7434 .sp 7435 .RS 4 7436 .ie n \{\ 7437 \h'-04'\(bu\h'+03'\c 7438 .\} 7439 .el \{\ 7440 .sp -1 7441 .IP \(bu 2.3 7442 .\} 7443 nbench: Filter module that saves data useful to the nbench benchmark suite\&. 7444 .RE 7445 .sp 7446 .RS 4 7447 .ie n \{\ 7448 \h'-04'\(bu\h'+03'\c 7449 .\} 7450 .el \{\ 7451 .sp -1 7452 .IP \(bu 2.3 7453 .\} 7454 ipc: Allows using SMB for inter process communication\&. Only used for the IPC$ share\&. 7455 .RE 7456 .sp 7457 .RS 4 7458 .ie n \{\ 7459 \h'-04'\(bu\h'+03'\c 7460 .\} 7461 .el \{\ 7462 .sp -1 7463 .IP \(bu 2.3 7464 .\} 7465 posix: Maps POSIX FS semantics to NT semantics 7466 .RE 7467 .sp 7468 .RS 4 7469 .ie n \{\ 7470 \h'-04'\(bu\h'+03'\c 7471 .\} 7472 .el \{\ 7473 .sp -1 7474 .IP \(bu 2.3 7475 .\} 7476 print: Allows printing over SMB\&. This is LANMAN\-style printing, not the be confused with the spoolss DCE/RPC interface used by later versions of Windows\&. 7477 .RE 7478 .sp 7479 .RE 7480 Note that this option is only used when the NTVFS file server is in use\&. It is not used with the (default) s3fs file server\&. 7481 .sp 7482 Default: 7483 \fI\fIntvfs handler\fR\fR\fI = \fR\fIunixuid, default\fR\fI \fR 7484 .RE 7485 6945 7486 null passwords (G) 6946 7487 .\" null passwords … … 6967 7508 .RE 6968 7509 7510 old password allowed period (G) 7511 .\" old password allowed period 7512 .PP 7513 .RS 4 7514 Number of minutes to permit an NTLM login after a password change or reset using the old password\&. This allows the user to re\-cache the new password on multiple clients without disrupting a network reconnection in the meantime\&. 7515 .sp 7516 This parameter only applies when 7517 \m[blue]\fBserver role\fR\m[] 7518 is set to Active Directory Domain Controller 7519 .sp 7520 Default: 7521 \fI\fIold password allowed period\fR\fR\fI = \fR\fI60\fR\fI \fR 7522 .RE 7523 6969 7524 only user (S) 6970 7525 .\" only user 6971 7526 .PP 6972 7527 .RS 4 6973 This is a boolean option that controls whether connections with usernames not in the 6974 \fIuser\fR 6975 list will be allowed\&. By default this option is disabled so that a client can supply a username to be used by the server\&. Enabling this parameter will force the server to only use the login names from the 6976 \fIuser\fR 6977 list and is only really useful in 6978 \m[blue]\fBsecurity = share\fR\m[] 6979 level security\&. 6980 .sp 6981 Note that this also means Samba won\*(Aqt try to deduce usernames from the service name\&. This can be annoying for the [homes] section\&. To get around this you could use 6982 user = %S 6983 which means your 6984 \fIuser\fR 6985 list will be just the service name, which for home directories is the name of the user\&. 7528 To restrict a service to a particular set of users you can use the 7529 \m[blue]\fBvalid users\fR\m[] 7530 parameter\&. 7531 .sp 7532 This parameter is deprecated 7533 .sp 7534 However, it currently operates only in conjunction with 7535 \m[blue]\fBusername\fR\m[]\&. The supported way to restrict a service to a particular set of users is the 7536 \m[blue]\fBvalid users\fR\m[] 7537 parameter\&. 6986 7538 .sp 6987 7539 Default: … … 7133 7685 .RE 7134 7686 7135 paranoid server security (G)7136 .\" paranoid server security7137 .PP7138 .RS 47139 Some version of NT 4\&.x allow non\-guest users with a bad passowrd\&. When this option is enabled, samba will not use a broken NT 4\&.x server as password server, but instead complain to the logs and exit\&.7140 .sp7141 Disabling this option prevents Samba from making this check, which involves deliberatly attempting a bad logon to the remote server\&.7142 .sp7143 Default:7144 \fI\fIparanoid server security\fR\fR\fI = \fR\fIyes\fR\fI \fR7145 .RE7146 7147 7687 passdb backend (G) 7148 7688 .\" passdb backend … … 7235 7775 Default: 7236 7776 \fI\fIpassdb expand explicit\fR\fR\fI = \fR\fIno\fR\fI \fR 7777 .RE 7778 7779 passwd chat (G) 7780 .\" passwd chat 7781 .PP 7782 .RS 4 7783 This string controls the 7784 \fI"chat"\fR 7785 conversation that takes places between 7786 \fBsmbd\fR(8) 7787 and the local password changing program to change the user\*(Aqs password\&. The string describes a sequence of response\-receive pairs that 7788 \fBsmbd\fR(8) 7789 uses to determine what to send to the 7790 \m[blue]\fBpasswd program\fR\m[] 7791 and what to expect back\&. If the expected output is not received then the password is not changed\&. 7792 .sp 7793 This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\&. 7794 .sp 7795 Note that this parameter only is used if the 7796 \m[blue]\fBunix password sync\fR\m[] 7797 parameter is set to 7798 \fByes\fR\&. This sequence is then called 7799 \fIAS ROOT\fR 7800 when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\&. This means that root must be able to reset the user\*(Aqs password without knowing the text of the previous password\&. In the presence of NIS/YP, this means that the 7801 \m[blue]\fBpasswd program\fR\m[] 7802 must be executed on the NIS master\&. 7803 .sp 7804 The string can contain the macro 7805 \fI%n\fR 7806 which is substituted for the new password\&. The old passsword (\fI%o\fR) is only available when 7807 \m[blue]\fBencrypt passwords\fR\m[] 7808 has been disabled\&. The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\&. The chat sequence string can also contain a \*(Aq*\*(Aq which matches any sequence of characters\&. Double quotes can be used to collect strings with spaces in them into a single string\&. 7809 .sp 7810 If the send string in any part of the chat sequence is a full stop "\&.", then no string is sent\&. Similarly, if the expect string is a full stop then no string is expected\&. 7811 .sp 7812 If the 7813 \m[blue]\fBpam password change\fR\m[] 7814 parameter is set to 7815 \fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\&. The \en macro is ignored for PAM conversions\&. 7816 .sp 7817 Default: 7818 \fI\fIpasswd chat\fR\fR\fI = \fR\fI*new*password* %n\en *new*password* %n\en *changed*\fR\fI \fR 7819 .sp 7820 Example: 7821 \fI\fIpasswd chat\fR\fR\fI = \fR\fI"*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\fR\fI \fR 7237 7822 .RE 7238 7823 … … 7271 7856 .RE 7272 7857 7273 passwd chat (G)7274 .\" passwd chat7275 .PP7276 .RS 47277 This string controls the7278 \fI"chat"\fR7279 conversation that takes places between7280 \fBsmbd\fR(8)7281 and the local password changing program to change the user\*(Aqs password\&. The string describes a sequence of response\-receive pairs that7282 \fBsmbd\fR(8)7283 uses to determine what to send to the7284 \m[blue]\fBpasswd program\fR\m[]7285 and what to expect back\&. If the expected output is not received then the password is not changed\&.7286 .sp7287 This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\&.7288 .sp7289 Note that this parameter only is used if the7290 \m[blue]\fBunix password sync\fR\m[]7291 parameter is set to7292 \fByes\fR\&. This sequence is then called7293 \fIAS ROOT\fR7294 when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\&. This means that root must be able to reset the user\*(Aqs password without knowing the text of the previous password\&. In the presence of NIS/YP, this means that the7295 \m[blue]\fBpasswd program\fR\m[]7296 must be executed on the NIS master\&.7297 .sp7298 The string can contain the macro7299 \fI%n\fR7300 which is substituted for the new password\&. The old passsword (\fI%o\fR) is only available when7301 \m[blue]\fBencrypt passwords\fR\m[]7302 has been disabled\&. The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\&. The chat sequence string can also contain a \*(Aq*\*(Aq which matches any sequence of characters\&. Double quotes can be used to collect strings with spaces in them into a single string\&.7303 .sp7304 If the send string in any part of the chat sequence is a full stop "\&.", then no string is sent\&. Similarly, if the expect string is a full stop then no string is expected\&.7305 .sp7306 If the7307 \m[blue]\fBpam password change\fR\m[]7308 parameter is set to7309 \fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\&. The \en macro is ignored for PAM conversions\&.7310 .sp7311 Default:7312 \fI\fIpasswd chat\fR\fR\fI = \fR\fI*new*password* %n\en*new*password* %n\en *changed*\fR\fI \fR7313 .sp7314 Example:7315 \fI\fIpasswd chat\fR\fR\fI = \fR\fI"*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\fR\fI \fR7316 .RE7317 7318 7858 passwd program (G) 7319 7859 .\" passwd program … … 7357 7897 .RE 7358 7898 7359 password level (G)7360 .\" password level7361 .PP7362 .RS 47363 Some client/server combinations have difficulty with mixed\-case passwords\&. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! Another problem child is the Windows 95/98 family of operating systems\&. These clients upper case clear text passwords even when NT LM 0\&.12 selected by the protocol negotiation request/response\&.7364 .sp7365 This deprecated parameter defines the maximum number of characters that may be upper case in passwords\&.7366 .sp7367 For example, say the password given was "FRED"\&. If7368 \fI password level\fR7369 is set to 1, the following combinations would be tried if "FRED" failed:7370 .sp7371 "Fred", "fred", "fRed", "frEd","freD"7372 .sp7373 If7374 \fIpassword level\fR7375 was set to 2, the following combinations would also be tried:7376 .sp7377 "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", \&.\&.7378 .sp7379 And so on\&.7380 .sp7381 The higher value this parameter is set to the more likely it is that a mixed case password will be matched against a single case password\&. However, you should be aware that use of this parameter reduces security and increases the time taken to process a new connection\&.7382 .sp7383 A value of zero will cause only two attempts to be made \- the password as is and the password in all\-lower case\&.7384 .sp7385 This parameter is used only when using plain\-text passwords\&. It is not at all used when encrypted passwords as in use (that is the default since samba\-3\&.0\&.0)\&. Use this only when7386 \m[blue]\fBencrypt passwords = No\fR\m[]\&.7387 .sp7388 Default:7389 \fI\fIpassword level\fR\fR\fI = \fR\fI0\fR\fI \fR7390 .sp7391 Example:7392 \fI\fIpassword level\fR\fR\fI = \fR\fI4\fR\fI \fR7393 .RE7394 7395 7899 password server (G) 7396 7900 .\" password server 7397 7901 .PP 7398 7902 .RS 4 7399 By specifying the name of a nother SMB server or Active Directorydomain controller with this option, and using7400 security = [ads|domain |server]7903 By specifying the name of a domain controller with this option, and using 7904 security = [ads|domain] 7401 7905 it is possible to get Samba to do all its username/password validation using a specific remote server\&. 7402 7906 .sp 7403 If the 7404 \fIsecurity\fR 7405 parameter is set to 7406 \fBdomain\fR 7407 or 7408 \fBads\fR, then this option 7907 Ideally, this option 7409 7908 \fIshould not\fR 7410 be used, as the default \*(Aq*\*(Aq indicates to Samba to determine the best DC to contact dynamically, just as all other hosts in an AD domain do\&. This allows the domain to be maintained without modification to the smb\&.conf file\&. The cryptograpic protection on the authenticated RPC calls used to verify passwords ensures that this default is safe\&.7909 be used, as the default \*(Aq*\*(Aq indicates to Samba to determine the best DC to contact dynamically, just as all other hosts in an AD domain do\&. This allows the domain to be maintained (addition and removal of domain controllers) without modification to the smb\&.conf file\&. The cryptographic protection on the authenticated RPC calls used to verify passwords ensures that this default is safe\&. 7411 7910 .sp 7412 7911 \fIIt is strongly recommended that you use the default of \*(Aq*\*(Aq\fR, however if in your particular environment you have reason to specify a particular DC list, then the list of machines in this option must be a list of names or IP addresses of Domain controllers for the Domain\&. If you use the default of \*(Aq*\*(Aq, or list several hosts in the … … 7422 7921 and so may resolved by any method and order described in that parameter\&. 7423 7922 .sp 7424 If the7425 \fIsecurity\fR7426 parameter is set to7427 \fBserver\fR, these additional restrictions apply:7428 .sp7429 .RS 47430 .ie n \{\7431 \h'-04'\(bu\h'+03'\c7432 .\}7433 .el \{\7434 .sp -17435 .IP \(bu 2.37436 .\}7437 You may list several password servers in the7438 \fIpassword server\fR7439 parameter, however if an7440 smbd7441 makes a connection to a password server, and then the password server fails, no more users will be able to be authenticated from this7442 smbd\&. This is a restriction of the SMB/CIFS protocol when in7443 security = server7444 mode and cannot be fixed in Samba\&.7445 .RE7446 .sp7447 .RS 47448 .ie n \{\7449 \h'-04'\(bu\h'+03'\c7450 .\}7451 .el \{\7452 .sp -17453 .IP \(bu 2.37454 .\}7455 You will have to ensure that your users are able to login from the Samba server, as when in7456 security = server7457 mode the network logon will appear to come from the Samba server rather than from the users workstation\&.7458 .RE7459 .sp7460 .RS 47461 .ie n \{\7462 \h'-04'\(bu\h'+03'\c7463 .\}7464 .el \{\7465 .sp -17466 .IP \(bu 2.37467 .\}7468 The client must not select NTLMv2 authentication\&.7469 .RE7470 .sp7471 .RS 47472 .ie n \{\7473 \h'-04'\(bu\h'+03'\c7474 .\}7475 .el \{\7476 .sp -17477 .IP \(bu 2.37478 .\}7479 The password server must be a machine capable of using the "LM1\&.2X002" or the "NT LM 0\&.12" protocol, and it must be in user level security mode\&.7480 .RE7481 .sp7482 .RS 47483 .ie n \{\7484 \h'-04'\(bu\h'+03'\c7485 .\}7486 .el \{\7487 .sp -17488 .IP \(bu 2.37489 .\}7490 Using a password server means your UNIX box (running Samba) is only as secure as (a host masqurading as) your password server\&.7491 \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\*(AqT COMPLETELY TRUST\fR\&.7492 .RE7493 .sp7494 .RS 47495 .ie n \{\7496 \h'-04'\(bu\h'+03'\c7497 .\}7498 .el \{\7499 .sp -17500 .IP \(bu 2.37501 .\}7502 Never point a Samba server at itself for password serving\&. This will cause a loop and could lock up your Samba server!7503 .RE7504 .sp7505 .RS 47506 .ie n \{\7507 \h'-04'\(bu\h'+03'\c7508 .\}7509 .el \{\7510 .sp -17511 .IP \(bu 2.37512 .\}7513 The name of the password server takes the standard substitutions, but probably the only useful one is7514 \fI%m \fR, which means the Samba server will use the incoming client as the password server\&. If you use this then you better trust your clients, and you had better restrict them with hosts allow!7515 .RE7516 .sp7517 .RE7518 7923 Default: 7519 7924 \fI\fIpassword server\fR\fR\fI = \fR\fI*\fR\fI \fR … … 7575 7980 .sp 7576 7981 Default: 7577 \fI\fIpid directory\fR\fR\fI = \fR\fI${prefix}/var/ locks\fR\fI \fR7578 .sp 7579 Example: 7580 \fI\fIpid directory\fR\fR\fI = \fR\fI pid directory =/var/run/\fR\fI \fR7982 \fI\fIpid directory\fR\fR\fI = \fR\fI${prefix}/var/run\fR\fI \fR 7983 .sp 7984 Example: 7985 \fI\fIpid directory\fR\fR\fI = \fR\fI/var/run/\fR\fI \fR 7581 7986 .RE 7582 7987 … … 7610 8015 .RE 7611 8016 7612 preexec close (S)7613 .\" preexec close7614 .PP7615 .RS 47616 This boolean option controls whether a non\-zero return code from7617 \m[blue]\fBpreexec\fR\m[]7618 should close the service being connected to\&.7619 .sp7620 Default:7621 \fI\fIpreexec close\fR\fR\fI = \fR\fIno\fR\fI \fR7622 .RE7623 7624 8017 exec 7625 8018 .\" exec … … 7638 8031 An interesting example is to send the users a welcome message every time they log in\&. Maybe a message of the day? Here is an example: 7639 8032 .sp 7640 7641 8033 preexec = csh \-c \*(Aqecho \e"Welcome to %S!\e" | /usr/local/samba/bin/smbclient \-M %m \-I %I\*(Aq & 7642 8034 .sp … … 7653 8045 Example: 7654 8046 \fI\fIpreexec\fR\fR\fI = \fR\fIecho \e"%u connected to %S from %m (%I)\e" >> /tmp/log\fR\fI \fR 8047 .RE 8048 8049 preexec close (S) 8050 .\" preexec close 8051 .PP 8052 .RS 4 8053 This boolean option controls whether a non\-zero return code from 8054 \m[blue]\fBpreexec\fR\m[] 8055 should close the service being connected to\&. 8056 .sp 8057 Default: 8058 \fI\fIpreexec close\fR\fR\fI = \fR\fIno\fR\fI \fR 7655 8059 .RE 7656 8060 … … 7698 8102 .RE 7699 8103 7700 auto services7701 .\" auto services7702 .PP7703 .RS 47704 This parameter is a synonym for7705 preload\&.7706 .RE7707 7708 preload (G)7709 .\" preload7710 .PP7711 .RS 47712 This is a list of services that you want to be automatically added to the browse lists\&. This is most useful for homes and printers services that would otherwise not be visible\&.7713 .sp7714 Note that if you just want all printers in your printcap file loaded then the7715 \m[blue]\fBload printers\fR\m[]7716 option is easier\&.7717 .sp7718 Default:7719 \fI\fIpreload\fR\fR\fI = \fR\fI\fR\fI \fR7720 .sp7721 Example:7722 \fI\fIpreload\fR\fR\fI = \fR\fIfred lp colorlp\fR\fI \fR7723 .RE7724 7725 8104 preserve case (S) 7726 8105 .\" preserve case … … 7794 8173 .sp 7795 8174 To use the CUPS printing interface set 7796 printcap name = cups\&. This should be supplemented by an add tional setting8175 printcap name = cups\&. This should be supplemented by an additional setting 7797 8176 \m[blue]\fBprinting = cups\fR\m[] 7798 8177 in the [global] section\&. … … 7933 8312 .RE 7934 8313 7935 printer admin (S)7936 .\" printer admin7937 .PP7938 .RS 47939 This lists users who can do anything to printers via the remote administration interfaces offered by MS\-RPC (usually using a NT workstation)\&. This parameter can be set per\-share or globally\&. Note: The root user always has admin rights\&. Use caution with use in the global stanza as this can cause side effects\&.7940 .sp7941 This parameter has been marked deprecated in favor of using the SePrintOperatorPrivilege and individual print security descriptors\&. It will be removed in a future release\&.7942 .sp7943 Default:7944 \fI\fIprinter admin\fR\fR\fI = \fR\fI\fR\fI \fR7945 .sp7946 Example:7947 \fI\fIprinter admin\fR\fR\fI = \fR\fIadmin, @staff\fR\fI \fR7948 .RE7949 7950 8314 printer 7951 8315 .\" printer … … 7971 8335 .sp 7972 8336 Default: 7973 \fI\fIprinter name\fR\fR\fI = \fR\fI none\fR\fI \fR8337 \fI\fIprinter name\fR\fR\fI = \fR\fI\fR\fI \fR 7974 8338 .sp 7975 8339 Example: … … 7997 8361 \fBHPUX\fR, 7998 8362 \fBQNX\fR, 7999 \fBSOFTQ\fR, and 8000 \fBCUPS\fR\&. 8363 \fBSOFTQ\fR, 8364 \fBCUPS\fR 8365 and 8366 \fBIPRINT\fR\&. 8367 .sp 8368 Be aware that CUPS and IPRINT are only available if the CUPS development library was available at the time Samba was compiled or packaged\&. 8001 8369 .sp 8002 8370 To see what the defaults are for the other print commands when using the various options use the … … 8012 8380 section\&. 8013 8381 .sp 8014 Default: 8015 \fI\fIprinting\fR\fR\fI = \fR\fIDepends on the operating system, see testparm \-v\&.\fR\fI \fR 8382 See 8383 testparm \-v\&. 8384 for the default value on your system 8385 .sp 8386 Default: 8387 \fI\fIprinting\fR\fR\fI = \fR\fI # Depends on the operating system\fR\fI \fR 8016 8388 .RE 8017 8389 … … 8033 8405 .PP 8034 8406 .RS 4 8035 Windows print clients can update print queue status by expecting the server to open a backchannel SMB connection to them\&. Due to client firewall settings this can cause considerable timeouts and will often fail, as there is no guarantee the client is even running an SMB server\&. By setting this parameter to 8036 \fBno\fR 8037 the Samba print server will not try to connect back to clients and treat corresponding requests as if the connection back to the client failed\&. The default setting of 8038 \fByes\fR 8039 causes smbd to attempt this connection\&. 8040 .sp 8041 Default: 8042 \fI\fIprint notify backchannel\fR\fR\fI = \fR\fIyes\fR\fI \fR 8407 Windows print clients can update print queue status by expecting the server to open a backchannel SMB connection to them\&. Due to client firewall settings this can cause considerable timeouts and will often fail, as there is no guarantee the client is even running an SMB server\&. By default, the Samba print server will not try to connect back to clients, and will treat corresponding requests as if the connection back to the client failed\&. 8408 .sp 8409 Default: 8410 \fI\fIprint notify backchannel\fR\fR\fI = \fR\fIno\fR\fI \fR 8411 .RE 8412 8413 private directory 8414 .\" private directory 8415 .PP 8416 .RS 4 8417 This parameter is a synonym for 8418 private dir\&. 8043 8419 .RE 8044 8420 … … 8088 8464 Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\&. 8089 8465 .sp 8090 \fINo default\fR 8466 Default: 8467 \fI\fIqueuepause command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 8091 8468 .sp 8092 8469 Example: … … 8111 8488 .sp 8112 8489 Default: 8113 \fI\fIqueueresume command\fR\fR\fI = \fR\fI \fR\fI \fR8490 \fI\fIqueueresume command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR 8114 8491 .sp 8115 8492 Example: 8116 8493 \fI\fIqueueresume command\fR\fR\fI = \fR\fIenable %p\fR\fI \fR 8494 .RE 8495 8496 raw NTLMv2 auth (G) 8497 .\" raw NTLMv2 auth 8498 .PP 8499 .RS 4 8500 This parameter determines whether or not 8501 \fBsmbd\fR(8) 8502 will allow SMB1 clients without extended security (without SPNEGO) to use NTLMv2 authentication\&. 8503 .sp 8504 If this option, 8505 lanman auth 8506 and 8507 ntlm auth 8508 are all disabled, then only clients with SPNEGO support will be permitted\&. That means NTLMv2 is only supported within NTLMSSP\&. 8509 .sp 8510 Default: 8511 \fI\fIraw NTLMv2 auth\fR\fR\fI = \fR\fIno\fR\fI \fR 8117 8512 .RE 8118 8513 … … 8127 8522 parameter\&. 8128 8523 .sp 8129 This parameter will not work with the8130 \m[blue]\fBsecurity = share\fR\m[]8131 in Samba 3\&.0\&. This is by design\&.8132 .sp8133 8524 Default: 8134 8525 \fI\fIread list\fR\fR\fI = \fR\fI\fR\fI \fR … … 8160 8551 .PP 8161 8552 .RS 4 8162 This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients\&. 8163 .sp 8164 If enabled, raw reads allow reads of 65535 bytes in one packet\&. This typically provides a major performance benefit\&. 8553 This is ignored if 8554 \m[blue]\fBasync smb echo handler\fR\m[] 8555 is set, because this feature is incompatible with raw read SMB requests 8556 .sp 8557 If enabled, raw reads allow reads of 65535 bytes in one packet\&. This typically provides a major performance benefit for some very, very old clients\&. 8165 8558 .sp 8166 8559 However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw reads\&. … … 8207 8600 Example: 8208 8601 \fI\fIregistry shares\fR\fR\fI = \fR\fIyes\fR\fI \fR 8602 .RE 8603 8604 reject md5 clients (G) 8605 .\" reject md5 clients 8606 .PP 8607 .RS 4 8608 This option controls whether the netlogon server (currently only in \*(Aqactive directory domain controller\*(Aq mode), will reject clients which does not support NETLOGON_NEG_SUPPORTS_AES\&. 8609 .sp 8610 You can set this to yes if all domain members support aes\&. This will prevent downgrade attacks\&. 8611 .sp 8612 This option takes precedence to the \*(Aqallow nt4 crypto\*(Aq option\&. 8613 .sp 8614 Default: 8615 \fI\fIreject md5 clients\fR\fR\fI = \fR\fIno\fR\fI \fR 8616 .RE 8617 8618 reject md5 servers (G) 8619 .\" reject md5 servers 8620 .PP 8621 .RS 4 8622 This option controls whether winbindd requires support for aes support for the netlogon secure channel\&. 8623 .sp 8624 The following flags will be required NETLOGON_NEG_ARCFOUR, NETLOGON_NEG_SUPPORTS_AES, NETLOGON_NEG_PASSWORD_SET2 and NETLOGON_NEG_AUTHENTICATED_RPC\&. 8625 .sp 8626 You can set this to yes if all domain controllers support aes\&. This will prevent downgrade attacks\&. 8627 .sp 8628 The behavior can be controlled per netbios domain by using \*(Aqreject md5 servers:NETBIOSDOMAIN = yes\*(Aq as option\&. 8629 .sp 8630 This option takes precedence to the 8631 \m[blue]\fBrequire strong key\fR\m[] 8632 option\&. 8633 .sp 8634 Default: 8635 \fI\fIreject md5 servers\fR\fR\fI = \fR\fIno\fR\fI \fR 8209 8636 .RE 8210 8637 … … 8309 8736 .RE 8310 8737 Default: 8311 \fI\fIrename user script\fR\fR\fI = \fR\fIno\fR\fI \fR 8738 \fI\fIrename user script\fR\fR\fI = \fR\fI\fR\fI \fR 8739 .RE 8740 8741 require strong key (G) 8742 .\" require strong key 8743 .PP 8744 .RS 4 8745 This option controls whether winbindd requires support for md5 strong key support for the netlogon secure channel\&. 8746 .sp 8747 The following flags will be required NETLOGON_NEG_STRONG_KEYS, NETLOGON_NEG_ARCFOUR and NETLOGON_NEG_AUTHENTICATED_RPC\&. 8748 .sp 8749 You can set this to no if some domain controllers only support des\&. This might allows weak crypto to be negotiated, may via downgrade attacks\&. 8750 .sp 8751 The behavior can be controlled per netbios domain by using \*(Aqrequire strong key:NETBIOSDOMAIN = no\*(Aq as option\&. 8752 .sp 8753 Note for active directory domain this option is hardcoded to \*(Aqyes\*(Aq 8754 .sp 8755 This option yields precedence to the 8756 \m[blue]\fBreject md5 servers\fR\m[] 8757 option\&. 8758 .sp 8759 This option takes precedence to the 8760 \m[blue]\fBclient schannel\fR\m[] 8761 option\&. 8762 .sp 8763 Default: 8764 \fI\fIrequire strong key\fR\fR\fI = \fR\fIyes\fR\fI \fR 8312 8765 .RE 8313 8766 … … 8339 8792 .\} 8340 8793 .sp 8341 registry key in Windows 2000 and Windows NT\&. When set to 0, user and group list information is returned to anyone who asks\&. When set to 1, only an authenticated user can retri ve user and group list information\&. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\&. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\&.8794 registry key in Windows 2000 and Windows NT\&. When set to 0, user and group list information is returned to anyone who asks\&. When set to 1, only an authenticated user can retrieve user and group list information\&. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\&. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\&. 8342 8795 .sp 8343 8796 The security advantage of using restrict anonymous = 1 is dubious, as user and group list information can be obtained using other means\&. … … 8363 8816 .RE 8364 8817 8818 rndc command (G) 8819 .\" rndc command 8820 .PP 8821 .RS 4 8822 This option specifies the path to the name server control utility\&. 8823 .sp 8824 The 8825 rndc 8826 utility should be a part of the bind installation\&. 8827 .sp 8828 Default: 8829 \fI\fIrndc command\fR\fR\fI = \fR\fI/usr/sbin/rndc\fR\fI \fR 8830 .sp 8831 Example: 8832 \fI\fIrndc command\fR\fR\fI = \fR\fI/usr/local/bind9/sbin/rndc\fR\fI \fR 8833 .RE 8834 8365 8835 root 8366 8836 .\" root … … 8402 8872 .sp 8403 8873 Default: 8404 \fI\fIroot directory\fR\fR\fI = \fR\fI /\fR\fI \fR8874 \fI\fIroot directory\fR\fR\fI = \fR\fI\fR\fI \fR 8405 8875 .sp 8406 8876 Example: … … 8420 8890 .RE 8421 8891 8892 root preexec (S) 8893 .\" root preexec 8894 .PP 8895 .RS 4 8896 This is the same as the 8897 \fIpreexec\fR 8898 parameter except that the command is run as root\&. This is useful for mounting filesystems (such as CDROMs) when a connection is opened\&. 8899 .sp 8900 Default: 8901 \fI\fIroot preexec\fR\fR\fI = \fR\fI\fR\fI \fR 8902 .RE 8903 8422 8904 root preexec close (S) 8423 8905 .\" root preexec close … … 8432 8914 .RE 8433 8915 8434 root preexec (S) 8435 .\" root preexec 8436 .PP 8437 .RS 4 8438 This is the same as the 8439 \fIpreexec\fR 8440 parameter except that the command is run as root\&. This is useful for mounting filesystems (such as CDROMs) when a connection is opened\&. 8441 .sp 8442 Default: 8443 \fI\fIroot preexec\fR\fR\fI = \fR\fI\fR\fI \fR 8444 .RE 8445 8446 rpc_server (G) 8447 .\" rpc_server 8448 .PP 8449 .RS 4 8450 Defines what kind of rpc server to use for a named pipe\&. The rpc_server prefix must be followed by the pipe name, and a value\&. 8451 .sp 8452 Three possible values are currently supported: 8453 embedded 8454 daemon 8455 external 8456 .sp 8457 The classic method is to run every pipe as an internal function 8458 \fIembedded\fR 8459 in smbd\&. 8460 .sp 8461 An alternative method is to fork a 8462 \fIdaemon\fR 8463 early on at smbd startup time\&. This is supported only for selected pipes\&. 8464 .sp 8465 Choosing the 8466 \fIexternal\fR 8467 option allows to run a completely independent (3rd party) server capable of interfacing with samba via the MS\-RPC interface over named pipes\&. 8468 .sp 8469 Currently only the spoolss pipe can be configured in 8470 \fIdaemon\fR 8471 mode like this: 8916 rpc big endian (G) 8917 .\" rpc big endian 8918 .PP 8919 .RS 4 8920 Setting this option will force the RPC client and server to transfer data in big endian\&. 8921 .sp 8922 If it is disabled, data will be transferred in little endian\&. 8923 .sp 8924 The behaviour is independent of the endianness of the host machine\&. 8925 .sp 8926 Default: 8927 \fI\fIrpc big endian\fR\fR\fI = \fR\fIno\fR\fI \fR 8928 .RE 8929 8930 rpc_daemon:DAEMON (G) 8931 .\" rpc_daemon:DAEMON 8932 .PP 8933 .RS 4 8934 Defines whether to use the embedded code or start a separate daemon for the defined rpc services\&. The rpc_daemon prefix must be followed by the server name, and a value\&. 8935 .sp 8936 Two possible values are currently supported: 8472 8937 .sp 8473 8938 .if n \{\ … … 8475 8940 .\} 8476 8941 .nf 8477 rpc_server:spoolss = daemon 8942 disabled 8943 fork 8478 8944 8479 8945 .fi … … 8482 8948 .\} 8483 8949 .sp 8484 Default: 8485 \fI\fIrpc_server\fR\fR\fI = \fR\fInone\fR\fI \fR 8486 .RE 8487 8488 security mask (S) 8489 .\" security mask 8490 .PP 8491 .RS 4 8492 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\&. 8493 .sp 8494 This parameter is applied as a mask (AND\*(Aqed with) to the incoming permission bits, thus resetting any bits not in this mask\&. Make sure not to mix up this parameter with 8495 \m[blue]\fBforce security mode\fR\m[], which works in a manner similar to this one but uses a logical OR instead of an AND\&. 8496 .sp 8497 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\&. 8498 .sp 8499 If not set explicitly this parameter is 0777, allowing a user to set all the user/group/world permissions on a file\&. 8500 .sp 8501 \fI Note\fR 8502 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it set to 8503 \fB0777\fR\&. 8504 .sp 8505 Default: 8506 \fI\fIsecurity mask\fR\fR\fI = \fR\fI0777\fR\fI \fR 8507 .sp 8508 Example: 8509 \fI\fIsecurity mask\fR\fR\fI = \fR\fI0770\fR\fI \fR 8950 The classic method is to run rpc services as internal daemons embedded in smbd, therefore the external daemons are 8951 \fIdisabled\fR 8952 by default\&. 8953 .sp 8954 Choosing the 8955 \fIfork\fR 8956 option will cause samba to fork a separate process for each daemon configured this way\&. Each daemon may in turn fork a number of children used to handle requests from multiple smbds and direct tcp/ip connections (if the Endpoint Mapper is enabled)\&. Communication with smbd happens over named pipes and require that said pipes are forward to the external daemon (see 8957 \m[blue]\fBrpc_server\fR\m[])\&. 8958 .sp 8959 Forked RPC Daemons support dynamically forking children to handle connections\&. The heuristics about how many children to keep around and how fast to allow them to fork and also how many clients each child is allowed to handle concurrently is defined by parametrical options named after the daemon\&. Five options are currently supported: 8960 .sp 8961 .if n \{\ 8962 .RS 4 8963 .\} 8964 .nf 8965 prefork_min_children 8966 prefork_max_children 8967 prefork_spawn_rate 8968 prefork_max_allowed_clients 8969 prefork_child_min_life 8970 8971 .fi 8972 .if n \{\ 8973 .RE 8974 .\} 8975 .sp 8976 To set one of these options use the follwing syntax: 8977 .sp 8978 .if n \{\ 8979 .RS 4 8980 .\} 8981 .nf 8982 damonname:prefork_min_children = 5 8983 8984 .fi 8985 .if n \{\ 8986 .RE 8987 .\} 8988 .sp 8989 Samba includes separate daemons for spoolss, lsarpc/lsass, netlogon, samr, FSRVP and mdssvc(Spotlight)\&. Currently five daemons are available and they are called: 8990 .sp 8991 .if n \{\ 8992 .RS 4 8993 .\} 8994 .nf 8995 epmd 8996 lsasd 8997 spoolssd 8998 fssd 8999 mdssd 9000 9001 .fi 9002 .if n \{\ 9003 .RE 9004 .\} 9005 .sp 9006 Example: 9007 .sp 9008 .if n \{\ 9009 .RS 4 9010 .\} 9011 .nf 9012 rpc_daemon:spoolssd = fork 9013 9014 .fi 9015 .if n \{\ 9016 .RE 9017 .\} 9018 .sp 9019 Default: 9020 \fI\fIrpc_daemon:DAEMON\fR\fR\fI = \fR\fIdisabled\fR\fI \fR 9021 .RE 9022 9023 rpc_server:SERVER (G) 9024 .\" rpc_server:SERVER 9025 .PP 9026 .RS 4 9027 With this option you can define if a rpc service should be running internal/embedded in smbd or should be redirected to an external daemon like Samba4, the endpoint mapper daemon, the spoolss daemon or the new LSA service daemon\&. The rpc_server prefix must be followed by the pipe name, and a value\&. 9028 .sp 9029 This option can be set for each available rpc service in Samba\&. The following list shows all available pipe names services you can modify with this option\&. 9030 .sp 9031 .RS 4 9032 .ie n \{\ 9033 \h'-04'\(bu\h'+03'\c 9034 .\} 9035 .el \{\ 9036 .sp -1 9037 .IP \(bu 2.3 9038 .\} 9039 epmapper \- Endpoint Mapper 9040 .RE 9041 .sp 9042 .RS 4 9043 .ie n \{\ 9044 \h'-04'\(bu\h'+03'\c 9045 .\} 9046 .el \{\ 9047 .sp -1 9048 .IP \(bu 2.3 9049 .\} 9050 winreg \- Remote Registry Service 9051 .RE 9052 .sp 9053 .RS 4 9054 .ie n \{\ 9055 \h'-04'\(bu\h'+03'\c 9056 .\} 9057 .el \{\ 9058 .sp -1 9059 .IP \(bu 2.3 9060 .\} 9061 srvsvc \- Remote Server Services 9062 .RE 9063 .sp 9064 .RS 4 9065 .ie n \{\ 9066 \h'-04'\(bu\h'+03'\c 9067 .\} 9068 .el \{\ 9069 .sp -1 9070 .IP \(bu 2.3 9071 .\} 9072 lsarpc \- Local Security Authority 9073 .RE 9074 .sp 9075 .RS 4 9076 .ie n \{\ 9077 \h'-04'\(bu\h'+03'\c 9078 .\} 9079 .el \{\ 9080 .sp -1 9081 .IP \(bu 2.3 9082 .\} 9083 samr \- Security Account Management 9084 .RE 9085 .sp 9086 .RS 4 9087 .ie n \{\ 9088 \h'-04'\(bu\h'+03'\c 9089 .\} 9090 .el \{\ 9091 .sp -1 9092 .IP \(bu 2.3 9093 .\} 9094 netlogon \- Netlogon Remote Protocol 9095 .RE 9096 .sp 9097 .RS 4 9098 .ie n \{\ 9099 \h'-04'\(bu\h'+03'\c 9100 .\} 9101 .el \{\ 9102 .sp -1 9103 .IP \(bu 2.3 9104 .\} 9105 netdfs \- Settings for Distributed File System 9106 .RE 9107 .sp 9108 .RS 4 9109 .ie n \{\ 9110 \h'-04'\(bu\h'+03'\c 9111 .\} 9112 .el \{\ 9113 .sp -1 9114 .IP \(bu 2.3 9115 .\} 9116 dssetup \- Active Directory Setup 9117 .RE 9118 .sp 9119 .RS 4 9120 .ie n \{\ 9121 \h'-04'\(bu\h'+03'\c 9122 .\} 9123 .el \{\ 9124 .sp -1 9125 .IP \(bu 2.3 9126 .\} 9127 wkssvc \- Workstation Services 9128 .RE 9129 .sp 9130 .RS 4 9131 .ie n \{\ 9132 \h'-04'\(bu\h'+03'\c 9133 .\} 9134 .el \{\ 9135 .sp -1 9136 .IP \(bu 2.3 9137 .\} 9138 spoolss \- Network Printing Spooler 9139 .RE 9140 .sp 9141 .RS 4 9142 .ie n \{\ 9143 \h'-04'\(bu\h'+03'\c 9144 .\} 9145 .el \{\ 9146 .sp -1 9147 .IP \(bu 2.3 9148 .\} 9149 svcctl \- Service Control 9150 .RE 9151 .sp 9152 .RS 4 9153 .ie n \{\ 9154 \h'-04'\(bu\h'+03'\c 9155 .\} 9156 .el \{\ 9157 .sp -1 9158 .IP \(bu 2.3 9159 .\} 9160 ntsvcs \- Plug and Play Services 9161 .RE 9162 .sp 9163 .RS 4 9164 .ie n \{\ 9165 \h'-04'\(bu\h'+03'\c 9166 .\} 9167 .el \{\ 9168 .sp -1 9169 .IP \(bu 2.3 9170 .\} 9171 eventlog \- Event Logger 9172 .RE 9173 .sp 9174 .RS 4 9175 .ie n \{\ 9176 \h'-04'\(bu\h'+03'\c 9177 .\} 9178 .el \{\ 9179 .sp -1 9180 .IP \(bu 2.3 9181 .\} 9182 initshutdown \- Init Shutdown Service 9183 .RE 9184 .sp 9185 .RS 4 9186 .ie n \{\ 9187 \h'-04'\(bu\h'+03'\c 9188 .\} 9189 .el \{\ 9190 .sp -1 9191 .IP \(bu 2.3 9192 .\} 9193 mdssvc \- Spotlight 9194 .RE 9195 .sp 9196 .RE 9197 Three possible values currently supported are: 9198 embeddedexternaldisabled 9199 .sp 9200 The classic method is to run every pipe as an internal function 9201 \fIembedded\fR 9202 in smbd\&. The defaults may vary depending on the service\&. 9203 .sp 9204 Choosing the 9205 \fIexternal\fR 9206 option allows one to run a separate daemon or even a completely independent (3rd party) server capable of interfacing with samba via the MS\-RPC interface over named pipes\&. 9207 .sp 9208 Currently in Samba3 we support four daemons, spoolssd, epmd, lsasd and mdssd\&. These daemons can be enabled using the 9209 \fIrpc_daemon\fR 9210 option\&. For spoolssd you have to enable the daemon and proxy the named pipe with: 9211 .sp 9212 Examples: 9213 .sp 9214 .if n \{\ 9215 .RS 4 9216 .\} 9217 .nf 9218 rpc_daemon:lsasd = fork 9219 rpc_server:lsarpc = external 9220 rpc_server:samr = external 9221 rpc_server:netlogon = external 9222 9223 rpc_server:spoolss = external 9224 rpc_server:epmapper = disabled 9225 9226 rpc_daemon:mdssd = fork 9227 rpc_server:mdssvc = external 9228 9229 .fi 9230 .if n \{\ 9231 .RE 9232 .\} 9233 .sp 9234 There is one special option which allows you to enable rpc services to listen for ncacn_ip_tcp connections too\&. Currently this is only used for testing and doesn\*(Aqt scale! 9235 .sp 9236 .if n \{\ 9237 .RS 4 9238 .\} 9239 .nf 9240 rpc_server:tcpip = yes 9241 9242 .fi 9243 .if n \{\ 9244 .RE 9245 .\} 9246 .sp 9247 Default: 9248 \fI\fIrpc_server:SERVER\fR\fR\fI = \fR\fIembedded\fR\fI \fR 9249 .RE 9250 9251 samba kcc command (G) 9252 .\" samba kcc command 9253 .PP 9254 .RS 4 9255 This option specifies the path to the Samba KCC command\&. This script is used for replication topology replication\&. 9256 .sp 9257 It should not be necessary to modify this option except for testing purposes or if the 9258 samba_kcc 9259 was installed in a non\-default location\&. 9260 .sp 9261 Default: 9262 \fI\fIsamba kcc command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_kcc\fR\fI \fR 9263 .sp 9264 Example: 9265 \fI\fIsamba kcc command\fR\fR\fI = \fR\fI/usr/local/bin/kcc\fR\fI \fR 8510 9266 .RE 8511 9267 … … 8518 9274 file\&. 8519 9275 .sp 8520 The option sets the "security mode bit" in replies to protocol negotiations with8521 \fBsmbd\fR(8)8522 to turn share level security on or off\&. Clients decide based on this bit whether (and how) to transfer user and password information to the server\&.8523 .sp8524 9276 The default is 8525 security = user, as this is the most common setting needed when talking to Windows 98 and Windows NT\&.9277 security = user, as this is the most common setting, used for a standalone file server or a DC\&. 8526 9278 .sp 8527 9279 The alternatives are 8528 9280 security = ads 8529 9281 or 8530 security = domain, which support joining Samba to a Windows domain, along with 8531 security = share 8532 and 8533 security = server, both of which are deprecated\&. 8534 .sp 8535 In versions of Samba prior to 2\&.0\&.0, the default was 8536 security = share 8537 mainly because that was the only option at one stage\&. 9282 security = domain, which support joining Samba to a Windows domain 8538 9283 .sp 8539 9284 You should use … … 8543 9288 if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&. 8544 9289 .sp 8545 It is possible to use8546 smbd8547 in a8548 \fI hybrid mode\fR8549 where it is offers both user and share level security under different8550 \m[blue]\fBNetBIOS aliases\fR\m[]\&.8551 .sp8552 9290 The different settings will now be explained\&. 8553 9291 .sp 9292 \fISECURITY = AUTO\fR 9293 .sp 9294 This is the default security setting in Samba, and causes Samba to consult the 9295 \m[blue]\fBserver role\fR\m[] 9296 parameter (if set) to determine the security mode\&. 9297 .sp 8554 9298 \fISECURITY = USER\fR 8555 9299 .sp 8556 This is the default security setting in Samba\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the 9300 If 9301 \m[blue]\fBserver role\fR\m[] 9302 is not specified, this is the default security setting in Samba\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the 8557 9303 \m[blue]\fBusername map\fR\m[] 8558 9304 parameter)\&. Encrypted passwords (see the … … 8572 9318 parameter for details on doing this\&. 8573 9319 .sp 8574 See also the section8575 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.8576 .sp8577 9320 \fISECURITY = DOMAIN\fR 8578 9321 .sp … … 8601 9344 parameter for details on doing this\&. 8602 9345 .sp 8603 See also the section8604 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.8605 .sp8606 9346 See also the 8607 9347 \m[blue]\fBpassword server\fR\m[] … … 8610 9350 parameter\&. 8611 9351 .sp 8612 \fISECURITY = SHARE\fR8613 .if n \{\8614 .sp8615 .\}8616 .RS 48617 .it 1 an-trap8618 .nr an-no-space-flag 18619 .nr an-break-flag 18620 .br8621 .ps +18622 \fBNote\fR8623 .ps -18624 .br8625 This option is deprecated as it is incompatible with SMB28626 .sp .5v8627 .RE8628 When clients connect to a share level security server, they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a8629 security = share8630 server)\&. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\&.8631 .sp8632 Note that8633 smbd8634 \fIALWAYS\fR8635 uses a valid UNIX user to act on behalf of the client, even in8636 security = share8637 level security\&.8638 .sp8639 As clients are not required to send a username to the server in share level security,8640 smbd8641 uses several techniques to determine the correct UNIX user to use on behalf of the client\&.8642 .sp8643 A list of possible UNIX usernames to match with the given client password is constructed using the following methods :8644 .sp8645 .RS 48646 .ie n \{\8647 \h'-04'\(bu\h'+03'\c8648 .\}8649 .el \{\8650 .sp -18651 .IP \(bu 2.38652 .\}8653 If the8654 \m[blue]\fBguest only\fR\m[]8655 parameter is set, then all the other stages are missed and only the8656 \m[blue]\fBguest account\fR\m[]8657 username is checked\&.8658 .RE8659 .sp8660 .RS 48661 .ie n \{\8662 \h'-04'\(bu\h'+03'\c8663 .\}8664 .el \{\8665 .sp -18666 .IP \(bu 2.38667 .\}8668 Is a username is sent with the share connection request, then this username (after mapping \- see8669 \m[blue]\fBusername map\fR\m[]), is added as a potential username\&.8670 .RE8671 .sp8672 .RS 48673 .ie n \{\8674 \h'-04'\(bu\h'+03'\c8675 .\}8676 .el \{\8677 .sp -18678 .IP \(bu 2.38679 .\}8680 If the client did a previous8681 \fIlogon \fR8682 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\&.8683 .RE8684 .sp8685 .RS 48686 .ie n \{\8687 \h'-04'\(bu\h'+03'\c8688 .\}8689 .el \{\8690 .sp -18691 .IP \(bu 2.38692 .\}8693 The name of the service the client requested is added as a potential username\&.8694 .RE8695 .sp8696 .RS 48697 .ie n \{\8698 \h'-04'\(bu\h'+03'\c8699 .\}8700 .el \{\8701 .sp -18702 .IP \(bu 2.38703 .\}8704 The NetBIOS name of the client is added to the list as a potential username\&.8705 .RE8706 .sp8707 .RS 48708 .ie n \{\8709 \h'-04'\(bu\h'+03'\c8710 .\}8711 .el \{\8712 .sp -18713 .IP \(bu 2.38714 .\}8715 Any users on the8716 \m[blue]\fBuser\fR\m[]8717 list are added as potential usernames\&.8718 .RE8719 .sp8720 .RE8721 If the8722 \fIguest only\fR8723 parameter is not set, then this list is then tried with the supplied password\&. The first user for whom the password matches will be used as the UNIX user\&.8724 .sp8725 If the8726 \fIguest only\fR8727 parameter is set, or no username can be determined then if the share is marked as available to the8728 \fIguest account\fR, then this guest user will be used, otherwise access is denied\&.8729 .sp8730 Note that it can be8731 \fIvery\fR8732 confusing in share\-level security as to which UNIX username will eventually be used in granting access\&.8733 .sp8734 See also the section8735 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.8736 .sp8737 \fISECURITY = SERVER\fR8738 .sp8739 In this depicted mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\&. If this fails it will revert to8740 security = user\&. It expects the8741 \m[blue]\fBencrypted passwords\fR\m[]8742 parameter to be set to8743 \fByes\fR, unless the remote server does not support them\&. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid8744 smbpasswd8745 file to check users against\&. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\&.8746 .if n \{\8747 .sp8748 .\}8749 .RS 48750 .it 1 an-trap8751 .nr an-no-space-flag 18752 .nr an-break-flag 18753 .br8754 .ps +18755 \fBNote\fR8756 .ps -18757 .br8758 This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\&. In particular, this mode of operation can cause significant resource consumption on the PDC, as it must maintain an active connection for the duration of the user\*(Aqs session\&. Furthermore, if this connection is lost, there is no way to reestablish it, and further authentications to the Samba server may fail (from a single client, till it disconnects)\&.8759 .sp .5v8760 .RE8761 .if n \{\8762 .sp8763 .\}8764 .RS 48765 .it 1 an-trap8766 .nr an-no-space-flag 18767 .nr an-break-flag 18768 .br8769 .ps +18770 \fBNote\fR8771 .ps -18772 .br8773 If the client selects NTLMv2 authentication, then this mode of operation8774 \fIwill fail\fR8775 .sp .5v8776 .RE8777 .if n \{\8778 .sp8779 .\}8780 .RS 48781 .it 1 an-trap8782 .nr an-no-space-flag 18783 .nr an-break-flag 18784 .br8785 .ps +18786 \fBNote\fR8787 .ps -18788 .br8789 From the client\*(Aqs point of view,8790 security = server8791 is the same as8792 security = user\&. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\&.8793 .sp .5v8794 .RE8795 .if n \{\8796 .sp8797 .\}8798 .RS 48799 .it 1 an-trap8800 .nr an-no-space-flag 18801 .nr an-break-flag 18802 .br8803 .ps +18804 \fBNote\fR8805 .ps -18806 .br8807 This option is deprecated, and may be removed in future8808 .sp .5v8809 .RE8810 9352 \fINote\fR 8811 9353 that the name of the resource being requested is … … 8816 9358 parameter for details on doing this\&. 8817 9359 .sp 8818 See also the section8819 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.8820 .sp8821 9360 See also the 8822 9361 \m[blue]\fBpassword server\fR\m[] … … 8831 9370 Note that this mode does NOT make Samba operate as a Active Directory Domain Controller\&. 8832 9371 .sp 9372 Note that this forces 9373 \m[blue]\fBrequire strong key = yes\fR\m[] 9374 and 9375 \m[blue]\fBclient schannel = yes\fR\m[] 9376 for the primary domain\&. 9377 .sp 8833 9378 Read the chapter about Domain Membership in the HOWTO for details\&. 8834 9379 .sp 8835 9380 Default: 8836 \fI\fIsecurity\fR\fR\fI = \fR\fI USER\fR\fI \fR9381 \fI\fIsecurity\fR\fR\fI = \fR\fIAUTO\fR\fI \fR 8837 9382 .sp 8838 9383 Example: … … 8840 9385 .RE 8841 9386 8842 send spnego principal (G) 8843 .\" send spnego principal 8844 .PP 8845 .RS 4 8846 This parameter determines whether or not 9387 security mask (S) 9388 .\" security mask 9389 .PP 9390 .RS 4 9391 This parameter has been removed for Samba 4\&.0\&.0\&. 9392 .sp 9393 \fINo default\fR 9394 .RE 9395 9396 max protocol 9397 .\" max protocol 9398 .PP 9399 .RS 4 9400 This parameter is a synonym for 9401 server max protocol\&. 9402 .RE 9403 9404 protocol 9405 .\" protocol 9406 .PP 9407 .RS 4 9408 This parameter is a synonym for 9409 server max protocol\&. 9410 .RE 9411 9412 server max protocol (G) 9413 .\" server max protocol 9414 .PP 9415 .RS 4 9416 The value of the parameter (a string) is the highest protocol level that will be supported by the server\&. 9417 .sp 9418 Possible values are : 9419 .sp 9420 .RS 4 9421 .ie n \{\ 9422 \h'-04'\(bu\h'+03'\c 9423 .\} 9424 .el \{\ 9425 .sp -1 9426 .IP \(bu 2.3 9427 .\} 9428 \fBLANMAN1\fR: First 9429 \fImodern\fR 9430 version of the protocol\&. Long filename support\&. 9431 .RE 9432 .sp 9433 .RS 4 9434 .ie n \{\ 9435 \h'-04'\(bu\h'+03'\c 9436 .\} 9437 .el \{\ 9438 .sp -1 9439 .IP \(bu 2.3 9440 .\} 9441 \fBLANMAN2\fR: Updates to Lanman1 protocol\&. 9442 .RE 9443 .sp 9444 .RS 4 9445 .ie n \{\ 9446 \h'-04'\(bu\h'+03'\c 9447 .\} 9448 .el \{\ 9449 .sp -1 9450 .IP \(bu 2.3 9451 .\} 9452 \fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&. 9453 .RE 9454 .sp 9455 .RS 4 9456 .ie n \{\ 9457 \h'-04'\(bu\h'+03'\c 9458 .\} 9459 .el \{\ 9460 .sp -1 9461 .IP \(bu 2.3 9462 .\} 9463 \fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and later versions of Windows\&. SMB2 has sub protocols available\&. 9464 .sp 9465 .RS 4 9466 .ie n \{\ 9467 \h'-04'\(bu\h'+03'\c 9468 .\} 9469 .el \{\ 9470 .sp -1 9471 .IP \(bu 2.3 9472 .\} 9473 \fBSMB2_02\fR: The earliest SMB2 version\&. 9474 .RE 9475 .sp 9476 .RS 4 9477 .ie n \{\ 9478 \h'-04'\(bu\h'+03'\c 9479 .\} 9480 .el \{\ 9481 .sp -1 9482 .IP \(bu 2.3 9483 .\} 9484 \fBSMB2_10\fR: Windows 7 SMB2 version\&. 9485 .RE 9486 .sp 9487 .RS 4 9488 .ie n \{\ 9489 \h'-04'\(bu\h'+03'\c 9490 .\} 9491 .el \{\ 9492 .sp -1 9493 .IP \(bu 2.3 9494 .\} 9495 \fBSMB2_22\fR: Early Windows 8 SMB2 version\&. 9496 .RE 9497 .sp 9498 .RS 4 9499 .ie n \{\ 9500 \h'-04'\(bu\h'+03'\c 9501 .\} 9502 .el \{\ 9503 .sp -1 9504 .IP \(bu 2.3 9505 .\} 9506 \fBSMB2_24\fR: Windows 8 beta SMB2 version\&. 9507 .RE 9508 .sp 9509 .RE 9510 By default SMB2 selects the SMB2_10 variant\&. 9511 .RE 9512 .sp 9513 .RS 4 9514 .ie n \{\ 9515 \h'-04'\(bu\h'+03'\c 9516 .\} 9517 .el \{\ 9518 .sp -1 9519 .IP \(bu 2.3 9520 .\} 9521 \fBSMB3\fR: The same as SMB2\&. Used by Windows 8\&. SMB3 has sub protocols available\&. 9522 .sp 9523 .RS 4 9524 .ie n \{\ 9525 \h'-04'\(bu\h'+03'\c 9526 .\} 9527 .el \{\ 9528 .sp -1 9529 .IP \(bu 2.3 9530 .\} 9531 \fBSMB3_00\fR: Windows 8 SMB3 version\&. (mostly the same as SMB2_24) 9532 .RE 9533 .sp 9534 .RS 4 9535 .ie n \{\ 9536 \h'-04'\(bu\h'+03'\c 9537 .\} 9538 .el \{\ 9539 .sp -1 9540 .IP \(bu 2.3 9541 .\} 9542 \fBSMB3_02\fR: Windows 8\&.1 SMB3 version\&. 9543 .RE 9544 .sp 9545 .RS 4 9546 .ie n \{\ 9547 \h'-04'\(bu\h'+03'\c 9548 .\} 9549 .el \{\ 9550 .sp -1 9551 .IP \(bu 2.3 9552 .\} 9553 \fBSMB3_10\fR: early Windows 10 technical preview SMB3 version\&. 9554 .RE 9555 .sp 9556 .RS 4 9557 .ie n \{\ 9558 \h'-04'\(bu\h'+03'\c 9559 .\} 9560 .el \{\ 9561 .sp -1 9562 .IP \(bu 2.3 9563 .\} 9564 \fBSMB3_11\fR: Windows 10 technical preview SMB3 version (maybe final)\&. 9565 .RE 9566 .sp 9567 .RE 9568 By default SMB3 selects the SMB3_11 variant\&. 9569 .RE 9570 .sp 9571 .RE 9572 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 9573 .sp 9574 Default: 9575 \fI\fIserver max protocol\fR\fR\fI = \fR\fISMB3\fR\fI \fR 9576 .sp 9577 Example: 9578 \fI\fIserver max protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR 9579 .RE 9580 9581 min protocol 9582 .\" min protocol 9583 .PP 9584 .RS 4 9585 This parameter is a synonym for 9586 server min protocol\&. 9587 .RE 9588 9589 server min protocol (G) 9590 .\" server min protocol 9591 .PP 9592 .RS 4 9593 This setting controls the minimum protocol version that the server will allow the client to use\&. 9594 .sp 9595 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 9596 .sp 9597 See 9598 Related command: \m[blue]\fBserver max protocol\fR\m[] 9599 for a full list of available protocols\&. 9600 .sp 9601 Default: 9602 \fI\fIserver min protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR 9603 .sp 9604 Example: 9605 \fI\fIserver min protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR 9606 .RE 9607 9608 server multi channel support (G) 9609 .\" server multi channel support 9610 .PP 9611 .RS 4 9612 This boolean parameter controls whether 8847 9613 \fBsmbd\fR(8) 8848 will send the server\-supplied principal sometimes given in the SPNEGO exchange\&. 8849 .sp 8850 If enabled, Samba can attempt to help clients to use Kerberos to contact it, even when known only by IP address or a name not registered with our KDC as a service principal name\&. Kerberos relies on names, so ordinarily cannot function in this situation\&. 8851 .sp 8852 If disabled, Samba will send the string not_defined_in_RFC4178@please_ignore as the \*(Aqrfc4178 hint\*(Aq, following the updated RFC and Windows 2008 behaviour in this area\&. 8853 .sp 8854 Note that Windows XP SP2 and later versions already ignored this value in all circumstances\&. 8855 .sp 8856 Default: 8857 \fI\fIsend spnego principal\fR\fR\fI = \fR\fIno\fR\fI \fR 9614 will support SMB3 multi\-channel\&. 9615 .sp 9616 This parameter has been added with version 4\&.4\&. 9617 .sp 9618 Warning: Note that this feature is considered experimental in Samba 4\&.4\&. Use it at your own risk: Even though it may seem to work well in testing, it may result in data corruption under some race conditions\&. Future 4\&.4\&.x release may improve this situation\&. 9619 .sp 9620 Default: 9621 \fI\fIserver multi channel support\fR\fR\fI = \fR\fIno\fR\fI \fR 9622 .RE 9623 9624 server role (G) 9625 .\" server role 9626 .PP 9627 .RS 4 9628 This option determines the basic operating mode of a Samba server and is one of the most important settings in the 9629 smb\&.conf 9630 file\&. 9631 .sp 9632 The default is 9633 server role = auto, as causes Samba to operate according to the 9634 \m[blue]\fBsecurity\fR\m[] 9635 setting, or if not specified as a simple file server that is not connected to any domain\&. 9636 .sp 9637 The alternatives are 9638 server role = standalone 9639 or 9640 server role = member server, which support joining Samba to a Windows domain, along with 9641 server role = domain controller, which run Samba as a Windows domain controller\&. 9642 .sp 9643 You should use 9644 server role = standalone 9645 and 9646 \m[blue]\fBmap to guest\fR\m[] 9647 if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&. 9648 .sp 9649 \fISERVER ROLE = AUTO\fR 9650 .sp 9651 This is the default server role in Samba, and causes Samba to consult the 9652 \m[blue]\fBsecurity\fR\m[] 9653 parameter (if set) to determine the server role, giving compatible behaviours to previous Samba versions\&. 9654 .sp 9655 \fISERVER ROLE = STANDALONE\fR 9656 .sp 9657 If 9658 \m[blue]\fBsecurity\fR\m[] 9659 is also not specified, this is the default security setting in Samba\&. In standalone operation, a client must first "log\-on" with a valid username and password (which can be mapped using the 9660 \m[blue]\fBusername map\fR\m[] 9661 parameter) stored on this machine\&. Encrypted passwords (see the 9662 \m[blue]\fBencrypted passwords\fR\m[] 9663 parameter) are by default used in this security mode\&. Parameters such as 9664 \m[blue]\fBuser\fR\m[] 9665 and 9666 \m[blue]\fBguest only\fR\m[] 9667 if set are then applied and may change the UNIX user to use on this connection, but only after the user has been successfully authenticated\&. 9668 .sp 9669 \fISERVER ROLE = MEMBER SERVER\fR 9670 .sp 9671 This mode will only work correctly if 9672 \fBnet\fR(8) 9673 has been used to add this machine into a Windows Domain\&. It expects the 9674 \m[blue]\fBencrypted passwords\fR\m[] 9675 parameter to be set to 9676 \fByes\fR\&. In this mode Samba will try to validate the username/password by passing it to a Windows or Samba Domain Controller, in exactly the same way that a Windows Server would do\&. 9677 .sp 9678 \fINote\fR 9679 that a valid UNIX user must still exist as well as the account on the Domain Controller to allow Samba to have a valid UNIX account to map file access to\&. Winbind can provide this\&. 9680 .sp 9681 \fISERVER ROLE = CLASSIC PRIMARY DOMAIN CONTROLLER\fR 9682 .sp 9683 This mode of operation runs a classic Samba primary domain controller, providing domain logon services to Windows and Samba clients of an NT4\-like domain\&. Clients must be joined to the domain to create a secure, trusted path across the network\&. There must be only one PDC per NetBIOS scope (typcially a broadcast network or clients served by a single WINS server)\&. 9684 .sp 9685 \fISERVER ROLE = CLASSIC BACKUP DOMAIN CONTROLLER\fR 9686 .sp 9687 This mode of operation runs a classic Samba backup domain controller, providing domain logon services to Windows and Samba clients of an NT4\-like domain\&. As a BDC, this allows multiple Samba servers to provide redundant logon services to a single NetBIOS scope\&. 9688 .sp 9689 \fISERVER ROLE = ACTIVE DIRECTORY DOMAIN CONTROLLER\fR 9690 .sp 9691 This mode of operation runs Samba as an active directory domain controller, providing domain logon services to Windows and Samba clients of the domain\&. This role requires special configuration, see the 9692 Samba4 HOWTO 9693 .sp 9694 Default: 9695 \fI\fIserver role\fR\fR\fI = \fR\fIAUTO\fR\fI \fR 9696 .sp 9697 Example: 9698 \fI\fIserver role\fR\fR\fI = \fR\fIACTIVE DIRECTORY DOMAIN CONTROLLER\fR\fI \fR 8858 9699 .RE 8859 9700 … … 8882 9723 .RE 8883 9724 9725 server services (G) 9726 .\" server services 9727 .PP 9728 .RS 4 9729 This option contains the services that the Samba daemon will run\&. 9730 .sp 9731 An entry in the 9732 smb\&.conf 9733 file can either override the previous value completely or entries can be removed from or added to it by prefixing them with 9734 \fB+\fR 9735 or 9736 \fB\-\fR\&. 9737 .sp 9738 Default: 9739 \fI\fIserver services\fR\fR\fI = \fR\fIs3fs, rpc, nbt, wrepl, ldap, cldap, kdc, drepl, winbindd, ntp_signd, kcc, dnsupdate, dns\fR\fI \fR 9740 .sp 9741 Example: 9742 \fI\fIserver services\fR\fR\fI = \fR\fI\-s3fs, +smb\fR\fI \fR 9743 .RE 9744 8884 9745 server signing (G) 8885 9746 .\" server signing … … 8887 9748 .RS 4 8888 9749 This controls whether the client is allowed or required to use SMB1 and SMB2 signing\&. Possible values are 9750 \fIdefault\fR, 8889 9751 \fIauto\fR, 8890 9752 \fImandatory\fR 8891 9753 and 8892 9754 \fIdisabled\fR\&. 9755 .sp 9756 By default, and when smb signing is set to 9757 \fIdefault\fR, smb signing is required when 9758 \m[blue]\fBserver role\fR\m[] 9759 is 9760 \fIactive directory domain controller\fR 9761 and disabled otherwise\&. 8893 9762 .sp 8894 9763 When set to auto, SMB1 signing is offered, but not enforced\&. When set to mandatory, SMB1 signing is required and if set to disabled, SMB signing is not offered either\&. … … 8901 9770 .sp 8902 9771 Default: 8903 \fI\fIserver signing\fR\fR\fI = \fR\fI Disabled\fR\fI \fR9772 \fI\fIserver signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR 8904 9773 .RE 8905 9774 … … 8928 9797 .RE 8929 9798 8930 set directory (S)8931 .\" set directory8932 .PP8933 .RS 48934 If8935 set directory = no, then users of the service may not use the setdir command to change directory\&.8936 .sp8937 The8938 setdir8939 command is only implemented in the Digital Pathworks client\&. See the Pathworks documentation for details\&.8940 .sp8941 Default:8942 \fI\fIset directory\fR\fR\fI = \fR\fIno\fR\fI \fR8943 .RE8944 8945 9799 set primary group script (G) 8946 9800 .\" set primary group script 8947 9801 .PP 8948 9802 .RS 4 8949 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\&. This script sets the primary group in the unix user datase when an administrator sets the primary group from the windows user manager or when fetching a SAM with9803 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\&. This script sets the primary group in the unix user database when an administrator sets the primary group from the windows user manager or when fetching a SAM with 8950 9804 net rpc vampire\&. 8951 9805 \fI%u\fR … … 8969 9823 should only be used whenever there is no operating system API available from the OS that samba can use\&. 8970 9824 .sp 8971 This option is only available if Samba was configured with the argument 8972 \-\-with\-sys\-quotas 8973 or on linux when 8974 \&./configure \-\-with\-quotas 8975 was used and a working quota api was found in the system\&. Most packages are configured with these options already\&. 9825 This option is only available if Samba was compiled with quota support\&. 8976 9826 .sp 8977 9827 This parameter should specify the path to a script that can set quota for the specified arguments\&. … … 8987 9837 .IP \(bu 2.3 8988 9838 .\} 8989 1 \- quota type 9839 1 \- path to where the quota needs to be set\&. This needs to be interpreted relative to the current working directory that the script may also check for\&. 9840 .RE 9841 .sp 9842 .RS 4 9843 .ie n \{\ 9844 \h'-04'\(bu\h'+03'\c 9845 .\} 9846 .el \{\ 9847 .sp -1 9848 .IP \(bu 2.3 9849 .\} 9850 2 \- quota type 8990 9851 .sp 8991 9852 .RS 4 … … 9044 9905 .IP \(bu 2.3 9045 9906 .\} 9046 2\- id (uid for user, gid for group, \-1 if N/A)9047 .RE 9048 .sp 9049 .RS 4 9050 .ie n \{\ 9051 \h'-04'\(bu\h'+03'\c 9052 .\} 9053 .el \{\ 9054 .sp -1 9055 .IP \(bu 2.3 9056 .\} 9057 3\- quota state (0 = disable, 1 = enable, 2 = enable and enforce)9058 .RE 9059 .sp 9060 .RS 4 9061 .ie n \{\ 9062 \h'-04'\(bu\h'+03'\c 9063 .\} 9064 .el \{\ 9065 .sp -1 9066 .IP \(bu 2.3 9067 .\} 9068 4\- block softlimit9069 .RE 9070 .sp 9071 .RS 4 9072 .ie n \{\ 9073 \h'-04'\(bu\h'+03'\c 9074 .\} 9075 .el \{\ 9076 .sp -1 9077 .IP \(bu 2.3 9078 .\} 9079 5\- block hardlimit9080 .RE 9081 .sp 9082 .RS 4 9083 .ie n \{\ 9084 \h'-04'\(bu\h'+03'\c 9085 .\} 9086 .el \{\ 9087 .sp -1 9088 .IP \(bu 2.3 9089 .\} 9090 6\- inode softlimit9091 .RE 9092 .sp 9093 .RS 4 9094 .ie n \{\ 9095 \h'-04'\(bu\h'+03'\c 9096 .\} 9097 .el \{\ 9098 .sp -1 9099 .IP \(bu 2.3 9100 .\} 9101 7\- inode hardlimit9102 .RE 9103 .sp 9104 .RS 4 9105 .ie n \{\ 9106 \h'-04'\(bu\h'+03'\c 9107 .\} 9108 .el \{\ 9109 .sp -1 9110 .IP \(bu 2.3 9111 .\} 9112 8(optional) \- block size, defaults to 10249907 3 \- id (uid for user, gid for group, \-1 if N/A) 9908 .RE 9909 .sp 9910 .RS 4 9911 .ie n \{\ 9912 \h'-04'\(bu\h'+03'\c 9913 .\} 9914 .el \{\ 9915 .sp -1 9916 .IP \(bu 2.3 9917 .\} 9918 4 \- quota state (0 = disable, 1 = enable, 2 = enable and enforce) 9919 .RE 9920 .sp 9921 .RS 4 9922 .ie n \{\ 9923 \h'-04'\(bu\h'+03'\c 9924 .\} 9925 .el \{\ 9926 .sp -1 9927 .IP \(bu 2.3 9928 .\} 9929 5 \- block softlimit 9930 .RE 9931 .sp 9932 .RS 4 9933 .ie n \{\ 9934 \h'-04'\(bu\h'+03'\c 9935 .\} 9936 .el \{\ 9937 .sp -1 9938 .IP \(bu 2.3 9939 .\} 9940 6 \- block hardlimit 9941 .RE 9942 .sp 9943 .RS 4 9944 .ie n \{\ 9945 \h'-04'\(bu\h'+03'\c 9946 .\} 9947 .el \{\ 9948 .sp -1 9949 .IP \(bu 2.3 9950 .\} 9951 7 \- inode softlimit 9952 .RE 9953 .sp 9954 .RS 4 9955 .ie n \{\ 9956 \h'-04'\(bu\h'+03'\c 9957 .\} 9958 .el \{\ 9959 .sp -1 9960 .IP \(bu 2.3 9961 .\} 9962 8 \- inode hardlimit 9963 .RE 9964 .sp 9965 .RS 4 9966 .ie n \{\ 9967 \h'-04'\(bu\h'+03'\c 9968 .\} 9969 .el \{\ 9970 .sp -1 9971 .IP \(bu 2.3 9972 .\} 9973 9(optional) \- block size, defaults to 1024 9113 9974 .RE 9114 9975 .sp … … 9121 9982 Example: 9122 9983 \fI\fIset quota command\fR\fR\fI = \fR\fI/usr/local/sbin/set_quota\fR\fI \fR 9984 .RE 9985 9986 share backend (G) 9987 .\" share backend 9988 .PP 9989 .RS 4 9990 This option specifies the backend that will be used to access the configuration of file shares\&. 9991 .sp 9992 Traditionally, Samba file shares have been configured in the 9993 \fBsmb\&.conf\fR 9994 file and this is still the default\&. 9995 .sp 9996 At the moment there are no other supported backends\&. 9997 .sp 9998 Default: 9999 \fI\fIshare backend\fR\fR\fI = \fR\fIclassic\fR\fI \fR 9123 10000 .RE 9124 10001 … … 9133 10010 Default: 9134 10011 \fI\fIshare:fake_fscaps\fR\fR\fI = \fR\fI0\fR\fI \fR 9135 .RE9136 9137 share modes (S)9138 .\" share modes9139 .PP9140 .RS 49141 This enables or disables the honoring of the9142 \fIshare modes\fR9143 during a file open\&. These modes are used by clients to gain exclusive read or write access to a file\&.9144 .sp9145 This is a deprecated option from old versions of Samba, and will be removed in the next major release\&.9146 .sp9147 These open modes are not directly supported by UNIX, so they are simulated using shared memory\&.9148 .sp9149 The share modes that are enabled by this option are the standard Windows share modes\&.9150 .sp9151 This option gives full share compatibility and is enabled by default\&.9152 .sp9153 You should9154 \fINEVER\fR9155 turn this parameter off as many Windows applications will break if you do so\&.9156 .sp9157 Default:9158 \fI\fIshare modes\fR\fR\fI = \fR\fIyes\fR\fI \fR9159 10012 .RE 9160 10013 … … 9181 10034 With the introduction of MS\-RPC based printing support for Windows NT/2000 client in Samba 2\&.2, a "Printers\&.\&.\&." folder will appear on Samba hosts in the share listing\&. Normally this folder will contain an icon for the MS Add Printer Wizard (APW)\&. However, it is possible to disable this feature regardless of the level of privilege of the connected user\&. 9182 10035 .sp 9183 Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\&. If the user does not have administrative access on the print server (i\&.e is not root or a member of the 9184 \fIprinter admin\fR 9185 group), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\&. This should succeed, however the APW icon will not be displayed\&. 10036 Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\&. If the user does not have administrative access on the print server (i\&.e is not root or has granted the SePrintOperatorPrivilege), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\&. This should succeed, however the APW icon will not be displayed\&. 9186 10037 .sp 9187 10038 Disabling the … … 9215 10066 that should start a shutdown procedure\&. 9216 10067 .sp 9217 If the connected user posses es the10068 If the connected user possesses the 9218 10069 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as root\&. 9219 10070 .sp … … 9299 10150 .RE 9300 10151 10152 smb2 leases (G) 10153 .\" smb2 leases 10154 .PP 10155 .RS 4 10156 This boolean option tells 10157 smbd 10158 whether to globally negotiate SMB2 leases on file open requests\&. Leasing is an SMB2\-only feature which allows clients to aggressively cache files locally above and beyond the caching allowed by SMB1 oplocks\&. This (experimental) parameter is set to off by default until the SMB2 leasing code is declared fully stable\&. 10159 .sp 10160 This is only available with 10161 \m[blue]\fBoplocks = yes\fR\m[] 10162 and 10163 \m[blue]\fBkernel oplocks = no\fR\m[]\&. 10164 .sp 10165 Note that the write cache won\*(Aqt be used for file handles with a smb2 write lease\&. 10166 .sp 10167 The Samba implementation of leases is currently marked as experimental! 10168 .sp 10169 Default: 10170 \fI\fIsmb2 leases\fR\fR\fI = \fR\fIno\fR\fI \fR 10171 .RE 10172 9301 10173 smb2 max credits (G) 9302 10174 .\" smb2 max credits … … 9321 10193 will return to a client, informing the client of the largest size that may be returned by a single SMB2 read call\&. 9322 10194 .sp 9323 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&. 9324 .sp 9325 Default: 9326 \fI\fIsmb2 max read\fR\fR\fI = \fR\fI65536\fR\fI \fR 10195 The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&. 10196 .sp 10197 Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 8MiB for SMB >= 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&. 10198 .sp 10199 Default: 10200 \fI\fIsmb2 max read\fR\fR\fI = \fR\fI8388608\fR\fI \fR 9327 10201 .RE 9328 10202 … … 9335 10209 will return to a client, informing the client of the largest size of buffer that may be used in querying file meta\-data via QUERY_INFO and related SMB2 calls\&. 9336 10210 .sp 9337 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&. 9338 .sp 9339 Default: 9340 \fI\fIsmb2 max trans\fR\fR\fI = \fR\fI65536\fR\fI \fR 10211 The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&. 10212 .sp 10213 Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 1MiB for SMB >= 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&. 10214 .sp 10215 Default: 10216 \fI\fIsmb2 max trans\fR\fR\fI = \fR\fI8388608\fR\fI \fR 9341 10217 .RE 9342 10218 … … 9349 10225 will return to a client, informing the client of the largest size that may be sent to the server by a single SMB2 write call\&. 9350 10226 .sp 9351 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&. 9352 .sp 9353 Default: 9354 \fI\fIsmb2 max write\fR\fR\fI = \fR\fI65536\fR\fI \fR 10227 The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&. 10228 .sp 10229 Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 8MiB for SMB => 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&. 10230 .sp 10231 Default: 10232 \fI\fIsmb2 max write\fR\fR\fI = \fR\fI8388608\fR\fI \fR 10233 .RE 10234 10235 smbd profiling level (G) 10236 .\" smbd profiling level 10237 .PP 10238 .RS 4 10239 This parameter allows the administrator to enable profiling support\&. 10240 .sp 10241 Possible values are 10242 \fBoff\fR, 10243 \fBcount\fR 10244 and 10245 \fBon\fR\&. 10246 .sp 10247 Default: 10248 \fI\fIsmbd profiling level\fR\fR\fI = \fR\fIoff\fR\fI \fR 10249 .sp 10250 Example: 10251 \fI\fIsmbd profiling level\fR\fR\fI = \fR\fIon\fR\fI \fR 9355 10252 .RE 9356 10253 … … 9359 10256 .PP 9360 10257 .RS 4 9361 This is a new feature introduced with Samba 3\&.2 and above\&. It is an extension to the SMB/CIFS protocol negotiated as part of the UNIX extensions\&. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\&. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\&. Currently this is only supported by Samba 3\&.2 smbclient, and hopefully soon Linux CIFSFS and MacOS/X clients\&. Windows clients do not support this feature\&. 9362 .sp 9363 This controls whether the remote client is allowed or required to use SMB encryption\&. Possible values are 9364 \fIauto\fR, 9365 \fImandatory\fR 9366 and 9367 \fIdisabled\fR\&. This may be set on a per\-share basis, but clients may chose to encrypt the entire session, not just traffic to a specific share\&. If this is set to mandatory then all traffic to a share 10258 This parameter controls whether a remote client is allowed or required to use SMB encryption\&. It has different effects depending on whether the connection uses SMB1 or SMB2 and newer: 10259 .sp 10260 .RS 4 10261 .ie n \{\ 10262 \h'-04'\(bu\h'+03'\c 10263 .\} 10264 .el \{\ 10265 .sp -1 10266 .IP \(bu 2.3 10267 .\} 10268 If the connection uses SMB1, then this option controls the use of a Samba\-specific extension to the SMB protocol introduced in Samba 3\&.2 that makes use of the Unix extensions\&. 10269 .RE 10270 .sp 10271 .RS 4 10272 .ie n \{\ 10273 \h'-04'\(bu\h'+03'\c 10274 .\} 10275 .el \{\ 10276 .sp -1 10277 .IP \(bu 2.3 10278 .\} 10279 If the connection uses SMB2 or newer, then this option controls the use of the SMB\-level encryption that is supported in SMB version 3\&.0 and above and available in Windows 8 and newer\&. 10280 .RE 10281 .sp 10282 .RE 10283 This parameter can be set globally and on a per\-share bases\&. Possible values are 10284 \fIoff\fR 10285 (or 10286 \fIdisabled\fR), 10287 \fIenabled\fR 10288 (or 10289 \fIauto\fR, or 10290 \fIif_required\fR), 10291 \fIdesired\fR, and 10292 \fIrequired\fR 10293 (or 10294 \fImandatory\fR)\&. A special value is 10295 \fIdefault\fR 10296 which is the implicit default setting of 10297 \fIenabled\fR\&. 10298 .PP 10299 \fIEffects for SMB1\fR 10300 .RS 4 10301 The Samba\-specific encryption of SMB1 connections is an extension to the SMB protocol negotiated as part of the UNIX extensions\&. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\&. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\&. Currently this is only supported smbclient of by Samba 3\&.2 and newer, and hopefully soon Linux CIFSFS and MacOS/X clients\&. Windows clients do not support this feature\&. 10302 .sp 10303 This may be set on a per\-share basis, but clients may chose to encrypt the entire session, not just traffic to a specific share\&. If this is set to mandatory then all traffic to a share 9368 10304 \fImust\fR 9369 mustbe encrypted once the connection has been made to the share\&. The server would return "access denied" to all non\-encrypted requests on such a share\&. Selecting encrypted traffic reduces throughput as smaller packet sizes must be used (no huge UNIX style read/writes allowed) as well as the overhead of encrypting and signing all the data\&.10305 be encrypted once the connection has been made to the share\&. The server would return "access denied" to all non\-encrypted requests on such a share\&. Selecting encrypted traffic reduces throughput as smaller packet sizes must be used (no huge UNIX style read/writes allowed) as well as the overhead of encrypting and signing all the data\&. 9370 10306 .sp 9371 10307 If SMB encryption is selected, Windows style SMB signing (see the … … 9373 10309 option) is no longer necessary, as the GSSAPI flags use select both signing and sealing of the data\&. 9374 10310 .sp 9375 When set to auto, SMB encryption is offered, but not enforced\&. When set to mandatory, SMB encryption is required and if set to disabled, SMB encryption can not be negotiated\&. 9376 .sp 9377 Default: 9378 \fI\fIsmb encrypt\fR\fR\fI = \fR\fIauto\fR\fI \fR 10311 When set to auto or default, SMB encryption is offered, but not enforced\&. When set to mandatory, SMB encryption is required and if set to disabled, SMB encryption can not be negotiated\&. 10312 .RE 10313 .PP 10314 \fIEffects for SMB2\fR 10315 .RS 4 10316 Native SMB transport encryption is available in SMB version 3\&.0 or newer\&. It is only offered by Samba if 10317 \fIserver max protocol\fR 10318 is set to 10319 \fISMB3\fR 10320 or newer\&. Clients supporting this type of encryption include Windows 8 and newer, Windows server 2012 and newer, and smbclient of Samba 4\&.1 and newer\&. 10321 .sp 10322 The protocol implementation offers various options: 10323 .sp 10324 .RS 4 10325 .ie n \{\ 10326 \h'-04'\(bu\h'+03'\c 10327 .\} 10328 .el \{\ 10329 .sp -1 10330 .IP \(bu 2.3 10331 .\} 10332 The capability to perform SMB encryption can be negotiated during protocol negotiation\&. 10333 .RE 10334 .sp 10335 .RS 4 10336 .ie n \{\ 10337 \h'-04'\(bu\h'+03'\c 10338 .\} 10339 .el \{\ 10340 .sp -1 10341 .IP \(bu 2.3 10342 .\} 10343 Data encryption can be enabled globally\&. In that case, an encryption\-capable connection will have all traffic in all its sessions encrypted\&. In particular all share connections will be encrypted\&. 10344 .RE 10345 .sp 10346 .RS 4 10347 .ie n \{\ 10348 \h'-04'\(bu\h'+03'\c 10349 .\} 10350 .el \{\ 10351 .sp -1 10352 .IP \(bu 2.3 10353 .\} 10354 Data encryption can also be enabled per share if not enabled globally\&. For an encryption\-capable connection, all connections to an encryption\-enabled share will be encrypted\&. 10355 .RE 10356 .sp 10357 .RS 4 10358 .ie n \{\ 10359 \h'-04'\(bu\h'+03'\c 10360 .\} 10361 .el \{\ 10362 .sp -1 10363 .IP \(bu 2.3 10364 .\} 10365 Encryption can be enforced\&. This means that session setups will be denied on non\-encryption\-capable connections if data encryption has been enabled globally\&. And tree connections will be denied for non\-encryption capable connections to shares with data encryption enabled\&. 10366 .RE 10367 .sp 10368 .RE 10369 These features can be controlled with settings of 10370 \fIsmb encrypt\fR 10371 as follows: 10372 .sp 10373 .RS 4 10374 .ie n \{\ 10375 \h'-04'\(bu\h'+03'\c 10376 .\} 10377 .el \{\ 10378 .sp -1 10379 .IP \(bu 2.3 10380 .\} 10381 Leaving it as default, explicitly setting 10382 \fIdefault\fR, or setting it to 10383 \fIenabled\fR 10384 globally will enable negotiation of encryption but will not turn on data encryption globally or per share\&. 10385 .RE 10386 .sp 10387 .RS 4 10388 .ie n \{\ 10389 \h'-04'\(bu\h'+03'\c 10390 .\} 10391 .el \{\ 10392 .sp -1 10393 .IP \(bu 2.3 10394 .\} 10395 Setting it to 10396 \fIdesired\fR 10397 globally will enable negotiation and will turn on data encryption on sessions and share connections for those clients that support it\&. 10398 .RE 10399 .sp 10400 .RS 4 10401 .ie n \{\ 10402 \h'-04'\(bu\h'+03'\c 10403 .\} 10404 .el \{\ 10405 .sp -1 10406 .IP \(bu 2.3 10407 .\} 10408 Setting it to 10409 \fIrequired\fR 10410 globally will enable negotiation and turn on data encryption on sessions and share connections\&. Clients that do not support encryption will be denied access to the server\&. 10411 .RE 10412 .sp 10413 .RS 4 10414 .ie n \{\ 10415 \h'-04'\(bu\h'+03'\c 10416 .\} 10417 .el \{\ 10418 .sp -1 10419 .IP \(bu 2.3 10420 .\} 10421 Setting it to 10422 \fIoff\fR 10423 globally will completely disable the encryption feature\&. 10424 .RE 10425 .sp 10426 .RS 4 10427 .ie n \{\ 10428 \h'-04'\(bu\h'+03'\c 10429 .\} 10430 .el \{\ 10431 .sp -1 10432 .IP \(bu 2.3 10433 .\} 10434 Setting it to 10435 \fIdesired\fR 10436 on a share will turn on data encryption for this share for clients that support encryption if negotiation has been enabled globally\&. 10437 .RE 10438 .sp 10439 .RS 4 10440 .ie n \{\ 10441 \h'-04'\(bu\h'+03'\c 10442 .\} 10443 .el \{\ 10444 .sp -1 10445 .IP \(bu 2.3 10446 .\} 10447 Setting it to 10448 \fIrequired\fR 10449 on a share will enforce data encryption for this share if negotiation has been enabled globally\&. I\&.e\&. clients that do not support encryption will be denied access to the share\&. 10450 .sp 10451 Note that this allows per\-share enforcing to be controlled in Samba differently from Windows: In Windows, 10452 \fIRejectUnencryptedAccess\fR 10453 is a global setting, and if it is set, all shares with data encryption turned on are automatically enforcing encryption\&. In order to achieve the same effect in Samba, one has to globally set 10454 \fIsmb encrypt\fR 10455 to 10456 \fIenabled\fR, and then set all shares that should be encrypted to 10457 \fIrequired\fR\&. Additionally, it is possible in Samba to have some shares with encryption 10458 \fIrequired\fR 10459 and some other shares with encryption only 10460 \fIdesired\fR, which is not possible in Windows\&. 10461 .RE 10462 .sp 10463 .RS 4 10464 .ie n \{\ 10465 \h'-04'\(bu\h'+03'\c 10466 .\} 10467 .el \{\ 10468 .sp -1 10469 .IP \(bu 2.3 10470 .\} 10471 Setting it to 10472 \fIoff\fR 10473 or 10474 \fIenabled\fR 10475 for a share has no effect\&. 10476 .RE 10477 .sp 10478 .RE 10479 .RE 10480 .sp 10481 Default: 10482 \fI\fIsmb encrypt\fR\fR\fI = \fR\fIdefault\fR\fI \fR 9379 10483 .RE 9380 10484 … … 9411 10515 .RE 9412 10516 9413 socket address (G)9414 .\" socket address9415 .PP9416 .RS 49417 This option allows you to control what address Samba will listen for connections on\&. This is used to support multiple virtual interfaces on the one server, each with a different configuration\&.9418 .sp9419 Setting this option should never be necessary on usual Samba servers running only one nmbd\&.9420 .sp9421 By default Samba will accept connections on any address\&.9422 .sp9423 Default:9424 \fI\fIsocket address\fR\fR\fI = \fR\fI\fR\fI \fR9425 .sp9426 Example:9427 \fI\fIsocket address\fR\fR\fI = \fR\fI192\&.168\&.2\&.20\fR\fI \fR9428 .RE9429 9430 10517 socket options (G) 9431 10518 .\" socket options 9432 10519 .PP 9433 10520 .RS 4 10521 .if n \{\ 10522 .sp 10523 .\} 10524 .RS 4 10525 .it 1 an-trap 10526 .nr an-no-space-flag 1 10527 .nr an-break-flag 1 10528 .br 10529 .ps +1 10530 \fBWarning\fR 10531 .ps -1 10532 .br 10533 Modern server operating systems are tuned for high network performance in the majority of situations; when you set socket options you are overriding those settings\&. Linux in particular has an auto\-tuning mechanism for buffer sizes that will be disabled if you specify a socket buffer size\&. This can potentially cripple your TCP/IP stack\&. 10534 .sp 10535 Getting the socket options correct can make a big difference to your performance, but getting them wrong can degrade it by just as much\&. As with any other low level setting, if you must make changes to it, make small changes and 10536 \fItest\fR 10537 the effect before making any large changes\&. 10538 .sp .5v 10539 .RE 10540 .sp 9434 10541 This option allows you to set socket options to be used when talking with the client\&. 9435 10542 .sp … … 9441 10548 .sp 9442 10549 You may find that on some systems Samba will say "Unknown socket option" when you supply an option\&. This means you either incorrectly typed it or you need to add an include file to includes\&.h for your OS\&. If the latter is the case please send the patch to 9443 samba\-technical@ samba\&.org\&.10550 samba\-technical@lists\&.samba\&.org\&. 9444 10551 .sp 9445 10552 Any of the supported socket options may be combined in any way you like, as long as your OS allows it\&. … … 9499 10606 .IP \(bu 2.3 9500 10607 .\} 10608 TCP_KEEPCNT * 10609 .RE 10610 .sp 10611 .RS 4 10612 .ie n \{\ 10613 \h'-04'\(bu\h'+03'\c 10614 .\} 10615 .el \{\ 10616 .sp -1 10617 .IP \(bu 2.3 10618 .\} 10619 TCP_KEEPIDLE * 10620 .RE 10621 .sp 10622 .RS 4 10623 .ie n \{\ 10624 \h'-04'\(bu\h'+03'\c 10625 .\} 10626 .el \{\ 10627 .sp -1 10628 .IP \(bu 2.3 10629 .\} 10630 TCP_KEEPINTVL * 10631 .RE 10632 .sp 10633 .RS 4 10634 .ie n \{\ 10635 \h'-04'\(bu\h'+03'\c 10636 .\} 10637 .el \{\ 10638 .sp -1 10639 .IP \(bu 2.3 10640 .\} 9501 10641 IPTOS_LOWDELAY 9502 10642 .RE … … 9521 10661 .IP \(bu 2.3 9522 10662 .\} 10663 SO_REUSEPORT 10664 .RE 10665 .sp 10666 .RS 4 10667 .ie n \{\ 10668 \h'-04'\(bu\h'+03'\c 10669 .\} 10670 .el \{\ 10671 .sp -1 10672 .IP \(bu 2.3 10673 .\} 9523 10674 SO_SNDBUF * 9524 10675 .RE … … 9555 10706 .\} 9556 10707 SO_RCVLOWAT * 10708 .RE 10709 .sp 10710 .RS 4 10711 .ie n \{\ 10712 \h'-04'\(bu\h'+03'\c 10713 .\} 10714 .el \{\ 10715 .sp -1 10716 .IP \(bu 2.3 10717 .\} 10718 SO_SNDTIMEO * 10719 .RE 10720 .sp 10721 .RS 4 10722 .ie n \{\ 10723 \h'-04'\(bu\h'+03'\c 10724 .\} 10725 .el \{\ 10726 .sp -1 10727 .IP \(bu 2.3 10728 .\} 10729 SO_RCVTIMEO * 10730 .RE 10731 .sp 10732 .RS 4 10733 .ie n \{\ 10734 \h'-04'\(bu\h'+03'\c 10735 .\} 10736 .el \{\ 10737 .sp -1 10738 .IP \(bu 2.3 10739 .\} 10740 TCP_FASTACK * 10741 .RE 10742 .sp 10743 .RS 4 10744 .ie n \{\ 10745 \h'-04'\(bu\h'+03'\c 10746 .\} 10747 .el \{\ 10748 .sp -1 10749 .IP \(bu 2.3 10750 .\} 10751 TCP_QUICKACK 10752 .RE 10753 .sp 10754 .RS 4 10755 .ie n \{\ 10756 \h'-04'\(bu\h'+03'\c 10757 .\} 10758 .el \{\ 10759 .sp -1 10760 .IP \(bu 2.3 10761 .\} 10762 TCP_NODELAYACK 10763 .RE 10764 .sp 10765 .RS 4 10766 .ie n \{\ 10767 \h'-04'\(bu\h'+03'\c 10768 .\} 10769 .el \{\ 10770 .sp -1 10771 .IP \(bu 2.3 10772 .\} 10773 TCP_KEEPALIVE_THRESHOLD * 10774 .RE 10775 .sp 10776 .RS 4 10777 .ie n \{\ 10778 \h'-04'\(bu\h'+03'\c 10779 .\} 10780 .el \{\ 10781 .sp -1 10782 .IP \(bu 2.3 10783 .\} 10784 TCP_KEEPALIVE_ABORT_THRESHOLD * 10785 .RE 10786 .sp 10787 .RS 4 10788 .ie n \{\ 10789 \h'-04'\(bu\h'+03'\c 10790 .\} 10791 .el \{\ 10792 .sp -1 10793 .IP \(bu 2.3 10794 .\} 10795 TCP_DEFER_ACCEPT * 9557 10796 .RE 9558 10797 .sp … … 9582 10821 Example: 9583 10822 \fI\fIsocket options\fR\fR\fI = \fR\fIIPTOS_LOWDELAY\fR\fI \fR 10823 .RE 10824 10825 spn update command (G) 10826 .\" spn update command 10827 .PP 10828 .RS 4 10829 This option sets the command that for updating servicePrincipalName names from 10830 spn_update_list\&. 10831 .sp 10832 Default: 10833 \fI\fIspn update command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_spnupdate\fR\fI \fR 10834 .sp 10835 Example: 10836 \fI\fIspn update command\fR\fR\fI = \fR\fI/usr/local/sbin/spnupdate\fR\fI \fR 10837 .RE 10838 10839 spoolss: architecture (G) 10840 .\" spoolss: architecture 10841 .PP 10842 .RS 4 10843 Windows spoolss print clients only allow association of server\-side drivers with printers when the driver architecture matches the advertised print server architecture\&. Samba\*(Aqs spoolss print server architecture can be changed using this parameter\&. 10844 .sp 10845 Default: 10846 \fI\fIspoolss: architecture\fR\fR\fI = \fR\fIWindows NT x86\fR\fI \fR 10847 .sp 10848 Example: 10849 \fI\fIspoolss: architecture\fR\fR\fI = \fR\fIWindows x64\fR\fI \fR 10850 .RE 10851 10852 spoolss: os_major (G) 10853 .\" spoolss: os_major 10854 .PP 10855 .RS 4 10856 Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&. 10857 .sp 10858 Default: 10859 \fI\fIspoolss: os_major\fR\fR\fI = \fR\fI5\fR\fI \fR 10860 .sp 10861 Example: 10862 \fI\fIspoolss: os_major\fR\fR\fI = \fR\fI6\fR\fI \fR 10863 .RE 10864 10865 spoolss: os_minor (G) 10866 .\" spoolss: os_minor 10867 .PP 10868 .RS 4 10869 Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&. 10870 .sp 10871 Default: 10872 \fI\fIspoolss: os_minor\fR\fR\fI = \fR\fI0\fR\fI \fR 10873 .sp 10874 Example: 10875 \fI\fIspoolss: os_minor\fR\fR\fI = \fR\fI1\fR\fI \fR 10876 .RE 10877 10878 spoolss: os_build (G) 10879 .\" spoolss: os_build 10880 .PP 10881 .RS 4 10882 Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&. 10883 .sp 10884 Default: 10885 \fI\fIspoolss: os_build\fR\fR\fI = \fR\fI2195\fR\fI \fR 10886 .sp 10887 Example: 10888 \fI\fIspoolss: os_build\fR\fR\fI = \fR\fI7601\fR\fI \fR 10889 .RE 10890 10891 spotlight (S) 10892 .\" spotlight 10893 .PP 10894 .RS 4 10895 This parameter controls whether Samba allows Spotlight queries on a share\&. For controlling indexing of filesystems you also have to use Tracker\*(Aqs own configuration system\&. 10896 .sp 10897 Spotlight has several prerequisites: 10898 .sp 10899 .RS 4 10900 .ie n \{\ 10901 \h'-04'\(bu\h'+03'\c 10902 .\} 10903 .el \{\ 10904 .sp -1 10905 .IP \(bu 2.3 10906 .\} 10907 Samba must be configured and built with Spotlight support\&. 10908 .RE 10909 .sp 10910 .RS 4 10911 .ie n \{\ 10912 \h'-04'\(bu\h'+03'\c 10913 .\} 10914 .el \{\ 10915 .sp -1 10916 .IP \(bu 2.3 10917 .\} 10918 The 10919 \fImdssvc\fR 10920 RPC service must be enabled, see below\&. 10921 .RE 10922 .sp 10923 .RS 4 10924 .ie n \{\ 10925 \h'-04'\(bu\h'+03'\c 10926 .\} 10927 .el \{\ 10928 .sp -1 10929 .IP \(bu 2.3 10930 .\} 10931 Tracker intergration must be setup and the share must be indexed by Tracker\&. 10932 .RE 10933 .sp 10934 .RE 10935 For a detailed set of instructions please see 10936 https://wiki\&.samba\&.org/index\&.php/Spotlight\&. 10937 .sp 10938 The Spotlight RPC service can either be enabled as embedded RPC service: 10939 .sp 10940 .if n \{\ 10941 .RS 4 10942 .\} 10943 .nf 10944 \fI[Global]\fR 10945 \m[blue]\fBrpc_server:mdsvc = embedded\fR\m[] 10946 .fi 10947 .if n \{\ 10948 .RE 10949 .\} 10950 .sp 10951 Or it can be run in a seperate RPC service daemon: 10952 .sp 10953 .if n \{\ 10954 .RS 4 10955 .\} 10956 .nf 10957 \fI[Global]\fR 10958 \m[blue]\fBrpc_server:mdssd = fork\fR\m[] 10959 \m[blue]\fBrpc_server:mdsvc = external\fR\m[] 10960 .fi 10961 .if n \{\ 10962 .RE 10963 .\} 10964 .sp 10965 Default: 10966 \fI\fIspotlight\fR\fR\fI = \fR\fIno\fR\fI \fR 9584 10967 .RE 9585 10968 … … 9623 11006 \m[blue]\fBmap hidden\fR\m[] 9624 11007 and 9625 \m[blue]\fBmap readonly\fR\m[])\&. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\&. For no other mapping to occur as a fall\-back,the parameters11008 \m[blue]\fBmap readonly\fR\m[])\&. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\&. When this parameter is set it will override the parameters 9626 11009 \m[blue]\fBmap hidden\fR\m[], 9627 11010 \m[blue]\fBmap system\fR\m[], … … 9629 11012 and 9630 11013 \m[blue]\fBmap readonly\fR\m[] 9631 must be set to off\&. This parameter writes the DOS attributes as a string into the extended attribute named "user\&.DOSATTRIB"\&. This extended attribute is explicitly hidden from smbd clients requesting an EA list\&. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\&. In Samba 3\&.5\&.0 and above the "user\&.DOSATTRIB" extended attribute has been extended to store the create time for a file as well as the DOS attributes\&. This is done in a backwards compatible way so files created by Samba 3\&.5\&.0 and above can still have the DOS attribute read from this extended attribute by earlier versions of Samba, but they will not be able to read the create time stored there\&. Storing the create time separately from the normal filesystem meta\-data allows Samba to faithfully reproduce NTFS semantics on top of a POSIX filesystem\&.11014 and they will behave as if they were set to off\&. This parameter writes the DOS attributes as a string into the extended attribute named "user\&.DOSATTRIB"\&. This extended attribute is explicitly hidden from smbd clients requesting an EA list\&. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\&. In Samba 3\&.5\&.0 and above the "user\&.DOSATTRIB" extended attribute has been extended to store the create time for a file as well as the DOS attributes\&. This is done in a backwards compatible way so files created by Samba 3\&.5\&.0 and above can still have the DOS attribute read from this extended attribute by earlier versions of Samba, but they will not be able to read the create time stored there\&. Storing the create time separately from the normal filesystem meta\-data allows Samba to faithfully reproduce NTFS semantics on top of a POSIX filesystem\&. 9632 11015 .sp 9633 11016 Default: … … 9643 11026 the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\&. In UNIX terminology this means that Samba will stop creating sparse files\&. 9644 11027 .sp 9645 This option is really des gined for file systems that support fast allocation of large numbers of blocks such as extent\-based file systems\&. On file systems that don\*(Aqt support extents (most notably ext3) this can make Samba slower\&. When you work with large files over >100MB on file systems without extents you may even run into problems with clients running into timeouts\&.11028 This option is really designed for file systems that support fast allocation of large numbers of blocks such as extent\-based file systems\&. On file systems that don\*(Aqt support extents (most notably ext3) this can make Samba slower\&. When you work with large files over >100MB on file systems without extents you may even run into problems with clients running into timeouts\&. 9646 11029 .sp 9647 11030 When you have an extent based filesystem it\*(Aqs likely that we can make use of unwritten extents which allows Samba to allocate even large amounts of space very fast and you will not see any timeout problems caused by strict allocate\&. With strict allocate in use you will also get much better out of quota messages in case you use quotas\&. Another advantage of activating this setting is that it will help to reduce file fragmentation\&. … … 9674 11057 .RE 9675 11058 11059 strict rename (S) 11060 .\" strict rename 11061 .PP 11062 .RS 4 11063 By default a Windows SMB server prevents directory renames when there are open file or directory handles below it in the filesystem hierarchy\&. Historically Samba has always allowed this as POSIX filesystem semantics require it\&. 11064 .sp 11065 This boolean parameter allows Samba to match the Windows behavior\&. Setting this to "yes" is a very expensive change, as it forces Samba to travers the entire open file handle database on every directory rename request\&. In a clustered Samba system the cost is even greater than the non\-clustered case\&. 11066 .sp 11067 When set to "no" smbd only checks the local process the client is attached to for open files below a directory being renamed, instead of checking for open files across all smbd processes\&. 11068 .sp 11069 Because of the expense in fully searching the database, the default is "no", and it is recommended to be left that way unless a specific Windows application requires it to be changed\&. 11070 .sp 11071 If the client has requested UNIX extensions (POSIX pathnames) then renames are always allowed and this parameter has no effect\&. 11072 .sp 11073 Default: 11074 \fI\fIstrict rename\fR\fR\fI = \fR\fIno\fR\fI \fR 11075 .RE 11076 9676 11077 strict sync (S) 9677 11078 .\" strict sync 9678 11079 .PP 9679 11080 .RS 4 9680 Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\&. Under UNIX, a sync call forces the processto be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\&. This is very slow and should only be done rarely\&. Setting this parameter to11081 Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\&. Under UNIX, a sync call forces the thread to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\&. This is very slow and should only be done rarely\&. Setting this parameter to 9681 11082 \fBno\fR 9682 11083 (the default) means that 9683 11084 \fBsmbd\fR(8) 9684 11085 ignores the Windows applications requests for a sync call\&. There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting\&. In addition, this fixes many performance problems that people have reported with the new Windows98 explorer shell file copies\&. 11086 .sp 11087 The flush request from SMB2/3 clients is handled asynchronously, so for these clients setting the parameter to 11088 \fByes\fR 11089 does not block the processing of other requests in the smbd process\&. 9685 11090 .sp 9686 11091 Default: … … 9727 11132 .RE 9728 11133 9729 syslog only (G)9730 .\" syslog only9731 .PP9732 .RS 49733 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\&. There still will be some logging to log\&.[sn]mbd even if9734 \fIsyslog only\fR9735 is enabled\&.9736 .sp9737 Default:9738 \fI\fIsyslog only\fR\fR\fI = \fR\fIno\fR\fI \fR9739 .RE9740 9741 11134 syslog (G) 9742 11135 .\" syslog … … 9753 11146 is enabled\&. 9754 11147 .sp 11148 The 11149 \m[blue]\fBlogging\fR\m[] 11150 parameter should be used instead\&. When 11151 \m[blue]\fBlogging\fR\m[] 11152 is set, it overrides the 11153 \m[blue]\fBsyslog\fR\m[] 11154 parameter\&. 11155 .sp 9755 11156 Default: 9756 11157 \fI\fIsyslog\fR\fR\fI = \fR\fI1\fR\fI \fR 11158 .RE 11159 11160 syslog only (G) 11161 .\" syslog only 11162 .PP 11163 .RS 4 11164 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\&. There still will be some logging to log\&.[sn]mbd even if 11165 \fIsyslog only\fR 11166 is enabled\&. 11167 .sp 11168 The 11169 \m[blue]\fBlogging\fR\m[] 11170 parameter should be used instead\&. When 11171 \m[blue]\fBlogging\fR\m[] 11172 is set, it overrides the 11173 \m[blue]\fBsyslog only\fR\m[] 11174 parameter\&. 11175 .sp 11176 Default: 11177 \fI\fIsyslog only\fR\fR\fI = \fR\fIno\fR\fI \fR 9757 11178 .RE 9758 11179 … … 9781 11202 daemon uses this parameter to fill in the login shell for that user\&. 9782 11203 .sp 9783 \fINo default\fR 9784 .RE 9785 9786 time offset (G) 9787 .\" time offset 9788 .PP 9789 .RS 4 9790 This deprecated parameter is a setting in minutes to add to the normal GMT to local time conversion\&. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\&. 9791 .if n \{\ 9792 .sp 9793 .\} 9794 .RS 4 9795 .it 1 an-trap 9796 .nr an-no-space-flag 1 9797 .nr an-break-flag 1 9798 .br 9799 .ps +1 9800 \fBNote\fR 9801 .ps -1 9802 .br 9803 This option is deprecated, and will be removed in the next major release 9804 .sp .5v 9805 .RE 9806 Default: 9807 \fI\fItime offset\fR\fR\fI = \fR\fI0\fR\fI \fR 9808 .sp 9809 Example: 9810 \fI\fItime offset\fR\fR\fI = \fR\fI60\fR\fI \fR 11204 Default: 11205 \fI\fItemplate shell\fR\fR\fI = \fR\fI/bin/false\fR\fI \fR 9811 11206 .RE 9812 11207 … … 9823 11218 .RE 9824 11219 11220 debug timestamp 11221 .\" debug timestamp 11222 .PP 11223 .RS 4 11224 This parameter is a synonym for 11225 timestamp logs\&. 11226 .RE 11227 11228 timestamp logs (G) 11229 .\" timestamp logs 11230 .PP 11231 .RS 4 11232 Samba debug log messages are timestamped by default\&. If you are running at a high 11233 \m[blue]\fBdebug level\fR\m[] 11234 these timestamps can be distracting\&. This boolean parameter allows timestamping to be turned off\&. 11235 .sp 11236 Default: 11237 \fI\fItimestamp logs\fR\fR\fI = \fR\fIyes\fR\fI \fR 11238 .RE 11239 11240 tls cafile (G) 11241 .\" tls cafile 11242 .PP 11243 .RS 4 11244 This option can be set to a file (PEM format) containing CA certificates of root CAs to trust to sign certificates or intermediate CA certificates\&. 11245 .sp 11246 This path is relative to 11247 \m[blue]\fBprivate dir\fR\m[] 11248 if the path does not start with a /\&. 11249 .sp 11250 Default: 11251 \fI\fItls cafile\fR\fR\fI = \fR\fItls/ca\&.pem\fR\fI \fR 11252 .RE 11253 11254 tls certfile (G) 11255 .\" tls certfile 11256 .PP 11257 .RS 4 11258 This option can be set to a file (PEM format) containing the RSA certificate\&. 11259 .sp 11260 This path is relative to 11261 \m[blue]\fBprivate dir\fR\m[] 11262 if the path does not start with a /\&. 11263 .sp 11264 Default: 11265 \fI\fItls certfile\fR\fR\fI = \fR\fItls/cert\&.pem\fR\fI \fR 11266 .RE 11267 11268 tls crlfile (G) 11269 .\" tls crlfile 11270 .PP 11271 .RS 4 11272 This option can be set to a file containing a certificate revocation list (CRL)\&. 11273 .sp 11274 This path is relative to 11275 \m[blue]\fBprivate dir\fR\m[] 11276 if the path does not start with a /\&. 11277 .sp 11278 Default: 11279 \fI\fItls crlfile\fR\fR\fI = \fR\fI\fR\fI \fR 11280 .RE 11281 11282 tls dh params file (G) 11283 .\" tls dh params file 11284 .PP 11285 .RS 4 11286 This option can be set to a file with Diffie\-Hellman parameters which will be used with DH ciphers\&. 11287 .sp 11288 This path is relative to 11289 \m[blue]\fBprivate dir\fR\m[] 11290 if the path does not start with a /\&. 11291 .sp 11292 Default: 11293 \fI\fItls dh params file\fR\fR\fI = \fR\fI\fR\fI \fR 11294 .RE 11295 11296 tls enabled (G) 11297 .\" tls enabled 11298 .PP 11299 .RS 4 11300 If this option is set to 11301 \fByes\fR, then Samba will use TLS when possible in communication\&. 11302 .sp 11303 Default: 11304 \fI\fItls enabled\fR\fR\fI = \fR\fIyes\fR\fI \fR 11305 .RE 11306 11307 tls keyfile (G) 11308 .\" tls keyfile 11309 .PP 11310 .RS 4 11311 This option can be set to a file (PEM format) containing the RSA private key\&. This file must be accessible without a pass\-phrase, i\&.e\&. it must not be encrypted\&. 11312 .sp 11313 This path is relative to 11314 \m[blue]\fBprivate dir\fR\m[] 11315 if the path does not start with a /\&. 11316 .sp 11317 Default: 11318 \fI\fItls keyfile\fR\fR\fI = \fR\fItls/key\&.pem\fR\fI \fR 11319 .RE 11320 11321 tls priority (G) 11322 .\" tls priority 11323 .PP 11324 .RS 4 11325 This option can be set to a string describing the TLS protocols to be supported in the parts of Samba that use GnuTLS, specifically the AD DC\&. 11326 .sp 11327 The default turns off SSLv3, as this protocol is no longer considered secure after CVE\-2014\-3566 (otherwise known as POODLE) impacted SSLv3 use in HTTPS applications\&. 11328 .sp 11329 The valid options are described in the 11330 GNUTLS Priority\-Strings documentation at http://gnutls\&.org/manual/html_node/Priority\-Strings\&.html 11331 .sp 11332 Default: 11333 \fI\fItls priority\fR\fR\fI = \fR\fINORMAL:\-VERS\-SSL3\&.0\fR\fI \fR 11334 .RE 11335 11336 tls verify peer (G) 11337 .\" tls verify peer 11338 .PP 11339 .RS 4 11340 This controls if and how strict the client will verify the peer\*(Aqs certificate and name\&. Possible values are (in increasing order): 11341 \fBno_check\fR, 11342 \fBca_only\fR, 11343 \fBca_and_name_if_available\fR, 11344 \fBca_and_name\fR 11345 and 11346 \fBas_strict_as_possible\fR\&. 11347 .sp 11348 When set to 11349 \fBno_check\fR 11350 the certificate is not verified at all, which allows trivial man in the middle attacks\&. 11351 .sp 11352 When set to 11353 \fBca_only\fR 11354 the certificate is verified to be signed from a ca specified in the 11355 \m[blue]\fBtls ca file\fR\m[] 11356 option\&. Setting 11357 \m[blue]\fBtls ca file\fR\m[] 11358 to a valid file is required\&. The certificate lifetime is also verified\&. If the 11359 \m[blue]\fBtls crl file\fR\m[] 11360 option is configured, the certificate is also verified against the ca crl\&. 11361 .sp 11362 When set to 11363 \fBca_and_name_if_available\fR 11364 all checks from 11365 \fBca_only\fR 11366 are performed\&. In addition, the peer hostname is verified against the certificate\*(Aqs name, if it is provided by the application layer and not given as an ip address string\&. 11367 .sp 11368 When set to 11369 \fBca_and_name\fR 11370 all checks from 11371 \fBca_and_name_if_available\fR 11372 are performed\&. In addition the peer hostname needs to be provided and even an ip address is checked against the certificate\*(Aqs name\&. 11373 .sp 11374 When set to 11375 \fBas_strict_as_possible\fR 11376 all checks from 11377 \fBca_and_name\fR 11378 are performed\&. In addition the 11379 \m[blue]\fBtls crl file\fR\m[] 11380 needs to be configured\&. Future versions of Samba may implement additional checks\&. 11381 .sp 11382 Default: 11383 \fI\fItls verify peer\fR\fR\fI = \fR\fIas_strict_as_possible\fR\fI \fR 11384 .RE 11385 11386 unicode (G) 11387 .\" unicode 11388 .PP 11389 .RS 4 11390 Specifies whether the server and client should support unicode\&. 11391 .sp 11392 If this option is set to false, the use of ASCII will be forced\&. 11393 .sp 11394 Default: 11395 \fI\fIunicode\fR\fR\fI = \fR\fIyes\fR\fI \fR 11396 .RE 11397 9825 11398 unix charset (G) 9826 11399 .\" unix charset … … 9832 11405 .sp 9833 11406 Default: 9834 \fI\fIunix charset\fR\fR\fI = \fR\fIUTF 8\fR\fI \fR11407 \fI\fIunix charset\fR\fR\fI = \fR\fIUTF\-8\fR\fI \fR 9835 11408 .sp 9836 11409 Example: … … 9879 11452 disable spoolss = yes\&. 9880 11453 .sp 9881 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\&. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\&. If the user possesses local administ ator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\&. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\&.11454 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\&. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\&. If the user possesses local administrator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\&. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\&. 9882 11455 .sp 9883 11456 If this parameter is enabled for a printer, then any attempt to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped to PRINTER_ACCESS_USE instead\&. Thus allowing the OpenPrinterEx() call to succeed\&. … … 9900 11473 .RE 9901 11474 11475 user 11476 .\" user 11477 .PP 11478 .RS 4 11479 This parameter is a synonym for 11480 username\&. 11481 .RE 11482 11483 users 11484 .\" users 11485 .PP 11486 .RS 4 11487 This parameter is a synonym for 11488 username\&. 11489 .RE 11490 11491 username (S) 11492 .\" username 11493 .PP 11494 .RS 4 11495 To restrict a service to a particular set of users you can use the 11496 \m[blue]\fBvalid users\fR\m[] 11497 parameter\&. 11498 .sp 11499 This parameter is deprecated 11500 .sp 11501 However, it currently operates only in conjunction with 11502 \m[blue]\fBonly user\fR\m[]\&. The supported way to restrict a service to a particular set of users is the 11503 \m[blue]\fBvalid users\fR\m[] 11504 parameter\&. 11505 .sp 11506 Default: 11507 \fI\fIusername\fR\fR\fI = \fR\fI # The guest account if a guest service, else <empty string>\&.\fR\fI \fR 11508 .sp 11509 Example: 11510 \fI\fIusername\fR\fR\fI = \fR\fIfred, mary, jack, jane, @users, @pcgroup\fR\fI \fR 11511 .RE 11512 9902 11513 username level (G) 9903 11514 .\" username level … … 9916 11527 Example: 9917 11528 \fI\fIusername level\fR\fR\fI = \fR\fI5\fR\fI \fR 11529 .RE 11530 11531 username map (G) 11532 .\" username map 11533 .PP 11534 .RS 4 11535 This option allows you to specify a file containing a mapping of usernames from the clients to the server\&. This can be used for several purposes\&. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\&. The other is to map multiple users to a single username so that they can more easily share files\&. 11536 .sp 11537 Please note that for user mode security, the username map is applied prior to validating the user credentials\&. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified entries in the map table (e\&.g\&. biddle = 11538 DOMAIN\efoo)\&. 11539 .sp 11540 The map file is parsed line by line\&. Each line should contain a single UNIX username on the left then a \*(Aq=\*(Aq followed by a list of usernames on the right\&. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\&. The special client name \*(Aq*\*(Aq is a wildcard and matches any name\&. Each line of the map file may be up to 1023 characters long\&. 11541 .sp 11542 The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \*(Aq=\*(Aq signs\&. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\&. Processing then continues with the next line\&. 11543 .sp 11544 If any line begins with a \*(Aq#\*(Aq or a \*(Aq;\*(Aq then it is ignored\&. 11545 .sp 11546 If any line begins with an \*(Aq!\*(Aq then the processing will stop after that line if a mapping was done by the line\&. Otherwise mapping continues with every line being processed\&. Using \*(Aq!\*(Aq is most useful when you have a wildcard mapping line later in the file\&. 11547 .sp 11548 For example to map from the name 11549 \fBadmin\fR 11550 or 11551 \fBadministrator\fR 11552 to the UNIX name 11553 \fB root\fR 11554 you would use: 11555 .sp 11556 .if n \{\ 11557 .RS 4 11558 .\} 11559 .nf 11560 root = admin administrator 11561 .fi 11562 .if n \{\ 11563 .RE 11564 .\} 11565 .sp 11566 Or to map anyone in the UNIX group 11567 \fBsystem\fR 11568 to the UNIX name 11569 \fBsys\fR 11570 you would use: 11571 .sp 11572 .if n \{\ 11573 .RS 4 11574 .\} 11575 .nf 11576 sys = @system 11577 .fi 11578 .if n \{\ 11579 .RE 11580 .\} 11581 .sp 11582 You can have as many mappings as you like in a username map file\&. 11583 .sp 11584 If your system supports the NIS NETGROUP option then the netgroup database is checked before the 11585 /etc/group 11586 database for matching groups\&. 11587 .sp 11588 You can map Windows usernames that have spaces in them by using double quotes around the name\&. For example: 11589 .sp 11590 .if n \{\ 11591 .RS 4 11592 .\} 11593 .nf 11594 tridge = "Andrew Tridgell" 11595 .fi 11596 .if n \{\ 11597 .RE 11598 .\} 11599 .sp 11600 would map the windows username "Andrew Tridgell" to the unix username "tridge"\&. 11601 .sp 11602 The following example would map mary and fred to the unix user sys, and map the rest to guest\&. Note the use of the \*(Aq!\*(Aq to tell Samba to stop processing if it gets a match on that line: 11603 .sp 11604 .if n \{\ 11605 .RS 4 11606 .\} 11607 .nf 11608 !sys = mary fred 11609 guest = * 11610 .fi 11611 .if n \{\ 11612 .RE 11613 .\} 11614 .sp 11615 Note that the remapping is applied to all occurrences of usernames\&. Thus if you connect to \e\eserver\efred and 11616 \fBfred\fR 11617 is remapped to 11618 \fBmary\fR 11619 then you will actually be connecting to \e\eserver\emary and will need to supply a password suitable for 11620 \fBmary\fR 11621 not 11622 \fBfred\fR\&. The only exception to this is the username passed to a Domain Controller (if you have one)\&. The DC will receive whatever username the client supplies without modification\&. 11623 .sp 11624 Also note that no reverse mapping is done\&. The main effect this has is with printing\&. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\*(Aqt own the print job\&. 11625 .sp 11626 Samba versions prior to 3\&.0\&.8 would only support reading the fully qualified username (e\&.g\&.: 11627 DOMAIN\euser) from the username map when performing a kerberos login from a client\&. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\&. This resulted in inconsistent behavior sometimes even on the same server\&. 11628 .sp 11629 The following functionality is obeyed in version 3\&.0\&.8 and later: 11630 .sp 11631 When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\&. 11632 .sp 11633 When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\&.e\&. 11634 DOMAIN\euser) only after the user has been successfully authenticated\&. 11635 .sp 11636 An example of use is: 11637 .sp 11638 .if n \{\ 11639 .RS 4 11640 .\} 11641 .nf 11642 username map = /usr/local/samba/lib/users\&.map 11643 .fi 11644 .if n \{\ 11645 .RE 11646 .\} 11647 .sp 11648 Default: 11649 \fI\fIusername map\fR\fR\fI = \fR\fI # no username map\fR\fI \fR 9918 11650 .RE 9919 11651 … … 9947 11679 This script is a mutually exclusive alternative to the 9948 11680 \m[blue]\fBusername map\fR\m[] 9949 parameter\&. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line lineon standard output (the name to which the account should mapped)\&. In this way, it is possible to store username map tables in an LDAP or NIS directory services\&.11681 parameter\&. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line on standard output (the name to which the account should mapped)\&. In this way, it is possible to store username map tables in an LDAP or NIS directory services\&. 9950 11682 .sp 9951 11683 Default: … … 9954 11686 Example: 9955 11687 \fI\fIusername map script\fR\fR\fI = \fR\fI/etc/samba/scripts/mapusers\&.sh\fR\fI \fR 9956 .RE9957 9958 username map (G)9959 .\" username map9960 .PP9961 .RS 49962 This option allows you to specify a file containing a mapping of usernames from the clients to the server\&. This can be used for several purposes\&. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\&. The other is to map multiple users to a single username so that they can more easily share files\&.9963 .sp9964 Please note that for user or share mode security, the username map is applied prior to validating the user credentials\&. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified enties in the map table (e\&.g\&. biddle =9965 DOMAIN\efoo)\&.9966 .sp9967 The map file is parsed line by line\&. Each line should contain a single UNIX username on the left then a \*(Aq=\*(Aq followed by a list of usernames on the right\&. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\&. The special client name \*(Aq*\*(Aq is a wildcard and matches any name\&. Each line of the map file may be up to 1023 characters long\&.9968 .sp9969 The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \*(Aq=\*(Aq signs\&. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\&. Processing then continues with the next line\&.9970 .sp9971 If any line begins with a \*(Aq#\*(Aq or a \*(Aq;\*(Aq then it is ignored\&.9972 .sp9973 If any line begins with an \*(Aq!\*(Aq then the processing will stop after that line if a mapping was done by the line\&. Otherwise mapping continues with every line being processed\&. Using \*(Aq!\*(Aq is most useful when you have a wildcard mapping line later in the file\&.9974 .sp9975 For example to map from the name9976 \fBadmin\fR9977 or9978 \fBadministrator\fR9979 to the UNIX name9980 \fB root\fR9981 you would use:9982 .sp9983 .if n \{\9984 .RS 49985 .\}9986 .nf9987 root = admin administrator9988 .fi9989 .if n \{\9990 .RE9991 .\}9992 .sp9993 Or to map anyone in the UNIX group9994 \fBsystem\fR9995 to the UNIX name9996 \fBsys\fR9997 you would use:9998 .sp9999 .if n \{\10000 .RS 410001 .\}10002 .nf10003 sys = @system10004 .fi10005 .if n \{\10006 .RE10007 .\}10008 .sp10009 You can have as many mappings as you like in a username map file\&.10010 .sp10011 If your system supports the NIS NETGROUP option then the netgroup database is checked before the10012 /etc/group10013 database for matching groups\&.10014 .sp10015 You can map Windows usernames that have spaces in them by using double quotes around the name\&. For example:10016 .sp10017 .if n \{\10018 .RS 410019 .\}10020 .nf10021 tridge = "Andrew Tridgell"10022 .fi10023 .if n \{\10024 .RE10025 .\}10026 .sp10027 would map the windows username "Andrew Tridgell" to the unix username "tridge"\&.10028 .sp10029 The following example would map mary and fred to the unix user sys, and map the rest to guest\&. Note the use of the \*(Aq!\*(Aq to tell Samba to stop processing if it gets a match on that line:10030 .sp10031 .if n \{\10032 .RS 410033 .\}10034 .nf10035 !sys = mary fred10036 guest = *10037 .fi10038 .if n \{\10039 .RE10040 .\}10041 .sp10042 Note that the remapping is applied to all occurrences of usernames\&. Thus if you connect to \e\eserver\efred and10043 \fBfred\fR10044 is remapped to10045 \fBmary\fR10046 then you will actually be connecting to \e\eserver\emary and will need to supply a password suitable for10047 \fBmary\fR10048 not10049 \fBfred\fR\&. The only exception to this is the username passed to the10050 \m[blue]\fBpassword server\fR\m[]10051 (if you have one)\&. The password server will receive whatever username the client supplies without modification\&.10052 .sp10053 Also note that no reverse mapping is done\&. The main effect this has is with printing\&. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\*(Aqt own the print job\&.10054 .sp10055 Samba versions prior to 3\&.0\&.8 would only support reading the fully qualified username (e\&.g\&.:10056 DOMAIN\euser) from the username map when performing a kerberos login from a client\&. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\&. This resulted in inconsistent behavior sometimes even on the same server\&.10057 .sp10058 The following functionality is obeyed in version 3\&.0\&.8 and later:10059 .sp10060 When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\&.10061 .sp10062 When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\&.e\&.10063 DOMAIN\euser) only after the user has been successfully authenticated\&.10064 .sp10065 An example of use is:10066 .sp10067 .if n \{\10068 .RS 410069 .\}10070 .nf10071 username map = /usr/local/samba/lib/users\&.map10072 .fi10073 .if n \{\10074 .RE10075 .\}10076 .sp10077 Default:10078 \fI\fIusername map\fR\fR\fI = \fR\fI # no username map\fR\fI \fR10079 .RE10080 10081 user10082 .\" user10083 .PP10084 .RS 410085 This parameter is a synonym for10086 username\&.10087 .RE10088 10089 users10090 .\" users10091 .PP10092 .RS 410093 This parameter is a synonym for10094 username\&.10095 .RE10096 10097 username (S)10098 .\" username10099 .PP10100 .RS 410101 Multiple users may be specified in a comma\-delimited list, in which case the supplied password will be tested against each username in turn (left to right)\&.10102 .sp10103 The deprecated10104 \fIusername\fR10105 line is needed only when the PC is unable to supply its own username\&. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames\&. In both these cases you may also be better using the \e\eserver\eshare%user syntax instead\&.10106 .sp10107 The10108 \fIusername\fR10109 line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the10110 \fIusername\fR10111 line in turn\&. This is slow and a bad idea for lots of users in case of duplicate passwords\&. You may get timeouts or security breaches using this parameter unwisely\&.10112 .sp10113 Samba relies on the underlying UNIX security\&. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password\&. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session\&. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do\&.10114 .sp10115 To restrict a service to a particular set of users you can use the10116 \m[blue]\fBvalid users\fR\m[]10117 parameter\&.10118 .sp10119 If any of the usernames begin with a \*(Aq@\*(Aq then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name\&.10120 .sp10121 If any of the usernames begin with a \*(Aq+\*(Aq then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name\&.10122 .sp10123 If any of the usernames begin with a \*(Aq&\*(Aq then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name\&.10124 .sp10125 Note that searching though a groups database can take quite some time, and some clients may time out during the search\&.10126 .sp10127 See the section10128 NOTE ABOUT USERNAME/PASSWORD VALIDATION10129 for more information on how this parameter determines access to the services\&.10130 .sp10131 Default:10132 \fI\fIusername\fR\fR\fI = \fR\fI # The guest account if a guest service, else <empty string>\&.\fR\fI \fR10133 .sp10134 Example:10135 \fI\fIusername\fR\fR\fI = \fR\fIfred, mary, jack, jane, @users, @pcgroup\fR\fI \fR10136 11688 .RE 10137 11689 … … 10165 11717 .sp 10166 11718 Default: 10167 \fI\fIusershare owner only\fR\fR\fI = \fR\fI True\fR\fI \fR11719 \fI\fIusershare owner only\fR\fR\fI = \fR\fIyes\fR\fI \fR 10168 11720 .RE 10169 11721 … … 10172 11724 .PP 10173 11725 .RS 4 10174 This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\&. This directory must be owned by root, and have no access for other, and be writable only by the group owner\&. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\&. Members of the group owner of this directory are the users allowed to create usershares\&. If this parameter is undefined then no user defined shares are allowed\&.11726 This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\&. This directory must be owned by root, and have no access for other, and be writable only by the group owner\&. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\&. Members of the group owner of this directory are the users allowed to create usershares\&. 10175 11727 .sp 10176 11728 For example, a valid usershare directory might be /usr/local/samba/lib/usershares, set up as follows\&. 10177 .sp10178 10179 11729 .sp 10180 11730 .if n \{\ … … 10193 11743 .sp 10194 11744 Default: 10195 \fI\fIusershare path\fR\fR\fI = \fR\fI NULL\fR\fI \fR11745 \fI\fIusershare path\fR\fR\fI = \fR\fI${prefix}/var/locks/usershares\fR\fI \fR 10196 11746 .RE 10197 11747 … … 10205 11755 .sp 10206 11756 Default: 10207 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fI NULL\fR\fI \fR11757 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fI\fR\fI \fR 10208 11758 .sp 10209 11759 Example: … … 10220 11770 .sp 10221 11771 Default: 10222 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fI NULL\fR\fI \fR11772 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fI\fR\fI \fR 10223 11773 .sp 10224 11774 Example: … … 10235 11785 .sp 10236 11786 Default: 10237 \fI\fIusershare template share\fR\fR\fI = \fR\fI NULL\fR\fI \fR11787 \fI\fIusershare template share\fR\fR\fI = \fR\fI\fR\fI \fR 10238 11788 .sp 10239 11789 Example: … … 10251 11801 .sp 10252 11802 Default: 10253 \fI\fIuse sendfile\fR\fR\fI = \fR\fI false\fR\fI \fR11803 \fI\fIuse sendfile\fR\fR\fI = \fR\fIno\fR\fI \fR 10254 11804 .RE 10255 11805 … … 10258 11808 .PP 10259 11809 .RS 4 10260 This deprecated variable controls controlswhether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&.11810 This deprecated variable controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&. 10261 11811 .sp 10262 11812 Unless further issues are discovered with our SPNEGO implementation, there is no reason this should ever be disabled\&. … … 10264 11814 Default: 10265 11815 \fI\fIuse spnego\fR\fR\fI = \fR\fIyes\fR\fI \fR 11816 .RE 11817 11818 utmp (G) 11819 .\" utmp 11820 .PP 11821 .RS 4 11822 This boolean parameter is only available if Samba has been configured and compiled with the option 11823 \-\-with\-utmp\&. If set to 11824 \fByes\fR 11825 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\&. Sites may use this to record the user connecting to a Samba share\&. 11826 .sp 11827 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\&. Enabling this option creates an n^2 algorithm to find this number\&. This may impede performance on large installations\&. 11828 .sp 11829 Default: 11830 \fI\fIutmp\fR\fR\fI = \fR\fIno\fR\fI \fR 10266 11831 .RE 10267 11832 … … 10282 11847 .RE 10283 11848 10284 utmp (G) 10285 .\" utmp 10286 .PP 10287 .RS 4 10288 This boolean parameter is only available if Samba has been configured and compiled with the option 10289 \-\-with\-utmp\&. If set to 10290 \fByes\fR 10291 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\&. Sites may use this to record the user connecting to a Samba share\&. 10292 .sp 10293 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\&. Enabling this option creates an n^2 algorithm to find this number\&. This may impede performance on large installations\&. 10294 .sp 10295 Default: 10296 \fI\fIutmp\fR\fR\fI = \fR\fIno\fR\fI \fR 11849 \-valid (S) 11850 .\" -valid 11851 .PP 11852 .RS 4 11853 This parameter indicates whether a share is valid and thus can be used\&. When this parameter is set to false, the share will be in no way visible nor accessible\&. 11854 .sp 11855 This option should not be used by regular users but might be of help to developers\&. Samba uses this option internally to mark shares as deleted\&. 11856 .sp 11857 Default: 11858 \fI\fI\-valid\fR\fR\fI = \fR\fIyes\fR\fI \fR 10297 11859 .RE 10298 11860 … … 10312 11874 \fI%S\fR\&. This is useful in the [homes] section\&. 10313 11875 .sp 11876 \fINote: \fRWhen used in the [global] section this parameter may have unwanted side effects\&. For example: If samba is configured as a MASTER BROWSER (see 11877 \fIlocal master\fR, 11878 \fIos level\fR, 11879 \fIdomain master\fR, 11880 \fIpreferred master\fR) this option will prevent workstations from being able to browse the network\&. 11881 .sp 10314 11882 Default: 10315 11883 \fI\fIvalid users\fR\fR\fI = \fR\fI # No valid users list (anyone can login) \fR\fI \fR … … 10317 11885 Example: 10318 11886 \fI\fIvalid users\fR\fR\fI = \fR\fIgreg, @pcusers\fR\fI \fR 10319 .RE10320 10321 \-valid (S)10322 .\" -valid10323 .PP10324 .RS 410325 This parameter indicates whether a share is valid and thus can be used\&. When this parameter is set to false, the share will be in no way visible nor accessible\&.10326 .sp10327 This option should not be used by regular users but might be of help to developers\&. Samba uses this option internally to mark shares as deleted\&.10328 .sp10329 Default:10330 \fI\fI\-valid\fR\fR\fI = \fR\fIyes\fR\fI \fR10331 11887 .RE 10332 11888 … … 10374 11930 .sp 10375 11931 Default: 10376 \fI\fIveto files\fR\fR\fI = \fR\fI No files or directories are vetoed\&.\fR\fI \fR11932 \fI\fIveto files\fR\fR\fI = \fR\fI # No files or directories are vetoed\fR\fI \fR 10377 11933 .RE 10378 11934 … … 10437 11993 .RE 10438 11994 11995 web port (G) 11996 .\" web port 11997 .PP 11998 .RS 4 11999 Specifies which port the Samba web server should listen on\&. 12000 .sp 12001 Default: 12002 \fI\fIweb port\fR\fR\fI = \fR\fI901\fR\fI \fR 12003 .sp 12004 Example: 12005 \fI\fIweb port\fR\fR\fI = \fR\fI80\fR\fI \fR 12006 .RE 12007 10439 12008 wide links (S) 10440 12009 .\" wide links … … 10469 12038 Default: 10470 12039 \fI\fIwinbind cache time\fR\fR\fI = \fR\fI300\fR\fI \fR 12040 .RE 12041 12042 winbindd privileged socket directory (G) 12043 .\" winbindd privileged socket directory 12044 .PP 12045 .RS 4 12046 This setting controls the location of the winbind daemon\*(Aqs privileged socket\&. 12047 .sp 12048 Default: 12049 \fI\fIwinbindd privileged socket directory\fR\fR\fI = \fR\fI${prefix}/var/lib/winbindd_privileged\fR\fI \fR 12050 .RE 12051 12052 winbindd socket directory (G) 12053 .\" winbindd socket directory 12054 .PP 12055 .RS 4 12056 This setting controls the location of the winbind daemon\*(Aqs socket\&. 12057 .sp 12058 Except within automated test scripts, this should not be altered, as the client tools (nss_winbind etc) do not honour this parameter\&. Client tools must then be advised of the altered path with the WINBINDD_SOCKET_DIR environment varaible\&. 12059 .sp 12060 Default: 12061 \fI\fIwinbindd socket directory\fR\fR\fI = \fR\fI${prefix}/var/run/winbindd\fR\fI \fR 10471 12062 .RE 10472 12063 … … 10553 12144 Be aware that a high value for this parameter can result in system slowdown as the main parent winbindd daemon must perform the group unrolling and will be unable to answer incoming NSS or authentication requests during this time\&. 10554 12145 .sp 10555 Default: 10556 \fI\fIwinbind expand groups\fR\fR\fI = \fR\fI1\fR\fI \fR 12146 The default value was changed from 1 to 0 with Samba 4\&.2\&. Some broken applications calculate the group memberships of users by traversing groups, such applications will require "winbind expand groups = 1"\&. But the new default makes winbindd more reliable as it doesn\*(Aqt require SAMR access to domain controllers of trusted domains\&. 12147 .sp 12148 Default: 12149 \fI\fIwinbind expand groups\fR\fR\fI = \fR\fI0\fR\fI \fR 10557 12150 .RE 10558 12151 … … 10563 12156 This parameter specifies the maximum number of clients the 10564 12157 \fBwinbindd\fR(8) 10565 daemon can connect with\&. 12158 daemon can connect with\&. The parameter is not a hard limit\&. The 12159 \fBwinbindd\fR(8) 12160 daemon configures itself to be able to accept at least that many connections, and if the limit is reached, an attempt is made to disconnect idle clients\&. 10566 12161 .sp 10567 12162 Default: … … 10605 12200 This parameter controls whether winbindd will replace whitespace in user and group names with an underscore (_) character\&. For example, whether the name "Space Kadet" should be replaced with the string "space_kadet"\&. Frequently Unix shell scripts will have difficulty with usernames contains whitespace due to the default field separator in the shell\&. If your domain possesses names containing the underscore character, this option may cause problems unless the name aliasing feature is supported by your nss_info plugin\&. 10606 12201 .sp 10607 This feature also enables the name aliasing API which can be used to make domain user and group names to a non\-qualified version\&. Please refer to the manpage for the configured idmap and nss_info plugin for the specifics on how to configure name aliasing for a specific configuration\&. Name aliasing takes precedence (and is mutually exclusive) over the whitespace replacement mechanism discussed previ souly\&.12202 This feature also enables the name aliasing API which can be used to make domain user and group names to a non\-qualified version\&. Please refer to the manpage for the configured idmap and nss_info plugin for the specifics on how to configure name aliasing for a specific configuration\&. Name aliasing takes precedence (and is mutually exclusive) over the whitespace replacement mechanism discussed previously\&. 10608 12203 .sp 10609 12204 Default: … … 10643 12238 .IP \(bu 2.3 10644 12239 .\} 10645 \fI<sfu | rfc2307 >\fR10646 \- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\&. Note that retrieving UID and GID from your ADS\-Server requires to use12240 \fI<sfu | sfu20 | rfc2307 >\fR 12241 \- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\&. For SFU 3\&.0 or 3\&.5 simply choose "sfu", if you use SFU 2\&.0 please choose "sfu20"\&. Note that retrieving UID and GID from your ADS\-Server requires to use 10647 12242 \fIidmap config DOMAIN:backend\fR 10648 = ad as well\&. 12243 = ad as well\&. The primary group membership is currently always calculated via the "primaryGroupID" LDAP attribute\&. 10649 12244 .RE 10650 12245 .sp … … 10662 12257 .PP 10663 12258 .RS 4 10664 This parameter is designed to control whether Winbind should allow to login with the12259 This parameter is designed to control whether Winbind should allow one to login with the 10665 12260 \fIpam_winbind\fR 10666 12261 module using Cached Credentials\&. If enabled, winbindd will store user credentials from successful logins encrypted in a local cache\&. 10667 12262 .sp 10668 12263 Default: 10669 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fI false\fR\fI \fR10670 .sp 10671 Example: 10672 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fI true\fR\fI \fR12264 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fIno\fR\fI \fR 12265 .sp 12266 Example: 12267 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fIyes\fR\fI \fR 10673 12268 .RE 10674 12269 … … 10694 12289 .sp 10695 12290 Default: 10696 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIfalse\fR\fI \fR 10697 .sp 10698 Example: 10699 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fItrue\fR\fI \fR 12291 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIno\fR\fI \fR 12292 .sp 12293 Example: 12294 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIyes\fR\fI \fR 12295 .RE 12296 12297 winbind request timeout (G) 12298 .\" winbind request timeout 12299 .PP 12300 .RS 4 12301 This parameter specifies the number of seconds the 12302 \fBwinbindd\fR(8) 12303 daemon will wait before disconnecting either a client connection with no outstanding requests (idle) or a client connection with a request that has remained outstanding (hung) for longer than this number of seconds\&. 12304 .sp 12305 Default: 12306 \fI\fIwinbind request timeout\fR\fR\fI = \fR\fI60\fR\fI \fR 10700 12307 .RE 10701 12308 … … 10710 12317 Default: 10711 12318 \fI\fIwinbind rpc only\fR\fR\fI = \fR\fIno\fR\fI \fR 12319 .RE 12320 12321 winbind sealed pipes (G) 12322 .\" winbind sealed pipes 12323 .PP 12324 .RS 4 12325 This option controls whether any requests from winbindd to domain controllers pipe will be sealed\&. Disabling sealing can be useful for debugging purposes\&. 12326 .sp 12327 The behavior can be controlled per netbios domain by using \*(Aqwinbind sealed pipes:NETBIOSDOMAIN = no\*(Aq as option\&. 12328 .sp 12329 Default: 12330 \fI\fIwinbind sealed pipes\fR\fR\fI = \fR\fIyes\fR\fI \fR 10712 12331 .RE 10713 12332 … … 10726 12345 .sp 10727 12346 Default: 10728 \fI\fIwinbind separator\fR\fR\fI = \fR\fI\ *(Aq\e\*(Aq\fR\fI \fR12347 \fI\fIwinbind separator\fR\fR\fI = \fR\fI\e\fR\fI \fR 10729 12348 .sp 10730 12349 Example: … … 10933 12552 .RE 10934 12553 12554 write ok 12555 .\" write ok 12556 .PP 12557 .RS 4 12558 This parameter is a synonym for 12559 writeable\&. 12560 .RE 12561 10935 12562 writeable (S) 10936 12563 .\" writeable … … 10956 12583 The integer parameter specifies the size of this cache (per oplocked file) in bytes\&. 10957 12584 .sp 12585 Note that the write cache won\*(Aqt be used for file handles with a smb2 write lease\&. 12586 .sp 10958 12587 Default: 10959 12588 \fI\fIwrite cache size\fR\fR\fI = \fR\fI0\fR\fI \fR … … 10973 12602 Note that if a user is in both the read list and the write list then they will be given write access\&. 10974 12603 .sp 10975 By design, this parameter will not work with the10976 \m[blue]\fBsecurity = share\fR\m[]10977 in Samba 3\&.0\&.10978 .sp10979 12604 Default: 10980 12605 \fI\fIwrite list\fR\fR\fI = \fR\fI\fR\fI \fR … … 10988 12613 .PP 10989 12614 .RS 4 10990 This parameter controls whether or not the server will support raw write SMB\*(Aqs when transferring data from clients\&. You should never need to change this parameter\&. 12615 This is ignored if 12616 \m[blue]\fBasync smb echo handler\fR\m[] 12617 is set, because this feature is incompatible with raw write SMB requests 12618 .sp 12619 If enabled, raw writes allow writes of 65535 bytes in one packet\&. This typically provides a major performance benefit for some very, very old clients\&. 12620 .sp 12621 However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw writes\&. 12622 .sp 12623 In general this parameter should be viewed as a system tuning tool and left severely alone\&. 10991 12624 .sp 10992 12625 Default: … … 11026 12659 .SH "VERSION" 11027 12660 .PP 11028 This man page is correct for version 3of the Samba suite\&.12661 This man page is correct for version 4 of the Samba suite\&. 11029 12662 .SH "SEE ALSO" 11030 12663 .PP 11031 11032 12664 \fBsamba\fR(7), 11033 12665 \fBsmbpasswd\fR(8), 11034 \fBswat\fR(8),11035 12666 \fBsmbd\fR(8), 11036 12667 \fBnmbd\fR(8), 12668 \fBwinbindd\fR(8), 12669 \fBsamba\fR(8), 12670 \fBsamba-tool\fR(8), 11037 12671 \fBsmbclient\fR(1), 11038 12672 \fBnmblookup\fR(1), 11039 \fBtestparm\fR(1), 11040 \fBtestprns\fR(1)\&. 12673 \fBtestparm\fR(1)\&. 11041 12674 .SH "AUTHOR" 11042 12675 .PP
Note:
See TracChangeset
for help on using the changeset viewer.