.TH "smb\&.conf" "5" "23 Oct 1998" "Samba" "SAMBA" .PP .SH "NAME" smb\&.conf \- The configuration file for the Samba suite .PP .SH "SYNOPSIS" .PP \fBsmb\&.conf\fP The \fBsmb\&.conf\fP file is a configuration file for the Samba suite\&. \fBsmb\&.conf\fP contains runtime configuration information for the Samba programs\&. The \fBsmb\&.conf\fP file is designed to be configured and administered by the \fBswat (8)\fP program\&. The complete description of the file format and possible parameters held within are here for reference purposes\&. .PP .SH "FILE FORMAT" .PP The file consists of sections and parameters\&. A section begins with the name of the section in square brackets and continues until the next section begins\&. Sections contain parameters of the form .PP \f(CW\'name = value\'\fP .PP The file is line-based - that is, each newline-terminated line represents either a comment, a section name or a parameter\&. .PP Section and parameter names are not case sensitive\&. .PP Only the first equals sign in a parameter is significant\&. Whitespace before or after the first equals sign is discarded\&. Leading, trailing and internal whitespace in section and parameter names is irrelevant\&. Leading and trailing whitespace in a parameter value is discarded\&. Internal whitespace within a parameter value is retained verbatim\&. .PP Any line beginning with a semicolon (\';\') or a hash (\'#\') character is ignored, as are lines containing only whitespace\&. .PP Any line ending in a \f(CW\'\e\'\fP is "continued" on the next line in the customary UNIX fashion\&. .PP The values following the equals sign in parameters are all either a string (no quotes needed) or a boolean, which may be given as yes/no, 0/1 or true/false\&. Case is not significant in boolean values, but is preserved in string values\&. Some items such as create modes are numeric\&. .PP .SH "SECTION DESCRIPTIONS" .PP Each section in the configuration file (except for the \fB[global]\fP section) describes a shared resource (known as a \fI"share"\fP)\&. The section name is the name of the shared resource and the parameters within the section define the shares attributes\&. .PP There are three special sections, \fB[global]\fP, \fB[homes]\fP and \fB[printers]\fP, which are described under \fB\'special sections\'\fP\&. The following notes apply to ordinary section descriptions\&. .PP A share consists of a directory to which access is being given plus a description of the access rights which are granted to the user of the service\&. Some housekeeping options are also specifiable\&. .PP Sections are either filespace services (used by the client as an extension of their native file systems) or printable services (used by the client to access print services on the host running the server)\&. .PP Sections may be designated \fBguest\fP services, in which case no password is required to access them\&. A specified UNIX \fBguest account\fP is used to define access privileges in this case\&. .PP Sections other than guest services will require a password to access them\&. The client provides the username\&. As older clients only provide passwords and not usernames, you may specify a list of usernames to check against the password using the \fB"user="\fP option in the share definition\&. For modern clients such as Windows 95/98 and Windows NT, this should not be neccessary\&. .PP Note that the access rights granted by the server are masked by the access rights granted to the specified or guest UNIX user by the host system\&. The server does not grant more access than the host system grants\&. .PP The following sample section defines a file space share\&. The user has write access to the path \f(CW/home/bar\fP\&. The share is accessed via the share name "foo": .PP .DS [foo] path = /home/bar writable = true .DE .PP The following sample section defines a printable share\&. The share is readonly, but printable\&. That is, the only write access permitted is via calls to open, write to and close a spool file\&. The \fB\'guest ok\'\fP parameter means access will be permitted as the default guest user (specified elsewhere): .PP .DS [aprinter] path = /usr/spool/public read only = true printable = true guest ok = true .DE .PP .SH "SPECIAL SECTIONS" .PP .IP .IP "\fBThe [global] section\fP" .IP Parameters in this section apply to the server as a whole, or are defaults for sections which do not specifically define certain items\&. See the notes under \fB\'PARAMETERS\'\fP for more information\&. .IP .IP "\fBThe [homes] section\fP" .IP If a section called \f(CW\'homes\'\fP is included in the configuration file, services connecting clients to their home directories can be created on the fly by the server\&. .IP When the connection request is made, the existing sections are scanned\&. If a match is found, it is used\&. If no match is found, the requested section name is treated as a user name and looked up in the local password file\&. If the name exists and the correct password has been given, a share is created by cloning the [homes] section\&. .IP Some modifications are then made to the newly created share: .IP .IP .IP o The share name is changed from \f(CW\'homes\'\fP to the located username .IP .IP o If no path was given, the path is set to the user\'s home directory\&. .IP .IP If you decide to use a \fBpath=\fP line in your [homes] section then you may find it useful to use the \fB%S\fP macro\&. For example : .IP \f(CWpath=/data/pchome/%S\fP .IP would be useful if you have different home directories for your PCs than for UNIX access\&. .IP This is a fast and simple way to give a large number of clients access to their home directories with a minimum of fuss\&. .IP A similar process occurs if the requested section name is \f(CW"homes"\fP, except that the share name is not changed to that of the requesting user\&. This method of using the [homes] section works well if different users share a client PC\&. .IP The [homes] section can specify all the parameters a normal service section can specify, though some make more sense than others\&. The following is a typical and suitable [homes] section: .IP .DS [homes] writable = yes .DE .IP An important point is that if guest access is specified in the [homes] section, all home directories will be visible to all clients \fBwithout a password\fP\&. In the very unlikely event that this is actually desirable, it would be wise to also specify \fBread only access\fP\&. .IP Note that the \fBbrowseable\fP flag for auto home directories will be inherited from the global browseable flag, not the [homes] browseable flag\&. This is useful as it means setting browseable=no in the [homes] section will hide the [homes] share but make any auto home directories visible\&. .IP .IP "\fBThe [printers] section\fP" .IP This section works like \fB[homes]\fP, but for printers\&. .IP If a [printers] section occurs in the configuration file, users are able to connect to any printer specified in the local host\'s printcap file\&. .IP When a connection request is made, the existing sections are scanned\&. If a match is found, it is used\&. If no match is found, but a \fB[homes]\fP section exists, it is used as described above\&. Otherwise, the requested section name is treated as a printer name and the appropriate printcap file is scanned to see if the requested section name is a valid printer share name\&. If a match is found, a new printer share is created by cloning the [printers] section\&. .IP A few modifications are then made to the newly created share: .IP .IP .IP o The share name is set to the located printer name .IP .IP o If no printer name was given, the printer name is set to the located printer name .IP .IP o If the share does not permit guest access and no username was given, the username is set to the located printer name\&. .IP .IP Note that the [printers] service MUST be printable - if you specify otherwise, the server will refuse to load the configuration file\&. .IP Typically the path specified would be that of a world-writable spool directory with the sticky bit set on it\&. A typical [printers] entry would look like this: .IP .DS [printers] path = /usr/spool/public writable = no guest ok = yes printable = yes .DE .IP All aliases given for a printer in the printcap file are legitimate printer names as far as the server is concerned\&. If your printing subsystem doesn\'t work like that, you will have to set up a pseudo-printcap\&. This is a file consisting of one or more lines like this: .IP .DS alias|alias|alias|alias\&.\&.\&. .DE .IP Each alias should be an acceptable printer name for your printing subsystem\&. In the \fB[global]\fP section, specify the new file as your printcap\&. The server will then only recognise names found in your pseudo-printcap, which of course can contain whatever aliases you like\&. The same technique could be used simply to limit access to a subset of your local printers\&. .IP An alias, by the way, is defined as any component of the first entry of a printcap record\&. Records are separated by newlines, components (if there are more than one) are separated by vertical bar symbols ("|")\&. .IP NOTE: On SYSV systems which use lpstat to determine what printers are defined on the system you may be able to use \fB"printcap name = lpstat"\fP to automatically obtain a list of printers\&. See the \fB"printcap name"\fP option for more detils\&. .IP .PP .SH "PARAMETERS" .PP Parameters define the specific attributes of sections\&. .PP Some parameters are specific to the \fB[global]\fP section (eg\&., \fBsecurity\fP)\&. Some parameters are usable in all sections (eg\&., \fBcreate mode\fP)\&. All others are permissible only in normal sections\&. For the purposes of the following descriptions the \fB[homes]\fP and \fB[printers]\fP sections will be considered normal\&. The letter \f(CW\'G\'\fP in parentheses indicates that a parameter is specific to the \fB[global]\fP section\&. The letter \f(CW\'S\'\fP indicates that a parameter can be specified in a service specific section\&. Note that all \f(CW\'S\'\fP parameters can also be specified in the \fB[global]\fP section - in which case they will define the default behaviour for all services\&. .PP Parameters are arranged here in alphabetical order - this may not create best bedfellows, but at least you can find them! Where there are synonyms, the preferred synonym is described, others refer to the preferred synonym\&. .PP .SH "VARIABLE SUBSTITUTIONS" .PP Many of the strings that are settable in the config file can take substitutions\&. For example the option \fB\f(CW"path = /tmp/%u"\fP\fP would be interpreted as \f(CW"path = /tmp/john"\fP if the user connected with the username john\&. .PP These substitutions are mostly noted in the descriptions below, but there are some general substitutions which apply whenever they might be relevant\&. These are: .PP .IP .IP o \fB%S\fP = the name of the current service, if any\&. .IP .IP o \fB%P\fP = the root directory of the current service, if any\&. .IP .IP o \fB%u\fP = user name of the current service, if any\&. .IP .IP o \fB%g\fP = primary group name of \fB%u\fP\&. .IP .IP o \fB%U\fP = session user name (the user name that the client wanted, not necessarily the same as the one they got)\&. .IP .IP o \fB%G\fP = primary group name of \fB%U\fP\&. .IP .IP o \fB%H\fP = the home directory of the user given by \fB%u\fP\&. .IP .IP o \fB%v\fP = the Samba version\&. .IP .IP o \fB%h\fP = the internet hostname that Samba is running on\&. .IP .IP o \fB%m\fP = the NetBIOS name of the client machine (very useful)\&. .IP .IP o \fB%L\fP = the NetBIOS name of the server\&. This allows you to change your config based on what the client calls you\&. Your server can have a "dual personality"\&. .IP .IP o \fB%M\fP = the internet name of the client machine\&. .IP .IP o \fB%N\fP = the name of your NIS home directory server\&. This is obtained from your NIS auto\&.map entry\&. If you have not compiled Samba with the \fB--with-automount\fP option then this value will be the same as \fB%L\fP\&. .IP .IP o \fB%p\fP = the path of the service\'s home directory, obtained from your NIS auto\&.map entry\&. The NIS auto\&.map entry is split up as "%N:%p"\&. .IP .IP o \fB%R\fP = the selected protocol level after protocol negotiation\&. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2 or NT1\&. .IP .IP o \fB%d\fP = The process id of the current server process\&. .IP .IP o \fB%a\fP = the architecture of the remote machine\&. Only some are recognised, and those may not be 100% reliable\&. It currently recognises Samba, WfWg, WinNT and Win95\&. Anything else will be known as "UNKNOWN"\&. If it gets it wrong then sending a level 3 log to \fIsamba-bugs@samba\&.anu\&.edu\&.au\fP should allow it to be fixed\&. .IP .IP o \fB%I\fP = The IP address of the client machine\&. .IP .IP o \fB%T\fP = the current date and time\&. .IP .PP There are some quite creative things that can be done with these substitutions and other smb\&.conf options\&. .PP .SH "NAME MANGLING" .PP Samba supports \fI"name mangling"\fP so that DOS and Windows clients can use files that don\'t conform to the 8\&.3 format\&. It can also be set to adjust the case of 8\&.3 format filenames\&. .PP There are several options that control the way mangling is performed, and they are grouped here rather than listed separately\&. For the defaults look at the output of the testparm program\&. .PP All of these options can be set separately for each service (or globally, of course)\&. .PP The options are: .PP \fB"mangle case = yes/no"\fP controls if names that have characters that aren\'t of the "default" case are mangled\&. For example, if this is yes then a name like \f(CW"Mail"\fP would be mangled\&. Default \fIno\fP\&. .PP \fB"case sensitive = yes/no"\fP controls whether filenames are case sensitive\&. If they aren\'t then Samba must do a filename search and match on passed names\&. Default \fIno\fP\&. .PP \fB"default case = upper/lower"\fP controls what the default case is for new filenames\&. Default \fIlower\fP\&. .PP \fB"preserve case = yes/no"\fP controls if new files are created with the case that the client passes, or if they are forced to be the \f(CW"default"\fP case\&. Default \fIYes\fP\&. .PP .PP \fB"short preserve case = yes/no"\fP controls if new files which conform to 8\&.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced to be the \f(CW"default"\fP case\&. This option can be use with \fB"preserve case = yes"\fP to permit long filenames to retain their case, while short names are lowered\&. Default \fIYes\fP\&. .PP By default, Samba 2\&.0 has the same semantics as a Windows NT server, in that it is case insensitive but case preserving\&. .PP .SH "NOTE ABOUT USERNAME/PASSWORD VALIDATION" .PP There are a number of ways in which a user can connect to a service\&. The server follows the following steps in determining if it will allow a connection to a specified service\&. If all the steps fail then the connection request is rejected\&. If one of the steps pass then the following steps are not checked\&. .PP If the service is marked \fB"guest only = yes"\fP then steps 1 to 5 are skipped\&. .PP .IP .IP 1\&. Step 1: If the client has passed a username/password pair and that username/password pair is validated by the UNIX system\'s password programs then the connection is made as that username\&. Note that this includes the \f(CW\e\eserver\eservice%username\fP method of passing a username\&. .IP .IP 2\&. Step 2: If the client has previously registered a username with the system and now supplies a correct password for that username then the connection is allowed\&. .IP .IP 3\&. Step 3: The client\'s netbios name and any previously used user names are checked against the supplied password, if they match then the connection is allowed as the corresponding user\&. .IP .IP 4\&. Step 4: If the client has previously validated a username/password pair with the server and the client has passed the validation token then that username is used\&. This step is skipped if \fB"revalidate = yes"\fP for this service\&. .IP .IP 5\&. Step 5: If a \fB"user = "\fP field is given in the smb\&.conf file for the service and the client has supplied a password, and that password matches (according to the UNIX system\'s password checking) with one of the usernames from the \fBuser=\fP field then the connection is made as the username in the \fB"user="\fP line\&. If one of the username in the \fBuser=\fP list begins with a \f(CW\'@\'\fP then that name expands to a list of names in the group of the same name\&. .IP .IP 6\&. Step 6: If the service is a guest service then a connection is made as the username given in the \fB"guest account ="\fP for the service, irrespective of the supplied password\&. .IP .PP .SH "COMPLETE LIST OF GLOBAL PARAMETERS" .PP Here is a list of all global parameters\&. See the section of each parameter for details\&. Note that some are synonyms\&. .PP .IP .IP o \fBannounce as\fP .IP .IP o \fBannounce version\fP .IP .IP o \fBauto services\fP .IP .IP o \fBbind interfaces only\fP .IP .IP o \fBbrowse list\fP .IP .IP o \fBchange notify timeout\fP .IP .IP o \fBcharacter set\fP .IP .IP o \fBclient code page\fP .IP .IP o \fBcoding system\fP .IP .IP o \fBconfig file\fP .IP .IP o \fBdeadtime\fP .IP .IP o \fBdebug timestamp\fP .IP .IP o \fBdebuglevel\fP .IP .IP o \fBdefault\fP .IP .IP o \fBdefault service\fP .IP .IP o \fBdfree command\fP .IP .IP o \fBdns proxy\fP .IP .IP o \fBdomain admin group\fP .IP .IP o \fBdomain admin users\fP .IP .IP o \fBdomain controller\fP .IP .IP o \fBdomain groups\fP .IP .IP o \fBdomain guest group\fP .IP .IP o \fBdomain guest users\fP .IP .IP o \fBdomain logons\fP .IP .IP o \fBdomain master\fP .IP .IP o \fBencrypt passwords\fP .IP .IP o \fBgetwd cache\fP .IP .IP o \fBhomedir map\fP .IP .IP o \fBhosts equiv\fP .IP .IP o \fBinterfaces\fP .IP .IP o \fBkeepalive\fP .IP .IP o \fBkernel oplocks\fP .IP .IP o \fBldap filter\fP .IP .IP o \fBldap port\fP .IP .IP o \fBldap root\fP .IP .IP o \fBldap root passwd\fP .IP .IP o \fBldap server\fP .IP .IP o \fBldap suffix\fP .IP .IP o \fBlm announce\fP .IP .IP o \fBlm interval\fP .IP .IP o \fBload printers\fP .IP .IP o \fBlocal master\fP .IP .IP o \fBlock dir\fP .IP .IP o \fBlock directory\fP .IP .IP o \fBlog file\fP .IP .IP o \fBlog level\fP .IP .IP o \fBlogon drive\fP .IP .IP o \fBlogon home\fP .IP .IP o \fBlogon path\fP .IP .IP o \fBlogon script\fP .IP .IP o \fBlpq cache time\fP .IP .IP o \fBmachine password timeout\fP .IP .IP o \fBmangled stack\fP .IP .IP o \fBmax disk size\fP .IP .IP o \fBmax log size\fP .IP .IP o \fBmax mux\fP .IP .IP o \fBmax open files\fP .IP .IP o \fBmax packet\fP .IP .IP o \fBmax ttl\fP .IP .IP o \fBmax wins ttl\fP .IP .IP o \fBmax xmit\fP .IP .IP o \fBmessage command\fP .IP .IP o \fBmin wins ttl\fP .IP .IP o \fBname resolve order\fP .IP .IP o \fBnetbios aliases\fP .IP .IP o \fBnetbios name\fP .IP .IP o \fBnis homedir\fP .IP .IP o \fBnt pipe support\fP .IP .IP o \fBnt smb support\fP .IP .IP o \fBnull passwords\fP .IP .IP o \fBole locking compatibility\fP .IP .IP o \fBos level\fP .IP .IP o \fBpacket size\fP .IP .IP o \fBpanic action\fP .IP .IP o \fBpasswd chat\fP .IP .IP o \fBpasswd chat debug\fP .IP .IP o \fBpasswd program\fP .IP .IP o \fBpassword level\fP .IP .IP o \fBpassword server\fP .IP .IP o \fBprefered master\fP .IP .IP o \fBpreferred master\fP .IP .IP o \fBpreload\fP .IP .IP o \fBprintcap\fP .IP .IP o \fBprintcap name\fP .IP .IP o \fBprinter driver file\fP .IP .IP o \fBprotocol\fP .IP .IP o \fBread bmpx\fP .IP .IP o \fBread prediction\fP .IP .IP o \fBread raw\fP .IP .IP o \fBread size\fP .IP .IP o \fBremote announce\fP .IP .IP o \fBremote browse sync\fP .IP .IP o \fBroot\fP .IP .IP o \fBroot dir\fP .IP .IP o \fBroot directory\fP .IP .IP o \fBsecurity\fP .IP .IP o \fBserver string\fP .IP .IP o \fBshared mem size\fP .IP .IP o \fBsmb passwd file\fP .IP .IP o \fBsmbrun\fP .IP .IP o \fBsocket address\fP .IP .IP o \fBsocket options\fP .IP .IP o \fBssl\fP .IP .IP o \fBssl CA certDir\fP .IP .IP o \fBssl CA certFile\fP .IP .IP o \fBssl ciphers\fP .IP .IP o \fBssl client cert\fP .IP .IP o \fBssl client key\fP .IP .IP o \fBssl compatibility\fP .IP .IP o \fBssl hosts\fP .IP .IP o \fBssl hosts resign\fP .IP .IP o \fBssl require clientcert\fP .IP .IP o \fBssl require servercert\fP .IP .IP o \fBssl server cert\fP .IP .IP o \fBssl server key\fP .IP .IP o \fBssl version\fP .IP .IP o \fBstat cache\fP .IP .IP o \fBstat cache size\fP .IP .IP o \fBstrip dot\fP .IP .IP o \fBsyslog\fP .IP .IP o \fBsyslog only\fP .IP .IP o \fBtime offset\fP .IP .IP o \fBtime server\fP .IP .IP o \fBtimestamp logs\fP .IP .IP o \fBunix password sync\fP .IP .IP o \fBunix realname\fP .IP .IP o \fBupdate encrypted\fP .IP .IP o \fBuse rhosts\fP .IP .IP o \fBusername level\fP .IP .IP o \fBusername map\fP .IP .IP o \fBvalid chars\fP .IP .IP o \fBwins proxy\fP .IP .IP o \fBwins server\fP .IP .IP o \fBwins support\fP .IP .IP o \fBworkgroup\fP .IP .IP o \fBwrite raw\fP .IP .PP .SH "COMPLETE LIST OF SERVICE PARAMETERS" .PP Here is a list of all service parameters\&. See the section of each parameter for details\&. Note that some are synonyms\&. .PP .IP .IP o \fBadmin users\fP .IP .IP o \fBallow hosts\fP .IP .IP o \fBalternate permissions\fP .IP .IP o \fBavailable\fP .IP .IP o \fBblocking locks\fP .IP .IP o \fBbrowsable\fP .IP .IP o \fBbrowseable\fP .IP .IP o \fBcase sensitive\fP .IP .IP o \fBcasesignames\fP .IP .IP o \fBcomment\fP .IP .IP o \fBcopy\fP .IP .IP o \fBcreate mask\fP .IP .IP o \fBcreate mode\fP .IP .IP o \fBdefault case\fP .IP .IP o \fBdelete readonly\fP .IP .IP o \fBdelete veto files\fP .IP .IP o \fBdeny hosts\fP .IP .IP o \fBdirectory\fP .IP .IP o \fBdirectory mask\fP .IP .IP o \fBdirectory mode\fP .IP .IP o \fBdont descend\fP .IP .IP o \fBdos filetime resolution\fP .IP .IP o \fBdos filetimes\fP .IP .IP o \fBexec\fP .IP .IP o \fBfake directory create times\fP .IP .IP o \fBfake oplocks\fP .IP .IP o \fBfollow symlinks\fP .IP .IP o \fBforce create mode\fP .IP .IP o \fBforce directory mode\fP .IP .IP o \fBforce group\fP .IP .IP o \fBforce user\fP .IP .IP o \fBfstype\fP .IP .IP o \fBgroup\fP .IP .IP o \fBguest account\fP .IP .IP o \fBguest ok\fP .IP .IP o \fBguest only\fP .IP .IP o \fBhide dot files\fP .IP .IP o \fBhide files\fP .IP .IP o \fBhosts allow\fP .IP .IP o \fBhosts deny\fP .IP .IP o \fBinclude\fP .IP .IP o \fBinvalid users\fP .IP .IP o \fBlocking\fP .IP .IP o \fBlppause command\fP .IP .IP o \fBlpq command\fP .IP .IP o \fBlpresume command\fP .IP .IP o \fBlprm command\fP .IP .IP o \fBmagic output\fP .IP .IP o \fBmagic script\fP .IP .IP o \fBmangle case\fP .IP .IP o \fBmangled map\fP .IP .IP o \fBmangled names\fP .IP .IP o \fBmangling char\fP .IP .IP o \fBmap archive\fP .IP .IP o \fBmap hidden\fP .IP .IP o \fBmap system\fP .IP .IP o \fBmap to guest\fP .IP .IP o \fBmax connections\fP .IP .IP o \fBmin print space\fP .IP .IP o \fBonly guest\fP .IP .IP o \fBonly user\fP .IP .IP o \fBoplocks\fP .IP .IP o \fBpath\fP .IP .IP o \fBpostexec\fP .IP .IP o \fBpostscript\fP .IP .IP o \fBpreexec\fP .IP .IP o \fBpreserve case\fP .IP .IP o \fBprint command\fP .IP .IP o \fBprint ok\fP .IP .IP o \fBprintable\fP .IP .IP o \fBprinter\fP .IP .IP o \fBprinter driver\fP .IP .IP o \fBprinter driver location\fP .IP .IP o \fBprinter name\fP .IP .IP o \fBprinting\fP .IP .IP o \fBpublic\fP .IP .IP o \fBqueuepause command\fP .IP .IP o \fBqueueresume command\fP .IP .IP o \fBread list\fP .IP .IP o \fBread only\fP .IP .IP o \fBrevalidate\fP .IP .IP o \fBroot postexec\fP .IP .IP o \fBroot preexec\fP .IP .IP o \fBset directory\fP .IP .IP o \fBshare modes\fP .IP .IP o \fBshort preserve case\fP .IP .IP o \fBstatus\fP .IP .IP o \fBstrict locking\fP .IP .IP o \fBstrict sync\fP .IP .IP o \fBsync always\fP .IP .IP o \fBuser\fP .IP .IP o \fBusername\fP .IP .IP o \fBusers\fP .IP .IP o \fBvalid users\fP .IP .IP o \fBveto files\fP .IP .IP o \fBveto oplock files\fP .IP .IP o \fBvolume\fP .IP .IP o \fBwide links\fP .IP .IP o \fBwritable\fP .IP .IP o \fBwrite list\fP .IP .IP o \fBwrite ok\fP .IP .IP o \fBwriteable\fP .IP .PP .SH "EXPLANATION OF EACH PARAMETER" .PP .IP .IP "\fBadmin users (S)\fP" .IP This is a list of users who will be granted administrative privileges on the share\&. This means that they will do all file operations as the super-user (root)\&. .IP You should use this option very carefully, as any user in this list will be able to do anything they like on the share, irrespective of file permissions\&. .IP \fBDefault:\fP .br \f(CW no admin users\fP .IP \fBExample:\fP .br \f(CW admin users = jason\fP .IP .IP "\fBallow hosts (S)\fP" .IP A synonym for this parameter is \fB\'hosts allow\'\fP .IP This parameter is a comma, space, or tab delimited set of hosts which are permitted to access a service\&. .IP If specified in the \fB[global]\fP section then it will apply to all services, regardless of whether the individual service has a different setting\&. .IP You can specify the hosts by name or IP number\&. For example, you could restrict access to only the hosts on a Class C subnet with something like \f(CW"allow hosts = 150\&.203\&.5\&."\fP\&. The full syntax of the list is described in the man page \fBhosts_access (5)\fP\&. Note that this man page may not be present on your system, so a brief description will be given here also\&. .IP \fINOTE:\fP IF you wish to allow the \fBsmbpasswd (8)\fP program to be run by local users to change their Samba passwords using the local \fBsmbd (8)\fP daemon, then you \fIMUST\fP ensure that the localhost is listed in your \fBallow hosts\fP list, as \fBsmbpasswd (8)\fP runs in client-server mode and is seen by the local \fBsmbd\fP process as just another client\&. .IP You can also specify hosts by network/netmask pairs and by netgroup names if your system supports netgroups\&. The \fIEXCEPT\fP keyword can also be used to limit a wildcard list\&. The following examples may provide some help: .IP \fBExample 1\fP: allow localhost and all IPs in 150\&.203\&.*\&.* except one .IP \f(CW hosts allow = localhost, 150\&.203\&. EXCEPT 150\&.203\&.6\&.66\fP .IP \fBExample 2\fP: allow localhost and hosts that match the given network/netmask .IP \f(CW hosts allow = localhost, 150\&.203\&.15\&.0/255\&.255\&.255\&.0\fP .IP \fBExample 3\fP: allow a localhost plus a couple of hosts .IP \f(CW hosts allow = localhost, lapland, arvidsjaur\fP .IP \fBExample 4\fP: allow only hosts in NIS netgroup "foonet" or localhost, but deny access from one particular host .IP \f(CW hosts allow = @foonet, localhost\fP \f(CW hosts deny = pirate\fP .IP Note that access still requires suitable user-level passwords\&. .IP See \fBtestparm (1)\fP for a way of testing your host access to see if it does what you expect\&. .IP \fBDefault:\fP \f(CW none (i\&.e\&., all hosts permitted access)\fP .IP \fBExample:\fP \f(CW allow hosts = 150\&.203\&.5\&. localhost myhost\&.mynet\&.edu\&.au\fP .IP .IP "\fBalternate permissions (S)\fP" .IP This is a deprecated parameter\&. It no longer has any effect in Samba2\&.0\&. In previous versions of Samba it affected the way the DOS "read only" attribute was mapped for a file\&. In Samba2\&.0 a file is marked "read only" if the UNIX file does not have the \'w\' bit set for the owner of the file, regardless if the owner of the file is the currently logged on user or not\&. .IP .IP "\fBannounce as (G)\fP" .IP This specifies what type of server \fBnmbd\fP will announce itself as, to a network neighborhood browse list\&. By default this is set to Windows NT\&. The valid options are : "NT", "Win95" or "WfW" meaining Windows NT, Windows 95 and Windows for Workgroups respectively\&. Do not change this parameter unless you have a specific need to stop Samba appearing as an NT server as this may prevent Samba servers from participating as browser servers correctly\&. .IP \fBDefault:\fP \f(CW announce as = NT\fP .IP \fBExample\fP \f(CW announce as = Win95\fP .IP .IP "\fBannounce version (G)\fP" .IP This specifies the major and minor version numbers that nmbd will use when announcing itself as a server\&. The default is 4\&.2\&. Do not change this parameter unless you have a specific need to set a Samba server to be a downlevel server\&. .IP \fBDefault:\fP \f(CW announce version = 4\&.2\fP .IP \fBExample:\fP \f(CW announce version = 2\&.0\fP .IP .IP "\fBauto services (G)\fP" .IP This is a list of services that you want to be automatically added to the browse lists\&. This is most useful for homes and printers services that would otherwise not be visible\&. .IP Note that if you just want all printers in your printcap file loaded then the \fB"load printers"\fP option is easier\&. .IP \fBDefault:\fP \f(CW no auto services\fP .IP \fBExample:\fP \f(CW auto services = fred lp colorlp\fP .IP .IP "\fBavailable (S)\fP" .IP This parameter lets you \fI\'turn off\'\fP a service\&. If \f(CW\'available = no\'\fP, then \fIALL\fP attempts to connect to the service will fail\&. Such failures are logged\&. .IP \fBDefault:\fP \f(CW available = yes\fP .IP \fBExample:\fP \f(CW available = no\fP .IP .IP "\fBbind interfaces only (G)\fP" .IP This global parameter allows the Samba admin to limit what interfaces on a machine will serve smb requests\&. If affects file service \fBsmbd\fP and name service \fBnmbd\fP in slightly different ways\&. .IP For name service it causes \fBnmbd\fP to bind to ports 137 and 138 on the interfaces listed in the \fB\'interfaces\'\fP parameter\&. \fBnmbd\fP also binds to the \'all addresses\' interface (0\&.0\&.0\&.0) on ports 137 and 138 for the purposes of reading broadcast messages\&. If this option is not set then \fBnmbd\fP will service name requests on all of these sockets\&. If \fB"bind interfaces only"\fP is set then \fBnmbd\fP will check the source address of any packets coming in on the broadcast sockets and discard any that don\'t match the broadcast addresses of the interfaces in the \fB\'interfaces\'\fP parameter list\&. As unicast packets are received on the other sockets it allows \fBnmbd\fP to refuse to serve names to machines that send packets that arrive through any interfaces not listed in the \fB"interfaces"\fP list\&. IP Source address spoofing does defeat this simple check, however so it must not be used seriously as a security feature for \fBnmbd\fP\&. .IP For file service it causes \fBsmbd\fP to bind only to the interface list given in the \fB\'interfaces\'\fP parameter\&. This restricts the networks that \fBsmbd\fP will serve to packets coming in those interfaces\&. Note that you should not use this parameter for machines that are serving PPP or other intermittant or non-broadcast network interfaces as it will not cope with non-permanent interfaces\&. .IP In addition, to change a users SMB password, the \fBsmbpasswd\fP by default connects to the \fI"localhost" - 127\&.0\&.0\&.1\fP address as an SMB client to issue the password change request\&. If \fB"bind interfaces only"\fP is set then unless the network address \fI127\&.0\&.0\&.1\fP is added to the \fB\'interfaces\'\fP parameter list then \fBsmbpasswd\fP will fail to connect in it\'s default mode\&. \fBsmbpasswd\fP can be forced to use the primary IP interface of the local host by using its \fB"-r remote machine"\fP parameter, with \fB"remote machine"\fP set to the IP name of the primary interface of the local host\&. .IP \fBDefault:\fP \f(CW bind interfaces only = False\fP .IP \fBExample:\fP \f(CW bind interfaces only = True\fP .IP .IP "\fBblocking locks (S)\fP" .IP This parameter controls the behavior of \fBsmbd\fP when given a request by a client to obtain a byte range lock on a region of an open file, and the request has a time limit associated with it\&. .IP If this parameter is set and the lock range requested cannot be immediately satisfied, Samba 2\&.0 will internally queue the lock request, and periodically attempt to obtain the lock until the timeout period expires\&. .IP If this parameter is set to "False", then Samba 2\&.0 will behave as previous versions of Samba would and will fail the lock request immediately if the lock range cannot be obtained\&. .IP This parameter can be set per share\&. .IP \fBDefault:\fP \f(CW blocking locks = True\fP .IP \fBExample:\fP \f(CW blocking locks = False\fP .IP .IP "\fBbroweable (S)\fP" .IP This controls whether this share is seen in the list of available shares in a net view and in the browse list\&. .IP \fBDefault:\fP \f(CW browsable = Yes\fP .IP \fBExample:\fP \f(CW browsable = No\fP .IP .IP "\fBbrowse list(G)\fP" .IP This controls whether \fBsmbd\fP will serve a browse list to a client doing a NetServerEnum call\&. Normally set to true\&. You should never need to change this\&. .IP \fBDefault:\fP \f(CW browse list = Yes\fP .IP .IP "\fBbrowseable\fP" .IP Synonym for \fBbrowsable\fP\&. .IP .IP "\fBcase sensitive (G)\fP" .IP See the discussion in the section \fBNAME MANGLING\fP\&. .IP .IP "\fBcasesignames (G)\fP" .IP Synonym for \fB"case sensitive"\fP\&. .IP .IP "\fBchange notify timeout (G)\fP" .IP One of the new NT SMB requests that Samba 2\&.0 supports is the "ChangeNotify" requests\&. This SMB allows a client to tell a server to \fI"watch"\fP a particular directory for any changes and only reply to the SMB request when a change has occurred\&. Such constant scanning of a directory is expensive under UNIX, hence an \fBsmbd\fP daemon only performs such a scan on each requested directory once every \fBchange notify timeout\fP seconds\&. .IP \fBchange notify timeout\fP is specified in units of seconds\&. .IP \fBDefault:\fP \f(CW change notify timeout = 60\fP .IP \fBExample:\fP \f(CW change notify timeout = 300\fP .IP Would change the scan time to every 5 minutes\&. .IP .IP "\fBcharacter set (G)\fP" .IP This allows a smbd to map incoming filenames from a DOS Code page (see the \fBclient code page\fP parameter) to several built in UNIX character sets\&. The built in code page translations are: .IP .IP .IP o \fBISO8859-1\fP Western European UNIX character set\&. The parameter \fBclient code page\fP \fIMUST\fP be set to code page 850 if the \fBcharacter set\fP parameter is set to iso8859-1 in order for the conversion to the UNIX character set to be done correctly\&. .IP .IP o \fBISO8859-2\fP Eastern European UNIX character set\&. The parameter \fBclient code page\fP \fIMUST\fP be set to code page 852 if the \fBcharacter set\fP parameter is set to ISO8859-2 in order for the conversion to the UNIX character set to be done correctly\&. .IP .IP o \fBISO8859-5\fP Russian Cyrillic UNIX character set\&. The parameter \fBclient code page\fP \fIMUST\fP be set to code page 866 if the \fBcharacter set\fP parameter is set to ISO8859-2 in order for the conversion to the UNIX character set to be done correctly\&. .IP .IP o \fBKOI8-R\fP Alternate mapping for Russian Cyrillic UNIX character set\&. The parameter \fBclient code page\fP \fIMUST\fP be set to code page 866 if the \fBcharacter set\fP parameter is set to KOI8-R in order for the conversion to the UNIX character set to be done correctly\&. .IP .IP \fIBUG\fP\&. These MSDOS code page to UNIX character set mappings should be dynamic, like the loading of MS DOS code pages, not static\&. .IP See also \fBclient code page\fP\&. Normally this parameter is not set, meaning no filename translation is done\&. .IP \fBDefault:\fP \f(CW character set = \fP .IP \fBExample:\fP \f(CW character set = ISO8859-1\fP .IP .IP "\fBclient code page (G)\fP" .IP This parameter specifies the DOS code page that the clients accessing Samba are using\&. To determine what code page a Windows or DOS client is using, open a DOS command prompt and type the command "chcp"\&. This will output the code page\&. The default for USA MS-DOS, Windows 95, and Windows NT releases is code page 437\&. The default for western european releases of the above operating systems is code page 850\&. .IP This parameter tells \fBsmbd\fP which of the \f(CWcodepage\&.XXX\fP files to dynamically load on startup\&. These files, described more fully in the manual page \fBmake_smbcodepage (1)\fP, tell \fBsmbd\fP how to map lower to upper case characters to provide the case insensitivity of filenames that Windows clients expect\&. .IP Samba currenly ships with the following code page files : .IP .IP .IP o \fBCode Page 437 - MS-DOS Latin US\fP .IP .IP o \fBCode Page 737 - Windows \'95 Greek\fP .IP .IP o \fBCode Page 850 - MS-DOS Latin 1\fP .IP .IP o \fBCode Page 852 - MS-DOS Latin 2\fP .IP .IP o \fBCode Page 861 - MS-DOS Icelandic\fP .IP .IP o \fBCode Page 866 - MS-DOS Cyrillic\fP .IP .IP o \fBCode Page 932 - MS-DOS Japanese SJIS\fP .IP .IP o \fBCode Page 936 - MS-DOS Simplified Chinese\fP .IP .IP o \fBCode Page 949 - MS-DOS Korean Hangul\fP .IP .IP o \fBCode Page 950 - MS-DOS Traditional Chinese\fP .IP .IP Thus this parameter may have any of the values 437, 737, 850, 852, 861, 932, 936, 949, or 950\&. If you don\'t find the codepage you need, read the comments in one of the other codepage files and the \fBmake_smbcodepage (1)\fP man page and write one\&. Please remember to donate it back to the Samba user community\&. .IP This parameter co-operates with the \fB"valid chars"\fP parameter in determining what characters are valid in filenames and how capitalization is done\&. If you set both this parameter and the \fB"valid chars"\fP parameter the \fB"client code page"\fP parameter \fIMUST\fP be set before the \fB"valid chars"\fP parameter in the \fBsmb\&.conf\fP file\&. The \fB"valid chars"\fP string will then augment the character settings in the "client code page" parameter\&. .IP If not set, \fB"client code page"\fP defaults to 850\&. .IP See also : \fB"valid chars"\fP .IP \fBDefault:\fP \f(CW client code page = 850\fP .IP \fBExample:\fP \f(CW client code page = 936\fP .IP .IP "\fBcodingsystem (G)\fP" .IP This parameter is used to determine how incoming Shift-JIS Japanese characters are mapped from the incoming \fB"client code page"\fP used by the client, into file names in the UNIX filesystem\&. Only useful if \fB"client code page"\fP is set to 932 (Japanese Shift-JIS)\&. .IP The options are : .IP .IP .IP o \fBSJIS\fP Shift-JIS\&. Does no conversion of the incoming filename\&. .IP .IP o \fBJIS8, J8BB, J8BH, J8@B, J8@J, J8@H \fP Convert from incoming Shift-JIS to eight bit JIS code with different shift-in, shift out codes\&. .IP .IP o \fBJIS7, J7BB, J7BH, J7@B, J7@J, J7@H \fP Convert from incoming Shift-JIS to seven bit JIS code with different shift-in, shift out codes\&. .IP .IP o \fBJUNET, JUBB, JUBH, JU@B, JU@J, JU@H \fP Convert from incoming Shift-JIS to JUNET code with different shift-in, shift out codes\&. .IP .IP o \fBEUC\fP Convert an incoming Shift-JIS character to EUC code\&. .IP .IP o \fBHEX\fP Convert an incoming Shift-JIS character to a 3 byte hex representation, ie\&. \f(CW:AB\fP\&. .IP .IP o \fBCAP\fP Convert an incoming Shift-JIS character to the 3 byte hex representation used by the Columbia Appletalk Program (CAP), ie\&. \f(CW:AB\fP\&. This is used for compatibility between Samba and CAP\&. .IP .IP .IP "\fBcomment (S)\fP" .IP This is a text field that is seen next to a share when a client does a queries the server, either via the network neighborhood or via "net view" to list what shares are available\&. .IP If you want to set the string that is displayed next to the machine name then see the server string command\&. .IP \fBDefault:\fP \f(CW No comment string\fP .IP \fBExample:\fP \f(CW comment = Fred\'s Files\fP .IP .IP "\fBconfig file (G)\fP" .IP This allows you to override the config file to use, instead of the default (usually \fBsmb\&.conf\fP)\&. There is a chicken and egg problem here as this option is set in the config file! .IP For this reason, if the name of the config file has changed when the parameters are loaded then it will reload them from the new config file\&. .IP This option takes the usual substitutions, which can be very useful\&. .IP If the config file doesn\'t exist then it won\'t be loaded (allowing you to special case the config files of just a few clients)\&. .IP \fBExample:\fP \f(CW config file = /usr/local/samba/lib/smb\&.conf\&.%m\fP .IP .IP "\fBcopy (S)\fP" .IP This parameter allows you to \fI\'clone\'\fP service entries\&. The specified service is simply duplicated under the current service\'s name\&. Any parameters specified in the current section will override those in the section being copied\&. .IP This feature lets you set up a \'template\' service and create similar services easily\&. Note that the service being copied must occur earlier in the configuration file than the service doing the copying\&. .IP \fBDefault:\fP \f(CW none\fP .IP \fBExample:\fP \f(CW copy = otherservice\fP .IP .IP "\fBcreate mask (S)\fP" .IP A synonym for this parameter is \fB\'create mode\'\fP\&. .IP When a file is created, the neccessary permissions are calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit-wise \'AND\'ed with this parameter\&. This parameter may be thought of as a bit-wise MASK for the UNIX modes of a file\&. Any bit \fI*not*\fP set here will be removed from the modes set on a file when it is created\&. .IP The default value of this parameter removes the \'group\' and \'other\' write and execute bits from the UNIX modes\&. .IP Following this Samba will bit-wise \'OR\' the UNIX mode created from this parameter with the value of the "force create mode" parameter which is set to 000 by default\&. .IP This parameter does not affect directory modes\&. See the parameter \fB\'directory mode\'\fP for details\&. .IP See also the \fB"force create mode"\fP parameter for forcing particular mode bits to be set on created files\&. See also the \fB"directory mode"\fP parameter for masking mode bits on created directories\&. .IP \fBDefault:\fP \f(CW create mask = 0744\fP .IP \fBExample:\fP \f(CW create mask = 0775\fP .IP .IP "\fBcreate mode (S)\fP" .IP This is a synonym for \fBcreate mask\fP\&. .IP .IP "\fBdeadtime (G)\fP" .IP The value of the parameter (a decimal integer) represents the number of minutes of inactivity before a connection is considered dead, and it is disconnected\&. The deadtime only takes effect if the number of open files is zero\&. .IP This is useful to stop a server\'s resources being exhausted by a large number of inactive connections\&. .IP Most clients have an auto-reconnect feature when a connection is broken so in most cases this parameter should be transparent to users\&. .IP Using this parameter with a timeout of a few minutes is recommended for most systems\&. .IP A deadtime of zero indicates that no auto-disconnection should be performed\&. .IP \fBDefault:\fP \f(CW deadtime = 0\fP .IP \fBExample:\fP \f(CW deadtime = 15\fP .IP .IP "\fBdebug timestamp (G)\fP" .IP Samba2\&.0 debug log messages are timestamped by default\&. If you are running at a high \fB"debug level"\fP these timestamps can be distracting\&. This boolean parameter allows them to be turned off\&. .IP \fBDefault:\fP \f(CW debug timestamp = Yes\fP .IP \fBExample:\fP \f(CW debug timestamp = No\fP .IP .IP "\fBdebug level (G)\fP" .IP The value of the parameter (an integer) allows the debug level (logging level) to be specified in the \fBsmb\&.conf\fP file\&. This is to give greater flexibility in the configuration of the system\&. .IP The default will be the debug level specified on the command line or level zero if none was specified\&. .IP \fBExample:\fP \f(CW debug level = 3\fP .IP .IP "\fBdefault (G)\fP" .IP A synonym for \fBdefault service\fP\&. .IP .IP "\fBdefault case (S)\fP" .IP See the section on \fB"NAME MANGLING"\fP\&. Also note the \fB"short preserve case"\fP parameter\&. .IP .IP "\fBdefault service (G)\fP" .IP This parameter specifies the name of a service which will be connected to if the service actually requested cannot be found\&. Note that the square brackets are \fINOT\fP given in the parameter value (see example below)\&. .IP There is no default value for this parameter\&. If this parameter is not given, attempting to connect to a nonexistent service results in an error\&. .IP Typically the default service would be a \fBguest ok\fP, \fBread-only\fP service\&. .IP Also note that the apparent service name will be changed to equal that of the requested service, this is very useful as it allows you to use macros like \fB%S\fP to make a wildcard service\&. .IP Note also that any \f(CW\'_\'\fP characters in the name of the service used in the default service will get mapped to a \f(CW\'/\'\fP\&. This allows for interesting things\&. .IP \fBExample:\fP .DS default service = pub [pub] path = /%S .DE .IP .IP "\fBdelete readonly (S)\fP" .IP This parameter allows readonly files to be deleted\&. This is not normal DOS semantics, but is allowed by UNIX\&. .IP This option may be useful for running applications such as rcs, where UNIX file ownership prevents changing file permissions, and DOS semantics prevent deletion of a read only file\&. .IP \fBDefault:\fP \f(CW delete readonly = No\fP .IP \fBExample:\fP \f(CW delete readonly = Yes\fP .IP .IP "\fBdelete veto files (S)\fP" .IP This option is used when Samba is attempting to delete a directory that contains one or more vetoed directories (see the \fB\'veto files\'\fP option)\&. If this option is set to False (the default) then if a vetoed directory contains any non-vetoed files or directories then the directory delete will fail\&. This is usually what you want\&. .IP If this option is set to True, then Samba will attempt to recursively delete any files and directories within the vetoed directory\&. This can be useful for integration with file serving systems such as \fBNetAtalk\fP, which create meta-files within directories you might normally veto DOS/Windows users from seeing (eg\&. \f(CW\&.AppleDouble\fP) .IP Setting \f(CW\'delete veto files = True\'\fP allows these directories to be transparently deleted when the parent directory is deleted (so long as the user has permissions to do so)\&. .IP See also the \fBveto files\fP parameter\&. .IP \fBDefault:\fP \f(CW delete veto files = False\fP .IP \fBExample:\fP \f(CW delete veto files = True\fP .IP .IP "\fBdeny hosts (S)\fP" .IP The opposite of \fB\'allow hosts\'\fP - hosts listed here are \fINOT\fP permitted access to services unless the specific services have their own lists to override this one\&. Where the lists conflict, the \fB\'allow\'\fP list takes precedence\&. .IP \fBDefault:\fP \f(CW none (i\&.e\&., no hosts specifically excluded)\fP .IP \fBExample:\fP \f(CW deny hosts = 150\&.203\&.4\&. badhost\&.mynet\&.edu\&.au\fP .IP .IP "\fBdfree command (G)\fP" .IP The dfree command setting should only be used on systems where a problem occurs with the internal disk space calculations\&. This has been known to happen with Ultrix, but may occur with other operating systems\&. The symptom that was seen was an error of "Abort Retry Ignore" at the end of each directory listing\&. .IP This setting allows the replacement of the internal routines to calculate the total disk space and amount available with an external routine\&. The example below gives a possible script that might fulfill this function\&. .IP The external program will be passed a single parameter indicating a directory in the filesystem being queried\&. This will typically consist of the string \f(CW"\&./"\fP\&. The script should return two integers in ascii\&. The first should be the total disk space in blocks, and the second should be the number of available blocks\&. An optional third return value can give the block size in bytes\&. The default blocksize is 1024 bytes\&. .IP Note: Your script should \fINOT\fP be setuid or setgid and should be owned by (and writable only by) root! .IP \fBDefault:\fP \f(CW By default internal routines for determining the disk capacity and remaining space will be used\&.\fP .IP \fBExample:\fP \f(CW dfree command = /usr/local/samba/bin/dfree\fP .IP Where the script dfree (which must be made executable) could be: .IP .DS #!/bin/sh df $1 | tail -1 | awk \'{print $2" "$4}\' .DE .IP or perhaps (on Sys V based systems): .IP .DS #!/bin/sh /usr/bin/df -k $1 | tail -1 | awk \'{print $3" "$5}\' .DE .IP Note that you may have to replace the command names with full path names on some systems\&. .IP .IP "\fBdirectory (S)\fP" .IP Synonym for \fBpath\fP\&. .IP .IP "\fBdirectory mask (S)\fP" .IP This parameter is the octal modes which are used when converting DOS modes to UNIX modes when creating UNIX directories\&. .IP When a directory is created, the neccessary permissions are calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit-wise \'AND\'ed with this parameter\&. This parameter may be thought of as a bit-wise MASK for the UNIX modes of a directory\&. Any bit \fI*not*\fP set here will be removed from the modes set on a directory when it is created\&. .IP The default value of this parameter removes the \'group\' and \'other\' write bits from the UNIX mode, allowing only the user who owns the directory to modify it\&. .IP Following this Samba will bit-wise \'OR\' the UNIX mode created from this parameter with the value of the "force directory mode" parameter\&. This parameter is set to 000 by default (ie\&. no extra mode bits are added)\&. .IP See the \fB"force directory mode"\fP parameter to cause particular mode bits to always be set on created directories\&. .IP See also the \fB"create mode"\fP parameter for masking mode bits on created files\&. .IP \fBDefault:\fP \f(CW directory mask = 0755\fP .IP \fBExample:\fP \f(CW directory mask = 0775\fP .IP .IP "\fBdirectory mode (S)\fP" .IP Synonym for \fBdirectory mask\fP\&. .IP .IP "\fBdns proxy (G)\fP" .IP Specifies that \fBnmbd\fP when acting as a WINS server and finding that a NetBIOS name has not been registered, should treat the NetBIOS name word-for-word as a DNS name and do a lookup with the DNS server for that name on behalf of the name-querying client\&. .IP Note that the maximum length for a NetBIOS name is 15 characters, so the DNS name (or DNS alias) can likewise only be 15 characters, maximum\&. .IP \fBnmbd\fP spawns a second copy of itself to do the DNS name lookup requests, as doing a name lookup is a blocking action\&. .IP See also the parameter \fBwins support\fP\&. .IP \fBDefault:\fP \f(CW dns proxy = yes\fP .IP \fBdomain admin group (G)\fP .IP This is an \fBEXPERIMENTAL\fP parameter that is part of the unfinished Samba NT Domain Controller Code\&. It may be removed in a later release\&. To work with the latest code builds that may have more support for Samba NT Domain Controller functionality please subscibe to the mailing list \fBSamba-ntdom\fP available by sending email to \fIlistproc@samba\&.anu\&.edu\&.au\fP .IP .IP "\fBdomain admin users (G)\fP" .IP This is an \fBEXPERIMENTAL\fP parameter that is part of the unfinished Samba NT Domain Controller Code\&. It may be removed in a later release\&. To work with the latest code builds that may have more support for Samba NT Domain Controller functionality please subscibe to the mailing list \fBSamba-ntdom\fP available by sending email to \fIlistproc@samba\&.anu\&.edu\&.au\fP .IP .IP "\fBdomain controller (G)\fP" .IP This is a \fBDEPRECATED\fP parameter\&. It is currently not used within the Samba source and should be removed from all current smb\&.conf files\&. It is left behind for compatibility reasons\&. .IP .IP "\fBdomain groups (G)\fP" .IP This is an \fBEXPERIMENTAL\fP parameter that is part of the unfinished Samba NT Domain Controller Code\&. It may be removed in a later release\&. To work with the latest code builds that may have more support for Samba NT Domain Controller functionality please subscibe to the mailing list \fBSamba-ntdom\fP available by sending email to \fIlistproc@samba\&.anu\&.edu\&.au\fP .IP .IP "\fBdomain guest group (G)\fP" .IP This is an \fBEXPERIMENTAL\fP parameter that is part of the unfinished Samba NT Domain Controller Code\&. It may be removed in a later release\&. To work with the latest code builds that may have more support for Samba NT Domain Controller functionality please subscibe to the mailing list \fBSamba-ntdom\fP available by sending email to \fIlistproc@samba\&.anu\&.edu\&.au\fP .IP .IP "\fBdomain guest users (G)\fP" .IP This is an \fBEXPERIMENTAL\fP parameter that is part of the unfinished Samba NT Domain Controller Code\&. It may be removed in a later release\&. To work with the latest code builds that may have more support for Samba NT Domain Controller functionality please subscibe to the mailing list \fBSamba-ntdom\fP available by sending email to \fIlistproc@samba\&.anu\&.edu\&.au\fP .IP .IP "\fBdomain logons (G)\fP" .IP If set to true, the Samba server will serve Windows 95/98 Domain logons for the \fBworkgroup\fP it is in\&. For more details on setting up this feature see the file DOMAINS\&.txt in the Samba documentation directory \f(CWdocs/\fP shipped with the source code\&. .IP Note that Win95/98 Domain logons are \fINOT\fP the same as Windows NT Domain logons\&. NT Domain logons require a Primary Domain Controller (PDC) for the Domain\&. It is inteded that in a future release Samba will be able to provide this functionality for Windows NT clients also\&. .IP \fBDefault:\fP \f(CW domain logons = no\fP .IP .IP "\fBdomain master (G)\fP" .IP Tell \fBnmbd\fP to enable WAN-wide browse list collation\&.Setting this option causes \fBnmbd\fP to claim a special domain specific NetBIOS name that identifies it as a domain master browser for its given \fBworkgroup\fP\&. Local master browsers in the same \fBworkgroup\fP on broadcast-isolated subnets will give this \fBnmbd\fP their local browse lists, and then ask \fBsmbd\fP for a complete copy of the browse list for the whole wide area network\&. Browser clients will then contact their local master browser, and will receive the domain-wide browse list, instead of just the list for their broadcast-isolated subnet\&. .IP Note that Windows NT Primary Domain Controllers expect to be able to claim this \fBworkgroup\fP specific special NetBIOS name that identifies them as domain master browsers for that \fBworkgroup\fP by default (ie\&. there is no way to prevent a Windows NT PDC from attempting to do this)\&. This means that if this parameter is set and \fBnmbd\fP claims the special name for a \fBworkgroup\fP before a Windows NT PDC is able to do so then cross subnet browsing will behave strangely and may fail\&. .IP \fBDefault:\fP \f(CW domain master = no\fP .IP .IP "\fBdont descend (S)\fP" .IP There are certain directories on some systems (eg\&., the \f(CW/proc\fP tree under Linux) that are either not of interest to clients or are infinitely deep (recursive)\&. This parameter allows you to specify a comma-delimited list of directories that the server should always show as empty\&. .IP Note that Samba can be very fussy about the exact format of the "dont descend" entries\&. For example you may need \f(CW"\&./proc"\fP instead of just \f(CW"/proc"\fP\&. Experimentation is the best policy :-) .IP \fBDefault:\fP \f(CW none (i\&.e\&., all directories are OK to descend)\fP .IP \fBExample:\fP \f(CW dont descend = /proc,/dev\fP .IP .IP "\fBdos filetime resolution (S)\fP" .IP Under the DOS and Windows FAT filesystem, the finest granulatity on time resolution is two seconds\&. Setting this parameter for a share causes Samba to round the reported time down to the nearest two second boundary when a query call that requires one second resolution is made to \fBsmbd\fP\&. .IP This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\&. If oplocks are enabled on a share, Visual C++ uses two different time reading calls to check if a file has changed since it was last read\&. One of these calls uses a one-second granularity, the other uses a two second granularity\&. As the two second call rounds any odd second down, then if the file has a timestamp of an odd number of seconds then the two timestamps will not match and Visual C++ will keep reporting the file has changed\&. Setting this option causes the two timestamps to match, and Visual C++ is happy\&. .IP \fBDefault:\fP \f(CW dos filetime resolution = False\fP .IP \fBExample:\fP \f(CW dos filetime resolution = True\fP .IP .IP "\fBdos filetimes (S)\fP" .IP Under DOS and Windows, if a user can write to a file they can change the timestamp on it\&. Under POSIX semantics, only the owner of the file or root may change the timestamp\&. By default, Samba runs with POSIX semantics and refuses to change the timestamp on a file if the user smbd is acting on behalf of is not the file owner\&. Setting this option to True allows DOS semantics and smbd will change the file timstamp as DOS requires\&. .IP \fBDefault:\fP \f(CW dos filetimes = False\fP .IP \fBExample:\fP \f(CW dos filetimes = True\fP .IP .IP "\fBencrypt passwords (G)\fP" .IP This boolean controls whether encrypted passwords will be negotiated with the client\&. Note that Windows NT 4\&.0 SP3 and above and also Windows 98 will by default expect encrypted passwords unless a registry entry is changed\&. To use encrypted passwords in Samba see the file ENCRYPTION\&.txt in the Samba documentation directory \f(CWdocs/\fP shipped with the source code\&. .IP In order for encrypted passwords to work correctly \fBsmbd\fP must either have access to a local \fBsmbpasswd (5)\fP file (see the \fBsmbpasswd (8)\fP program for information on how to set up and maintain this file), or set the \fBsecurity=\fP parameter to either \fB"server"\fP or \fB"domain"\fP which causes \fBsmbd\fP to authenticate against another server\&. .IP .IP "\fBexec (S)\fP" .IP This is a synonym for \fBpreexec\fP\&. .IP .IP "\fBfake directory create times (S)\fP" .IP NTFS and Windows VFAT file systems keep a create time for all files and directories\&. This is not the same as the ctime - status change time - that Unix keeps, so Samba by default reports the earliest of the various times Unix does keep\&. Setting this parameter for a share causes Samba to always report midnight 1-1-1980 as the create time for directories\&. .IP This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\&. Visual C++ generated makefiles have the object directory as a dependency for each object file, and a make rule to create the directory\&. Also, when NMAKE compares timestamps it uses the creation time when examining a directory\&. Thus the object directory will be created if it does not exist, but once it does exist it will always have an earlier timestamp than the object files it contains\&. .IP However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or deleted in the directory\&. NMAKE therefore finds all object files in the object directory bar the last one built are out of date compared to the directory and rebuilds them\&. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\&. .IP \fBDefault:\fP \f(CW fake directory create times = False\fP .IP \fBExample:\fP \f(CW fake directory create times = True\fP .IP .IP "\fBfake oplocks (S)\fP" .IP Oplocks are the way that SMB clients get permission from a server to locally cache file operations\&. If a server grants an oplock (opportunistic lock) then the client is free to assume that it is the only one accessing the file and it will aggressively cache file data\&. With some oplock types the client may even cache file open/close operations\&. This can give enormous performance benefits\&. .IP When you set \f(CW"fake oplocks = yes"\fP \fBsmbd\fP will always grant oplock requests no matter how many clients are using the file\&. .IP It is generally much better to use the real \fBoplocks\fP support rather than this parameter\&. .IP If you enable this option on all read-only shares or shares that you know will only be accessed from one client at a time such as physically read-only media like CDROMs, you will see a big performance improvement on many operations\&. If you enable this option on shares where multiple clients may be accessing the files read-write at the same time you can get data corruption\&. Use this option carefully! .IP This option is disabled by default\&. .IP .IP "\fBfollow symlinks (S)\fP" .IP This parameter allows the Samba administrator to stop \fBsmbd\fP from following symbolic links in a particular share\&. Setting this parameter to \fI"No"\fP prevents any file or directory that is a symbolic link from being followed (the user will get an error)\&. This option is very useful to stop users from adding a symbolic link to \f(CW/etc/pasword\fP in their home directory for instance\&. However it will slow filename lookups down slightly\&. .IP This option is enabled (ie\&. \fBsmbd\fP will follow symbolic links) by default\&. .IP .IP "\fBforce create mode (S)\fP" .IP This parameter specifies a set of UNIX mode bit permissions that will \fI*always*\fP be set on a file created by Samba\&. This is done by bitwise \'OR\'ing these bits onto the mode bits of a file that is being created\&. The default for this parameter is (in octel) 000\&. The modes in this parameter are bitwise \'OR\'ed onto the file mode after the mask set in the \fB"create mask"\fP parameter is applied\&. .IP See also the parameter \fB"create mask"\fP for details on masking mode bits on created files\&. .IP \fBDefault:\fP \f(CW force create mode = 000\fP .IP \fBExample:\fP \f(CW force create mode = 0755\fP .IP would force all created files to have read and execute permissions set for \'group\' and \'other\' as well as the read/write/execute bits set for the \'user\'\&. .IP .IP "\fBforce directory mode (S)\fP" .IP This parameter specifies a set of UNIX mode bit permissions that will \fI*always*\fP be set on a directory created by Samba\&. This is done by bitwise \'OR\'ing these bits onto the mode bits of a directory that is being created\&. The default for this parameter is (in octel) 0000 which will not add any extra permission bits to a created directory\&. This operation is done after the mode mask in the parameter \fB"directory mask"\fP is applied\&. .IP See also the parameter \fB"directory mask"\fP for details on masking mode bits on created directories\&. .IP \fBDefault:\fP \f(CW force directory mode = 000\fP .IP \fBExample:\fP \f(CW force directory mode = 0755\fP .IP would force all created directories to have read and execute permissions set for \'group\' and \'other\' as well as the read/write/execute bits set for the \'user\'\&. .IP .IP "\fBforce group (S)\fP" .IP This specifies a UNIX group name that will be assigned as the default primary group for all users connecting to this service\&. This is useful for sharing files by ensuring that all access to files on service will use the named group for their permissions checking\&. Thus, by assigning permissions for this group to the files and directories within this service the Samba administrator can restrict or allow sharing of these files\&. .IP \fBDefault:\fP \f(CW no forced group\fP .IP \fBExample:\fP \f(CW force group = agroup\fP .IP .IP "\fBforce user (S)\fP" .IP This specifies a UNIX user name that will be assigned as the default user for all users connecting to this service\&. This is useful for sharing files\&. You should also use it carefully as using it incorrectly can cause security problems\&. .IP This user name only gets used once a connection is established\&. Thus clients still need to connect as a valid user and supply a valid password\&. Once connected, all file operations will be performed as the \f(CW"forced user"\fP, no matter what username the client connected as\&. .IP This can be very useful\&. .IP \fBDefault:\fP \f(CW no forced user\fP .IP \fBExample:\fP \f(CW force user = auser\fP .IP .IP "\fBfstype (S)\fP" .IP This parameter allows the administrator to configure the string that specifies the type of filesystem a share is using that is reported by \fBsmbd\fP when a client queries the filesystem type for a share\&. The default type is \fB"NTFS"\fP for compatibility with Windows NT but this can be changed to other strings such as "Samba" or "FAT" if required\&. .IP \fBDefault:\fP \f(CW fstype = NTFS\fP .IP \fBExample:\fP \f(CW fstype = Samba\fP .IP .IP "\fBgetwd cache (G)\fP" .IP This is a tuning option\&. When this is enabled a cacheing algorithm will be used to reduce the time taken for getwd() calls\&. This can have a significant impact on performance, especially when the \fBwidelinks\fP parameter is set to False\&. .IP \fBDefault:\fP \f(CW getwd cache = No\fP .IP \fBExample:\fP \f(CW getwd cache = Yes\fP .IP .IP "\fBgroup (S)\fP" .IP Synonym for \fB"force group"\fP\&. .IP .IP "\fBguest account (S)\fP" .IP This is a username which will be used for access to services which are specified as \fB\'guest ok\'\fP (see below)\&. Whatever privileges this user has will be available to any client connecting to the guest service\&. Typically this user will exist in the password file, but will not have a valid login\&. The user account \fB"ftp"\fP is often a good choice for this parameter\&. If a username is specified in a given service, the specified username overrides this one\&. .IP One some systems the default guest account "nobody" may not be able to print\&. Use another account in this case\&. You should test this by trying to log in as your guest user (perhaps by using the \f(CW"su -"\fP command) and trying to print using the system print command such as \fBlpr (1)\fP or \fBlp (1)\fP\&. .IP \fBDefault:\fP \f(CW specified at compile time, usually "nobody"\fP .IP \fBExample:\fP \f(CW guest account = ftp\fP .IP .IP "\fBguest ok (S)\fP" .IP If this parameter is \fI\'yes\'\fP for a service, then no password is required to connect to the service\&. Privileges will be those of the \fBguest account\fP\&. .IP See the section below on \fBsecurity\fP for more information about this option\&. .IP \fBDefault:\fP \f(CW guest ok = no\fP .IP \fBExample:\fP \f(CW guest ok = yes\fP .IP .IP "\fBguest only (S)\fP" .IP If this parameter is \fI\'yes\'\fP for a service, then only guest connections to the service are permitted\&. This parameter will have no affect if \fB"guest ok"\fP or \fB"public"\fP is not set for the service\&. .IP See the section below on \fBsecurity\fP for more information about this option\&. .IP \fBDefault:\fP \f(CW guest only = no\fP .IP \fBExample:\fP \f(CW guest only = yes\fP .IP .IP "\fBhide dot files (S)\fP" .IP This is a boolean parameter that controls whether files starting with a dot appear as hidden files\&. .IP \fBDefault:\fP \f(CW hide dot files = yes\fP .IP \fBExample:\fP \f(CW hide dot files = no\fP .IP .IP "\fBhide files(S)\fP" .IP This is a list of files or directories that are not visible but are accessible\&. The DOS \'hidden\' attribute is applied to any files or directories that match\&. .IP Each entry in the list must be separated by a \f(CW\'/\'\fP, which allows spaces to be included in the entry\&. \f(CW\'*\'\fP and \f(CW\'?\'\fP can be used to specify multiple files or directories as in DOS wildcards\&. .IP Each entry must be a unix path, not a DOS path and must not include the unix directory separator \f(CW\'/\'\fP\&. .IP Note that the case sensitivity option is applicable in hiding files\&. .IP Setting this parameter will affect the performance of Samba, as it will be forced to check all files and directories for a match as they are scanned\&. .IP See also \fB"hide dot files"\fP, \fB"veto files"\fP and \fB"case sensitive"\fP\&. .IP \fBDefault\fP .DS No files or directories are hidden by this option (dot files are hidden by default because of the "hide dot files" option)\&. .DE .IP \fBExample\fP \f(CW hide files = /\&.*/DesktopFolderDB/TrashFor%m/resource\&.frk/\fP .IP The above example is based on files that the Macintosh SMB client (DAVE) available from \fBThursby\fP creates for internal use, and also still hides all files beginning with a dot\&. .IP .IP "\fBhomedir map (G)\fP" .IP If \fB"nis homedir"\fP is true, and \fBsmbd\fP is also acting as a Win95/98 \fBlogon server\fP then this parameter specifies the NIS (or YP) map from which the server for the user\'s home directory should be extracted\&. At present, only the Sun auto\&.home map format is understood\&. The form of the map is: .IP \f(CWusername server:/some/file/system\fP .IP and the program will extract the servername from before the first \f(CW\':\'\fP\&. There should probably be a better parsing system that copes with different map formats and also Amd (another automounter) maps\&. .IP NB: A working NIS is required on the system for this option to work\&. .IP See also \fB"nis homedir"\fP, \fBdomain logons\fP\&. .IP \fBDefault:\fP \f(CW homedir map = auto\&.home\fP .IP \fBExample:\fP \f(CW homedir map = amd\&.homedir\fP .IP .IP "\fBhosts allow (S)\fP" .IP Synonym for \fBallow hosts\fP\&. .IP .IP "\fBhosts deny (S)\fP" .IP Synonym for \fBdenyhosts\fP\&. .IP .IP "\fBhosts equiv (G)\fP" .IP If this global parameter is a non-null string, it specifies the name of a file to read for the names of hosts and users who will be allowed access without specifying a password\&. .IP This is not be confused with \fBallow hosts\fP which is about hosts access to services and is more useful for guest services\&. \fBhosts equiv\fP may be useful for NT clients which will not supply passwords to samba\&. .IP NOTE: The use of \fBhosts equiv\fP can be a major security hole\&. This is because you are trusting the PC to supply the correct username\&. It is very easy to get a PC to supply a false username\&. I recommend that the \fBhosts equiv\fP option be only used if you really know what you are doing, or perhaps on a home network where you trust your spouse and kids\&. And only if you \fIreally\fP trust them :-)\&. .IP \fBDefault\fP \f(CW No host equivalences\fP .IP \fBExample\fP \f(CW hosts equiv = /etc/hosts\&.equiv\fP .IP .IP "\fBinclude (G)\fP" .IP This allows you to include one config file inside another\&. The file is included literally, as though typed in place\&. .IP It takes the standard substitutions, except \fB%u\fP, \fB%P\fP and \fB%S\fP\&. .IP .IP "\fBinterfaces (G)\fP" .IP This option allows you to setup multiple network interfaces, so that Samba can properly handle browsing on all interfaces\&. .IP The option takes a list of ip/netmask pairs\&. The netmask may either be a bitmask, or a bitlength\&. .IP For example, the following line: .IP \f(CWinterfaces = 192\&.168\&.2\&.10/24 192\&.168\&.3\&.10/24\fP .IP would configure two network interfaces with IP addresses 192\&.168\&.2\&.10 and 192\&.168\&.3\&.10\&. The netmasks of both interfaces would be set to 255\&.255\&.255\&.0\&. .IP You could produce an equivalent result by using: .IP \f(CWinterfaces = 192\&.168\&.2\&.10/255\&.255\&.255\&.0 192\&.168\&.3\&.10/255\&.255\&.255\&.0\fP .IP if you prefer that format\&. .IP If this option is not set then Samba will attempt to find a primary interface, but won\'t attempt to configure more than one interface\&. .IP See also \fB"bind interfaces only"\fP\&. .IP .IP "\fBinvalid users (S)\fP" .IP This is a list of users that should not be allowed to login to this service\&. This is really a \fI"paranoid"\fP check to absolutely ensure an improper setting does not breach your security\&. .IP A name starting with a \f(CW\'@\'\fP is interpreted as an NIS netgroup first (if your system supports NIS), and then as a UNIX group if the name was not found in the NIS netgroup database\&. .IP A name starting with \f(CW\'+\'\fP is interpreted only by looking in the UNIX group database\&. A name starting with \f(CW\'&\'\fP is interpreted only by looking in the NIS netgroup database (this requires NIS to be working on your system)\&. The characters \f(CW\'+\'\fP and \f(CW\'&\'\fP may be used at the start of the name in either order so the value \f(CW"+&group"\fP means check the UNIX group database, followed by the NIS netgroup database, and the value \f(CW"&+group"\fP means check the NIS netgroup database, followed by the UNIX group database (the same as the \f(CW\'@\'\fP prefix)\&. .IP The current servicename is substituted for \fB%S\fP\&. This is useful in the \fB[homes]\fP section\&. .IP See also \fB"valid users"\fP\&. .IP \fBDefault:\fP \f(CW No invalid users\fP .IP \fBExample:\fP \f(CW invalid users = root fred admin @wheel\fP .IP .IP "\fBkeepalive (G)\fP" .IP The value of the parameter (an integer) represents the number of seconds between \fB\'keepalive\'\fP packets\&. If this parameter is zero, no keepalive packets will be sent\&. Keepalive packets, if sent, allow the server to tell whether a client is still present and responding\&. .IP Keepalives should, in general, not be needed if the socket being used has the SO_KEEPALIVE attribute set on it (see \fB"socket options"\fP)\&. Basically you should only use this option if you strike difficulties\&. .IP \fBDefault:\fP \f(CW keep alive = 0\fP .IP \fBExample:\fP \f(CW keep alive = 60\fP .IP .IP "\fBkernel oplocks (G)\fP" .IP For UNIXs that support kernel based \fBoplocks\fP (currently only IRIX but hopefully also Linux and FreeBSD soon) this parameter allows the use of them to be turned on or off\&. .IP Kernel oplocks support allows Samba \fBoplocks\fP to be broken whenever a local UNIX process or NFS operation accesses a file that \fBsmbd\fP has oplocked\&. This allows complete data consistancy between SMB/CIFS, NFS and local file access (and is a \fIvery\fP cool feature :-)\&. .IP This parameter defaults to \fI"On"\fP on systems that have the support, and \fI"off"\fP on systems that don\'t\&. You should never need to touch this parameter\&. .IP .IP "\fBldap filter (G)\fP" .IP This parameter is part of the \fIEXPERIMENTAL\fP Samba support for a password database stored on an LDAP server back-end\&. These options are only available if your version of Samba was configured with the \fB--with-ldap\fP option\&. .IP This parameter specifies an LDAP search filter used to search for a user name in the LDAP database\&. It must contain the string \fB%u\fP which will be replaced with the user being searched for\&. .IP \fBDefault:\fP \f(CW empty string\&.\fP .IP .IP "\fBldap port (G)\fP" .IP This parameter is part of the \fIEXPERIMENTAL\fP Samba support for a password database stored on an LDAP server back-end\&. These options are only available if your version of Samba was configured with the \fB--with-ldap\fP option\&. .IP This parameter specifies the TCP port number to use to contact the LDAP server on\&. .IP \fBDefault:\fP \f(CW ldap port = 389\&.\fP .IP .IP "\fBldap root (G)\fP" .IP This parameter is part of the \fIEXPERIMENTAL\fP Samba support for a password database stored on an LDAP server back-end\&. These options are only available if your version of Samba was configured with the \fB--with-ldap\fP option\&. .IP This parameter specifies the entity to bind to the LDAP server as (essentially the LDAP username) in order to be able to perform queries and modifications on the LDAP database\&. .IP See also \fBldap root passwd\fP\&. .IP \fBDefault:\fP \f(CW empty string (no user defined)\fP .IP .IP "\fBldap root passwd (G)\fP" .IP This parameter is part of the \fIEXPERIMENTAL\fP Samba support for a password database stored on an LDAP server back-end\&. These options are only available if your version of Samba was configured with the \fB--with-ldap\fP option\&. .IP This parameter specifies the password for the entity to bind to the LDAP server as (the password for this LDAP username) in order to be able to perform queries and modifications on the LDAP database\&. .IP \fIBUGS:\fP This parameter should \fINOT\fP be a readable parameter in the \fBsmb\&.conf\fP file and will be removed once a correct storage place is found\&. .IP See also \fBldap root\fP\&. .IP \fBDefault:\fP \f(CW empty string\&.\fP .IP .IP "\fBldap server (G)\fP" .IP This parameter is part of the \fIEXPERIMENTAL\fP Samba support for a password database stored on an LDAP server back-end\&. These options are only available if your version of Samba was configured with the \fB--with-ldap\fP option\&. .IP This parameter specifies the DNS name of the LDAP server to use for SMB/CIFS authentication purposes\&. .IP \fBDefault:\fP \f(CW ldap server = localhost\fP .IP .IP "\fBldap suffix (G)\fP" .IP This parameter is part of the \fIEXPERIMENTAL\fP Samba support for a password database stored on an LDAP server back-end\&. These options are only available if your version of Samba was configured with the \fB--with-ldap\fP option\&. .IP This parameter specifies the \f(CW"dn"\fP or LDAP \fI"distinguished name"\fP that tells \fBsmbd\fP to start from when searching for an entry in the LDAP password database\&. .IP \fBDefault:\fP \f(CW empty string\&.\fP .IP .IP "\fBlm announce (G)\fP" .IP This parameter determines if \fBnmbd\fP will produce Lanman announce broadcasts that are needed by \fBOS/2\fP clients in order for them to see the Samba server in their browse list\&. This parameter can have three values, \f(CW"true"\fP, \f(CW"false"\fP, or \f(CW"auto"\fP\&. The default is \f(CW"auto"\fP\&. If set to \f(CW"false"\fP Samba will never produce these broadcasts\&. If set to \f(CW"true"\fP Samba will produce Lanman announce broadcasts at a frequency set by the parameter \fB"lm interval"\fP\&. If set to \f(CW"auto"\fP Samba will not send Lanman announce broadcasts by default but will listen for them\&. If it hears such a broadcast on the wire it will then start sending them at a frequency set by the parameter \fB"lm interval"\fP\&. .IP See also \fB"lm interval"\fP\&. .IP \fBDefault:\fP \f(CW lm announce = auto\fP .IP \fBExample:\fP \f(CW lm announce = true\fP .IP .IP "\fBlm interval (G)\fP" .IP If Samba is set to produce Lanman announce broadcasts needed by \fBOS/2\fP clients (see the \fB"lm announce"\fP parameter) then this parameter defines the frequency in seconds with which they will be made\&. If this is set to zero then no Lanman announcements will be made despite the setting of the \fB"lm announce"\fP parameter\&. .IP See also \fB"lm announce"\fP\&. .IP \fBDefault:\fP \f(CW lm interval = 60\fP .IP \fBExample:\fP \f(CW lm interval = 120\fP .IP .IP "\fBload printers (G)\fP" .IP A boolean variable that controls whether all printers in the printcap will be loaded for browsing by default\&. See the \fB"printers"\fP section for more details\&. .IP \fBDefault:\fP \f(CW load printers = yes\fP .IP bg(Example:) \f(CW load printers = no\fP .IP .IP "\fBlocal master (G)\fP" .IP This option allows \fBnmbd\fP to try and become a local master browser on a subnet\&. If set to False then \fBnmbd\fP will not attempt to become a local master browser on a subnet and will also lose in all browsing elections\&. By default this value is set to true\&. Setting this value to true doesn\'t mean that Samba will \fIbecome\fP the local master browser on a subnet, just that \fBnmbd\fP will \fIparticipate\fP in elections for local master browser\&. .IP Setting this value to False will cause \fBnmbd\fP \fInever\fP to become a local master browser\&. .IP \fBDefault:\fP \f(CW local master = yes\fP .IP .IP "\fBlock dir (G)\fP" .IP Synonym for \fB"lock directory"\fP\&. .IP .IP "\fBlock directory (G)\fP" .IP This option specifies the directory where lock files will be placed\&. The lock files are used to implement the \fB"max connections"\fP option\&. .IP \fBDefault:\fP \f(CW lock directory = /tmp/samba\fP .IP \fBExample:\fP \f(CW lock directory = /usr/local/samba/var/locks\fP .IP .IP "\fBlocking (S)\fP" .IP This controls whether or not locking will be performed by the server in response to lock requests from the client\&. .IP If \f(CW"locking = no"\fP, all lock and unlock requests will appear to succeed and all lock queries will indicate that the queried lock is clear\&. .IP If \f(CW"locking = yes"\fP, real locking will be performed by the server\&. .IP This option \fImay\fP be useful for read-only filesystems which \fImay\fP not need locking (such as cdrom drives), although setting this parameter of \f(CW"no"\fP is not really recommended even in this case\&. .IP Be careful about disabling locking either globally or in a specific service, as lack of locking may result in data corruption\&. You should never need to set this parameter\&. .IP \fBDefault:\fP \f(CW locking = yes\fP .IP \fBExample:\fP \f(CW locking = no\fP .IP .IP "\fBlog file (G)\fP" .IP This options allows you to override the name of the Samba log file (also known as the debug file)\&. .IP This option takes the standard substitutions, allowing you to have separate log files for each user or machine\&. .IP \fBExample:\fP \f(CW log file = /usr/local/samba/var/log\&.%m\fP .IP .IP "\fBlog level (G)\fP" .IP Synonym for \fB"debug level"\fP\&. .IP .IP "\fBlogon drive (G)\fP" .IP This parameter specifies the local path to which the home directory will be connected (see \fB"logon home"\fP) and is only used by NT Workstations\&. .IP Note that this option is only useful if Samba is set up as a \fBlogon server\fP\&. .IP \fBExample:\fP \f(CW logon drive = h:\fP .IP .IP "\fBlogon home (G)\fP" .IP This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC\&. It allows you to do .IP \f(CW"NET USE H: /HOME"\fP .IP from a command prompt, for example\&. .IP This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\&. .IP Note that this option is only useful if Samba is set up as a \fBlogon server\fP\&. .IP \fBExample:\fP \f(CW logon home = "\e\eremote_smb_server\e%U"\fP .IP \fBDefault:\fP \f(CW logon home = "\e\e%N\e%U"\fP .IP .IP "\fBlogon path (G)\fP" .IP This parameter specifies the home directory where roaming profiles (USER\&.DAT / USER\&.MAN files for Windows 95/98) are stored\&. .IP This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\&. It also specifies the directory from which the \f(CW"desktop"\fP, \f(CW"start menu"\fP, \f(CW"network neighborhood"\fP and \f(CW"programs"\fP folders, and their contents, are loaded and displayed on your Windows 95/98 client\&. .IP The share and the path must be readable by the user for the preferences and directories to be loaded onto the Windows 95/98 client\&. The share must be writeable when the logs in for the first time, in order that the Windows 95/98 client can create the user\&.dat and other directories\&. .IP Thereafter, the directories and any of contents can, if required, be made read-only\&. It is not adviseable that the USER\&.DAT file be made read-only - rename it to USER\&.MAN to achieve the desired effect (a \fIMAN\fPdatory profile)\&. .IP Windows clients can sometimes maintain a connection to the [homes] share, even though there is no user logged in\&. Therefore, it is vital that the logon path does not include a reference to the homes share (i\&.e setting this parameter to \f(CW\e\e%N\eHOMES\eprofile_path\fP will cause problems)\&. .IP This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\&. .IP Note that this option is only useful if Samba is set up as a \fBlogon server\fP\&. .IP \fBDefault:\fP \f(CW logon path = \e\e%N\e%U\eprofile\fP .IP \fBExample:\fP \f(CW logon path = \e\ePROFILESERVER\eHOME_DIR\e%U\ePROFILE\fP .IP .IP "\fBlogon script (G)\fP" .IP This parameter specifies the batch file (\&.bat) or NT command file (\&.cmd) to be downloaded and run on a machine when a user successfully logs in\&. The file must contain the DOS style cr/lf line endings\&. Using a DOS-style editor to create the file is recommended\&. .IP The script must be a relative path to the \f(CW[netlogon]\fP service\&. If the \f(CW[netlogon]\fP service specifies a \fBpath\fP of /usr/local/samba/netlogon, and logon script = STARTUP\&.BAT, then the file that will be downloaded is: .IP \f(CW/usr/local/samba/netlogon/STARTUP\&.BAT\fP .IP The contents of the batch file is entirely your choice\&. A suggested command would be to add \f(CWNET TIME \e\eSERVER /SET /YES\fP, to force every machine to synchronise clocks with the same time server\&. Another use would be to add \f(CWNET USE U: \e\eSERVER\eUTILS\fP for commonly used utilities, or \f(CWNET USE Q: \e\eSERVER\eISO9001_QA\fP for example\&. .IP Note that it is particularly important not to allow write access to the \f(CW[netlogon]\fP share, or to grant users write permission on the batch files in a secure environment, as this would allow the batch files to be arbitrarily modified and security to be breached\&. .IP This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\&. .IP Note that this option is only useful if Samba is set up as a \fBlogon server\fP\&. .IP \fBExample:\fP \f(CW logon script = scripts\e%U\&.bat\fP .IP .IP "\fBlppause command (S)\fP" .IP This parameter specifies the command to be executed on the server host in order to stop printing or spooling a specific print job\&. .IP This command should be a program or script which takes a printer name and job number to pause the print job\&. One way of implementing this is by using job priorities, where jobs having a too low priority won\'t be sent to the printer\&. .IP If a \f(CW"%p"\fP is given then the printername is put in its place\&. A \f(CW"%j"\fP is replaced with the job number (an integer)\&. On HPUX (see \fBprinting=hpux\fP), if the \f(CW"-p%p"\fP option is added to the lpq command, the job will show up with the correct status, i\&.e\&. if the job priority is lower than the set fence priority it will have the PAUSED status, whereas if the priority is equal or higher it will have the SPOOLED or PRINTING status\&. .IP Note that it is good practice to include the absolute path in the lppause command as the PATH may not be available to the server\&. .IP See also the \fB"printing"\fP parameter\&. .IP \fBDefault:\fP Currently no default value is given to this string, unless the value of the \fB"printing"\fP parameter is \f(CWSYSV\fP, in which case the default is : .IP \f(CW lp -i %p-%j -H hold\fP .IP or if the value of the \fB"printing"\fP parameter is \f(CWsoftq\fP, then the default is: .IP \f(CW qstat -s -j%j -h\fP .IP \fBExample for HPUX:\fP lppause command = /usr/bin/lpalt %p-%j -p0 .IP .IP "\fBlpq cache time (G)\fP" .IP This controls how long lpq info will be cached for to prevent the \fBlpq\fP command being called too often\&. A separate cache is kept for each variation of the \fBlpq\fP command used by the system, so if you use different \fBlpq\fP commands for different users then they won\'t share cache information\&. .IP The cache files are stored in \f(CW/tmp/lpq\&.xxxx\fP where xxxx is a hash of the \fBlpq\fP command in use\&. .IP The default is 10 seconds, meaning that the cached results of a previous identical \fBlpq\fP command will be used if the cached data is less than 10 seconds old\&. A large value may be advisable if your \fBlpq\fP command is very slow\&. .IP A value of 0 will disable cacheing completely\&. .IP See also the \fB"printing"\fP parameter\&. .IP \fBDefault:\fP \f(CW lpq cache time = 10\fP .IP \fBExample:\fP \f(CW lpq cache time = 30\fP .IP .IP "\fBlpq command (S)\fP" .IP This parameter specifies the command to be executed on the server host in order to obtain \f(CW"lpq"\fP-style printer status information\&. .IP This command should be a program or script which takes a printer name as its only parameter and outputs printer status information\&. .IP Currently eight styles of printer status information are supported; BSD, AIX, LPRNG, PLP, SYSV, HPUX, QNX and SOFTQ\&. This covers most UNIX systems\&. You control which type is expected using the \fB"printing ="\fP option\&. .IP Some clients (notably Windows for Workgroups) may not correctly send the connection number for the printer they are requesting status information about\&. To get around this, the server reports on the first printer service connected to by the client\&. This only happens if the connection number sent is invalid\&. .IP If a \f(CW%p\fP is given then the printername is put in its place\&. Otherwise it is placed at the end of the command\&. .IP Note that it is good practice to include the absolute path in the \fBlpq command\fP as the PATH may not be available to the server\&. .IP See also the \fB"printing"\fP parameter\&. .IP \fBDefault:\fP \f(CW depends on the setting of printing =\fP .IP \fBExample:\fP \f(CW lpq command = /usr/bin/lpq %p\fP .IP .IP "\fBlpresume command (S)\fP" .IP This parameter specifies the command to be executed on the server host in order to restart or continue printing or spooling a specific print job\&. .IP This command should be a program or script which takes a printer name and job number to resume the print job\&. See also the \fB"lppause command"\fP parameter\&. .IP If a \f(CW%p\fP is given then the printername is put in its place\&. A \f(CW%j\fP is replaced with the job number (an integer)\&. .IP Note that it is good practice to include the absolute path in the \fBlpresume command\fP as the PATH may not be available to the server\&. .IP See also the \fB"printing"\fP parameter\&. .IP \fBDefault:\fP .IP Currently no default value is given to this string, unless the value of the \fB"printing"\fP parameter is \f(CWSYSV\fP, in which case the default is : .IP \f(CW lp -i %p-%j -H resume\fP .IP or if the value of the \fB"printing"\fP parameter is \f(CWsoftq\fP, then the default is: .IP \f(CW qstat -s -j%j -r\fP .IP \fBExample for HPUX:\fP \f(CW lpresume command = /usr/bin/lpalt %p-%j -p2\fP .IP .IP "\fBlprm command (S)\fP" .IP This parameter specifies the command to be executed on the server host in order to delete a print job\&. .IP This command should be a program or script which takes a printer name and job number, and deletes the print job\&. .IP If a \f(CW%p\fP is given then the printername is put in its place\&. A \f(CW%j\fP is replaced with the job number (an integer)\&. .IP Note that it is good practice to include the absolute path in the \fBlprm command\fP as the PATH may not be available to the server\&. .IP See also the \fB"printing"\fP parameter\&. .IP \fBDefault:\fP \f(CW depends on the setting of "printing ="\fP .IP \fBExample 1:\fP \f(CW lprm command = /usr/bin/lprm -P%p %j\fP .IP \fBExample 2:\fP \f(CW lprm command = /usr/bin/cancel %p-%j\fP .IP .IP "\fBmachine password timeout (G)\fP" .IP If a Samba server is a member of an Windows NT Domain (see the \fB"security=domain"\fP) parameter) then periodically a running \fBsmbd\fP process will try and change the \fBMACHINE ACCOUNT PASWORD\fP stored in the file called \f(CW\&.\&.mac\fP where \f(CW\fP is the name of the Domain we are a member of and tt is the primary \fB"NetBIOS name"\fP of the machine \fBsmbd\fP is running on\&. This parameter specifies how often this password will be changed, in seconds\&. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\&. .IP See also \fBsmbpasswd (8)\fP, and the \fB"security=domain"\fP) parameter\&. .IP \fBDefault:\fP \f(CW machine password timeout = 604800\fP .IP .IP "\fBmagic output (S)\fP" .IP This parameter specifies the name of a file which will contain output created by a magic script (see the \fB"magic script"\fP parameter below)\&. .IP Warning: If two clients use the same \fB"magic script"\fP in the same directory the output file content is undefined\&. .IP \fBDefault:\fP \f(CW magic output = \&.out\fP .IP \fBExample:\fP \f(CW magic output = myfile\&.txt\fP .IP .IP "\fBmagic script (S)\fP" .IP This parameter specifies the name of a file which, if opened, will be executed by the server when the file is closed\&. This allows a UNIX script to be sent to the Samba host and executed on behalf of the connected user\&. .IP Scripts executed in this way will be deleted upon completion, permissions permitting\&. .IP If the script generates output, output will be sent to the file specified by the \fB"magic output"\fP parameter (see above)\&. .IP Note that some shells are unable to interpret scripts containing carriage-return-linefeed instead of linefeed as the end-of-line marker\&. Magic scripts must be executable \fI"as is"\fP on the host, which for some hosts and some shells will require filtering at the DOS end\&. .IP Magic scripts are \fIEXPERIMENTAL\fP and should \fINOT\fP be relied upon\&. .IP \fBDefault:\fP \f(CW None\&. Magic scripts disabled\&.\fP .IP \fBExample:\fP \f(CW magic script = user\&.csh\fP .IP .IP "\fBmangle case (S)\fP" .IP See the section on \fB"NAME MANGLING"\fP\&. .IP .IP "\fBmangled map (S)\fP" .IP This is for those who want to directly map UNIX file names which are not representable on Windows/DOS\&. The mangling of names is not always what is needed\&. In particular you may have documents with file extensions that differ between DOS and UNIX\&. For example, under UNIX it is common to use \f(CW"\&.html"\fP for HTML files, whereas under Windows/DOS \f(CW"\&.htm"\fP is more commonly used\&. .IP So to map \f(CW"html"\fP to \f(CW"htm"\fP you would use: .IP \f(CW mangled map = (*\&.html *\&.htm)\fP .IP One very useful case is to remove the annoying \f(CW";1"\fP off the ends of filenames on some CDROMS (only visible under some UNIXes)\&. To do this use a map of (*;1 *)\&. .IP \fBdefault:\fP \f(CW no mangled map\fP .IP \fBExample:\fP \f(CW mangled map = (*;1 *)\fP .IP .IP "\fBmangled names (S)\fP" .IP This controls whether non-DOS names under UNIX should be mapped to DOS-compatible names ("mangled") and made visible, or whether non-DOS names should simply be ignored\&. .IP See the section on \fB"NAME MANGLING"\fP for details on how to control the mangling process\&. .IP If mangling is used then the mangling algorithm is as follows: .IP .IP .IP o The first (up to) five alphanumeric characters before the rightmost dot of the filename are preserved, forced to upper case, and appear as the first (up to) five characters of the mangled name\&. .IP .IP o A tilde \f(CW"~"\fP is appended to the first part of the mangled name, followed by a two-character unique sequence, based on the original root name (i\&.e\&., the original filename minus its final extension)\&. The final extension is included in the hash calculation only if it contains any upper case characters or is longer than three characters\&. .IP Note that the character to use may be specified using the \fB"mangling char"\fP option, if you don\'t like \f(CW\'~\'\fP\&. .IP .IP o The first three alphanumeric characters of the final extension are preserved, forced to upper case and appear as the extension of the mangled name\&. The final extension is defined as that part of the original filename after the rightmost dot\&. If there are no dots in the filename, the mangled name will have no extension (except in the case of \fB"hidden files"\fP - see below)\&. .IP .IP o Files whose UNIX name begins with a dot will be presented as DOS hidden files\&. The mangled name will be created as for other filenames, but with the leading dot removed and \f(CW"___"\fP as its extension regardless of actual original extension (that\'s three underscores)\&. .IP .IP The two-digit hash value consists of upper case alphanumeric characters\&. .IP This algorithm can cause name collisions only if files in a directory share the same first five alphanumeric characters\&. The probability of such a clash is 1/1300\&. .IP The name mangling (if enabled) allows a file to be copied between UNIX directories from Windows/DOS while retaining the long UNIX filename\&. UNIX files can be renamed to a new extension from Windows/DOS and will retain the same basename\&. Mangled names do not change between sessions\&. .IP \fBDefault:\fP \f(CW mangled names = yes\fP .IP \fBExample:\fP \f(CW mangled names = no\fP .IP .IP "\fBmangling char (S)\fP" .IP This controls what character is used as the \fI"magic"\fP character in \fBname mangling\fP\&. The default is a \f(CW\'~\'\fP but this may interfere with some software\&. Use this option to set it to whatever you prefer\&. .IP \fBDefault:\fP \f(CW mangling char = ~\fP .IP \fBExample:\fP \f(CW mangling char = ^\fP .IP .IP "\fBmangled stack (G)\fP" .IP This parameter controls the number of mangled names that should be cached in the Samba server \fBsmbd\fP\&. .IP This stack is a list of recently mangled base names (extensions are only maintained if they are longer than 3 characters or contains upper case characters)\&. .IP The larger this value, the more likely it is that mangled names can be successfully converted to correct long UNIX names\&. However, large stack sizes will slow most directory access\&. Smaller stacks save memory in the server (each stack element costs 256 bytes)\&. .IP It is not possible to absolutely guarantee correct long file names, so be prepared for some surprises! .IP \fBDefault:\fP \f(CW mangled stack = 50\fP .IP \fBExample:\fP \f(CW mangled stack = 100\fP .IP .IP "\fBmap archive (S)\fP" .IP This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit\&. The DOS archive bit is set when a file has been modified since its last backup\&. One motivation for this option it to keep Samba/your PC from making any file it touches from becoming executable under UNIX\&. This can be quite annoying for shared source code, documents, etc\&.\&.\&. .IP Note that this requires the \fB"create mask"\fP parameter to be set such that owner execute bit is not masked out (ie\&. it must include 100)\&. See the parameter \fB"create mask"\fP for details\&. .IP \fBDefault:\fP \f(CW map archive = yes\fP .IP \fBExample:\fP \f(CW map archive = no\fP .IP .IP "\fBmap hidden (S)\fP" .IP This controls whether DOS style hidden files should be mapped to the UNIX world execute bit\&. .IP Note that this requires the \fB"create mask"\fP to be set such that the world execute bit is not masked out (ie\&. it must include 001)\&. See the parameter \fB"create mask"\fP for details\&. .IP \fBDefault:\fP \f(CW map hidden = no\fP .IP \fBExample:\fP \f(CW map hidden = yes\fP .IP .IP "\fBmap system (S)\fP" .IP This controls whether DOS style system files should be mapped to the UNIX group execute bit\&. .IP Note that this requires the \fB"create mask"\fP to be set such that the group execute bit is not masked out (ie\&. it must include 010)\&. See the parameter \fB"create mask"\fP for details\&. .IP \fBDefault:\fP \f(CW map system = no\fP .IP \fBExample:\fP \f(CW map system = yes\fP .IP .IP "\fBmap to guest (G)\fP" .IP This parameter is only useful in \fBsecurity\fP modes other than \fB"security=share"\fP - ie\&. user, server, and domain\&. .IP This parameter can take three different values, which tell \fBsmbd\fP what to do with user login requests that don\'t match a valid UNIX user in some way\&. .IP The three settings are : .IP .IP .IP o \fB"Never"\fP - Means user login requests with an invalid password are rejected\&. This is the default\&. .IP .IP o \fB"Bad User"\fP - Means user logins with an invalid password are rejected, unless the username does not exist, in which case it is treated as a guest login and mapped into the \fB"guest account"\fP\&. .IP .IP o \fB"Bad Password"\fP - Means user logins with an invalid password are treated as a guest login and mapped into the \fB"guest account"\fP\&. Note that this can cause problems as it means that any user mistyping their password will be silently logged on a \fB"guest"\fP - and will not know the reason they cannot access files they think they should - there will have been no message given to them that they got their password wrong\&. Helpdesk services will \fI*hate*\fP you if you set the \fB"map to guest"\fP parameter this way :-)\&. .IP .IP Note that this parameter is needed to set up \fB"Guest"\fP share services when using \fBsecurity\fP modes other than share\&. This is because in these modes the name of the resource being requested is \fI*not*\fP sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for \fB"Guest"\fP shares\&. .IP For people familiar with the older Samba releases, this parameter maps to the old compile-time setting of the GUEST_SESSSETUP value in local\&.h\&. .IP \fBDefault:\fP \f(CW map to guest = Never\fP \fBExample\fP: \f(CW map to guest = Bad User\fP .IP .IP "\fBmax connections (S)\fP" .IP This option allows the number of simultaneous connections to a service to be limited\&. If \fB"max connections"\fP is greater than 0 then connections will be refused if this number of connections to the service are already open\&. A value of zero mean an unlimited number of connections may be made\&. .IP Record lock files are used to implement this feature\&. The lock files will be stored in the directory specified by the \fB"lock directory"\fP option\&. .IP \fBDefault:\fP \f(CW max connections = 0\fP .IP \fBExample:\fP \f(CW max connections = 10\fP .IP .IP "\fBmax disk size (G)\fP" .IP This option allows you to put an upper limit on the apparent size of disks\&. If you set this option to 100 then all shares will appear to be not larger than 100 MB in size\&. .IP Note that this option does not limit the amount of data you can put on the disk\&. In the above case you could still store much more than 100 MB on the disk, but if a client ever asks for the amount of free disk space or the total disk size then the result will be bounded by the amount specified in \fB"max disk size"\fP\&. .IP This option is primarily useful to work around bugs in some pieces of software that can\'t handle very large disks, particularly disks over 1GB in size\&. .IP A \fB"max disk size"\fP of 0 means no limit\&. .IP \fBDefault:\fP \f(CW max disk size = 0\fP .IP \fBExample:\fP \f(CW max disk size = 1000\fP .IP .IP "\fBmax log size (G)\fP" .IP This option (an integer in kilobytes) specifies the max size the log file should grow to\&. Samba periodically checks the size and if it is exceeded it will rename the file, adding a \f(CW"\&.old"\fP extension\&. .IP A size of 0 means no limit\&. .IP \fBDefault:\fP \f(CW max log size = 5000\fP .IP \fBExample:\fP \f(CW max log size = 1000\fP .IP .IP "\fBmax mux (G)\fP" .IP This option controls the maximum number of outstanding simultaneous SMB operations that samba tells the client it will allow\&. You should never need to set this parameter\&. .IP \fBDefault:\fP \f(CW max mux = 50\fP .IP .IP "\fBmaxopenfiles (G)\fP" .IP This parameter limits the maximum number of open files that one \fBsmbd\fP file serving process may have open for a client at any one time\&. The default for this parameter is set very high (10,000) as Samba uses only one bit per un-opened file\&. .IP The limit of the number of open files is usually set by the UNIX per-process file descriptor limit rather than this parameter so you should never need to touch this parameter\&. .IP \fBDefault:\fP \f(CW max open files = 10000\fP .IP .IP "\fBmax packet (G)\fP" .IP Synonym for (packetsize)\&. .IP .IP "\fBmax ttl (G)\fP" .IP This option tells \fBnmbd\fP what the default \'time to live\' of NetBIOS names should be (in seconds) when \fBnmbd\fP is requesting a name using either a broadcast packet or from a WINS server\&. You should never need to change this parameter\&. The default is 3 days\&. .IP \fBDefault:\fP \f(CW max ttl = 259200\fP .IP .IP "\fBmax wins ttl (G)\fP" .IP This option tells \fBnmbd\fP when acting as a WINS server \fB(wins support =true)\fP what the maximum \'time to live\' of NetBIOS names that \fBnmbd\fP will grant will be (in seconds)\&. You should never need to change this parameter\&. The default is 6 days (518400 seconds)\&. .IP See also the \fB"min wins ttl"\fP parameter\&. .IP \fBDefault:\fP \f(CW max wins ttl = 518400\fP .IP .IP "\fBmax xmit (G)\fP" .IP This option controls the maximum packet size that will be negotiated by Samba\&. The default is 65535, which is the maximum\&. In some cases you may find you get better performance with a smaller value\&. A value below 2048 is likely to cause problems\&. .IP \fBDefault:\fP \f(CW max xmit = 65535\fP .IP \fBExample:\fP \f(CW max xmit = 8192\fP .IP .IP "\fBmessage command (G)\fP" .IP This specifies what command to run when the server receives a WinPopup style message\&. .IP This would normally be a command that would deliver the message somehow\&. How this is to be done is up to your imagination\&. .IP An example is: .IP \f(CW message command = csh -c \'xedit %s;rm %s\' &\fP .IP This delivers the message using \fBxedit\fP, then removes it afterwards\&. \fINOTE THAT IT IS VERY IMPORTANT THAT THIS COMMAND RETURN IMMEDIATELY\fP\&. That\'s why I have the \f(CW\'&\'\fP on the end\&. If it doesn\'t return immediately then your PCs may freeze when sending messages (they should recover after 30secs, hopefully)\&. .IP All messages are delivered as the global guest user\&. The command takes the standard substitutions, although \fB%u\fP won\'t work (\fB%U\fP may be better in this case)\&. .IP Apart from the standard substitutions, some additional ones apply\&. In particular: .IP .IP .IP o \f(CW"%s"\fP = the filename containing the message\&. .IP .IP o \f(CW"%t"\fP = the destination that the message was sent to (probably the server name)\&. .IP .IP o \f(CW"%f"\fP = who the message is from\&. .IP .IP You could make this command send mail, or whatever else takes your fancy\&. Please let us know of any really interesting ideas you have\&. .IP Here\'s a way of sending the messages as mail to root: .IP \f(CWmessage command = /bin/mail -s \'message from %f on %m\' root < %s; rm %s\fP .IP If you don\'t have a message command then the message won\'t be delivered and Samba will tell the sender there was an error\&. Unfortunately WfWg totally ignores the error code and carries on regardless, saying that the message was delivered\&. .IP If you want to silently delete it then try: .IP \f(CW"message command = rm %s"\fP\&. .IP For the really adventurous, try something like this: .IP \f(CWmessage command = csh -c \'csh < %s |& /usr/local/samba/bin/smbclient -M %m; rm %s\' &\fP .IP this would execute the command as a script on the server, then give them the result in a WinPopup message\&. Note that this could cause a loop if you send a message from the server using smbclient! You better wrap the above in a script that checks for this :-) .IP \fBDefault:\fP \f(CW no message command\fP .IP \fBExample:\fP \f(CW message command = csh -c \'xedit %s;rm %s\' &\fP .IP .IP "\fBmin print space (S)\fP" .IP This sets the minimum amount of free disk space that must be available before a user will be able to spool a print job\&. It is specified in kilobytes\&. The default is 0, which means a user can always spool a print job\&. .IP See also the \fBprinting\fP parameter\&. .IP \fBDefault:\fP \f(CW min print space = 0\fP .IP \fBExample:\fP \f(CW min print space = 2000\fP .IP .IP "\fBmin wins ttl (G)\fP" .IP This option tells \fBnmbd\fP when acting as a WINS server \fB(wins support = true)\fP what the minimum \'time to live\' of NetBIOS names that \fBnmbd\fP will grant will be (in seconds)\&. You should never need to change this parameter\&. The default is 6 hours (21600 seconds)\&. .IP \fBDefault:\fP \f(CW min wins ttl = 21600\fP .IP .IP "\fBname resolve order (G)\fP" .IP This option is used by the programs in the Samba suite to determine what naming services and in what order to resolve host names to IP addresses\&. The option takes a space separated string of different name resolution options\&. .IP The options are :"lmhosts", "host", "wins" and "bcast"\&. They cause names to be resolved as follows : .IP .IP .IP o \fBlmhosts\fP : Lookup an IP address in the Samba lmhosts file\&. .IP .IP o \fBhost\fP : Do a standard host name to IP address resolution, using the system /etc/hosts, NIS, or DNS lookups\&. This method of name resolution is operating system depended for instance on IRIX or Solaris this may be controlled by the \fI/etc/nsswitch\&.conf\fP file)\&. .IP .IP o \fBwins\fP : Query a name with the IP address listed in the \fBwins server\fP parameter\&. If no WINS server has been specified this method will be ignored\&. .IP .IP o \fBbcast\fP : Do a broadcast on each of the known local interfaces listed in the \fBinterfaces\fP parameter\&. This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet\&. .IP .IP \fBDefault:\fP \f(CW name resolve order = lmhosts host wins bcast\fP .IP \fBExample:\fP \f(CW name resolve order = lmhosts bcast host\fP .IP This will cause the local lmhosts file to be examined first, followed by a broadcast attempt, followed by a normal system hostname lookup\&. .IP .IP "\fBnetbios aliases (G)\fP" .IP This is a list of NetBIOS names that \fBnmbd\fP will advertise as additional names by which the Samba server is known\&. This allows one machine to appear in browse lists under multiple names\&. If a machine is acting as a \fBbrowse server\fP or \fBlogon server\fP none of these names will be advertised as either browse server or logon servers, only the primary name of the machine will be advertised with these capabilities\&. .IP See also \fB"netbios name"\fP\&. .IP \fBDefault:\fP \f(CW empty string (no additional names)\fP .IP \fBExample:\fP \f(CW netbios aliases = TEST TEST1 TEST2\fP .IP .IP "\fBnetbios name (G)\fP" .IP This sets the NetBIOS name by which a Samba server is known\&. By default it is the same as the first component of the host\'s DNS name\&. If a machine is a \fBbrowse server\fP or \fBlogon server\fP this name (or the first component of the hosts DNS name) will be the name that these services are advertised under\&. .IP See also \fB"netbios aliases"\fP\&. .IP \fBDefault:\fP \f(CW Machine DNS name\&.\fP .IP \fBExample:\fP \f(CW netbios name = MYNAME\fP .IP .IP "\fBnis homedir (G)\fP" .IP Get the home share server from a NIS map\&. For UNIX systems that use an automounter, the user\'s home directory will often be mounted on a workstation on demand from a remote server\&. .IP When the Samba logon server is not the actual home directory server, but is mounting the home directories via NFS then two network hops would be required to access the users home directory if the logon server told the client to use itself as the SMB server for home directories (one over SMB and one over NFS)\&. This can be very slow\&. .IP This option allows Samba to return the home share as being on a different server to the logon server and as long as a Samba daemon is running on the home directory server, it will be mounted on the Samba client directly from the directory server\&. When Samba is returning the home share to the client, it will consult the NIS map specified in \fB"homedir map"\fP and return the server listed there\&. .IP Note that for this option to work there must be a working NIS system and the Samba server with this option must also be a \fBlogon server\fP\&. .IP \fBDefault:\fP \f(CW nis homedir = false\fP .IP \fBExample:\fP \f(CW nis homedir = true\fP .IP .IP "\fBnt pipe support (G)\fP" .IP This boolean parameter controlls whether \fBsmbd\fP will allow Windows NT clients to connect to the NT SMB specific \f(CWIPC$\fP pipes\&. This is a developer debugging option and can be left alone\&. .IP \fBDefault:\fP \f(CW nt pipe support = yes\fP .IP .IP "\fBnt smb support (G)\fP" .IP This boolean parameter controlls whether \fBsmbd\fP will negotiate NT specific SMB support with Windows NT clients\&. Although this is a developer debugging option and should be left alone, benchmarking has discovered that Windows NT clients give faster performance with this option set to \f(CW"no"\fP\&. This is still being investigated\&. If this option is set to \f(CW"no"\fP then Samba offers exactly the same SMB calls that versions prior to Samba2\&.0 offered\&. This information may be of use if any users are having problems with NT SMB support\&. .IP \fBDefault:\fP \f(CW nt support = yes\fP .IP .IP "\fBnull passwords (G)\fP" .IP Allow or disallow client access to accounts that have null passwords\&. .IP See also \fBsmbpasswd (5)\fP\&. .IP \fBDefault:\fP \f(CW null passwords = no\fP .IP \fBExample:\fP \f(CW null passwords = yes\fP .IP .IP "\fBole locking compatibility (G)\fP" .IP This parameter allows an administrator to turn off the byte range lock manipulation that is done within Samba to give compatibility for OLE applications\&. Windows OLE applications use byte range locking as a form of inter-process communication, by locking ranges of bytes around the 2^32 region of a file range\&. This can cause certain UNIX lock managers to crash or otherwise cause problems\&. Setting this parameter to \f(CW"no"\fP means you trust your UNIX lock manager to handle such cases correctly\&. .IP \fBDefault:\fP \f(CW ole locking compatibility = yes\fP .IP \fBExample:\fP \f(CW ole locking compatibility = no\fP .IP .IP "\fBonly guest (S)\fP" .IP A synonym for \fB"guest only"\fP\&. .IP .IP "\fBonly user (S)\fP" .IP This is a boolean option that controls whether connections with usernames not in the \fBuser=\fP list will be allowed\&. By default this option is disabled so a client can supply a username to be used by the server\&. .IP Note that this also means Samba won\'t try to deduce usernames from the service name\&. This can be annoying for the \fB[homes]\fP section\&. To get around this you could use "\fBuser\fP = \fB%S\fP" which means your \fB"user"\fP list will be just the service name, which for home directories is the name of the user\&. .IP See also the \fBuser\fP parameter\&. .IP \fBDefault:\fP \f(CW only user = False\fP .IP \fBExample:\fP \f(CW only user = True\fP .IP .IP "\fBoplocks (S)\fP" .IP This boolean option tells smbd whether to issue oplocks (opportunistic locks) to file open requests on this share\&. The oplock code can dramatically (approx 30% or more) improve the speed of access to files on Samba servers\&. It allows the clients to agressively cache files locally and you may want to disable this option for unreliable network environments (it is turned on by default in Windows NT Servers)\&. For more information see the file Speed\&.txt in the Samba docs/ directory\&. .IP Oplocks may be selectively turned off on certain files on a per share basis\&. See the \'veto oplock files\' parameter\&. On some systems oplocks are recognised by the underlying operating system\&. This allows data synchronisation between all access to oplocked files, whether it be via Samba or NFS or a local UNIX process\&. See the \fBkernel oplocks\fP parameter for details\&. .IP \fBDefault:\fP \f(CW oplocks = True\fP .IP \fBExample:\fP \f(CW oplocks = False\fP .IP .IP "\fBos level (G)\fP" .IP This integer value controls what level Samba advertises itself as for browse elections\&. The value of this parameter determines whether \fBnmbd\fP has a chance of becoming a local master browser for the \fBWORKGROUP\fP in the local broadcast area\&. The default is zero, which means \fBnmbd\fP will lose elections to Windows machines\&. See BROWSING\&.txt in the Samba docs/ directory for details\&. .IP \fBDefault:\fP \f(CW os level = 0\fP .IP \fBExample:\fP \f(CW os level = 65 ; This will win against any NT Server\fP .IP .IP "\fBpacket size (G)\fP" .IP This is a deprecated parameter that how no effect on the current Samba code\&. It is left in the parameter list to prevent breaking old \fBsmb\&.conf\fP files\&. .IP .IP "\fBpanic action (G)\fP" .IP This is a Samba developer option that allows a system command to be called when either \fBsmbd\fP or \fBnmbd\fP crashes\&. This is usually used to draw attention to the fact that a problem occured\&. .IP \fBDefault:\fP \f(CW panic action = \fP .IP .IP "\fBpasswd chat (G)\fP" .IP This string controls the \fI"chat"\fP conversation that takes places between \fBsmbd\fP and the local password changing program to change the users password\&. The string describes a sequence of response-receive pairs that \fBsmbd\fP uses to determine what to send to the \fBpasswd\fP program and what to expect back\&. If the expected output is not received then the password is not changed\&. .IP This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\&. .IP The string can contain the macros \f(CW"%o"\fP and \f(CW"%n"\fP which are substituted for the old and new passwords respectively\&. It can also contain the standard macros \f(CW"\en"\fP, \f(CW"\er"\fP, \f(CW"\et"\fP and \f(CW"\es"\fP to give line-feed, carriage-return, tab and space\&. .IP The string can also contain a \f(CW\'*\'\fP which matches any sequence of characters\&. .IP Double quotes can be used to collect strings with spaces in them into a single string\&. .IP If the send string in any part of the chat sequence is a fullstop \f(CW"\&."\fP then no string is sent\&. Similarly, is the expect string is a fullstop then no string is expected\&. .IP Note that if the \fB"unix password sync"\fP parameter is set to true, then this sequence is called \fI*AS ROOT*\fP when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\&. In this case the old password cleartext is set to \f(CW""\fP (the empty string)\&. .IP See also \fB"unix password sync"\fP, \fB"passwd program"\fP and \fB"passwd chat debug"\fP\&. .IP \fBExample:\fP .DS passwd chat = "*Enter OLD password*" %o\en "*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*" .DE .IP \fBDefault:\fP .DS passwd chat = *old*password* %o\en *new*password* %n\en *new*password* %n\en *changed* .DE .IP .IP "\fBpasswd chat debug (G)\fP" .IP This boolean specifies if the passwd chat script parameter is run in \f(CW"debug"\fP mode\&. In this mode the strings passed to and received from the passwd chat are printed in the \fBsmbd\fP log with a \fB"debug level"\fP of 100\&. This is a dangerous option as it will allow plaintext passwords to be seen in the \fBsmbd\fP log\&. It is available to help Samba admins debug their \fB"passwd chat"\fP scripts when calling the \fB"passwd program"\fP and should be turned off after this has been done\&. This parameter is off by default\&. .IP See also \fB"passwd chat"\fP, \fB"passwd program"\fP\&. .IP \fBExample:\fP \f(CW passwd chat debug = True\fP .IP \fBDefault:\fP \f(CW passwd chat debug = False\fP .IP .IP "\fBpasswd program (G)\fP" .IP The name of a program that can be used to set UNIX user passwords\&. Any occurrences of \fB%u\fP will be replaced with the user name\&. The user name is checked for existance before calling the password changing program\&. .IP Also note that many passwd programs insist in \fI"reasonable"\fP passwords, such as a minimum length, or the inclusion of mixed case chars and digits\&. This can pose a problem as some clients (such as Windows for Workgroups) uppercase the password before sending it\&. .IP \fINote\fP that if the \fB"unix password sync"\fP parameter is set to \f(CW"True"\fP then this program is called \fI*AS ROOT*\fP before the SMB password in the \fBsmbpassswd\fP file is changed\&. If this UNIX password change fails, then \fBsmbd\fP will fail to change the SMB password also (this is by design)\&. .IP If the \fB"unix password sync"\fP parameter is set this parameter \fIMUST USE ABSOLUTE PATHS\fP for \fIALL\fP programs called, and must be examined for security implications\&. Note that by default \fB"unix password sync"\fP is set to \f(CW"False"\fP\&. .IP See also \fB"unix password sync"\fP\&. .IP \fBDefault:\fP \f(CW passwd program = /bin/passwd\fP .IP \fBExample:\fP \f(CW passwd program = /sbin/passwd %u\fP .IP .IP "\fBpassword level (G)\fP" .IP Some client/server combinations have difficulty with mixed-case passwords\&. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! .IP This parameter defines the maximum number of characters that may be upper case in passwords\&. .IP For example, say the password given was \f(CW"FRED"\fP\&. If \fBpassword level\fP is set to 1, the following combinations would be tried if \f(CW"FRED"\fP failed: .IP \f(CW"Fred"\fP, \f(CW"fred"\fP, \f(CW"fRed"\fP, \f(CW"frEd"\fP, \f(CW"freD"\fP .IP If \fBpassword level\fP was set to 2, the following combinations would also be tried: .IP \f(CW"FRed"\fP, \f(CW"FrEd"\fP, \f(CW"FreD"\fP, \f(CW"fREd"\fP, \f(CW"fReD"\fP, \f(CW"frED"\fP, \f(CW\&.\&.\fP .IP And so on\&. .IP The higher value this parameter is set to the more likely it is that a mixed case password will be matched against a single case password\&. However, you should be aware that use of this parameter reduces security and increases the time taken to process a new connection\&. .IP A value of zero will cause only two attempts to be made - the password as is and the password in all-lower case\&. .IP \fBDefault:\fP \f(CW password level = 0\fP .IP \fBExample:\fP \f(CW password level = 4\fP .IP .IP "\fBpassword server (G)\fP" .IP By specifying the name of another SMB server (such as a WinNT box) with this option, and using \fB"security = domain"\fP or \fB"security = server"\fP you can get Samba to do all its username/password validation via a remote server\&. .IP This options sets the name of the password server to use\&. It must be a NetBIOS name, so if the machine\'s NetBIOS name is different from its internet name then you may have to add its NetBIOS name to the lmhosts file which is stored in the same directory as the \fBsmb\&.conf\fP file\&. .IP The name of the password server is looked up using the parameter \fB"name resolve order="\fP and so may resolved by any method and order described in that parameter\&. .IP The password server much be a machine capable of using the "LM1\&.2X002" or the "LM NT 0\&.12" protocol, and it must be in user level security mode\&. .IP NOTE: Using a password server means your UNIX box (running Samba) is only as secure as your password server\&. \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\'T COMPLETELY TRUST\fP\&. .IP Never point a Samba server at itself for password serving\&. This will cause a loop and could lock up your Samba server! .IP The name of the password server takes the standard substitutions, but probably the only useful one is \fB%m\fP, which means the Samba server will use the incoming client as the password server\&. If you use this then you better trust your clients, and you better restrict them with hosts allow! .IP If the \fB"security"\fP parameter is set to \fB"domain"\fP, then the list of machines in this option must be a list of Primary or Backup Domain controllers for the \fBDomain\fP, as the Samba server is cryptographically in that domain, and will use crpytographically authenticated RPC calls to authenticate the user logging on\&. The advantage of using \fB"security=domain"\fP is that if you list several hosts in the \fB"password server"\fP option then \fBsmbd\fP will try each in turn till it finds one that responds\&. This is useful in case your primary server goes down\&. .IP If the \fB"security"\fP parameter is set to \fB"server"\fP, then there are different restrictions that \fB"security=domain"\fP doesn\'t suffer from: .IP .IP .IP o You may list several password servers in the \fB"password server"\fP parameter, however if an \fBsmbd\fP makes a connection to a password server, and then the password server fails, no more users will be able to be authenticated from this \fBsmbd\fP\&. This is a restriction of the SMB/CIFS protocol when in \fB"security=server"\fP mode and cannot be fixed in Samba\&. .IP .IP o If you are using a Windows NT server as your password server then you will have to ensure that your users are able to login from the Samba server, as when in \fB"security=server"\fP mode the network logon will appear to come from there rather than from the users workstation\&. .IP .IP See also the \fB"security"\fP parameter\&. .IP \fBDefault:\fP \f(CW password server = \fP .IP \fBExample:\fP \f(CW password server = NT-PDC, NT-BDC1, NT-BDC2\fP .IP .IP "\fBpath (S)\fP" .IP This parameter specifies a directory to which the user of the service is to be given access\&. In the case of printable services, this is where print data will spool prior to being submitted to the host for printing\&. .IP For a printable service offering guest access, the service should be readonly and the path should be world-writable and have the sticky bit set\&. This is not mandatory of course, but you probably won\'t get the results you expect if you do otherwise\&. .IP Any occurrences of \fB%u\fP in the path will be replaced with the UNIX username that the client is using on this connection\&. Any occurrences of \fB%m\fP will be replaced by the NetBIOS name of the machine they are connecting from\&. These replacements are very useful for setting up pseudo home directories for users\&. .IP Note that this path will be based on \fB"root dir"\fP if one was specified\&. .IP \fBDefault:\fP \f(CW none\fP .IP \fBExample:\fP \f(CW path = /home/fred\fP .IP .IP "\fBpostexec (S)\fP" .IP This option specifies a command to be run whenever the service is disconnected\&. It takes the usual substitutions\&. The command may be run as the root on some systems\&. .IP An interesting example may be do unmount server resources: .IP \f(CWpostexec = /etc/umount /cdrom\fP .IP See also \fBpreexec\fP\&. .IP \fBDefault:\fP \f(CW none (no command executed)\fP .IP \fBExample:\fP \f(CW postexec = echo "%u disconnected from %S from %m (%I)" >> /tmp/log\fP .IP .IP "\fBpostscript (S)\fP" .IP This parameter forces a printer to interpret the print files as postscript\&. This is done by adding a \f(CW%!\fP to the start of print output\&. .IP This is most useful when you have lots of PCs that persist in putting a control-D at the start of print jobs, which then confuses your printer\&. .IP \fBDefault:\fP \f(CW postscript = False\fP .IP \fBExample:\fP \f(CW postscript = True\fP .IP .IP "\fBpreexec (S)\fP" .IP This option specifies a command to be run whenever the service is connected to\&. It takes the usual substitutions\&. .IP An interesting example is to send the users a welcome message every time they log in\&. Maybe a message of the day? Here is an example: .IP .DS preexec = csh -c \'echo \e"Welcome to %S!\e" | /usr/local/samba/bin/smbclient -M %m -I %I\' & .DE .IP Of course, this could get annoying after a while :-) .IP See also \fBpostexec\fP\&. .IP \fBDefault:\fP \f(CW none (no command executed)\fP .IP \fBExample:\fP \f(CW preexec = echo \e"%u connected to %S from %m (%I)\e" >> /tmp/log\fP .IP .IP "\fBpreferred master (G)\fP" .IP This boolean parameter controls if \fBnmbd\fP is a preferred master browser for its workgroup\&. .IP If this is set to true, on startup, \fBnmbd\fP will force an election, and it will have a slight advantage in winning the election\&. It is recommended that this parameter is used in conjunction with \fB"domain master = yes"\fP, so that \fBnmbd\fP can guarantee becoming a domain master\&. .IP Use this option with caution, because if there are several hosts (whether Samba servers, Windows 95 or NT) that are preferred master browsers on the same subnet, they will each periodically and continuously attempt to become the local master browser\&. This will result in unnecessary broadcast traffic and reduced browsing capabilities\&. .IP See also \fBos level\fP\&. .IP \fBDefault:\fP \f(CW preferred master = no\fP .IP \fBExample:\fP \f(CW preferred master = yes\fP .IP .IP "\fBprefered master (G)\fP" .IP Synonym for \fB"preferred master"\fP for people who cannot spell :-)\&. .IP .IP "\fBpreload\fP" Synonym for \fB"auto services"\fP\&. .IP .IP "\fBpreserve case (S)\fP" .IP This controls if new filenames are created with the case that the client passes, or if they are forced to be the \f(CW"default"\fP case\&. .IP \fBDefault:\fP \f(CW preserve case = yes\fP .IP See the section on \fB"NAME MANGLING"\fP for a fuller discussion\&. .IP .IP "\fBprint command (S)\fP" .IP After a print job has finished spooling to a service, this command will be used via a \f(CWsystem()\fP call to process the spool file\&. Typically the command specified will submit the spool file to the host\'s printing subsystem, but there is no requirement that this be the case\&. The server will not remove the spool file, so whatever command you specify should remove the spool file when it has been processed, otherwise you will need to manually remove old spool files\&. .IP The print command is simply a text string\&. It will be used verbatim, with two exceptions: All occurrences of \f(CW"%s"\fP will be replaced by the appropriate spool file name, and all occurrences of \f(CW"%p"\fP will be replaced by the appropriate printer name\&. The spool file name is generated automatically by the server, the printer name is discussed below\&. .IP The full path name will be used for the filename if \f(CW"%s"\fP is not preceded by a \f(CW\'/\'\fP\&. If you don\'t like this (it can stuff up some lpq output) then use \f(CW"%f"\fP instead\&. Any occurrences of \f(CW"%f"\fP get replaced by the spool filename without the full path at the front\&. .IP The print command \fIMUST\fP contain at least one occurrence of \f(CW"%s"\fP or \f(CW"%f"\fP - the \f(CW"%p"\fP is optional\&. At the time a job is submitted, if no printer name is supplied the \f(CW"%p"\fP will be silently removed from the printer command\&. .IP If specified in the \fB"[global]"\fP section, the print command given will be used for any printable service that does not have its own print command specified\&. .IP If there is neither a specified print command for a printable service nor a global print command, spool files will be created but not processed and (most importantly) not removed\&. .IP Note that printing may fail on some UNIXes from the \f(CW"nobody"\fP account\&. If this happens then create an alternative guest account that can print and set the \fB"guest account"\fP in the \fB"[global]"\fP section\&. .IP You can form quite complex print commands by realising that they are just passed to a shell\&. For example the following will log a print job, print the file, then remove it\&. Note that \f(CW\';\'\fP is the usual separator for command in shell scripts\&. .IP \f(CWprint command = echo Printing %s >> /tmp/print\&.log; lpr -P %p %s; rm %s\fP .IP You may have to vary this command considerably depending on how you normally print files on your system\&. The default for the parameter varies depending on the setting of the \fB"printing="\fP parameter\&. .IP \fBDefault:\fP For \fB"printing="\fP BSD, AIX, QNX, LPRNG or PLP : \f(CW print command = lpr -r -P%p %s\fP .IP For \fB"printing="\fP SYS or HPUX : \f(CW print command = lp -c -d%p %s; rm %s\fP .IP For \fB"printing="\fP SOFTQ : \f(CW print command = lp -d%p -s %s; rm %s\fP .IP \fBExample:\fP \f(CW print command = /usr/local/samba/bin/myprintscript %p %s\fP .IP .IP "\fBprint ok (S)\fP" .IP Synonym for \fBprintable\fP\&. .IP .IP "\fBprintable (S)\fP" .IP If this parameter is \f(CW"yes"\fP, then clients may open, write to and submit spool files on the directory specified for the service\&. .IP Note that a printable service will ALWAYS allow writing to the service path (user privileges permitting) via the spooling of print data\&. The \fB"read only"\fP parameter controls only non-printing access to the resource\&. .IP \fBDefault:\fP \f(CW printable = no\fP .IP \fBExample:\fP \f(CW printable = yes\fP .IP .IP "\fBprintcap (G)\fP" .IP Synonym for \fBprintcapname\fP\&. .IP .IP "\fBprintcap name (G)\fP" .IP This parameter may be used to override the compiled-in default printcap name used by the server (usually /etc/printcap)\&. See the discussion of the \fB[printers]\fP section above for reasons why you might want to do this\&. .IP On System V systems that use \fBlpstat\fP to list available printers you can use \f(CW"printcap name = lpstat"\fP to automatically obtain lists of available printers\&. This is the default for systems that define SYSV at configure time in Samba (this includes most System V based systems)\&. If \fB"printcap name"\fP is set to \fBlpstat\fP on these systems then Samba will launch \f(CW"lpstat -v"\fP and attempt to parse the output to obtain a printer list\&. .IP A minimal printcap file would look something like this: .IP .DS print1|My Printer 1 print2|My Printer 2 print3|My Printer 3 print4|My Printer 4 print5|My Printer 5 .DE .IP where the \f(CW\'|\'\fP separates aliases of a printer\&. The fact that the second alias has a space in it gives a hint to Samba that it\'s a comment\&. .IP \fINOTE\fP: Under AIX the default printcap name is \f(CW"/etc/qconfig"\fP\&. Samba will assume the file is in AIX \f(CW"qconfig"\fP format if the string \f(CW"/qconfig"\fP appears in the printcap filename\&. .IP \fBDefault:\fP \f(CW printcap name = /etc/printcap\fP .IP \fBExample:\fP \f(CW printcap name = /etc/myprintcap\fP .IP .IP "\fBprinter (S)\fP" .IP This parameter specifies the name of the printer to which print jobs spooled through a printable service will be sent\&. .IP If specified in the \fB[global]\fP section, the printer name given will be used for any printable service that does not have its own printer name specified\&. .IP \fBDefault:\fP none (but may be \f(CW"lp"\fP on many systems) .IP \fBExample:\fP printer name = laserwriter .IP .IP "\fBprinter driver (S)\fP" .IP This option allows you to control the string that clients receive when they ask the server for the printer driver associated with a printer\&. If you are using Windows95 or WindowsNT then you can use this to automate the setup of printers on your system\&. .IP You need to set this parameter to the exact string (case sensitive) that describes the appropriate printer driver for your system\&. If you don\'t know the exact string to use then you should first try with no \fB"printer driver"\fP option set and the client will give you a list of printer drivers\&. The appropriate strings are shown in a scrollbox after you have chosen the printer manufacturer\&. .IP See also \fB"printer driver file"\fP\&. .IP \fBExample:\fP printer driver = HP LaserJet 4L .IP .IP "\fBprinter driver file (G)\fP" .IP This parameter tells Samba where the printer driver definition file, used when serving drivers to Windows 95 clients, is to be found\&. If this is not set, the default is : .IP \f(CWSAMBA_INSTALL_DIRECTORY/lib/printers\&.def\fP .IP This file is created from Windows 95 \f(CW"msprint\&.def"\fP files found on the Windows 95 client system\&. For more details on setting up serving of printer drivers to Windows 95 clients, see the documentation file in the docs/ directory, PRINTER_DRIVER\&.txt\&. .IP \fBDefault:\fP \f(CW None (set in compile)\&.\fP .IP \fBExample:\fP \f(CW printer driver file = /usr/local/samba/printers/drivers\&.def\fP .IP See also \fB"printer driver location"\fP\&. .IP .IP "\fBprinter driver location (S)\fP" .IP This parameter tells clients of a particular printer share where to find the printer driver files for the automatic installation of drivers for Windows 95 machines\&. If Samba is set up to serve printer drivers to Windows 95 machines, this should be set to .IP \f(CW\e\eMACHINE\eaPRINTER$\fP .IP Where MACHINE is the NetBIOS name of your Samba server, and PRINTER$ is a share you set up for serving printer driver files\&. For more details on setting this up see the documentation file in the docs/ directory, PRINTER_DRIVER\&.txt\&. .IP \fBDefault:\fP \f(CW None\fP .IP \fBExample:\fP \f(CW printer driver location = \e\eMACHINE\ePRINTER$\fP .IP See also \fB"printer driver file"\fP\&. .IP .IP "\fBprinter name (S)\fP" .IP Synonym for \fBprinter\fP\&. .IP .IP "\fBprinting (S)\fP" .IP This parameters controls how printer status information is interpreted on your system, and also affects the default values for the \fB"print command"\fP, \fB"lpq command"\fP \fB"lppause command"\fP, \fB"lpresume command"\fP, and \fB"lprm command"\fP\&. .IP Currently eight printing styles are supported\&. They are \fB"printing=BSD"\fP, \fB"printing=AIX"\fP, \fB"printing=LPRNG"\fP, \fB"printing=PLP"\fP, \fB"printing=SYSV"\fP,\fB"printing="HPUX"\fP,\fB"printing=QNX"\fP and \fB"printing=SOFTQ"\fP\&. .IP To see what the defaults are for the other print commands when using these three options use the \fB"testparm"\fP program\&. .IP This option can be set on a per printer basis .IP See also the discussion in the \fB[printers]\fP section\&. .IP .IP "\fBprotocol (G)\fP" .IP The value of the parameter (a string) is the highest protocol level that will be supported by the server\&. .IP Possible values are : .IP .IP .IP o CORE: Earliest version\&. No concept of user names\&. .IP .IP o COREPLUS: Slight improvements on CORE for efficiency\&. .IP .IP o LANMAN1: First \fI"modern"\fP version of the protocol\&. Long filename support\&. .IP .IP o LANMAN2: Updates to Lanman1 protocol\&. .IP .IP o NT1: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&. .IP .IP Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. .IP \fBDefault:\fP \f(CW protocol = NT1\fP .IP \fBExample:\fP \f(CW protocol = LANMAN1\fP .IP .IP "\fBpublic (S)\fP" .IP Synonym for \fB"guest ok"\fP\&. .IP .IP "\fBqueuepause command (S)\fP" .IP This parameter specifies the command to be executed on the server host in order to pause the printerqueue\&. .IP This command should be a program or script which takes a printer name as its only parameter and stops the printerqueue, such that no longer jobs are submitted to the printer\&. .IP This command is not supported by Windows for Workgroups, but can be issued from the Printer\'s window under Windows 95 & NT\&. .IP If a \f(CW"%p"\fP is given then the printername is put in its place\&. Otherwise it is placed at the end of the command\&. .IP Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\&. .IP \fBDefault:\fP \f(CW depends on the setting of "printing ="\fP .IP \fBExample:\fP \f(CW queuepause command = disable %p\fP .IP .IP "\fBqueueresume command (S)\fP" .IP This parameter specifies the command to be executed on the server host in order to resume the printerqueue\&. It is the command to undo the behaviour that is caused by the previous parameter (\fB"queuepause command\fP)\&. .IP This command should be a program or script which takes a printer name as its only parameter and resumes the printerqueue, such that queued jobs are resubmitted to the printer\&. .IP This command is not supported by Windows for Workgroups, but can be issued from the Printer\'s window under Windows 95 & NT\&. .IP If a \f(CW"%p"\fP is given then the printername is put in its place\&. Otherwise it is placed at the end of the command\&. .IP Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\&. .IP \fBDefault:\fP \f(CW depends on the setting of "printing ="\fP .IP \fBExample:\fP \f(CW queuepause command = enable %p\fP .IP .IP "\fBread bmpx (G)\fP" .IP This boolean parameter controls whether \fBsmbd\fP will support the "Read Block Multiplex" SMB\&. This is now rarely used and defaults to off\&. You should never need to set this parameter\&. .IP \fBDefault:\fP read bmpx = No .IP .IP "\fBread list (S)\fP" .IP This is a list of users that are given read-only access to a service\&. If the connecting user is in this list then they will not be given write access, no matter what the \fB"read only"\fP option is set to\&. The list can include group names using the syntax described in the \fB"invalid users"\fP parameter\&. .IP See also the \fB"write list"\fP parameter and the \fB"invalid users"\fP parameter\&. .IP \fBDefault:\fP \f(CW read list = \fP .IP \fBExample:\fP \f(CW read list = mary, @students\fP .IP .IP "\fBread only (S)\fP" .IP Note that this is an inverted synonym for \fB"writable"\fP and \fB"write ok"\fP\&. .IP See also \fB"writable"\fP and \fB"write ok"\fP\&. .IP .IP "\fBread prediction (G)\fP" .IP \fINOTE\fP: This code is currently disabled in Samba2\&.0 and may be removed at a later date\&. Hence this parameter has no effect\&. .IP This options enables or disables the read prediction code used to speed up reads from the server\&. When enabled the server will try to pre-read data from the last accessed file that was opened read-only while waiting for packets\&. .IP \fBDefault:\fP \f(CW read prediction = False\fP .IP .IP "\fBread raw (G)\fP" .IP This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients\&. .IP If enabled, raw reads allow reads of 65535 bytes in one packet\&. This typically provides a major performance benefit\&. .IP However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw reads\&. .IP In general this parameter should be viewed as a system tuning tool and left severely alone\&. See also \fB"write raw"\fP\&. .IP \fBDefault:\fP \f(CW read raw = yes\fP .IP .IP "\fBread size (G)\fP" .IP The option \fB"read size"\fP affects the overlap of disk reads/writes with network reads/writes\&. If the amount of data being transferred in several of the SMB commands (currently SMBwrite, SMBwriteX and SMBreadbraw) is larger than this value then the server begins writing the data before it has received the whole packet from the network, or in the case of SMBreadbraw, it begins writing to the network before all the data has been read from disk\&. .IP This overlapping works best when the speeds of disk and network access are similar, having very little effect when the speed of one is much greater than the other\&. .IP The default value is 2048, but very little experimentation has been done yet to determine the optimal value, and it is likely that the best value will vary greatly between systems anyway\&. A value over 65536 is pointless and will cause you to allocate memory unnecessarily\&. .IP \fBDefault:\fP \f(CW read size = 2048\fP .IP \fBExample:\fP \f(CW read size = 8192\fP .IP .IP "\fBremote announce (G)\fP" .IP This option allows you to setup \fBnmbd\fP to periodically announce itself to arbitrary IP addresses with an arbitrary workgroup name\&. .IP This is useful if you want your Samba server to appear in a remote workgroup for which the normal browse propagation rules don\'t work\&. The remote workgroup can be anywhere that you can send IP packets to\&. .IP For example: .IP \f(CW remote announce = 192\&.168\&.2\&.255/SERVERS 192\&.168\&.4\&.255/STAFF\fP .IP the above line would cause nmbd to announce itself to the two given IP addresses using the given workgroup names\&. If you leave out the workgroup name then the one given in the \fB"workgroup"\fP parameter is used instead\&. .IP The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable\&. .IP See the documentation file BROWSING\&.txt in the docs/ directory\&. .IP \fBDefault:\fP \f(CW remote announce = \fP .IP \fBExample:\fP \f(CW remote announce = 192\&.168\&.2\&.255/SERVERS 192\&.168\&.4\&.255/STAFF\fP .IP .IP "\fBremote browse sync (G)\fP" .IP This option allows you to setup \fBnmbd\fP to periodically request synchronisation of browse lists with the master browser of a samba server that is on a remote segment\&. This option will allow you to gain browse lists for multiple workgroups across routed networks\&. This is done in a manner that does not work with any non-samba servers\&. .IP This is useful if you want your Samba server and all local clients to appear in a remote workgroup for which the normal browse propagation rules don\'t work\&. The remote workgroup can be anywhere that you can send IP packets to\&. .IP For example: .IP \f(CW remote browse sync = 192\&.168\&.2\&.255 192\&.168\&.4\&.255\fP .IP the above line would cause \fBnmbd\fP to request the master browser on the specified subnets or addresses to synchronise their browse lists with the local server\&. .IP The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable\&. If a machine IP address is given Samba makes NO attempt to validate that the remote machine is available, is listening, nor that it is in fact the browse master on it\'s segment\&. .IP \fBDefault:\fP \f(CW remote browse sync = \fP .IP \fBExample:\fP \f(CW remote browse sync = 192\&.168\&.2\&.255 192\&.168\&.4\&.255\fP .IP .IP "\fBrevalidate (S)\fP" .IP Note that this option only works with \fB"security=share"\fP and will be ignored if this is not the case\&. .IP This option controls whether Samba will allow a previously validated username/password pair to be used to attach to a share\&. Thus if you connect to \f(CW\e\eserver\eshare1\fP then to \f(CW\e\eserver\eshare2\fP it won\'t automatically allow the client to request connection to the second share as the same username as the first without a password\&. .IP If \fB"revalidate"\fP is \f(CW"True"\fP then the client will be denied automatic access as the same username\&. .IP \fBDefault:\fP \f(CW revalidate = False\fP .IP \fBExample:\fP \f(CW revalidate = True\fP .IP .IP "\fBroot (G)\fP" .IP Synonym for \fB"root directory"\fP\&. .IP .IP "\fBroot dir (G)\fP" .IP Synonym for \fB"root directory"\fP\&. .IP .IP "\fBroot directory (G)\fP" .IP The server will \f(CW"chroot()"\fP (ie\&. Change it\'s root directory) to this directory on startup\&. This is not strictly necessary for secure operation\&. Even without it the server will deny access to files not in one of the service entries\&. It may also check for, and deny access to, soft links to other parts of the filesystem, or attempts to use \f(CW"\&.\&."\fP in file names to access other directories (depending on the setting of the \fB"wide links"\fP parameter)\&. .IP Adding a \fB"root directory"\fP entry other than \f(CW"/"\fP adds an extra level of security, but at a price\&. It absolutely ensures that no access is given to files not in the sub-tree specified in the \fB"root directory"\fP option, \fI*including*\fP some files needed for complete operation of the server\&. To maintain full operability of the server you will need to mirror some system files into the \fB"root directory"\fP tree\&. In particular you will need to mirror /etc/passwd (or a subset of it), and any binaries or configuration files needed for printing (if required)\&. The set of files that must be mirrored is operating system dependent\&. .IP \fBDefault:\fP \f(CW root directory = /\fP .IP \fBExample:\fP \f(CW root directory = /homes/smb\fP .IP .IP "\fBroot postexec (S)\fP" .IP This is the same as the \fB"postexec"\fP parameter except that the command is run as root\&. This is useful for unmounting filesystems (such as cdroms) after a connection is closed\&. .IP See also \fB"postexec"\fP\&. .IP .IP "\fBroot preexec (S)\fP" .IP This is the same as the \fB"preexec"\fP parameter except that the command is run as root\&. This is useful for mounting filesystems (such as cdroms) before a connection is finalised\&. .IP See also \fB"preexec"\fP\&. .IP .IP "\fBsecurity (G)\fP" .IP This option affects how clients respond to Samba and is one of the most important settings in the \fBsmb\&.conf\fP file\&. .IP The option sets the \f(CW"security mode bit"\fP in replies to protocol negotiations with \fBsmbd\fP to turn share level security on or off\&. Clients decide based on this bit whether (and how) to transfer user and password information to the server\&. .IP The default is "security=user", as this is the most common setting needed when talking to Windows 98 and Windows NT\&. .IP The alternatives are \fB"security = share"\fP, \fB"security = server"\fP or \fB"security=domain"\fP\&. .IP \fI*****NOTE THAT THIS DEFAULT IS DIFFERENT IN SAMBA2\&.0 THAN FOR PREVIOUS VERSIONS OF SAMBA *******\fP\&. .IP In previous versions of Samba the default was \fB"security=share"\fP mainly because that was the only option at one stage\&. .IP There is a bug in WfWg that has relevence to this setting\&. When in user or server level security a WfWg client will totally ignore the password you type in the "connect drive" dialog box\&. This makes it very difficult (if not impossible) to connect to a Samba service as anyone except the user that you are logged into WfWg as\&. .IP If your PCs use usernames that are the same as their usernames on the UNIX machine then you will want to use \fB"security = user"\fP\&. If you mostly use usernames that don\'t exist on the UNIX box then use \fB"security = share"\fP\&. .IP You should also use \fBsecurity=share\fP if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&. It is more difficult to setup guest shares with \fBsecurity=user\fP, see the \fB"map to guest"\fPparameter for details\&. .IP It is possible to use \fBsmbd\fP in a \fI"hybred mode"\fP where it is offers both user and share level security under different \fBNetBIOS aliases\fP\&. See the \fBNetBIOS aliases\fP and the \fBinclude\fP parameters for more information\&. .IP The different settings will now be explained\&. .IP .IP .IP "\fB"security=share"\fP" When clients connect to a share level security server then need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a \fBsecurity=share\fP server)\&. Instead, the clients send authentication information (passwords) on a per-share basis, at the time they attempt to connect to that share\&. .IP Note that \fBsmbd\fP \fI*ALWAYS*\fP uses a valid UNIX user to act on behalf of the client, even in \fB"security=share"\fP level security\&. .IP As clients are not required to send a username to the server in share level security, \fBsmbd\fP uses several techniques to determine the correct UNIX user to use on behalf of the client\&. .IP A list of possible UNIX usernames to match with the given client password is constructed using the following methods : .IP .IP .IP o If the \fB"guest only"\fP parameter is set, then all the other stages are missed and only the \fB"guest account"\fP username is checked\&. .IP .IP o Is a username is sent with the share connection request, then this username (after mapping - see \fB"username map"\fP), is added as a potential username\&. .IP .IP o If the client did a previous \fI"logon"\fP request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\&. .IP .IP o The name of the service the client requested is added as a potential username\&. .IP .IP o The NetBIOS name of the client is added to the list as a potential username\&. .IP .IP o Any users on the \fB"user"\fP list are added as potential usernames\&. .IP .IP If the \fB"guest only"\fP parameter is not set, then this list is then tried with the supplied password\&. The first user for whom the password matches will be used as the UNIX user\&. .IP If the \fB"guest only"\fP parameter is set, or no username can be determined then if the share is marked as available to the \fB"guest account"\fP, then this guest user will be used, otherwise access is denied\&. .IP Note that it can be \fI*very*\fP confusing in share-level security as to which UNIX username will eventually be used in granting access\&. .IP See also the section \fB"NOTE ABOUT USERNAME/PASSWORD VALIDATION"\fP\&. .IP .IP "\fB"security=user"\fP" .IP This is the default security setting in Samba2\&.0\&. With user-level security a client must first \f(CW"log-on"\fP with a valid username and password (which can be mapped using the \fB"username map"\fP parameter)\&. Encrypted passwords (see the \fB"encrypted passwords"\fP parameter) can also be used in this security mode\&. Parameters such as \fB"user"\fP and \fB"guest only"\fP, if set are then applied and may change the UNIX user to use on this connection, but only after the user has been successfully authenticated\&. .IP \fINote\fP that the the name of the resource being requested is \fI*not*\fP sent to the server until after the server has successfully authenticated the client\&. This is why guest shares don\'t work in user level security without allowing the server to automatically map unknown users into the \fB"guest account"\fP\&. See the \fB"map to guest"\fP parameter for details on doing this\&. .IP See also the section \fB"NOTE ABOUT USERNAME/PASSWORD VALIDATION"\fP\&. .IP .IP "\fB"security=server"\fP" .IP In this mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\&. If this fails it will revert to \fB"security = user"\fP, but note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid smbpasswd file to check users against\&. See the documentation file in the docs/ directory ENCRYPTION\&.txt for details on how to set this up\&. .IP \fINote\fP that from the clients point of view \fB"security=server"\fP is the same as \fB"security=user"\fP\&. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\&. .IP \fINote\fP that the the name of the resource being requested is \fI*not*\fP sent to the server until after the server has successfully authenticated the client\&. This is why guest shares don\'t work in server level security without allowing the server to automatically map unknown users into the \fB"guest account"\fP\&. See the \fB"map to guest"\fP parameter for details on doing this\&. .IP See also the section \fB"NOTE ABOUT USERNAME/PASSWORD VALIDATION"\fP\&. .IP See also the \fB"password server"\fP parameter\&. and the \fB"encrypted passwords"\fP parameter\&. .IP .IP "\fB"security=domain"\fP" .IP This mode will only work correctly if \fBsmbpasswd\fP has been used to add this machine into a Windows NT Domain\&. It expects the \fB"encrypted passwords"\fP parameter to be set to \f(CW"true"\fP\&. In this mode Samba will try to validate the username/password by passing it to a Windows NT Primary or Backup Domain Controller, in exactly the same way that a Windows NT Server would do\&. .IP \fINote\fP that a valid UNIX user must still exist as well as the account on the Domain Controller to allow Samba to have a valid UNIX account to map file access to\&. .IP \fINote\fP that from the clients point of view \fB"security=domain"\fP is the same as \fB"security=user"\fP\&. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\&. .IP \fINote\fP that the the name of the resource being requested is \fI*not*\fP sent to the server until after the server has successfully authenticated the client\&. This is why guest shares don\'t work in domain level security without allowing the server to automatically map unknown users into the \fB"guest account"\fP\&. See the \fB"map to guest"\fP parameter for details on doing this\&. .IP e,(BUG:) There is currently a bug in the implementation of \fB"security=domain\fP with respect to multi-byte character set usernames\&. The communication with a Domain Controller must be done in UNICODE and Samba currently does not widen multi-byte user names to UNICODE correctly, thus a multi-byte username will not be recognised correctly at the Domain Controller\&. This issue will be addressed in a future release\&. .IP See also the section \fB"NOTE ABOUT USERNAME/PASSWORD VALIDATION"\fP\&. .IP See also the \fB"password server"\fP parameter\&. and the \fB"encrypted passwords"\fP parameter\&. .IP .IP \fBDefault:\fP \f(CW security = USER\fP .IP \fBExample:\fP \f(CW security = DOMAIN\fP .IP .IP "\fBserver string (G)\fP" .IP This controls what string will show up in the printer comment box in print manager and next to the IPC connection in \f(CW"net view"\fP\&. It can be any string that you wish to show to your users\&. .IP It also sets what will appear in browse lists next to the machine name\&. .IP A \f(CW"%v"\fP will be replaced with the Samba version number\&. .IP A \f(CW"%h"\fP will be replaced with the hostname\&. .IP \fBDefault:\fP \f(CW server string = Samba %v\fP .IP \fBExample:\fP \f(CW server string = University of GNUs Samba Server\fP .IP .IP "\fBset directory (S)\fP" .IP If \f(CW"set directory = no"\fP, then users of the service may not use the setdir command to change directory\&. .IP The setdir command is only implemented in the Digital Pathworks client\&. See the Pathworks documentation for details\&. .IP \fBDefault:\fP \f(CW set directory = no\fP .IP \fBExample:\fP \f(CW set directory = yes\fP .IP .IP "\fBshare modes (S)\fP" .IP This enables or disables the honouring of the \f(CW"share modes"\fP during a file open\&. These modes are used by clients to gain exclusive read or write access to a file\&. .IP These open modes are not directly supported by UNIX, so they are simulated using shared memory, or lock files if your UNIX doesn\'t support shared memory (almost all do)\&. .IP The share modes that are enabled by this option are DENY_DOS, DENY_ALL, DENY_READ, DENY_WRITE, DENY_NONE and DENY_FCB\&. .IP This option gives full share compatibility and enabled by default\&. .IP You should \fI*NEVER*\fP turn this parameter off as many Windows applications will break if you do so\&. .IP \fBDefault:\fP \f(CW share modes = yes\fP .IP .IP "\fBshared mem size (G)\fP" .IP It specifies the size of the shared memory (in bytes) to use between \fBsmbd\fP processes\&. This parameter defaults to one megabyte of shared memory\&. It is possible that if you have a large server with many files open simultaneously that you may need to increase this parameter\&. Signs that this parameter is set too low are users reporting strange problems trying to save files (locking errors) and error messages in the smbd log looking like \f(CW"ERROR smb_shm_alloc : alloc of XX bytes failed"\fP\&. .IP \fBDefault:\fP \f(CW shared mem size = 1048576\fP .IP \fBExample:\fP \f(CW shared mem size = 5242880 ; Set to 5mb for a large number of files\&.\fP .IP .IP "\fBshort preserve case (G)\fP" .IP This boolean parameter controls if new files which conform to 8\&.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced to be the \f(CW"default"\fP case\&. This option can be use with \fB"preserve case =yes"\fP to permit long filenames to retain their case, while short names are lowered\&. Default \fIYes\fP\&. .IP See the section on \fBNAME MANGLING\fP\&. .IP \fBDefault:\fP \f(CW short preserve case = yes\fP .IP .IP "\fBsmb passwd file (G)\fP" .IP This option sets the path to the encrypted smbpasswd file\&. By default the path to the smbpasswd file is compiled into Samba\&. .IP \fBDefault:\fP \f(CW smb passwd file= \fP .IP \fBExample:\fP \f(CW smb passwd file = /usr/samba/private/smbpasswd\fP .IP .IP "\fBsmbrun (G)\fP" .IP This sets the full path to the \fBsmbrun\fP binary\&. This defaults to the value in the Makefile\&. .IP You must get this path right for many services to work correctly\&. .IP You should not need to change this parameter so long as Samba is installed correctly\&. .IP \fBDefault:\fP \f(CW smbrun=\fP .IP \fBExample:\fP \f(CW smbrun = /usr/local/samba/bin/smbrun\fP .IP .IP "\fBsocket address (G)\fP" .IP This option allows you to control what address Samba will listen for connections on\&. This is used to support multiple virtual interfaces on the one server, each with a different configuration\&. .IP By default samba will accept connections on any address\&. .IP \fBExample:\fP \f(CW socket address = 192\&.168\&.2\&.20\fP .IP .IP "\fBsocket options (G)\fP" .IP This option allows you to set socket options to be used when talking with the client\&. .IP Socket options are controls on the networking layer of the operating systems which allow the connection to be tuned\&. .IP This option will typically be used to tune your Samba server for optimal performance for your local network\&. There is no way that Samba can know what the optimal parameters are for your net, so you must experiment and choose them yourself\&. We strongly suggest you read the appropriate documentation for your operating system first (perhaps \fB"man setsockopt"\fP will help)\&. .IP You may find that on some systems Samba will say "Unknown socket option" when you supply an option\&. This means you either mis-typed it or you need to add an include file to includes\&.h for your OS\&. If the latter is the case please send the patch to \fIsamba-bugs@samba\&.anu\&.edu\&.au\fP\&. .IP Any of the supported socket options may be combined in any way you like, as long as your OS allows it\&. .IP This is the list of socket options currently settable using this option: .IP .IP .IP o SO_KEEPALIVE .IP .IP o SO_REUSEADDR .IP .IP o SO_BROADCAST .IP .IP o TCP_NODELAY .IP .IP o IPTOS_LOWDELAY .IP .IP o IPTOS_THROUGHPUT .IP .IP o SO_SNDBUF * .IP .IP o SO_RCVBUF * .IP .IP o SO_SNDLOWAT * .IP .IP o SO_RCVLOWAT * .IP .IP Those marked with a \f(CW*\fP take an integer argument\&. The others can optionally take a 1 or 0 argument to enable or disable the option, by default they will be enabled if you don\'t specify 1 or 0\&. .IP To specify an argument use the syntax SOME_OPTION=VALUE for example \f(CWSO_SNDBUF=8192\fP\&. Note that you must not have any spaces before or after the = sign\&. .IP If you are on a local network then a sensible option might be .IP \f(CWsocket options = IPTOS_LOWDELAY\fP .IP If you have a local network then you could try: .IP \f(CWsocket options = IPTOS_LOWDELAY TCP_NODELAY\fP .IP If you are on a wide area network then perhaps try setting IPTOS_THROUGHPUT\&. .IP Note that several of the options may cause your Samba server to fail completely\&. Use these options with caution! .IP \fBDefault:\fP \f(CW socket options = TCP_NODELAY\fP .IP \fBExample:\fP \f(CW socket options = IPTOS_LOWDELAY\fP .IP .IP "\fBssl (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP This variable enables or disables the entire SSL mode\&. If it is set to "no", the SSL enabled samba behaves exactly like the non-SSL samba\&. If set to "yes", it depends on the variables \fB"ssl hosts"\fP and \fB"ssl hosts resign"\fP whether an SSL connection will be required\&. .IP \fBDefault:\fP \f(CW ssl=no\fP \fBExample:\fP \f(CW ssl=yes\fP .IP .IP "\fBssl CA certDir (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP This variable defines where to look up the Certification Autorities\&. The given directory should contain one file for each CA that samba will trust\&. The file name must be the hash value over the "Distinguished Name" of the CA\&. How this directory is set up is explained later in this document\&. All files within the directory that don\'t fit into this naming scheme are ignored\&. You don\'t need this variable if you don\'t verify client certificates\&. .IP \fBDefault:\fP \f(CW ssl CA certDir = /usr/local/ssl/certs\fP .IP .IP "\fBssl CA certFile (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP This variable is a second way to define the trusted CAs\&. The certificates of the trusted CAs are collected in one big file and this variable points to the file\&. You will probably only use one of the two ways to define your CAs\&. The first choice is preferable if you have many CAs or want to be flexible, the second is perferable if you only have one CA and want to keep things simple (you won\'t need to create the hashed file names)\&. You don\'t need this variable if you don\'t verify client certificates\&. .IP \fBDefault:\fP \f(CW ssl CA certFile = /usr/local/ssl/certs/trustedCAs\&.pem\fP .IP .IP "\fBssl ciphers (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP This variable defines the ciphers that should be offered during SSL negotiation\&. You should not set this variable unless you know what you are doing\&. .IP .IP "\fBssl client cert (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP The certificate in this file is used by \fBsmbclient\fP if it exists\&. It\'s needed if the server requires a client certificate\&. .IP \fBDefault:\fP \f(CW ssl client cert = /usr/local/ssl/certs/smbclient\&.pem\fP .IP .IP "\fBssl client key (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP This is the private key for \fBsmbclient\fP\&. It\'s only needed if the client should have a certificate\&. .IP \fBDefault:\fP \f(CW ssl client key = /usr/local/ssl/private/smbclient\&.pem\fP .IP .IP "\fBssl compatibility (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP This variable defines whether SSLeay should be configured for bug compatibility with other SSL implementations\&. This is probably not desirable because currently no clients with SSL implementations other than SSLeay exist\&. .IP \fBDefault:\fP \f(CW ssl compatibility = no\fP .IP .IP "\fBssl hosts (G)\fP" .IP See \fB"ssl hosts resign"\fP\&. .IP .IP "\fBssl hosts resign (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP These two variables define whether samba will go into SSL mode or not\&. If none of them is defined, samba will allow only SSL connections\&. If the \fB"ssl hosts"\fP variable lists hosts (by IP-address, IP-address range, net group or name), only these hosts will be forced into SSL mode\&. If the \fB"ssl hosts resign"\fP variable lists hosts, only these hosts will NOT be forced into SSL mode\&. The syntax for these two variables is the same as for the \fB"hosts allow"\fP and \fB"hosts deny"\fP pair of variables, only that the subject of the decision is different: It\'s not the access right but whether SSL is used or not\&. See the \fB"allow hosts"\fP parameter for details\&. The example below requires SSL connections from all hosts outside the local net (which is 192\&.168\&.*\&.*)\&. .IP \fBDefault:\fP \f(CW ssl hosts = \fP \f(CW ssl hosts resign = \fP .IP \fBExample:\fP \f(CW ssl hosts resign = 192\&.168\&.\fP .IP .IP "\fBssl require clientcert (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP If this variable is set to \f(CW"yes"\fP, the server will not tolerate connections from clients that don\'t have a valid certificate\&. The directory/file given in \fB"ssl CA certDir"\fP and \fB"ssl CA certFile"\fP will be used to look up the CAs that issued the client\'s certificate\&. If the certificate can\'t be verified positively, the connection will be terminated\&. If this variable is set to \f(CW"no"\fP, clients don\'t need certificates\&. Contrary to web applications you really \fI*should*\fP require client certificates\&. In the web environment the client\'s data is sensitive (credit card numbers) and the server must prove to be trustworthy\&. In a file server environment the server\'s data will be sensitive and the clients must prove to be trustworthy\&. .IP \fBDefault:\fP \f(CW ssl require clientcert = no\fP .IP .IP "\fBssl require servercert (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP If this variable is set to \f(CW"yes"\fP, the \fBsmbclient\fP will request a certificate from the server\&. Same as \fB"ssl require clientcert"\fP for the server\&. .IP \fBDefault:\fP \f(CW ssl require servercert = no\fP .IP .IP "\fBssl server cert (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP This is the file containing the server\'s certificate\&. The server _must_ have a certificate\&. The file may also contain the server\'s private key\&. See later for how certificates and private keys are created\&. .IP \fBDefault:\fP \f(CW ssl server cert = \fP .IP .IP "\fBssl server key (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP This file contains the private key of the server\&. If this variable is not defined, the key is looked up in the certificate file (it may be appended to the certificate)\&. The server \fI*must*\fP have a private key and the certificate \fI*must*\fP match this private key\&. .IP \fBDefault:\fP \f(CW ssl server key = \fP .IP .IP "\fBssl version (G)\fP" .IP This variable is part of SSL-enabled Samba\&. This is only available if the SSL libraries have been compiled on your system and the configure option \f(CW"--with-ssl"\fP was given at configure time\&. .IP \fINote\fP that for export control reasons this code is \fI**NOT**\fP enabled by default in any current binary version of Samba\&. .IP This enumeration variable defines the versions of the SSL protocol that will be used\&. \f(CW"ssl2or3"\fP allows dynamic negotiation of SSL v2 or v3, \f(CW"ssl2"\fP results in SSL v2, \f(CW"ssl3"\fP results in SSL v3 and "tls1" results in TLS v1\&. TLS (Transport Layer Security) is the (proposed?) new standard for SSL\&. .IP \fBDefault:\fP \f(CW ssl version = "ssl2or3"\fP .IP .IP "\fBstat cache (G)\fP" .IP This parameter determines if \fBsmbd\fP will use a cache in order to speed up case insensitive name mappings\&. You should never need to change this parameter\&. .IP \fBDefault:\fP \f(CW stat cache = yes\fP .IP .IP "\fBstat cache size (G)\fP" .IP This parameter determines the number of entries in the \fBstat cache\fP\&. You should never need to change this parameter\&. .IP \fBDefault:\fP \f(CW stat cache size = 50\fP .IP .IP "\fBstatus (G)\fP" .IP This enables or disables logging of connections to a status file that \fBsmbstatus\fP can read\&. .IP With this disabled \fBsmbstatus\fP won\'t be able to tell you what connections are active\&. You should never need to change this parameter\&. .IP \fBDefault:\fP status = yes .IP dir(\fBstrict locking (S)\fP) .IP This is a boolean that controls the handling of file locking in the server\&. When this is set to \f(CW"yes"\fP the server will check every read and write access for file locks, and deny access if locks exist\&. This can be slow on some systems\&. .IP When strict locking is \f(CW"no"\fP the server does file lock checks only when the client explicitly asks for them\&. .IP Well behaved clients always ask for lock checks when it is important, so in the vast majority of cases \fB"strict locking = no"\fP is preferable\&. .IP \fBDefault:\fP \f(CW strict locking = no\fP .IP \fBExample:\fP \f(CW strict locking = yes\fP .IP .IP "\fBstrict sync (S)\fP" .IP Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\&. Under UNIX, a sync call forces the process to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storate\&. This is very slow and should only be done rarely\&. Setting this parameter to "no" (the default) means that smbd ignores the Windows applications requests for a sync call\&. There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting\&. In addition, this fixes many performance problems that people have reported with the new Windows98 explorer shell file copies\&. .IP See also the \fB"sync always"\fP parameter\&. .IP \fBDefault:\fP \f(CW strict sync = no\fP .IP \fBExample:\fP \f(CW strict sync = yes\fP .IP .IP "\fBstrip dot (G)\fP" .IP This is a boolean that controls whether to strip trailing dots off UNIX filenames\&. This helps with some CDROMs that have filenames ending in a single dot\&. .IP \fBDefault:\fP \f(CW strip dot = no\fP .IP \fBExample:\fP \f(CW strip dot = yes\fP .IP .IP "\fBsync always (S)\fP" .IP This is a boolean parameter that controls whether writes will always be written to stable storage before the write call returns\&. If this is false then the server will be guided by the client\'s request in each write call (clients can set a bit indicating that a particular write should be synchronous)\&. If this is true then every write will be followed by a fsync() call to ensure the data is written to disk\&. Note that the \fB"strict sync"\fP parameter must be set to \f(CW"yes"\fP in order for this parameter to have any affect\&. .IP See also the \fB"strict sync"\fP parameter\&. .IP \fBDefault:\fP \f(CW sync always = no\fP .IP \fBxample:\fP \f(CW sync always = yes\fP .IP .IP "\fBsyslog (G)\fP" .IP This parameter maps how Samba debug messages are logged onto the system syslog logging levels\&. Samba debug level zero maps onto syslog LOG_ERR, debug level one maps onto LOG_WARNING, debug level two maps to LOG_NOTICE, debug level three maps onto LOG_INFO\&. The paramter sets the threshold for doing the mapping, all Samba debug messages above this threashold are mapped to syslog LOG_DEBUG messages\&. .IP \fBDefault:\fP \f(CW syslog = 1\fP .IP .IP "\fBsyslog only (G)\fP" .IP If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\&. .IP \fBDefault:\fP \f(CW syslog only = no\fP .IP .IP "\fBtime offset (G)\fP" .IP This parameter is a setting in minutes to add to the normal GMT to local time conversion\&. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\&. .IP \fBDefault:\fP \f(CW time offset = 0\fP .IP \fBExample:\fP \f(CW time offset = 60\fP .IP .IP .IP "\fBtime server (G)\fP" .IP This parameter determines if \fBnmbd\fP advertises itself as a time server to Windows clients\&. The default is False\&. .IP \fBDefault:\fP \f(CW time server = False\fP .IP \fBExample:\fP \f(CW time server = True\fP .IP .IP "\fBtimestamp logs (G)\fP" .IP Samba2\&.0 will a timestamps to all log entries by default\&. This can be distracting if you are attempting to debug a problem\&. This parameter allows the timestamping to be turned off\&. .IP \fBDefault:\fP \f(CW timestamp logs = True\fP .IP \fBExample:\fP \f(CW timestamp logs = False\fP .IP .IP "\fBunix password sync (G)\fP" .IP This boolean parameter controlls whether Samba attempts to synchronise the UNIX password with the SMB password when the encrypted SMB password in the smbpasswd file is changed\&. If this is set to true the program specified in the \fB"passwd program"\fP parameter is called \fI*AS ROOT*\fP - to allow the new UNIX password to be set without access to the old UNIX password (as the SMB password has change code has no access to the old password cleartext, only the new)\&. By default this is set to \f(CW"false"\fP\&. .IP See also \fB"passwd program"\fP, \fB"passwd chat"\fP\&. .IP \fBDefault:\fP \f(CW unix password sync = False\fP .IP \fBExample:\fP \f(CW unix password sync = True\fP .IP .IP "\fBunix realname (G)\fP" .IP This boolean parameter when set causes samba to supply the real name field from the unix password file to the client\&. This is useful for setting up mail clients and WWW browsers on systems used by more than one person\&. .IP \fBDefault:\fP \f(CW unix realname = no\fP .IP \fBExample:\fP \f(CW unix realname = yes\fP .IP .IP "\fBupdate encrypted (G)\fP" .IP This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as they log on\&. This option allows a site to migrate from plaintext password authentication (users authenticate with plaintext password over the wire, and are checked against a UNIX account database) to encrypted password authentication (the SMB challenge/response authentication mechanism) without forcing all users to re-enter their passwords via smbpasswd at the time the change is made\&. This is a convenience option to allow the change over to encrypted passwords to be made over a longer period\&. Once all users have encrypted representations of their passwords in the smbpasswd file this parameter should be set to \f(CW"off"\fP\&. .IP In order for this parameter to work correctly the \fB"encrypt passwords"\fP parameter must be set to \f(CW"no"\fP when this parameter is set to \f(CW"yes"\fP\&. .IP Note that even when this parameter is set a user authenticating to smbd must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd) passwords\&. .IP \fBDefault:\fP \f(CW update encrypted = no\fP .IP \fBExample:\fP \f(CW update encrypted = yes\fP .IP .IP "\fBuse rhosts (G)\fP" .IP If this global parameter is a true, it specifies that the UNIX users \f(CW"\&.rhosts"\fP file in their home directory will be read to find the names of hosts and users who will be allowed access without specifying a password\&. .IP NOTE: The use of \fBuse rhosts\fP can be a major security hole\&. This is because you are trusting the PC to supply the correct username\&. It is very easy to get a PC to supply a false username\&. I recommend that the \fBuse rhosts\fP option be only used if you really know what you are doing\&. .IP \fBDefault:\fP \f(CW use rhosts = no\fP .IP \fBExample:\fP \f(CW use rhosts = yes\fP .IP .IP "\fBuser (S)\fP" .IP Synonym for \fB"username"\fP\&. .IP .IP "\fBusers (S)\fP" .IP Synonym for \fB"username"\fP\&. .IP .IP "\fBusername (S)\fP" .IP Multiple users may be specified in a comma-delimited list, in which case the supplied password will be tested against each username in turn (left to right)\&. .IP The \fBusername=\fP line is needed only when the PC is unable to supply its own username\&. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames\&. In both these cases you may also be better using the \f(CW\e\eserver\eshare%user\fP syntax instead\&. .IP The \fBusername=\fP line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the username= line in turn\&. This is slow and a bad idea for lots of users in case of duplicate passwords\&. You may get timeouts or security breaches using this parameter unwisely\&. .IP Samba relies on the underlying UNIX security\&. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password\&. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session\&. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do\&. .IP To restrict a service to a particular set of users you can use the \fB"valid users="\fP parameter\&. .IP If any of the usernames begin with a \f(CW\'@\'\fP then the name will be looked up first in the yp netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name\&. .IP If any of the usernames begin with a \f(CW\'+\'\fP then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name\&. .IP If any of the usernames begin with a \f(CW\'&\'\fP then the name will be looked up only in the yp netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name\&. .IP Note that searching though a groups database can take quite some time, and some clients may time out during the search\&. .IP See the section \fB"NOTE ABOUT USERNAME/PASSWORD VALIDATION"\fP for more information on how this parameter determines access to the services\&. .IP \fBDefault:\fP \f(CW The guest account if a guest service, else the name of the service\&.\fP .IP \fBExamples:\fP .DS username = fred username = fred, mary, jack, jane, @users, @pcgroup .DE .IP .IP "\fBusername level (G)\fP" .IP This option helps Samba to try and \'guess\' at the real UNIX username, as many DOS clients send an all-uppercase username\&. By default Samba tries all lowercase, followed by the username with the first letter capitalized, and fails if the username is not found on the UNIX machine\&. .IP If this parameter is set to non-zero the behaviour changes\&. This parameter is a number that specifies the number of uppercase combinations to try whilst trying to determine the UNIX user name\&. The higher the number the more combinations will be tried, but the slower the discovery of usernames will be\&. Use this parameter when you have strange usernames on your UNIX machine, such as \f(CW"AstrangeUser"\fP\&. .IP \fBDefault:\fP \f(CW username level = 0\fP .IP \fBExample:\fP \f(CW username level = 5\fP .IP .IP "\fBusername map (G)\fP" .IP This option allows you to to specify a file containing a mapping of usernames from the clients to the server\&. This can be used for several purposes\&. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\&. The other is to map multiple users to a single username so that they can more easily share files\&. .IP The map file is parsed line by line\&. Each line should contain a single UNIX username on the left then a \f(CW\'=\'\fP followed by a list of usernames on the right\&. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\&. The special client name \f(CW\'*\'\fP is a wildcard and matches any name\&. Each line of the map file may be up to 1023 characters long\&. .IP The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \f(CW\'=\'\fP signs\&. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\&. Processing then continues with the next line\&. .IP If any line begins with a \f(CW\'#\'\fP or a \f(CW\';\'\fP then it is ignored .IP If any line begins with an \f(CW\'!\'\fP then the processing will stop after that line if a mapping was done by the line\&. Otherwise mapping continues with every line being processed\&. Using \f(CW\'!\'\fP is most useful when you have a wildcard mapping line later in the file\&. .IP For example to map from the name \f(CW"admin"\fP or \f(CW"administrator"\fP to the UNIX name \f(CW"root"\fP you would use: .IP \f(CW root = admin administrator\fP .IP Or to map anyone in the UNIX group \f(CW"system"\fP to the UNIX name \f(CW"sys"\fP you would use: .IP \f(CW sys = @system\fP .IP You can have as many mappings as you like in a username map file\&. .IP If your system supports the NIS NETGROUP option then the netgroup database is checked before the \f(CW/etc/group\fP database for matching groups\&. .IP You can map Windows usernames that have spaces in them by using double quotes around the name\&. For example: .IP \f(CW tridge = "Andrew Tridgell"\fP .IP would map the windows username \f(CW"Andrew Tridgell"\fP to the unix username tridge\&. .IP The following example would map mary and fred to the unix user sys, and map the rest to guest\&. Note the use of the \f(CW\'!\'\fP to tell Samba to stop processing if it gets a match on that line\&. .IP .DS !sys = mary fred guest = * .DE .IP Note that the remapping is applied to all occurrences of usernames\&. Thus if you connect to \f(CW"\e\eserver\efred"\fP and \f(CW"fred"\fP is remapped to \f(CW"mary"\fP then you will actually be connecting to \f(CW"\e\eserver\emary"\fP and will need to supply a password suitable for \f(CW"mary"\fP not \f(CW"fred"\fP\&. The only exception to this is the username passed to the \fB"password server"\fP (if you have one)\&. The password server will receive whatever username the client supplies without modification\&. .IP Also note that no reverse mapping is done\&. The main effect this has is with printing\&. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\'t own the print job\&. .IP \fBDefault:\fP \f(CW no username map\fP .IP \fBExample:\fP \f(CW username map = /usr/local/samba/lib/users\&.map\fP .IP .IP "\fBvalid chars (S)\fP" .IP The option allows you to specify additional characters that should be considered valid by the server in filenames\&. This is particularly useful for national character sets, such as adding u-umlaut or a-ring\&. .IP The option takes a list of characters in either integer or character form with spaces between them\&. If you give two characters with a colon between them then it will be taken as an lowercase:uppercase pair\&. .IP If you have an editor capable of entering the characters into the config file then it is probably easiest to use this method\&. Otherwise you can specify the characters in octal, decimal or hexadecimal form using the usual C notation\&. .IP For example to add the single character \f(CW\'Z\'\fP to the charset (which is a pointless thing to do as it\'s already there) you could do one of the following .IP .DS valid chars = Z valid chars = z:Z valid chars = 0132:0172 .DE .IP The last two examples above actually add two characters, and alter the uppercase and lowercase mappings appropriately\&. .IP Note that you MUST specify this parameter after the \fB"client code page"\fP parameter if you have both set\&. If \fB"client code page"\fP is set after the \fB"valid chars"\fP parameter the \fB"valid chars"\fP settings will be overwritten\&. .IP See also the \fB"client code page"\fP parameter\&. .IP \fBDefault:\fP .DS Samba defaults to using a reasonable set of valid characters for english systems .DE .IP \fBExample\fP \f(CW valid chars = 0345:0305 0366:0326 0344:0304\fP .IP The above example allows filenames to have the swedish characters in them\&. .IP NOTE: It is actually quite difficult to correctly produce a \fB"valid chars"\fP line for a particular system\&. To automate the process \fItino@augsburg\&.net\fP has written a package called \fB"validchars"\fP which will automatically produce a complete \fB"valid chars"\fP line for a given client system\&. Look in the examples/validchars/ subdirectory of your Samba source code distribution for this package\&. .IP .IP "\fBvalid users (S)\fP" .IP This is a list of users that should be allowed to login to this service\&. Names starting with \f(CW\'@\'\fP, \f(CW\'+\'\fP and \f(CW\'&\'\fP are interpreted using the same rules as described in the \fB"invalid users"\fP parameter\&. .IP If this is empty (the default) then any user can login\&. If a username is in both this list and the \fB"invalid users"\fP list then access is denied for that user\&. .IP The current servicename is substituted for \fB"%S"\fP\&. This is useful in the \fB[homes]\fP section\&. .IP See also \fB"invalid users"\fP\&. .IP \fBDefault:\fP \f(CW No valid users list\&. (anyone can login)\fP .IP \fBExample:\fP \f(CW valid users = greg, @pcusers\fP .IP .IP "\fBveto files(S)\fP" .IP This is a list of files and directories that are neither visible nor accessible\&. Each entry in the list must be separated by a \f(CW\'/\'\fP, which allows spaces to be included in the entry\&. \f(CW\'*\'\fP and \f(CW\'?\'\fP can be used to specify multiple files or directories as in DOS wildcards\&. .IP Each entry must be a unix path, not a DOS path and must \fI*not*\fP include the unix directory separator \f(CW\'/\'\fP\&. .IP Note that the \fB"case sensitive"\fP option is applicable in vetoing files\&. .IP One feature of the veto files parameter that it is important to be aware of, is that if a directory contains nothing but files that match the veto files parameter (which means that Windows/DOS clients cannot ever see them) is deleted, the veto files within that directory *are automatically deleted* along with it, if the user has UNIX permissions to do so\&. .IP Setting this parameter will affect the performance of Samba, as it will be forced to check all files and directories for a match as they are scanned\&. .IP See also \fB"hide files"\fP and \fB"case sensitive"\fP\&. .IP \fBDefault:\fP \f(CW No files or directories are vetoed\&.\fP .IP \fBExamples:\fP .IP Example 1\&. .IP .DS Veto any files containing the word Security, any ending in \&.tmp, and any directory containing the word root\&. veto files = /*Security*/*\&.tmp/*root*/ .DE .IP Example 2\&. .IP .DS Veto the Apple specific files that a NetAtalk server creates\&. veto files = /\&.AppleDouble/\&.bin/\&.AppleDesktop/Network Trash Folder/ .DE .IP .IP "\fBveto oplock files (S)\fP" .IP This parameter is only valid when the \fB"oplocks"\fP parameter is turned on for a share\&. It allows the Samba administrator to selectively turn off the granting of oplocks on selected files that match a wildcarded list, similar to the wildcarded list used in the \fB"veto files"\fP parameter\&. .IP \fBDefault:\fP \f(CW No files are vetoed for oplock grants\&.\fP .IP \fBExamples:\fP .IP You might want to do this on files that you know will be heavily contended for by clients\&. A good example of this is in the NetBench SMB benchmark program, which causes heavy client contention for files ending in \f(CW"\&.SEM"\fP\&. To cause Samba not to grant oplocks on these files you would use the line (either in the \fB[global]\fP section or in the section for the particular NetBench share : .IP \f(CW veto oplock files = /*\&.SEM/\fP .IP .IP "\fBvolume (S)\fP" .IP This allows you to override the volume label returned for a share\&. Useful for CDROMs with installation programs that insist on a particular volume label\&. .IP The default is the name of the share\&. .IP .IP "\fBwide links (S)\fP" .IP This parameter controls whether or not links in the UNIX file system may be followed by the server\&. Links that point to areas within the directory tree exported by the server are always allowed; this parameter controls access only to areas that are outside the directory tree being exported\&. .IP \fBDefault:\fP \f(CW wide links = yes\fP .IP \fBExample:\fP \f(CW wide links = no\fP .IP .IP "\fBwins proxy (G)\fP" .IP This is a boolean that controls if \fBnmbd\fP will respond to broadcast name queries on behalf of other hosts\&. You may need to set this to \f(CW"yes"\fP for some older clients\&. .IP \fBDefault:\fP \f(CW wins proxy = no\fP .IP .IP "\fBwins server (G)\fP" .IP This specifies the DNS name (or IP address) of the WINS server that \fBnmbd\fP should register with\&. If you have a WINS server on your network then you should set this to the WINS servers name\&. .IP You should point this at your WINS server if you have a multi-subnetted network\&. .IP \fINOTE\fP\&. You need to set up Samba to point to a WINS server if you have multiple subnets and wish cross-subnet browsing to work correctly\&. .IP See the documentation file BROWSING\&.txt in the docs/ directory of your Samba source distribution\&. .IP \fBDefault:\fP \f(CW wins server = \fP .IP \fBExample:\fP \f(CW wins server = 192\&.9\&.200\&.1\fP .IP .IP "\fBwins support (G)\fP" .IP This boolean controls if the \fBnmbd\fP process in Samba will act as a WINS server\&. You should not set this to true unless you have a multi-subnetted network and you wish a particular \fBnmbd\fP to be your WINS server\&. Note that you should \fI*NEVER*\fP set this to true on more than one machine in your network\&. .IP \fBDefault:\fP \f(CW wins support = no\fP .IP .IP "\fBworkgroup (G)\fP" .IP This controls what workgroup your server will appear to be in when queried by clients\&. Note that this parameter also controlls the Domain name used with the \fB"security=domain"\fP setting\&. .IP \fBDefault:\fP \f(CW set at compile time to WORKGROUP\fP .IP \&.B Example: workgroup = MYGROUP .IP .IP "\fBwritable (S)\fP" .IP An inverted synonym is \fB"read only"\fP\&. .IP If this parameter is \f(CW"no"\fP, then users of a service may not create or modify files in the service\'s directory\&. .IP Note that a printable service \fB("printable = yes")\fP will \fI*ALWAYS*\fP allow writing to the directory (user privileges permitting), but only via spooling operations\&. .IP \fBDefault:\fP \f(CW writable = no\fP .IP \fBExamples:\fP .DS read only = no writable = yes write ok = yes .DE .IP .IP "\fBwrite list (S)\fP" .IP This is a list of users that are given read-write access to a service\&. If the connecting user is in this list then they will be given write access, no matter what the \fB"read only"\fP option is set to\&. The list can include group names using the @group syntax\&. .IP Note that if a user is in both the read list and the write list then they will be given write access\&. .IP See also the \fB"read list"\fP option\&. .IP \fBDefault:\fP \f(CW write list = \fP .IP \fBExample:\fP \f(CW write list = admin, root, @staff\fP .IP .IP "\fBwrite ok (S)\fP" .IP Synonym for \fBwritable\fP\&. .IP .IP "\fBwrite raw (G)\fP" .IP This parameter controls whether or not the server will support raw writes SMB\'s when transferring data from clients\&. You should never need to change this parameter\&. .IP \fBDefault:\fP \f(CW write raw = yes\fP .IP .IP "\fBwriteable\fP" .IP Synonym for \fB"writable"\fP for people who can\'t spell :-)\&. .IP .SH "WARNINGS" .IP Although the configuration file permits service names to contain spaces, your client software may not\&. Spaces will be ignored in comparisons anyway, so it shouldn\'t be a problem - but be aware of the possibility\&. .IP On a similar note, many clients - especially DOS clients - limit service names to eight characters\&. \fBSmbd\fP has no such limitation, but attempts to connect from such clients will fail if they truncate the service names\&. For this reason you should probably keep your service names down to eight characters in length\&. .IP Use of the \fB[homes]\fP and \fB[printers]\fP special sections make life for an administrator easy, but the various combinations of default attributes can be tricky\&. Take extreme care when designing these sections\&. In particular, ensure that the permissions on spool directories are correct\&. .IP .SH "VERSION" .IP This man page is correct for version 2\&.0 of the Samba suite\&. .IP .SH "SEE ALSO" .IP \fBsmbd (8)\fP, \fBsmbclient (1)\fP, \fBnmbd (8)\fP, \fBtestparm (1)\fP, \fBtestprns (1)\fP, \fBSamba\fP, \fBnmblookup (1)\fP, \fBsmbpasswd (5)\fP, \fBsmbpasswd (8)\fP\&. .IP .SH "AUTHOR" .IP The original Samba software and related utilities were created by Andrew Tridgell \fIsamba-bugs@samba\&.anu\&.edu\&.au\fP\&. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\&. .IP The original Samba man pages were written by Karl Auer\&. The man page sources were converted to YODL format (another excellent piece of Open Source software, available at \fBftp://ftp\&.icce\&.rug\&.nl/pub/unix/\fP) and updated for the Samba2\&.0 release by Jeremy Allison\&. \fIsamba-bugs@samba\&.anu\&.edu\&.au\fP\&. .IP See \fBsamba (7)\fP to find out how to get a full list of contributors and details on how to submit bug reports, comments etc\&.