Ignore:
Timestamp:
Nov 24, 2016, 1:14:11 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to version 4.4.3

File:
1 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs/manpages/smbcacls.1

    r860 r988  
    22.\"     Title: smbcacls
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBCACLS" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "SMBCACLS" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 smbcacls {//server/share} {/filename} [\-D|\-\-delete\ acls] [\-M|\-\-modify\ acls] [\-a|\-\-add\ acls] [\-S|\-\-set\ acls] [\-C|\-\-chown\ name] [\-G|\-\-chgrp\ name] [\-I\ allow|romove|copy] [\-\-numeric] [\-t] [\-U\ username] [\-h] [\-d]
     34smbcacls {//server/share} {/filename} [\-D|\-\-delete\ acl] [\-M|\-\-modify\ acl] [\-a|\-\-add\ acl] [\-S|\-\-set\ acl] [\-C|\-\-chown\ name] [\-G|\-\-chgrp\ name] [\-I\ allow|remove|copy] [\-\-numeric] [\-t] [\-U\ username] [\-d] [\-e] [\-m|\-\-max\-protocol\ LEVEL] [\-\-query\-security\-info\ FLAGS] [\-\-set\-security\-info\ FLAGS] [\-\-sddl] [\-\-domain\-sid\ SID]
    3535.SH "DESCRIPTION"
    3636.PP
     
    4141The
    4242smbcacls
    43 program manipulates NT Access Control Lists (ACLs) on SMB file shares\&.
     43program manipulates NT Access Control Lists (ACLs) on SMB file shares\&. An ACL is comprised zero or more Access Control Entries (ACEs), which define access restrictions for a specific user or group\&.
    4444.SH "OPTIONS"
    4545.PP
     
    4848program\&. The format of ACLs is described in the section ACL FORMAT
    4949.PP
    50 \-a|\-\-add acls
    51 .RS 4
    52 Add the ACLs specified to the ACL list\&. Existing access control entries are unchanged\&.
    53 .RE
    54 .PP
    55 \-M|\-\-modify acls
    56 .RS 4
    57 Modify the mask value (permissions) for the ACLs specified on the command line\&. An error will be printed for each ACL specified that was not already present in the ACL list
    58 .RE
    59 .PP
    60 \-D|\-\-delete acls
    61 .RS 4
    62 Delete any ACLs specified on the command line\&. An error will be printed for each ACL specified that was not already present in the ACL list\&.
    63 .RE
    64 .PP
    65 \-S|\-\-set acls
    66 .RS 4
    67 This command sets the ACLs on the file with only the ones specified on the command line\&. All other ACLs are erased\&. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed\&.
     50\-a|\-\-add acl
     51.RS 4
     52Add the entries specified to the ACL\&. Existing access control entries are unchanged\&.
     53.RE
     54.PP
     55\-M|\-\-modify acl
     56.RS 4
     57Modify the mask value (permissions) for the ACEs specified on the command line\&. An error will be printed for each ACE specified that was not already present in the object\*(Aqs ACL\&.
     58.RE
     59.PP
     60\-D|\-\-delete acl
     61.RS 4
     62Delete any ACEs specified on the command line\&. An error will be printed for each ACE specified that was not already present in the object\*(Aqs ACL\&.
     63.RE
     64.PP
     65\-S|\-\-set acl
     66.RS 4
     67This command sets the ACL on the object with only what is specified on the command line\&. Any existing ACL is erased\&. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed\&.
    6868.RE
    6969.PP
     
    9898.RE
    9999.PP
     100\-m|\-\-max\-protocol PROTOCOL_NAME
     101.RS 4
     102This allows the user to select the highest SMB protocol level that smbcacls will use to connect to the server\&. By default this is set to NT1, which is the highest available SMB1 protocol\&. To connect using SMB2 or SMB3 protocol, use the strings SMB2 or SMB3 respectively\&. Note that to connect to a Windows 2012 server with encrypted transport selecting a max\-protocol of SMB3 is required\&.
     103.RE
     104.PP
    100105\-t|\-\-test\-args
    101106.RS 4
     
    103108.RE
    104109.PP
    105 \-h|\-\-help
    106 .RS 4
    107 Print a summary of command line options\&.
    108 .RE
    109 .PP
    110 \-d|\-\-debuglevel=level
    111 .RS 4
    112 \fIlevel\fR
    113 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    114 .sp
    115 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    116 .sp
    117 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    118 .sp
    119 Note that specifying this parameter here will override the
    120 \m[blue]\fBlog level\fR\m[]
    121 parameter in the
    122 smb\&.conf
    123 file\&.
    124 .RE
    125 .PP
    126 \-V|\-\-version
    127 .RS 4
    128 Prints the program version number\&.
    129 .RE
    130 .PP
    131 \-s|\-\-configfile <configuration file>
    132 .RS 4
    133 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    134 smb\&.conf
    135 for more information\&. The default configuration file name is determined at compile time\&.
    136 .RE
    137 .PP
    138 \-l|\-\-log\-basename=logdirectory
    139 .RS 4
    140 Base directory name for log/debug files\&. The extension
    141 \fB"\&.progname"\fR
    142 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    143 .RE
    144 .PP
    145 \-N|\-\-no\-pass
    146 .RS 4
    147 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.
    148 .sp
    149 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.
    150 .sp
    151 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.
    152 .RE
    153 .PP
    154 \-k|\-\-kerberos
    155 .RS 4
    156 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.
    157 .RE
    158 .PP
    159 \-C|\-\-use\-ccache
    160 .RS 4
    161 Try to use the credentials cached by winbind\&.
    162 .RE
    163 .PP
    164 \-A|\-\-authentication\-file=filename
    165 .RS 4
    166 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is
    167 .sp
    168 .if n \{\
    169 .RS 4
    170 .\}
    171 .nf
    172 username = <value>
    173 password = <value>
    174 domain   = <value>
    175 .fi
    176 .if n \{\
    177 .RE
    178 .\}
    179 .sp
    180 Make certain that the permissions on the file restrict access from unwanted users\&.
    181 .RE
    182 .PP
    183 \-U|\-\-user=username[%password]
    184 .RS 4
    185 Sets the SMB username or username and password\&.
    186 .sp
    187 If %password is not specified, the user will be prompted\&. The client will first check the
    188 \fBUSER\fR
    189 environment variable, then the
    190 \fBLOGNAME\fR
    191 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username
    192 \fBGUEST\fR
    193 is used\&.
    194 .sp
    195 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the
    196 \fI\-A\fR
    197 for more details\&.
    198 .sp
    199 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the
    200 ps
    201 command\&. To be safe always allow
    202 rpcclient
    203 to prompt for a password and type it in directly\&.
     110\-\-query\-security\-info FLAGS
     111.RS 4
     112The security\-info flags for queries\&.
     113.RE
     114.PP
     115\-\-set\-security\-info FLAGS
     116.RS 4
     117The security\-info flags for queries\&.
     118.RE
     119.PP
     120\-\-sddl
     121.RS 4
     122Output and input acls in sddl format\&.
     123.RE
     124.PP
     125\-\-domain\-sid SID
     126.RS 4
     127SID used for sddl processing\&.
    204128.RE
    205129.SH "ACL FORMAT"
    206130.PP
    207 The format of an ACL is one or more ACL entries separated by either commas or newlines\&. An ACL entry is one of the following:
     131The format of an ACL is one or more entries separated by either commas or newlines\&. An ACL entry is one of the following:
    208132.PP
    209133.if n \{\
     
    225149The owner and group specify the owner and group sids for the object\&. If a SID in the format S\-1\-x\-y\-z is specified this is used, otherwise the name specified is resolved using the server on which the file or directory resides\&.
    226150.PP
    227 ACLs specify permissions granted to the SID\&. This SID again can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\&. The type, flags and mask values determine the type of access granted to the SID\&.
    228 .PP
    229 The type can be either ALLOWED or DENIED to allow/deny access to the SID\&. The flags values are generally zero for file ACLs and either 9 or 2 for directory ACLs\&. Some common flags are:
     151ACEs are specified with an "ACL:" prefix, and define permissions granted to an SID\&. The SID again can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\&. The type, flags and mask values determine the type of access granted to the SID\&.
     152.PP
     153The type can be either ALLOWED or DENIED to allow/deny access to the SID\&. The flags values are generally zero for file ACEs and either 9 or 2 for directory ACEs\&. Some common flags are:
    230154.sp
    231155.RS 4
     
    275199.RE
    276200.PP
    277 At present flags can only be specified as decimal or hexadecimal values\&.
     201At present, flags can only be specified as decimal or hexadecimal values\&.
    278202.PP
    279203The mask is a value which expresses the access right granted to the SID\&. It can be given as a decimal or hexadecimal value, or by using one of the following text strings which map to the NT file permissions of the same name\&.
     
    401325.SH "VERSION"
    402326.PP
    403 This man page is correct for version 3 of the Samba suite\&.
     327This man page is correct for version 4 of the Samba suite\&.
    404328.SH "AUTHOR"
    405329.PP
Note: See TracChangeset for help on using the changeset viewer.