X-Git-Url: http://git.samba.org/samba.git/?p=ira%2Fwip.git;a=blobdiff_plain;f=WHATSNEW.txt;h=de8df4b0068bf7f7363598dec3edbef87ed7725e;hp=4f747a18d6e90974b3a3f423a001c4a9e89f548b;hb=118fd6213d5f6419f654e9226a41d527c04346f7;hpb=7926e6f86356d01776c04f8c1b74b6049ee63eb0 diff --git a/WHATSNEW.txt b/WHATSNEW.txt index 4f747a18d6e..de8df4b0068 100644 --- a/WHATSNEW.txt +++ b/WHATSNEW.txt @@ -1,882 +1,248 @@ - WHATS NEW IN Samba 3.0.0 RC1 - August 15 2003 - ============================== + ================================= + Release Notes for Samba 3.2.0pre2 + Oct XX, 2007 + ================================= -This is the first release candidate snapshot of Samba 3.0.0. A release -candidate implies that the code is very close to a final release, remember -that this is still a non-production release intended for testing purposes. -Use at your own risk. +This is the second preview release of Samba 3.2.0. This is *not* +intended for production environments and is designed for testing +purposes only. Please report any defects via the Samba bug reporting +system at https://bugzilla.samba.org/. -The purpose of this release candidate is to get wider testing of the major -new pieces of code in the current Samba 3.0 development tree. -Please refer to the section on "Known Issues" for more details. +Please be aware that Samba is now distributed under the version 3 +of the new GNU General Public License. You may refer to the COPYING +file that accompanies these release notes for further licensing details. +Major enhancements in Samba 3.2.0 include: -Major new features: -------------------- + File Serving: + o Use of IDL generated parsing layer for several DCE/RPC + interfaces. + o Removal of the 1024 byte limit on pathnames and 256 byte limit on + filename components to honor the MAX_PATH setting from the host OS. + o Introduction of a registry based configuration system. + o Improved CIFS Unix Extensions support. + o Experimental support for file serving clusters. -1) Active Directory support. Samba 3.0 is now able to - to join a ADS realm as a member server and authenticate - users using LDAP/Kerberos. -2) Unicode support. Samba will now negotiate UNICODE on the wire and - internally there is now a much better infrastructure for multi-byte - and UNICODE character sets. + Winbind and Active Directory Integration: + o Full support for Windows 2003 cross-forest, transitive trusts + and one-way domain trusts + o Support for userPrincipalName logons via pam_winbind and NSS + lookups. + o Support in pam_winbind for logging on using the userPrincipalName. + o Expansion of nested domain groups via NSS calls. + o Support for Active Directory LDAP Signing policy. -3) New authentication system. The internal authentication system has - been almost completely rewritten. Most of the changes are internal, - but the new auth system is also very configurable. -4) New filename mangling system. The filename mangling system has been - completely rewritten. An internal database now stores mangling maps - persistently. This needs lots of testing. + Users & Groups: + o New ldb backend for local group mapping tables + o Raised level of security defaults for authentication operations. -5) A new "net" command has been added. It is somewhat similar to - the "net" command in windows. Eventually we plan to replace - numerous other utilities (such as smbpasswd) with subcommands - in "net". -6) Samba now negotiates NT-style status32 codes on the wire. This - improves error handling a lot. + Documentation: + o Inclusion of an HTLM version of the 3rd edition of "Using Samba" + from O'Reilly Publishing. -7) Better Windows 2000/XP/2003 printing support including publishing - printer attributes in active directory. -8) New loadable RPC modules. +Now Licensed under the GNU GPLv3 +================================ -9) New default dual-daemon winbindd support for better performance. +The Samba Team has adopted the Version 3 of the GNU General Public +License for the 3.2 and later releases. The GPLv3 is the updated +version of the GPLv2 license under which Samba is currently +distributed. It has been updated to improvecompatibility with other +licenses and to make it easier to adopt internationally, and is an +improved version of the license to better suit the needs of Free +Software in the 21st Century. -10) Support for migrating from a Windows NT 4.0 domain to a Samba - domain and maintaining user, group and domain SIDs. +The original announcement is available on-line at -11) Support for establishing trust relationships with Windows NT 4.0 - domain controllers. - -12) Initial support for a distributed Winbind architecture using - an LDAP directory for storing SID to uid/gid mappings. - -13) Major updates to the Samba documentation tree. - -14) Full support for client and server SMB signing to ensure - compatibility with default Windows 2003 security settings. - -Plus lots of other improvements! - - -Additional Documentation ------------------------- - -Please refer to Samba documentation tree (including in the docs/ -subdirectory) for extensive explanations of installing, configuring -and maintaining Samba 3.0 servers and clients. It is advised to -begin with the Samba-HOWTO-Collection for overviews and specific -tasks (the current book is up to approximately 400 pages) and to -refer to the various man pages for information on individual options. - - -###################################################################### -Changes since 3.0beta3 -###################### - -Please refer to the CVS log for the SAMBA_3_0 branch for complete -details - -1) Various memory leak fixes. -2) Provide full support SMB signing (server and client) -3) Check for broken getgrouplist() in glibc. -4) Don't get stuck in an infinite loop listing directories - recursively if the server returns an empty directory name - (bug 222). -5) Idle LDAP connections after 150 seconds. -6) Patched make uninstallmodules (bug 236). -7) Fix bug that caused smbd to return incomplete directory listings - when UNIX files contained MS wildcards characters. -8) Quiet default debug messages in command line tools. -9) Fixes to avoid panics on invalid multi-byte strings. -10) Fix error messages when creating a new smbpasswd file (bug 198). -11) Implemented better detection routines in autoconf scripts for - locating ads support on the host OS. -12) Fix bug that caused libraries in /usr/local/lib to be ignored - (bug 174). -13) Ensure winbindd_ads uses the correct realm or domain name when - connecting to trusted DC. -14) Ensure a correct prototype is created for snprintf() (bug 187) -15) Stop files being created on read-only shares in some circumstances. -16) Fix wbinfo -p (bug 251) -17) Support schannel on any tcp/ip connection if necessary -18) Correct bug in user_in_list() so that it works with winbind groups - again. -19) Ensure the schannel bind credentials default to the domain - of the destination host. -20) Default password expiration time in account_pol.tdb to never - expire. Remove any existing account_pol.tdb file to reset - the new default policy (bug 184). -21) Add buttons to SWAT to change the view of smb.conf (bug 212) -22) Fix incorrect checks that determine whether or not the 'add user - script' has been set. -23) More cleanup for internal character set conversions. -24) Fixes for multi-byte strings in stat cache code. -25) Ensure that the net command honors the 'workgroup' parameter - in smb.conf when not overridden from the command line. -26) Add gss-spnego support to the ntlm_auth tool. -27) Add vfs_default_quota VFS module. -28) Added server support for NT quota interfaces. -29) Prevent Krb5 replay attacks by adding a replay_cache. -30) Fix problems with winbindd and transitive trusts in AD domains. -31) Added -S to client tools for setting SMB signing options on the - command line. -32) Fix bug causing the 'passwd change program' to be called as the - connected user and not root. -33) Fixed data corruption bug in byte-range locking (e.g. affected MS Excel). -34) Support winbindd on FreeBSD is possible. -35) Look at the only first OID in the security blob sent in the session - setup request to determine the token type. -36) Only push locks onto a blocking lock queue if the posix lock failed with - EACCES or EAGAIN (this means another lock conflicts). Else return an - error and don't queue the request. -37) Fix command line argument processing for smbtar. -38) Correct issue that caused smbd to return generic unix_user. - for lookupsid(). -39) Default to algorithmic mapping when generating a rid for a group - mapping. -40) Expand %g and %G in logon script, profile path, etc... during - a domain logon (bug 208). -41) Make sure smbclient client obeys '-s ' -42) Added win2k3 shadow copy operations to VFS interface. -43) Allow connections to samba domain member as SERVER\user (don't - always default to DOMAIN\user). -44) Remove checks in winbindd that caused it to attempt to use - non-transitive trust relationships. -45) Remove delays in winbindd caused by invalid DNS lookups. -46) Fix supplementary group memberships on systems with slightly - broken NSS implementations (bug 267). -47) Correct issue that prevented smbclient from view shares on - a win2k server when using a non-anonymous connection (bug 284). -48) Add --domain=DOMAIN_NAME to wbinfo for limiting operations like - 'wbinfo -u' to a single domain. The '.' character represents - our domain. -49) Fix group enumeration bug when using an LDAP directory for - storing group mappings. -50) Default to use NTLMv2 if available. Fallback to not using LM/NTLM - when the extended security capability bit is not set. -51) Fix crash in 'wbinfo -a' when using extended characters in the - username (bug 269). -52) Fix multi-byte strupper() panics (bug 205). -53) Add vfs_readonly VFS module. -54) Make sure to initialize the sambaNextUserRid and sambaNextGroupRid - attributes when using 'idmap backend = ldap' (bug 280). -55) Make sure that UNIX users shared between a Samba PDC and member - samba server are seen as domain users and not local users on the - domain member. -56) Fix Query FS Info level 2. -57) Allow enumeration of users and groups by win9x "file server" (bug - 286). -58) Create symlinks during instal for modules that support mutliple - functions (bug 91). -59) More iconv detection fixes. -60) Fix path length error in vfs_recycle module (bug 291). -61) Added server support for the LSA_DS UUID on the \lsarpc pipe. - (server DsRoleGetPrimaryDomainInfo() is currently disabled). -62) Fix SMBseek and get/set position calls. -62) Fix SetFileInfo level 1. -63) Added tool to convert smbd log file to a pcap file (log2pcaphex). - - - -Changes since 3.0beta3 -###################### - -1) Added fix for Japanese case names in statcache code; - these can change size on upper casing. -2) Correct issues with iconv detection in configure script - (support needed to find iconv libraries on FreeBSD). -3) Fix bug that caused a WINS server to be marked as dead - incorrectly (bug #190). -4) Removing additional deadlocks conditions that prevented - winbindd from running on a Samba PDC (used for trust - relationships). -5) Add support for searching for Active Directory for - published printers (net ads printer search). -6) Separate UNIX username from DOMAIN\username in pipe - credentials. -7) Auth modules now support returning NT_STATUS_NOT_IMPLEMENTED - for cases that they cannot handle. -8) Flush winbindd connection cache when the machine trust account - password is changed while a connection is open (bug #200). -9) Add support for 'OSVersion' server printer data string - (corrects problem with uploading printer drivers from - WinXP clients). -10) Numerous memory leak fixes. -11) LDAP fixes ("passdb backend = ldapsam" & "idmap backend = ldap"): - - Store domain SID in LDAP directory. - - store idmap information in existing entries (use sambaSID=... - if adding a new entry). -12) Fix incorrect usage of primary group SID when looking up user - groups (bug #109). -13) Remove idmap_XX_to_XX calls from smbd. Move back to the the - winbind_XXX and local_XXX calls used in 2.2. -14) All uid/gid allocation must involve winbindd now (we do not - attempt to map unknown SIDs to a UNIX identify). -15) Add 'winbind trusted domains only' parameter to force a domain - member. The server to use matching users names from /etc/passwd - for its domain (needed for domain member of a Samba domain). -16) Rename 'idmap only' to 'enable rid algorithm' for better clarity - (defaults to "yes"). -17) Add support for multi-byte statcache code (bug #185) -18) Fix open mode race condition. -19) Implement winbindd local account management functions. Refer to - the "Winbind Changes" section for details. -20) Move RID allocation functions into idmap backend. -21) Fix parsing error that prevented publishing printers from a - Samba server in an AD domain. -22) Revive NTLMSSP support for named pipes. -23) More SCHANNEL fixes. -24) Correct SMB signing with NTLMSSP. -25) Fix coherency bug in print handle/printer object caching code - that could cause XP clients to infinitely loop while updating - their local printer cache. -26) Make winbindd use its dual-daemon mode by default (use -Y to - start as a single process). -27) Add support to nmbd and winbindd for 'smbcontrol - reload-config'. -28) Correct problem with smbtar when dealing with files > 8Gb - (bug #102). - - - -Changes since 3.0beta1 -###################### - -1) Rework our smb signing code again, this factors out some of - the common MAC calculation code, and now supports multiple - outstanding packets (bug #40). -2) Enforce 'client plaintext auth', 'client lanman auth' and 'client - ntlmv2 auth'. -3) Correct timestamp problem on 64-bit machines (bug #140). -4) Add extra debugging statements to winbindd for tracking down - failures. -5) Fix bug when aliased 'winbind uid/gid' parameters are used. - ('winbind uid/gid' are now replaced with 'idmap uid/gid'). -6) Added an auth flag that indicates if we should be allowed - to fall back to NTLMSSP for SASL if krb5 fails. -7) Fixed the bug that forced us not to use the winbindd cache when - we have a primary ADS domain and a secondary (trusted) NT4 - domain. -8) Use lp_realm() to find the default realm for 'net ads password'. -9) Removed editreg from standard build until it is portable.. -10) Fix domain membership for servers not running winbindd. -11) Correct race condition in determining the high water mark - in the idmap backend (bug #181). -12) Set the user's primary unix group from usrmgr.exe (partial - fix for bug #45). -13) Show comments when doing 'net group -l' (bug #3). -14) Add trivial extension to 'net' to dump current local idmap - and restore mappings as well. -15) Modify 'net rpc vampire' to add new and existing users to - both the idmap and the SAM. This code needs further testing. -16) Fix crash bug in ADS searches. -17) Build libnss_wins.so as part of nsswitch target (bug #160). -18) Make net rpc vampire return an error if the sam sync RPC - returns an error. -19) Fail to join an NT 4 domain as a BDC if a workstation account - using our name exists. -20) Fix various memory leaks in server and client code -21) Remove the short option to --set-auth-user for wbinfo (-A) to - prevent confusion with the -a option (bug #158). -22) Added new 'map acl inherit' parameter. -23) Removed unused 'privileges' code from group mapping database. -24) Don't segfault on empty passdb backend list (bug #136). -25) Fixed acl sorting algorithm for Windows 2000 clients. -26) Replace universal group cache with netsamlogon_cache - from APPLIANCE_HEAD branch. -27) Fix autoconf detection issues surrounding --with-ads=yes - but no Krb5 header files installed (bug #152). -28) Add LDAP lookup for domain sequence number in case we are - joined using NT4 protocols to a native mode AD domain. -29) Fix backend method selection for trusted NT 4 (or 2k - mixed mode) domains. -30) Fixed bug that caused us to enumerate domain local groups - from native mode AD domains other than our own. -31) Correct group enumeration for viewing in the Windows - security tab (bug #110). -32) Consolidate the DC location code. -33) Moved 'ads server' functionality into 'password server' for - backwards compatibility. -34) Fix winbindd_idmap tdb upgrades from a 2.2 installation. - ( if you installed beta1, be sure to - 'mv idmap.tdb winbindd_idmap.tdb' ). -35) Fix pdb_ldap segfaults, and wrong default values for - ldapsam_compat. -36) Enable negative connection cache for winbindd's ADS backend - functions. -37) Enable address caching for active directory DC's so we don't - have to hit DNS so much. -38) Fix bug in idmap code that caused mapping to randomly be - redefined. -39) Add tdb locking code to prevent race condition when adding a - new mapping to idmap. -40) Fix 'map to guest = bad user' when acting as a PDC supporting - trust relationships. -41) Prevent deadlock issues when running winbindd on a Samba PDC - to handle allocating uids & gids for trusted users and groups -42) added LOCALE patch from Steve Langasek (bug #122). -43) Add the 'guest' passdb backend automatically to the end of - the 'passdb backend' list if 'guest account' has a valid - username. -44) Remove samstrict_dc auth method. Rework 'samstrict' to only - handle our local names (or domain name if we are a PDC). - Move existing permissive 'sam' method to 'sam_ignoredomain' - and make 'samstrict' the new default 'sam' auth method. -45) Match Windows NT4/2k behavior when authenticating a user with - and unknown domain (default to our domain if we are a DC or - domain member; default to our local name if we are a - standalone server). -46) Fix Get_Pwnam() to always fall back to lookup 'user' if the - 'DOMAIN\user' lookup fails. This matches 2.2. behavior. -47) Fix the trustdom_cache code to update the list of trusted - domains when operating as a domain member and not using - winbindd. -48) Remove 'nisplussam' passdb backend since it has suffered for - too long without a maintainer. - - - - -###################################################################### -Upgrading from a previous Samba 3.0 beta -######################################## - -Beginning with Samba 3.0.0beta3, the RID allocation functions -have been moved into winbindd. Previously these were handled -by each passdb backend. This means that winbindd must be running -to automatically allocate RIDs for users and/or groups. Otherwise, -smbd will use the 2.2 algorithm for generating new RIDs. + http://news.samba.org/announcements/samba_gplv3/ -If you are using 'passdb backend = tdbsam' with a previous Samba -3.0 beta release (or possibly alpha), it may be necessary to -move the RID_COUNTER entry from /usr/local/samba/private/passdb.tdb -to winbindd_idmap.tdb. To do this: -1) Ensure that winbindd_idmap.tdb exists (launch winbindd at least - once) -2) build tdbtool by executing 'make tdbtool' in the source/tdb/ - directory -3) run: (note that 'tdb>' is the tool's prompt for input) +New Security Defaults for Authentication +======================================== - root# ./tdbtool /usr/local/samba/private/passdb.tdb - tdb> show RID_COUNTER - key 12 bytes - RID_COUNTER - data 4 bytes - [000] 0A 52 00 00 .R. +Support for LanMan passwords is now disabled in both client and server +applications. Additionally, clear text authentication requests are +disabled by default in client utilities such as smbclient and all +libsmbclient based applications. This will affect connection both +to and from hosts running DOS, Windows 9x/ME, and OS/2. Please refer +to the "Changes" section for details on the exact parameters that were +updated. - tdb> move RID_COUNTER /usr/local/samba/var/locks/winbindd_idmap.tdb - .... - record moved -If you are using 'passdb backend = ldapsam', it will be necessary to -store idmap entries in the LDAP directory as well (i.e. idmap backend -= ldap). Refer to the 'net idmap' command for more information on -migrating SID<->UNIX id mappings from one backend to another. -If the RID_COUNTER record does not exist, then these instructions are -unneccessary and the new RID_COUNTER record will be correctly generated -if needed. +Registry Configuration Backend +============================== +Samba is now able to use a registry based configuration backed to +supplement smb.conf setting. This feature may be enabled by setting +"include = registry" and "registry shares = yes" in the [global] +section of smb.conf and may be managed using the "net conf" command. +More information may be obtained from the smb.conf(5) and net(8) man +pages. -######################## -Upgrading from Samba 2.2 -######################## -This section is provided to help administrators understand the details -involved with upgrading a Samba 2.2 server to Samba 3.0. +Removed Features +================ +Both the Python bindings and the libmsrpc shared library have been +removed from the tree due to lack of an official maintainer. -Building --------- -Many of the options to the GNU autoconf script have been modified -in the 3.0 release. The most noticeable are: - - * removal of --with-tdbsam (is now included by default; see section - on passdb backends and authentication for more details) - - * --with-ldapsam is now on used to provided backward compatible - parameters for LDAP enabled Samba 2.2 servers. Refer to the passdb - backend and authentication section for more details - - * inclusion of non-standard passdb modules may be enabled using - --with-expsam. This includes an XML backend and a mysql backend. - - * removal of --with-msdfs (is now enabled by default) - - * removal of --with-ssl (no longer supported) - - * --with-utmp now defaults to 'yes' on supported systems - - * --with-sendfile-support is now enabled by default on supported - systems - - -Parameters ----------- - -This section contains a brief listing of changes to smb.conf options -in the 3.0.0 release. Please refer to the smb.conf(5) man page for -complete descriptions of new or modified parameters. - -Removed Parameters (order alphabetically): - - * admin log - * alternate permissions - * character set - * client codepage - * code page directory - * coding system - * domain admin group - * domain guest group - * force unknown acl user - * nt smb support - * post script - * printer driver - * printer driver file - * printer driver location - * status - * total print jobs - * use rhosts - * valid chars - * vfs options - -New Parameters (new parameters have been grouped by function): - - Remote management - ----------------- - * abort shutdown script - * shutdown script - - User and Group Account Management - --------------------------------- - * add group script - * add machine script - * add user to group script - * algorithmic rid base - * delete group script - * delete user from group script - * passdb backend - * set primary group script - - Authentication - -------------- - * auth methods - * realm - - Protocol Options - ---------------- - * client lanman auth - * client NTLMv2 auth - * client schannel - * client signing - * client use spnego - * disable netbios - * ntlm auth - * paranoid server security - * server schannel - * server signing - * smb ports - * use spnego - - File Service - ------------ - * get quota command - * hide special files - * hide unwriteable files - * hostname lookups - * kernel change notify - * mangle prefix - * map acl inherit - * msdfs proxy - * set quota command - * use sendfile - * vfs objects - - Printing - -------- - * max reported print jobs - - UNICODE and Character Sets - -------------------------- - * display charset - * dos charset - * unicode - * unix charset - - SID to uid/gid Mappings - ----------------------- - * idmap backend - * idmap gid - * idmap uid - * winbind enable local accounts - * winbind trusted domains only - * template primary group - * enable rid algorithm - - LDAP - ---- - * ldap delete dn - * ldap group suffix - * ldap idmap suffix - * ldap machine suffix - * ldap passwd sync - * ldap trust ids - * ldap user suffix - - General Configuration - --------------------- - * preload modules - * privatedir - -Modified Parameters (changes in behavior): - - * encrypt passwords (enabled by default) - * mangling method (set to 'hash2' by default) - * passwd chat - * passwd program - * restrict anonymous (integer value) - * security (new 'ads' value) - * strict locking (enabled by default) - * winbind cache time (increased to 5 minutes) - * winbind uid (deprecated in favor of 'idmap uid') - * winbind gid (deprecated in favor of 'idmap gid') - - -Databases ---------- - -This section contains brief descriptions of any new databases -introduced in Samba 3.0. Please remember to backup your existing -${lock directory}/*tdb before upgrading to Samba 3.0. Samba will -upgrade databases as they are opened (if necessary), but downgrading -from 3.0 to 2.2 is an unsupported path. - -Name Description Backup? ----- ----------- ------- -account_policy User policy settings yes -gencache Generic caching db no -group_mapping Mapping table from Windows yes - groups/SID to unix groups -winbindd_idmap ID map table from SIDS to UNIX yes - uids/gids. -namecache Name resolution cache entries no -netsamlogon_cache Cache of NET_USER_INFO_3 structure no - returned as part of a successful - net_sam_logon request -printing/*.tdb Cached output from 'lpq no - command' created on a per print - service basis -registry Read-only samba registry skeleton no - that provides support for exporting - various db tables via the winreg RPCs - - -Changes in Behavior -------------------- - -The following issues are known changes in behavior between Samba 2.2 and -Samba 3.0 that may affect certain installations of Samba. - - 1) When operating as a member of a Windows domain, Samba 2.2 would - map any users authenticated by the remote DC to the 'guest account' - if a uid could not be obtained via the getpwnam() call. Samba 3.0 - rejects the connection as NT_STATUS_LOGON_FAILURE. There is no - current work around to re-establish the 2.2 behavior. - - 2) When adding machines to a Samba 2.2 controlled domain, the - 'add user script' was used to create the UNIX identity of the - machine trust account. Samba 3.0 introduces a new 'add machine - script' that must be specified for this purpose. Samba 3.0 will - not fall back to using the 'add user script' in the absence of - an 'add machine script' - ###################################################################### -Passdb Backends and Authentication -################################## - -There have been a few new changes that Samba administrators should be -aware of when moving to Samba 3.0. - - 1) encrypted passwords have been enabled by default in order to - inter-operate better with out-of-the-box Windows client - installations. This does mean that either (a) a samba account - must be created for each user, or (b) 'encrypt passwords = no' - must be explicitly defined in smb.conf. - - 2) Inclusion of new 'security = ads' option for integration - with an Active Directory domain using the native Windows - Kerberos 5 and LDAP protocols. - - MIT kerberos 1.3.1 supports the ARCFOUR-HMAC-MD5 encryption - type which is neccessary for servers on which the - administrator password has not been changed, or kerberos-enabled - SMB connections to servers that require Kerberos SMB signing. - Besides this one difference, either MIT or Heimdal Kerberos - distributions are usable by Samba 3.0. - - -Samba 3.0 also includes the possibility of setting up chains -of authentication methods (auth methods) and account storage -backends (passdb backend). Please refer to the smb.conf(5) -man page for details. While both parameters assume sane default -values, it is likely that you will need to understand what the -values actually mean in order to ensure Samba operates correctly. - -The recommended passdb backends at this time are - - * smbpasswd - 2.2 compatible flat file format - * tdbsam - attribute rich database intended as an smbpasswd - replacement for stand alone servers - * ldapsam - attribute rich account storage and retrieval - backend utilizing an LDAP directory. - * ldapsam_compat - a 2.2 backward compatible LDAP account - backend - -Certain functions of the smbpasswd(8) tool have been split between the -new smbpasswd(8) utility, the net(8) tool, and the new pdbedit(8) -utility. See the respective man pages for details. - - -###################################################################### -LDAP -#### - -This section outlines the new features affecting Samba / LDAP -integration. - -New Schema ----------- - -A new object class (sambaSamAccount) has been introduced to replace -the old sambaAccount. This change aids us in the renaming of attributes -to prevent clashes with attributes from other vendors. There is a -conversion script (examples/LDAP/convertSambaAccount) to modify and LDIF -file to the new schema. +Changes +####### + +smb.conf changes +---------------- + + Parameter Name Description Default + -------------- ----------- ------- + client lanman auth Changed Default No + client ldap sasl wrapping New plain + client plaintext auth Changed Default No + clustering New No + cluster addresses New "" + ctdb socket New "" + lanman auth Changed Default No + mangle map Removed + open files database hashsize Removed + read bmpx Removed + registry shares New No + winbind expand groups New 1 + winbind rpc only New No + + +Changes since 3.2.0pre1: +----------------------- + + +Original 3.2.0pre1 commits: +--------------------------- +o Michael Adam + * Unified POSIX ACL detection including support for FreeBSD and + HP-UX. + * Performance improvements for Winbind's lookup functions (names, + SIDs, and group membership) when joined to an AD domain. + * Winbind cache validation support. + * Store domain trust passwords for Samba domain controller's in + the domain's passdb backend. + * Merged \winreg server code from the SAMBA_3_2 development branch. + * Fixes for libreplace. + * Implement new registry configuration backend. -Example: - - $ ldapsearch .... -b "ou=people,dc=..." > old.ldif - $ convertSambaAccount old.ldif new.ldif - -The can be obtained by running 'net getlocalsid ' -on the Samba PDC as root. - -The old sambaAccount schema may still be used by specifying the -"ldapsam_compat" passdb backend. However, the sambaAccount and -associated attributes have been moved to the historical section of -the schema file and must be uncommented before use if needed. -The 2.2 object class declaration for a sambaAccount has not changed -in the 3.0 samba.schema file. - -Other new object classes and their uses include: - - * sambaDomain - domain information used to allocate rids - for users and groups as necessary. The attributes are added - in 'ldap suffix' directory entry automatically if - an idmap uid/gid range has been set and the 'ldapsam' - passdb backend has been selected. - - * sambaGroupMapping - an object representing the - relationship between a posixGroup and a Windows - group/SID. These entries are stored in the 'ldap - group suffix' and managed by the 'net groupmap' command. - - * sambaUnixIdPool - created in the 'ldap idmap suffix' entry - automatically and contains the next available 'idmap uid' and - 'idmap gid' - - * sambaIdmapEntry - object storing a mapping between a - SID and a UNIX uid/gid. These objects are created by the - idmap_ldap module as needed. - - * sambaSidEntry - object representing a SID alone, as a Structural - class on which to build the sambaIdmapEntry. - -New Suffix for Searching ------------------------- - -The following new smb.conf parameters have been added to aid in directing -certain LDAP queries when 'passdb backend = ldapsam://...' has been -specified. - - * ldap suffix - used to search for user and computer accounts - * ldap user suffix - used to store user accounts - * ldap machine suffix - used to store machine trust accounts - * ldap group suffix - location of posixGroup/sambaGroupMapping entries - * ldap idmap suffix - location of sambaIdmapEntry objects - -If an 'ldap suffix' is defined, it will be appended to all of the -remaining sub-suffix parameters. In this case, the order of the suffix -listings in smb.conf is important. Always place the 'ldap suffix' first -in the list. - -Due to a limitation in Samba's smb.conf parsing, you should not surround -the DN's with quotation marks. - - -IdMap LDAP support ------------------- - -Samba 3.0 supports an ldap backend for the idmap subsystem. The -following options would inform Samba that the idmap table should be -stored on the directory server onterose in the "ou=idmap,dc=plainjoe, -dc=org" partition. - - [global] - ... - idmap backend = ldap:ldap://onterose/ - ldap idmap suffix = ou=idmap,dc=plainjoe,dc=org - idmap uid = 40000-50000 - idmap gid = 40000-50000 - -This configuration allows winbind installations on multiple servers to -share a uid/gid number space, thus avoiding the interoperability problems -with NFS that were present in Samba 2.2. +o Jeremy Allison + * Add support for file system objectIDs. + * Winbind cache validation support. + * Add in the UNIX capability for 24-bit readX. + * Improve Delete-on-Close semantics. + * Removal of static file and path name buffers in SMB file serving + code. +o Danilo Almeida + * Move the machine account to the OU specified when running "net + ads join". -###################################################################### -Trust Relationships and a Samba Domain -###################################### - -Samba 3.0.0beta2 is able to utilize winbindd as the means of -allocating uids and gids to trusted users and groups. More -information regarding Samba's support for establishing trust -relationships can be found in the Samba-HOWTO-Collection included -in the docs/ directory of this release. -First create your Samba PDC and ensure that everything is -working correctly before moving on the trusts. +o Andrew Bartlett + * Tighten authentication protocol defaults in client tools and + servers. -To establish Samba as the trusting domain (named SAMBA) from a Windows NT -4.0 domain named WINDOWS: - 1) create the trust account for SAMBA in "User Manager for Domains" - 2) connect the trust from the Samba domain using - 'net rpc trustdom establish GLASS' +o Gerald (Jerry) Carter + * Implement support for one-way trusts and two-way cross-forest + transitive trust in winbindd. + * Fixes for Winbind's offline/disconnected logon support when + using remote idmap backends. + * Fix LookupNames and LookupSids to use the same resolution + heuristics as Windows XP. + * Fix lockups in Winbind when running nscd. + * UPN logon support in pam_winbind. + * Add support for GNU linker scripts when build shared libraries + (based on work by Julien Cristau and James + Peach). -To create a trustlationship with SAMBA as the trusted domain: - 1) create the initial trust account for GLASS using - 'smbpasswd -a -i GLASS'. You may need to create a UNIX - account for GLASS$ prior to this step (depending on your - local configuration). - 2) connect the trust from a WINDOWS DC using "User Manager - for Domains" +o Guenther Deschner + * Additional support for decoding and downloading group policy + objects from Active Directory. + * Improvements to "net ads keytab" command. + * Fixes for linking against Heimdal Kerberos client libs. + * Support LDAP range retrieval searches. + * Fixes for failure to refresh user ticket caches in Winbind. + * UPN logon support in pam_winbind. + * Add KDC locator plugin for MIT kerberos 1.6 or later. -Now join winbindd on the Samba PDC to the SAMBA domain using -the normal steps for adding a Samba server to an NT4 domain: -(note that smbd & nmbd must be running at this point) - root# net rpc join -U root - Password: +o Steve Langasek + * Allow SIGTERM to cause nmbd to exit while awaiting a interface + to come up. -Start winbindd and test the join with 'wbinfo -t'. -Now test the trust relationship by connecting to the SAMBA DC -(e.g. POGO) as a user from the WINDOWS domain: +o Volker Lendecke + * Merge experimental cluster support patches from the ctdb branch. + * Add tdb storage abstraction for ctdb. + * Use IDL for internal message passing system. + * Add client support for the SamLogonEx() authentication request. + * Implement RPC proxy stubs in the Samba server code to allow + replacing implementation functions one by one. + * Remove static incoming and outgoing buffers from core server SMB + packet processing code. + * Add "net sam rights" command. - $ smbclient //pogo/netlogon -U Administrator -W WINDOWS - Password: -Now connect to the WINDOWS DC (e.g. CRYSTAL) as a Samba user: +o Steve French + * Fixes for mount.cfs Linux utility. - $ smbclient //crystal/netlogon -U root -W WINDOWS - Password: -###################################################################### -Changes in Winbind -################## +o Stefan Metzmacher + * Fixes for libreplace. + * Add support for LDAP digital signing policy. + * Experimental clustered file system support. -Beginning with Samba3.0.0beta3, winbindd has been given new account -manage functionality equivalent to the 'add user script' family of -smb.conf parameters. The idmap design has also been changed to -centralize control of foreign SID lookups and matching to UNIX -uids and gids. +o Lars Mueller + * Makefile and build fixes. + * Add pam_pwd_expire for pam_winbind (original patch from Andreas + Schneider). -Brief Description of Changes ----------------------------- -1) The sid_to_uid() family of functions (smbd/uid.c) have been - reverted to the 2.2.x design. This means that when resolving a - SID to a UID or similar mapping: +o James Peach + * Fixes for setgroups() and *BSD and Darwin. + * Support membership of >16 groups on Darwin. - a) First consult winbindd - b) perform a local lookup only if winbindd fails to - return a successful answer - There are some variations to this, but these two rules generally - apply. +o Jiri Sasek + * Added vfs_vfsacl module. -2) All idmap lookups have been moved into winbindd. This means that - a server must run winbindd (and support NSS) in order to achieve - any mappings of SID to dynamically allocated UNIX ids. This was - a conscious design choice. -3) New functions have been added to winbindd to emulate the 'add user - script' family of smbd functions without requiring that external - scripts be defined. This functionality is controlled by the 'winbind - enable local accounts' smb.conf parameter (enabled by default). +o Karolin Seeger + * Add deletelocalgroup and unmapunixgroup subcommand to "net sam". + * Cleanup internal passdb functions. - However, this account management functionality is only supported - in a local tdb (winbindd_idmap.tdb). If these new UNIX accounts - must be shared among multiple Samba servers (such as a PDC and BDCs), - it will be necessary to define your own 'add user script', et. al. - programs that place the accounts/groups in some form of directory - such as NIS or LDAP. This requirement was deemed beyond the scope - of winbind's account management functions. Solutions for - distributing UNIX system information have been deployed and tested - for many years. We saw no need to reinvent the wheel. -4) A member of a Samba controlled domain running winbindd is now able - to map domain users directly onto existing UNIX accounts while still - automatically creating accounts for trusted users and groups. This - behavior is controlled by the 'winbind trusted domains only' smb.conf - parameter (disabled by default to provide 2.2.x winbind behavior). +o Simo Sorce + * Fixes for IDmap and Passdb backends. -5) Group mapping support is wrapped in the local_XX_to_XX() functions - in smbd/uid.c. The reason that group mappings are not included - in winbindd is because the purpose of Samba's group map is to - match any Windows SID with an existing UNIX group. These UNIX - groups can be created by winbindd (see next section), but the - SID<->gid mapping is retreived by smbd, not winbindd. +o Andrew Tridgell + * Port ldb from the Samba 4 tree and add ldb group mapping plugin. + * Move several file serving related tdb files to use the dbwrap + API internally. + * Cleanup the GPFS VFS plugin. + * Experimental clustered file system support. -Examples --------- -* security = server running winbindd to allocate accounts on demand +o Jelmer Vernooij + * Implement NDR basic to support utilizing IDL files from Samba 4 + tree for general DCE/RPC parsing stubs. -* Samba PDC running winbindd to handle the automatic creation of UNIX - identities for machine trust accounts - -* Automtically creating UNIX user and groups when migrating a Windows NT - 4.0 PDC to a Samba PDC. Winbindd must be running when executing - 'net rpc vampire' for this to work. - - -###################################################################### -Known Issues -############ - -* The smbldap perl scripts for managing user entries in an LDAP - directory have not be updated to function with the Samba 3.0 - schema changes. This (or an equivalent solution) work is planned - to be completed prior to the stable 3.0.0 release. - -Please refer to https://bugzilla.samba.org/ for a current list of bugs -filed against the Samba 3.0 codebase. ###################################################################### @@ -888,10 +254,13 @@ joining the #samba-technical IRC channel on irc.freenode.net. If you do report problems then please try to send high quality feedback. If you don't provide vital information to help us track down -the problem then you will probably be ignored. +the problem then you will probably be ignored. All bug reports should +be filed under the Samba 3.2 product in the project's Bugzilla +database (https://bugzilla.samba.org/). + -A new bugzilla installation has been established to help support the -Samba 3.0 community of users. This server, located at -https://bugzilla.samba.org/, will replace the existing jitterbug server -and the old http://bugs.samba.org now points to the new bugzilla server. +====================================================================== +== Our Code, Our Bugs, Our Responsibility. +== The Samba Team +======================================================================