Cifs Admin Guide
Cifs Admin Guide
Cifs Admin Guide
1 Administrator's Guide
Copyright 2008 Hewlett-Packard Company, L.P Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendors standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group.
Table of Contents
About This Document.........................................................................................................9
Intended Audience.................................................................................................................................9 Document Organization.........................................................................................................................9 Typographic Conventions...............................................................................................................10 HP Encourages Your Comments..........................................................................................................10
Table of Contents
5 Winbind Support.........................................................................................................59
Overview...............................................................................................................................................59 Winbind Features..................................................................................................................................60 Winbind Process Flow..........................................................................................................................61 Winbind Functionality..........................................................................................................................62 User and Group Mapping.....................................................................................................................63 User Authentication and Host Mapping Process Flow...................................................................63 Group Mapping Process Flow.........................................................................................................64 Disabling Winbind................................................................................................................................65 Configuring HP CIFS Server with Winbind.........................................................................................65 Winbind Configuration Parameters................................................................................................65 A SMB.CONF Example..............................................................................................................66 LDAP Backend Support .......................................................................................................................66 wbinfo Utility........................................................................................................................................66
7 Configuring Printers.....................................................................................................77
Introduction..........................................................................................................................................77 Configuring a Printer Share..................................................................................................................77 Creating the Spool Directory................................................................................................................77 Queue Setup..........................................................................................................................................78 DCPS Print Queues..........................................................................................................................78 TCPIP$TELNETSYM Print Queues.................................................................................................78 LPD Print Queues............................................................................................................................79 LPD Print Queue Setup..............................................................................................................79 Installing Printer Drivers......................................................................................................................80 Manual Driver Installation..............................................................................................................80 Automatic Driver Installation.........................................................................................................80 Creating the PRINT$ Share.............................................................................................................81
8 Tool Reference..............................................................................................................83
HP CIFS Management Tools.................................................................................................................83 smbpasswd .....................................................................................................................................84 Syntax.........................................................................................................................................84 Examples....................................................................................................................................85 pdbedit ............................................................................................................................................85 Syntax.........................................................................................................................................85 Examples....................................................................................................................................88 net ...................................................................................................................................................88 Net Commands..........................................................................................................................88 Syntax for net lookup.................................................................................................................89 Examples...............................................................................................................................89 Syntax for net user......................................................................................................................89
Table of Contents 5
Examples...............................................................................................................................90 wbinfo .............................................................................................................................................91 Syntax.........................................................................................................................................91 Examples....................................................................................................................................92 smbclient..........................................................................................................................................93 Syntax.........................................................................................................................................93 Examples....................................................................................................................................94 smbstatus.........................................................................................................................................95 Syntax.........................................................................................................................................95 Examples....................................................................................................................................95 nmblookup......................................................................................................................................96 Syntax.........................................................................................................................................96 Examples....................................................................................................................................97 smbshow..........................................................................................................................................97 Examples....................................................................................................................................97 Smbver.............................................................................................................................................98 Example......................................................................................................................................98 SAMBA$DEFINE_COMMANDS.COM..........................................................................................98 SAMBA$GATHER_INFO.COM......................................................................................................98 testparm...........................................................................................................................................98 Syntax.........................................................................................................................................98 Example......................................................................................................................................99 tdbbackup........................................................................................................................................99 Syntax.........................................................................................................................................99 Tdbdump.......................................................................................................................................100 Syntax.......................................................................................................................................100 smbcontrol.....................................................................................................................................100 Syntax.......................................................................................................................................100 Example...............................................................................................................................101
Index...............................................................................................................................107
Table of Contents
List of Figures
3-1 3-2 3-3 3-4 3-5 3-6 3-7 4-1 5-1 5-2 5-3 6-1 Standalone HP CIFS Server as a PDC...........................................................................................36 Standalone HP CIFS Server as a PDC with EDS backend.............................................................37 Multiple HP CIFS Servers with EDS backend...............................................................................37 Windows Domain..........................................................................................................................44 An example of the ADS Domain Model.......................................................................................45 Direction of Trust...........................................................................................................................50 Active Directory............................................................................................................................51 CIFS Authentication with LDAP Integration................................................................................55 Winbind Process Flow...................................................................................................................61 User Authentication and Host Mapping Process Flow................................................................63 Group Mapping Process Flow.......................................................................................................64 Modifying ACE Permissions.........................................................................................................73
List of Tables
1 1-1 2-1 2-2 4-1 5-1 Typographic Conventions.............................................................................................................10 Files and Directory Description.....................................................................................................13 Files Retained During Installation.................................................................................................21 SYSMAN Utility............................................................................................................................29 Global LDAP Parameters..............................................................................................................57 Global Parameters.........................................................................................................................65
List of Tables
Intended Audience
This document is intended for OpenVMS system administrators and network administrators. For more information about the HP CIFS Server, see the HP CIFS Server documentation: http://h71000.www7.hp.com/doc/CIFS.html
Document Organization
The document is organized as follows: Chapter 1 Introduction to the HP CIFS Server Introduces the HP CIFS Server architecture, summarizes the available documentation resources, and provides the product roadmap. Installing and Configuring the HP CIFS Server Describes the procedure to install and configure the HP CIFS Server. HP CIFS Deployment Model Describes how to configure the roles that an HP CIFS Server can play in an NT style domain, whether it is a Samba Domain model, consisting solely of HP CIFS Servers, or as an NT Domain with a Microsoft NT Primary Domain Controller (PDC). LDAP Integration Support Describes how to install, configure, and verify the HP Enterprise Directory, HP LDAP Integration product, and HP CIFS Server software with LDAP feature support. Winbind Support Describes how to set up and configure the HP CIFS Server with the winbind support. Managing Users, Groups, and File Access Describes how to manage users and groups on the HP CIFS Server. This chapter also describes how to set and modify file access controls either from the OpenVMS host or from a Windows domain member. Configuring Printers Describes how to configure Print Services on systems running HP CIFS Server software. Tool Reference Describes some of the management tools included with HP CIFS for OpenVMS, including many native Samba utilities such as pdbedit and smbclient. Sample Installation and Removal Procedure Provides sample installation and removal procedures for HP CIFS Server.
Chapter 2 Chapter 3
Chapter 4
Chapter 5 Chapter 6
Chapter 7 Chapter 8
Appendix A
Intended Audience
Typographic Conventions
Table 1 lists the typographic conventions used in the document. Table 1 Typographic Conventions
Convention ... Description A horizontal ellipsis in a figure or example indicates the following possibilities: Additional optional arguments in a statement have been omitted. The preceding item or items can be repeated one or more times. Additional parameters, values, or other information can be entered. A vertical ellipsis indicates the omission of items from a code example or command format; the items are omitted because they are not important to the topic being described. In command format descriptions, parentheses indicate that you must enclose choices in parentheses if you specify more than one. In installation or upgrade examples, parentheses indicate the possible answers to a prompt, such as: Is this correct? (Y/N) [Y]. In command format descriptions, brackets indicate optional choices. You can choose one or more items or no items. Do not type the brackets on the command line. However, you must include the brackets in the syntax for OpenVMS directory specifications and for a substring specification in an assignment statement. In command format descriptions, braces indicate required choices; you must choose at least one of the items listed. Do not type the braces on the command line. This typeface indicates code examples, command examples, and interactive screen displays. In text, this type also identifies website addresses, OpenVMS command and pathnames, PC-based commands and folders, and certain elements of the C programming language. Italic type indicates important information, complete titles of manuals or variables. Variables include information that varies in system output (for example, Internal error number), in command lines (/PRODUCER=name), and in command parameters in text (where dd represents the predefined code for the device type). Uppercase indicates the name of a command, routine, file, file protection code, or the abbreviation of a system privilege. A hyphen at the end of a command format description, command line, or code line indicates that the command or statement continues on the following line. A warning calls attention to important information that if not understood or followed will result in personal injury or nonrecoverable system problems. A caution calls attention to important information that if not understood or followed will result in data loss, data corruption, or damage to hardware or software. This alert provides essential information to explain a concept or to complete a task. A note contains additional information to emphasize or supplement important points of the main text.
... ()
[]
{} Example
italic type
10
11
When using the HP CIFS Server product, HP recommends that you refer to The Samba HOWTO Collection, Samba-3 by Example, and Using Samba, 2nd Edition. All three books are also available through the Samba Web Administration Tool (SWAT). IMPORTANT: The book Using Samba, 2nd Edition describes a previous version of Samba (V.2.0.4). However, much of the information in Using Samba, 2nd Edition is applicable to this version of the HP CIFS Server. Readers should always use the SWAT help facility for the most definitive information on the HP CIFS Server. NOTE: Non-HP Samba documentation might include descriptions of features and functionalities planned for future releases of Samba. The authors of these books do not always provide information indicating which features are in existing release and which features will be available in future Samba releases. Not all the features that are available on Samba UNIX/Linux are applicable to HP OpenVMS CIFS. For OpenVMS specific features, see the HP OpenVMS CIFS Release Notes.
12
SAMBA$ROOT:[LIB]SMB.CONF SAMBA$ROOT:[UTILS]
13
14
NOTE: The HP CIFS Server source code files are not required for execution of HP CIFS Server. You can choose not to install them or you can remove them. The source code backup saveset is available at the location SAMBA$ROOT:[SRC].
Software Requirements
The software requirements for the HP CIFS Server are: OpenVMS Alpha Version 8.2 or 8.3 OpenVMS Integrity servers Version 8.21 or 8.3 or 8.31H1 TCP/IP Services or MultiNet or TCPware the transport software to support the network protocols used by other servers and network clients
15
NOTE: You must install the latest C RTL (C Run-Time Library) ECO kits before installing the HP CIFS Server kit. The latest C RTL ECO kits can be downloaded from the following web address: ftp://ftp.itrc.hp.com/openvms_patches
$ PRODUCT EXTRACT RELEASE_NOTES SAMBA/FILE=file_name.txt/SOURCE=directory-path If the file name is not specified, the release notes are written to a file called CIFS_REL_NOTES.TXT in the current directory. If the destination qualifier is not specified, PCSI extracts the release notes to the current directory. After the installation completes, you can read the release notes or print the file from SYS$HELP:CIFS_REL_NOTES.TXT.
Preinstallation Tasks
This section lists the preinstallation tasks you must complete before installing HP CIFS Server software on your system.
16
NOTE: The above command applies only if the system is running TCP/IP Services for OpenVMS. If you are running MultiNet or TCPWare, see the MultiNet Installation and Administrator's Guide and the TCPware Management Guide to verify the status of the transport.
2.
and METRIC Server to create a TCP/IP cluster name. The TCP/IP cluster name that is specified in the load broker configuration file has to be the same as the "CIFS cluster alias" name (whatever is specified in the NETBIOS NAME parameter in SMB.CONF) as this the name that gets registered in the DNS name space. For more information on the configuration of the Load Broker and Metric Server, see TCP/IP Services for OpenVMS Management and TCP/IP Services for OpenVMS Concepts and Planning. You can also register Cluster name as a multihomed entry in WINS, unless the WINS server resides in the same IP sub-net as the CIFS for OpenVMS server. For more details, see step 6. If you are running Multinet or TCPware, see the Process software documentation for more details regarding how load balancing and failover can be implemented. 6. The HP CIFS Server cluster should not be configured to use a WINS server because each HP CIFS cluster node attempts to register the HP CIFS cluster name as a Unique (NetBIOS) name rather than a Group name, which is not allowed. WINS will prevent the second and subsequent cluster members that start HP CIFS from associating their IP address with the cluster name in WINS. This restriction will be addressed in future release. The WINS server restriction should not present a problem for clients as they (typically) resolve names using DNS queries. However, the inability to use a WINS server may present problems for the HP CIFS Servers if there are no domain controllers on the same IP subnet as the HP CIFS cluster members. In this case, use the SAMBA$ROOT:[LIB]LMHOSTS. file to map the IP address of remote domain controllers to their respective names (including the special names that only domain controllers register).
7.
If you are installing HP CIFS Server on a cluster that does not have a common disk, you must install the HP CIFS Server software on each node separately and configure each node separately. If you are installing HP CIFS Server on a cluster node running OpenVMS Version 8.2 or Version 8.2-1, you must install HP CIFS Server on each node separately, and these systems must use separate SAMBA$ROOT directory trees and care must be taken to prevent users from accessing the same files simultaneously on multiple cluster members (that is, offer a share only from one cluster member). If you are installing HP CIFS Server on a cluster node running OpenVMS Version 8.3 and higher, you can have common SAMBA$ROOT directory tree in a cluster node. If you are installing HP CIFS Server on a standalone server you can have a separate SAMBA$ROOT directory tree on each node. NOTE: Ensure that nodes with Version 8.2 or earlier and Version 8.3 and higher, does not share a common location as a share to avoid corruption. This limitation is due to the locking feature as it does not work across Version 8.2 or earlier and Version 8.3 and higher versions. For more information, see OpenVMS Cluster Considerations (page 18). If the HP CIFS cluster nodes use separate system disks, the installation does not accommodate such environments; thus, the following actions must be accomplished to update any other applicable system disks: The following files must be copied from the installation node system disk to SYS$COMMON:[SYS$STARTUP] on the other applicable system disk(s): SAMBA$DEFINE_ROOT.COM SAMBA$STARTUP.COM SAMBA$SHUTDOWN.COM The TCP/IP service definitions for the SMBD and SWAT services must be added to the service database. The best way to accomplish this is to run the HP CIFS configuration procedure on any one HP CIFS cluster member that boots from that system disk: $ @SYS$STARTUP:SAMBA$DEFINE_ROOT
OpenVMS Cluster Considerations 19
$ @SAMBA$ROOT:[BIN]SAMBA$CONFIG
20
All the backed up data will remain in the SAMBA$ROOT:[BACKUP_RESTORE] directory after installation. NOTE: When installing a product that is already installed, the PCSI utility requires the new kit be installed to the same location as the existing kit (and will ignore the /DESTINATION qualifier, if specified). To change the product destination, see Moving the SAMBA$ROOT Directory (page 21). To upgrade the HP CIFS Server software, follow these steps: 1. 2. Log into the SYSTEM account or a privileged account. Shutdown HP CIFS Server: $ @SYS$STARTUP:SAMBA$SHUTDOWN NOTE: If HP CIFS Server is running on multiple cluster members that share the same SAMBA$ROOT: directory, shutdown HP CIFS Server on all cluster members. 3. Start the PCSI utility: $ PRODUCT INSTALL SAMBA NOTE: To stop the installation at any time, press Ctrl+Y.
21
Postinstallation Tasks
After the installation completes, follow these steps: 1. Verify if the SAMBA$ROOT logical is set: $ SH LOG SAMBA$ROOT
"SAMBA$ROOT" = "NEWTON$DKA100:[SAMBA.]"
If the logical name is not defined, execute the following command: $ @SYS$STARTUP:SAMBA$DEFINE_ROOT If you are installing HP CIFS Server on a cluster, this logical will be defined only on the NODE where HP CIFS Server is installed. 2. Execute the SAMBA$ROOT:[BIN]SAMBA$CONFIG.COM command procedure. This command procedure will add TCP/IP services, SMBD, SMBD445, and SWAT and the logical names required by HP CIFS. Verify if the TCP/IP services, such as SMBD and SWAT, exist and also ensure that SWAT service is enabled. For example, if the system is running TCP/IP Services for OpenVMS, enter the following commands: $ TCPIP SH SERVICE SMBD445
Service SMBD445 Service SMBD Service SWAT Port 445 Port 139 Port 901 Proto TCP Proto TCP Proto TCP Process SMBD445 Process SMBD Process SWAT Address 0.0.0.0 Address 0.0.0.0 Address 0.0.0.0 State Disabled State Disabled State Disabled
3.
NOTE: 4.
Execute @SAMBA$ROOT:[BIN]SAMBA$DEFINE_COMMANDS.COM to define symbols for all the HP CIFS utilities. This command procedure also defines symbols, namely, SMBSTART, SMBSTOP, SMBSHOW, and SMBVERSION. NOTE: Edit the login.com and add the below line.
$ @SAMBA$ROOT:[BIN]SAMBA$DEFINE_COMMANDS.COM This will ensure all the HP CIFS commands will be available after login. 5. On OpenVMS Alpha Version 8.2 and OpenVMS Integrity servers Version 8.2-1 define the following logical: $ DEFINE/SYSTEM SAMBA$VMS_FCNTL 1 This logical is required as FCNTL byte range locking feature is not available on OpenVMS Alpha Version 8.2 and OpenVMS Integrity servers Version 8.2-1. For more information on the byte range locking restriction, see OpenVMS Cluster Considerations (page 18).
22
23
Section Description
Each section in the SMB.CONF file represents a share on the HP CIFS Server. The section "global" is special because it contains settings that apply to the whole HP CIFS Server and not to one share in particular. There are three special sections, [global], [homes], and [<file/printer share-name>], which are described under Special Sections. Special sections [global] section Parameters in this section apply to the server as a whole or are defaults for sections which do not specifically define certain items. [homes] section This section is included in the configuration file. Services connecting clients to their home directories can be created on the fly by the server. [file/printer share-name>] section This section is included in the configuration file and if the Printable parameter is set to YES, this share functions as a printer share. If the Printable parameter is set to NO, this share functions as a file or disk share.
24
Parameters Parameters define the specific attributes of sections. Following are the two types of parameters: Global Parameters - Parameter specific to the [global] section. For example, workgroup, security, and so on. Service Parameters - Parameter specific to the service-specific section. They are usable in all sections, for example, browsable. For more information on configuration (SMB.CONF), see the following web address:
NOTE:
http://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html Verify the Configuration File Enter the following command to verify the contents of the SMB.CONF file: $ TESTPARM TESTPARM examines the SMB.CONF file for syntax errors and reports any found, along with a list of the services. NOTE: If the TESTPARM reports no problems, it is NOT a guarantee that the services specified in the configuration file will be available or will operate as expected.
Sample Configuration File (SMB.CONF)
[global] server string = Samba %v running on %h (OpenVMS) security = user passdb backend = tdbsam domain master = yes guest account = SAMBA$GUEST domain logons = Yes log file = /samba$root/var/log.%m log level = 0 load printers = no printing = OpenVMS [homes] comment = Home Directories browsable = no read only = no create mode = 0750 [HPLASER] path = /var/tmp printable = yes min print space = 2000 [test1] browsable = yes writeable = yes path = /DKA0/users/test1
Configuring HP CIFS Server 25
Supported Backend
This section describes the supported backend that can be specified in the SMB.CONF file by setting the "passdb backend = <database> parameter in the [global] section.
smbpasswd Backend
This backend enables you to store user name and passwords similar to UNIX (/etc/passwd). By default, it stores the information in the smbpasswd file. It contains the LanMan or NT password hashes, password change times, and account flags information. This is a primitive type password backend that has several disadvantages that has been overcome by the tdbsam and ldapsam password backends.
TDBSAM Backend
This backend enables you to store user and machine account in a TDB database. By default, it stores the information in SAMBA$ROOT:[PRIVATE]PASSDB.TDB. The contents of the TDB file can be viewed using the TDBDUMP or pdbedit utility. This is the default password backend for the HP CIFS Server.
LDAPSAM Backend
This backend enables you to store both POSIX (UNIX) and CIFS user and group account information in a single repository. For more information about LDAPSAM backend, see Chapter 4 (page 53).
2.
26
3.
Configure a generic, cluster-wide SMB.CONF file in the SAMBA$ROOT:[LIB] directory, which will be used by all cluster members running HP CIFS Server and which contains parameters and share definitions applicable to all. The [global] section of this common SMB.CONF file must contain the following "INCLUDE" parameter so the appropriate node-specific configuration file is loaded:
include = SAMBA$ROOT:[LIB]SMB.CONF_%h
%h is one of several environment variables that may be used in the configuration files to fine-tune the configuration. For more information see the SMB.CONF manpage at http:// www.samba.org/samba/docs/man/manpages- 3/smb.conf.5.html. The [global] section must also contain the cluster name definition in the parameter: netbios name = <TCPIP-cluster-alias-name>
For Japanese or Chinese character set support, configure SMB.CONF file and add the following line to the [global] section: [global] dos charset = <user local codepage> unix charset = UTF-8 vfs objects = vtf NOTE: For more information on the VTF module, see Limitations section in the HP OpenVMS CIFS Release Notes for using the VTF module. where: [<user local codepage>] is Windows codepage of the user. The value "CP850" is the default Windows codepage for English. For Japanese Windows, the value is "SJIS" or "CP932". By default, the SMB.CONF file will have the following configuration settings for character set support: [global] dos charset = CP850 unix charset = UTF-8 NOTE: The character set applies only to the characters in the file names and not the contents of the files.
To start HP CIFS Server on all cluster nodes at the same time, ensure that you are logged in to the SYSTEM account on one of the member nodes, and then run SYSMAN. Table 22 lists the SYSMAN utility commands. Table 2-2 SYSMAN Utility
Enter this command... $ RUN SYS$SYSTEM:SYSMAN SYSMAN> SET ENVIRONMENT/NODE=(node1,node2,...) To... Start the SYSMAN utility. Define the OpenVMS Cluster members on which to start the server. For example, SYSMAN> SET ENVIRONMENT/NODE=(SPEEDY,SPIN,SPAN) SYSMAN> DO @SYS$STARTUP:SAMBA$STARTUP.COM Start the HP CIFS Server on all the nodes you defined in the previous command. SYSMAN> EXIT Exit the SYSMAN utility.
29
Logs NMBD log files will be generated after startup. The SAMBA$NMBD_<node-name>.log files are stored in SAMBA$ROOT:[VAR]. SMBD log files will be generated for each client that utilizes the HP CIFS Server. By default, these log files are stored in SAMBA$ROOT:[VAR] as specified by the SMB.CONF parameter log files. When you run the executable in the "-i" interactive mode, all the debug messages will be displayed on the screen and you can also know where exactly the SMBD process is hanging or aborting. SAMBA$ROOT:[BIN]SAMBA$GATHER_INFO.COM - This is the command procedure that gathers information and data files and creates a backup save set file for reporting problems. Packet sniffer (Wireshark, Microsoft Network Monitor, etc.) can be used to capture the network traces between the client and sever. The System Dump Analyzer can be used to analyze the process details. Ensure that "name of the services startup command file" points to the appropriate startup command procedure for the SMBD startup. To verify, enter the following command: $ TCPIP SHOW SERVICE SMBD/FULL For example,
$ TCPIP SHOW SERVICE SMBD445/FULL Service: SMBD445 State: Enabled Port: 445 Protocol: TCP Address: 0.0.0.0 Inactivity: 5 User_name: SAMBA$SMBD Process: SMBD445 Limit: 500 Active: 0 Peak: 0 File: SAMBA$ROOT:[BIN]SAMBA$SMBD_STARTUP.COM Flags: Listen Socket Opts: Rcheck Scheck Receive: 0 Send: 0 Log Opts: Acpt Actv Dactv Conn Error Exit Logi Logo Mdfy Rjct TimO Addr TimO Addr File: SAMBA$ROOT:[VAR]SAMBA$SMBD_STARTUP.LOG Security Reject msg: not defined Accept host: 0.0.0.0 Accept netw: 0.0.0.0 $ TCPIP SHOW SERVICE SMBD/FULL Service: SMBD State: Enabled Port: 139 Protocol: TCP,UDP Address: 0.0.0.0 Inactivity: 0 User_name: SAMBA$SMBD Process: SMBD Limit: 100 Active: 1 Peak: 1 File: SAMBA$ROOT:[BIN]SAMBA$SMBD_STARTUP.COM Flags: Listen Socket Opts: None Receive: 0 Send: 0 Log Opts: Acpt Actv Dactv Conn Error Exit Logi Logo Mdfy Rjct TimO Addr File: SAMBA$ROOT:[VAR]SAMBA$SMBD_STARTUP.LOG Security Reject msg: not defined Accept host: 0.0.0.0 Accept netw: 0.0.0.0
30
NOTE:
Ensure that all the settings and log files are accessible.
For example,
C:\ NBTSTAT -A 16.148.18.31 Local Area Connection: Node IpAddress: [16.38.47.15] Scope Id: [] NetBIOS Remote Machine Name Table Name Type Status -----------------------------------------NEWTON <00> UNIQUE Registered NEWTON <03> UNIQUE Registered NEWTON <20> UNIQUE Registered LANGROUP <00> GROUP Registered LANGROUP <1C> UNIQUE Registered LANGROUP <1E> GROUP Registered MAC Address = 00-00-00-00-00-00
3.
Connect from a client by entering the following address at the RUN prompt.
\\<ip-address-of-CIFS-server> OR <name of the server>
a.
The Enter Network Password screen is displayed. Enter the domain\user name in the User Name field and the password in the Password field. Click OK. A list of shared folders and files are displayed.
b.
NOTE: If HP CIFS Server is configured as a member server to a domain <domain-name>, then you need to prefix the <user-name> with the "<domain-name>\ as shown: <domain-name>\<user-name>
31
3.
6.
Specify disk cluster size as a multiple of 16. You can achieve this during disk initialization by executing the command: $ INITIALIZE disk /CLUSTER=16*n Where: n can range from 1 onwards.
7.
Add the following line in SAMBA$ROOT:[BIN]SAMBA$SMBD_STARTUP.COM: $ SET RMS_DEFAULT /EXTEND_QUANTITY=10240/BLOCK_COUNT=n/BLOCK_COUNT=8 NOTE: Where: n is 124 for EVA, 96 for XP, and 127 for all other disk types. Specify extend_quantity in the multiple of 16 blocks.
8.
Disable Large File Copy Whenever a copy to the server operation is initiated the HP CIFS Server by default starts copying the file without prior allocation. This enables copying large files without time out. If you want the server to allocate the space before starting the copy operation define the following logical: $ DEFINE/SYSTEM SAMBA$DISABLE_LARGE_FILE_COPY 1
32
Since server takes some time to respond to the client as it needs to allocate the space, the large file copy to the server might fail, if the above logical is defined. 9. Execute the following command periodically on the directory containing large number of variable-length record formatted files. $ ANALYZE/RMS/UPDATE_HEADER <filespec> NOTE: The above command updates the "file length hint" fields of the file headers on ODS-5 disks. If these fields are invalidated, HP CIFS Server calculates the actual number file size by reading the contents of the file. This deteriorates the performance.
Special Concerns when Using HP CIFS Server on a Network File System (NFS)
Both NFS and CIFS provide file system access to a file storage from multiple systems. However, controlling access to files, particularly files open for write access, from NFS and CIFS systems simultaneously are not supported. Since NFS and CIFS have their own way of locking mechanism which is not known to each other, it will not be able to synchronize access to a specific resource.
33
of the SMB.CONF file, NMBD process will write or store the unwanted datagram (UDP) packets to the unexpected.tdb file: [global] store dgpackets = yes require strongkey require strongkey is VMS specific SMB.CONF parameter which is specified in the [global] section. Setting require strongkey to 'YES' specifies that an HP CIFS Server must use a strong (128 bit) session key. If the domain controller on the other side of the channel does not support strong (128 bit) session keys, then the HP CIFS server will refuse to establish a secure channel. [global] require strongkey = yes NOTE: This registry parameter should be set to 'YES' only when all the other domain controllers support strong keys. Only Windows 2000 and above supports strong keys. Token sid limit Token sid limit is a VMS specific SMB.CONF parameter which is specified in the [global] section. It indicates the maximum number of domain groups to which an user can belong. By default, this parameter is set to 750.
34
Domain Roles
This section describes how to configure an HP CIFS Server for different domain roles.
Domain Roles
35
Domain users may access resources of Domain Member servers such as file and printer shares. Member servers authenticate domain users by passing user authentication requests to domain controllers for processing.
Figure 3-1 shows a standalone HP CIFS Server as a PDC with the local password database: Figure 3-1 Standalone HP CIFS Server as a PDC
HP CIFS PDC
CIFS users
Figure 3-2 shows a standalone HP CIFS Server as a PDC using the Enterprise Directory Server (EDS) as an LDAP backend:
36
HP CIFS PDC
Figure 3-3 shows multiple HP CIFS Servers using Enterprise Directory Server as an LDAP backend: Figure 3-3 Multiple HP CIFS Servers with EDS backend
HP CIFS PDC EDS LDAP Server HP CIFS BDC CIFS Users HP CIFS Member Server password backend: ldapsam
The Samba Domain Deployment Model consists of a HP CIFS Server configured as a Primary Domain Controller (PDC), and one or more HP CIFS Servers acting as Backup Domain Controllers (BDCs). The PDC, BDCs, and member servers use the central LDAP backend to consolidate CIFS accounts on the LDAP directory.
WINS is used for multi-subnetted environments. Multi-subnetted environments require name-to-IP-address mapping to go beyond broadcast limits of a IP-subnet. PC client configurations also can specify the WINS server address to ensure that they are able to address systems outside their IP-subnet boundary. To configure the HP CIFS Server as a WINS client, use the SMB.CONF global parameter wins server and specify the IP address of the WINS server. At this time, the HP CIFS Server does not support being a WINS server.
38
Limitations The following is a list of limitations for the PDC support: HP CIFS Server cannot create Security Account Management (SAM) update delta files. It cannot interoperate with a PDC to synchronize the SAM from delta files that are held by a BDC. The HP CIFS Server PDC does not support replication to BDCs. Running BDCs with a backend other than LDAP can prove difficult if not impossible to keep account information synchronized. See the Table 5.1, Domain Backend Account Distribution Option, in the Official Samba3 HOWTO and Reference Guide for more information on possible domain design configurations using LDAP.
HP CIFS Server does not implement a true SAM database and nor its replication. HP CIFS Server implementation of BDCs is very much like a PDC with one important difference. A BDC is configured like a PDC except the smb.conf parameter, domain master, must be set to no. NOTE: security: Set this parameter to user to ensure that Windows users, client machine accounts, and passwords are stored and managed in the passdb backend . domain master: Set this parameter to no in order for the HP CIFS Server to act as a BDC. domain logon: Set this parameter to yes to provide netlogon services. Encrypt passwords: You set this parameter to yes, the passwords used to authenticate users are encrypted. You must set this parameter to yes when you configure HP CIFS Server to act as a BDC. Synchronizing the Account Database between the BDC and the PDC Unlike Advanced Server and Windows domain controllers, automatic replication of the user accounts database is not possible between a HP CIFS PDC and HP CIFS BDCs To accomplish the same goal, HP CIFS requires the assistance of LDAP servers. By configuring the HP CIFS PDC and HP CIFS BDCs to use the LDAP backend, replication of the accounts database is achieved by virtue of the synchronization occurring between LDAP servers. HP CIFS can use the LDAP backend to store and obtain user and group account information in the LDAP directory (such as HP Enterprise Directory or an OpenLDAP server). Though a single LDAP server can be used for both the HP CIFS PDC and BDCs, it is highly recommended that separate LDAP servers be used by the HP CIFS PDC and BDCs for high availability and better performance. If tdbsam is specified as the passdb backend, the replication between the BDC and PDC can be achieved by executing the following command: $ NET RPC VAMPIRE -S [NT netbios name or IP] -W [domainname] U administrator%password
40
41
The account can be viewed like any other account, but the complete account name, which includes the dollar sign must be specified; for example: $ pdbedit --list --verbose winstatn01$ 3. Now that the necessary accounts exist, the Windows workstation may be added to the domain by an Administrator. From the Windows client, follow these steps: a. Logon as any user. b. Right-click on My Computer and select Properties. c. Select the Computer Name tab. d. Click the Change button. e. In the "Member of" section, select the Domain option and specify the NetBIOS domain name of the HP CIFS domain. Click OK. f. When prompted, enter the credentials of a domain administrator. If successful, the system will display a message welcoming you to the domain. Click OK. g. Click OK to acknowledge the message indicating the system must be rebooted. h. Click OK to complete the name change and reboot. After the system reboots the Windows Security logon screen appears. Enter a domain 'username' and 'password'. From the Logon to drop-down box, select the domain name. If the Logon to box is not present, click the Options button to expose it.
When the computer account is created prior to the HP CIFS server joining the domain, the HP CIFS server administrator need not supply a domain user name and password of an account
42 HP CIFS Deployment Models
with rights to add computers to the domain. In this case, after configuring the SMB.CONF file appropriately, join the domain by executing the command: $ NET RPC JOIN If the computer account for the HP CIFS server was not created prior to joining the domain, the administrator must supply the username and password of a domain account with rights to add computers to the domain. For example, the Administrator account. To join a domain and create a machine account (or resync the password of an existing machine account), execute the command: $ NET RPC JOIN --user <username> For more information on member server configuration, see A sample SMB.CONF file For an HP CIFS ADS Member Server (page 45). NOTE: 1. HP CIFS does not need to be started before executing the $ NET RPC JOIN command. 2. As specified above, the command is dependent upon the ability to locate the PDC of the domain using standard NetBIOS name resolution methods, including WINS (if SMB.CONF contains a valid wins server entry), entries in an lmhosts. file, or using broadcasts on the local subnet. Use the nmblookup tool as described in Chapter 8 (page 83) to determine if NetBIOS name resolution is effective. 3. Alternately, the $ NET RPC JOIN command provides options to designate the name (--server) or the IP address (--ipaddress) of the domain PDC. If the name is specified, $ NET RPC JOIN will use NetBIOS name resolution to resolve the name to its IP address. 4. The $ NET RPC JOIN command will not make use of the "password server" parameter if specified in the SMB.CONF file. 5. Use the command $ NET RPC TESTJOIN any time after joining the domain to verify the server is joined to the domain properly.
43
LDAP
winbind
Windows NT BDC
windows users
In the Windows Domain Model, HP CIFS Server can join a Windows domain as a member server with Windows NT or Windows 200x domain controllers. HP CIFS Server supports winbind to provide User ID (UID) and Group ID (GID) mappings for Windows users. For a larger deployment environment, you can use the LDAP directory to maintain unique ID maps across multiple HP CIFS Servers.
44
windows users
winbind idmaps
create mode = 0664 directory mode = 0775 [share1] path = /tmp read only = no [tmp] path=/tmp read only = no browseable = yes writable = yes
The following is a sample HP CIFS configuration File, SAMBA$ROOT:[LIB]SMB.CONF, used for an HP CIFS Server machine hpcif54 acting as a ADS member server in the sample ADS Domain Model with passdb backend as tdbsam:
###################################################### # # An sample smb.conf file for an HP CIFS ADS member server # # Global Parameters [global] # Domain Name workgroup = hpcif23_dom server string = CIFS Server as a domain member of hpcif23_dom security = domain netbios name = hpcif54 encrypt passwords = yes password server = hpcifs23 passdb backend = tdbsam log level = 0 log fie = /samba$root/var/log.%m max log size = 1000 host msdfs = no # For idmap configuration of winbind idmap uid = 1000-10000 idmap gid = 1000-10000 [homes] comment = Home Directory browseable = no writable = yes create mode = 0664 directory mode = 0775 [share1] path = /tmp read only = no [tmp] path=/tmp read only = no browseable = yes writable = yes
46
NOTE: HP CIFS Server supports several ways to allocate and map OpenVMS users and groups to domain users and groups. If winbind is used, winbind can create and maintain mappings for users and groups. For more information about winbind mapping, see User and Group Mapping (page 63). If winbind is not used, a local OpenVMS account associated with each Windows user and group must be created.
Roaming Profiles
The HP CIFS Server, configured as a PDC, supports Roaming Profiles with the following features: A user's environment, preference settings, desktop settings, etc. are stored on the HP CIFS Server Roaming Profiles can be created as a share, and be shared between Windows clients When a user logs on to a workstation in the domain, the roaming profile is downloaded from the share which is on a HP CIFS Server configured as a PDC, to the local machine. Upon logout, the profile is copied back to the server
Configuring Roaming Profiles Use the following procedure to configure roaming profiles: 1. Modify or enable roaming profiles by using the global parameter named logon path, in the smb.conf file. Example: [global] #%L substitutes for this servers NetBIOS name, %U is user name logon path = \\%L\profile\%U workgroup = SAMBADOM security = user encrypt passwords = yes domain logon = yes 2. Create a [profiles] share for roaming profiles. Set profile acls = yes for the profile share used for the user profile files. Do not set profile acls = yes on normal shares as this will result in incorrect ownership of the files created on those shares. The following is an example configuration for the [profiles] share: [profiles] profile acls = yes path = /samba$root/profiles read only = no create mode = 600 directory mode = 770 writeable = yes browseable = no guest ok = no
47
Any logon script should contain valid commands recognized by the Windows client. A logon user should have proper access permissions to execute logon scripts.
The following is an example configuration for user logon scripts: [global] logon script = %U.bat [netlogon] path = /samba$root/netlogon browseable = no guest ok = no
Trust Relationships
Trust relationships enable users authenticated in one domain, commonly referred to as the "trusted" domain, to access resources in another domain, commonly referred to as the "trusting" domain. There are various types of trusts, depending on the domain type. The concept of trusts was introduced in Windows NT domains and has been extended and expanded in Windows Active Directory domains. HP CIFS server supports the same types of trusts supported by Windows NT (and Advanced Server for OpenVMS). The characteristic of these trusts is they are one-way - one domain trusts another but the reverse does not automatically apply. If both domains are to trust each other, then two one-way trusts (commonly referred to as a two-way trust) are required, one in each direction. For more information on trusts, consult the Microsoft Technet papers at http://technet.microsoft.com. The process of establishing a one-way trust involves administration in both domains. An administrator in the trusted domain must first establish the trust in the trusted domain (where the user logons are authenticated) and specify a password which is provided to the administrator of the trusting domain to use when completing the trust establishment in the trusting domain.
is required to complete the trust creation in the trusting domain. The method of establishing the trust in the trusting domain depends on the type of PDC. The procedure for an HP CIFS PDC is covered here. For information on other type of PDCs, refer to the documentation for that system. To complete the trust, use the command below and supply the name of the trusted domain. You will be prompted for the trust password. $ NET RPC TRUSTDOM ESTABLISH <TRUSTED-DOMAIN-NAME> PASSWORD: <TRUST-PASSWORD>
Establishing a Two-way Trust Relationship between an HP CIFS Domain and a Windows Active Directory Domain
Step-by-Step Procedure
1. 2. Configure HP CIFS Server as a PDC. For configuring HP CIFS Server as a PDC, see Configure the HP CIFS Server as a PDC (page 41). If the HP CIFS domain PDC and Windows domain PDC Emulator are not on the same subnet, configure the PDC of both domains to use WINS or add the appropriate entries in the lmhosts. file on both. The following example shows the lmhosts. file entries required on the Windows PDC emulator for the HP CIFS PDC named NEWTON at IP address 16.148.195.74 in domain NEWTONDOM: 16.148.195.74 newton #PRE #DOM:newtondom 16.148.173.74 "newtondom \0x1b" #PRE NOTE: There must be exactly 20 characters between the quotes in the above entry. The domain name must be space-padded to 15 characters, followed by \0x1b. The following example shows the lmhosts. file entries required on the HP CIFS PDC for the Windows PDC Emulator named WINPDC at IP address 16.138.185.206 in domain WINSDOM: 16.138.185.206 WINPDC 16.138.185.206 WINSDOM#1B 3. Establishing the Trust in the Trusted Domain Since this is a two-way trust, you need to establish the trust in both HP CIFS and Windows domain. For more information on establishing the trust in the trusted domain on HP CIFS, see Establishing the Trust in the Trusted Domain (page 48). 4. Establishing the Trust To establish two-way trust, follow these steps:
On Windows PDC
a. b. c. Open Active Directory Domains and Trusts on the Active Directory controller of the domain whose resources you wish HP CIFS users to have access to. Click the Trusts tab, and then click New Trust. The New Trust Wizard appears. Click Next.
Trust Relationships 49
d. e.
Enter the HP CIFS Domain name in the Name box. For example, type newtondom, and then click Next. In the Direction of Trust Window, select Two-way. Figure 3-6 Direction of Trust
f. g. h. i. j.
Click Next, and then select Domain-wide Authentication. Click Next, and then in the Trust password box, type a password for this trust. Type the password again in the Confirm trust password box, and then click Next. In the Confirm Outgoing Trust Window, select Yes, confirm the outgoing trust. In the Confirm Incoming Trust Window, enter the HP CIFS User name and Password. Click Next. NOTE: The user must be a admin user.
On HP CIFS PDC
For more information on establishing the trust in the trusting domain, See Establishing the Trust in the Trusting Domain (page 48). You will be prompted for the password that you entered on your Windows PDC box. NOTE: An error message, "NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT," that may be reported periodically is of no concern and may safely be ignored. It means the password you gave is correct and the NT4 server says the account is ready for interdomain connection and not for ordinary connection. After that, be patient; it can take a while (especially in large networks), but eventually you should see the Success message.
50
You will see the following success message The trust has been validated. It is in place and active.
Trust Relationships
51
52
Overview
Lightweight Directory Access Protocol (LDAP) provides a framework for the development of a centralized management infrastructure. LDAP supports directory enabled computing by consolidating applications, services, user accounts, Windows account, and configuration information into a central LDAP directory. HP CIFS customer sites with large numbers of users and servers may want to integrate the HP CIFS Server with LDAP support. Configuring multiple HP CIFS Servers to communicate with the LDAP directory server provides a centralized and scalable management of user databases. When you integrate the HP CIFS Server with the LDAP product on OpenVMS, the HP CIFS Server can store user account information on the Enterprise Directory Server. The LDAP database can replace tdbsam, or NT server user databases. The LDAP directory can be used to store Windows user information, which had previously been stored in the passdb.tdb file. When the HP CIFS Server is configured to use the LDAP password integration, the SMBD program uses the LDAP directory to look up the Windows user information during the authentication and authorization processes. Also, when you invoke the pdbedit program to add, delete, or change user information, updates are made in the LDAP user database rather than the passdb.tdb file used by the tdbsam backend. You can enable the LDAP support with configuration parameters provided by the HP CIFS Server. HP CIFS Server will access an LDAP directory server for password, user, group, and other data when you set the SMB.CONF passwd backend parameter to ldapsam.
Network Environments
The HP CIFS Server supports many different network environments. Features such as WINS, browser control, domain logons, roaming profiles, and many others continue to be available to support a diverse range of network environments. LDAP integration provides one more alternative solution for HP CIFS user authentication.
Overview
53
54
CIFS Server1
CIFS Server2
4 5 LDAP Protocol
5
The following describes the message exchanges between the Windows PC, CIFS Server, and LDAP directory server for user authentication shown in Figure 4-1: 1. A Windows user requests a connection. 2. The CIFS Server sends a challenge to the Windows PC client. 3. The Windows PC client sends a response packet to the CIFS Server based on the user password and the challenge information. 4. The CIFS Server looks up the LDAP directory server for user data and requests data attributes including password information. 5. The CIFS Server receives data attributes, including password information, from the LDAP directory server. If the password and challenge information match the information in the client response package, the user authentication succeeds. 6. If the user is authenticated and is successfully mapped to a valid OpenVMS user, the CIFS Server returns a user token session ID to the Windows PC client.
55
1.
Invoke Network Control Language (NCL) from a privileged account, and enter the following command to create HP CIFS specific naming contexts: $ MC NCL NCL> CREATE DSA NAMING CONTEXT "/SAMBADOMAIN= <samba_domain_name>" where: /SAMBADOMAIN is part of the DIT structure that is created under LDAP (X500) tree. SAMBA_DOMAIN_NAME is the domain name specified in the DIT structure and also defined in the SAMBA.SC Schema file.
2.
Invoke DXIM, and enter the following command to create HP CIFS specific directory entries: $ DXIM /I=C DXIM> CREATE "/SambaDomainName = <samba_domain_name>" ATTRIBUTES _DXIM>objectClass=(sambaDomain),sambaDomainName="<samba_domain_name>",sambaSID=<SID_VALUE> where: /SAMBADOMAIN is part of the DIT structure that is created under LDAP (X500) tree. SAMBA_DOMAIN_NAME is the domain name specified in the DIT structure and the following sambaDomain, sambaDomainName and sambaSID are defined in the SAMBA.SC Schema file. NOTE: You can obtain the sambaSID value using the NET RPC INFO command. To do so, enter the following command: $ NET RPC INFO "-U" <adminuser%"passwordofadmin">
$ NET RPC INFO "-U" "administrator%Welcome123" Domain Name:NEWTONDOM Domain SID: S-1-5-21-2259843773-1199894201-4032371524 Sequence number: 33677 Num users: 5563 Num domain groups: 55 Num local groups: 58
3.
Create an LDAP admin account in the LDAP directory. Use the distinguished name (dn) of that account as the value for the SMB.CONF global parameter ldap admin dn; for example: ldap admin dn = cn=ldapadmin, cn=users, dc=my-domain, dc=mycompany, dc=com
56
ldap admin dn
ldap delete dn
57
ldap timeout
58
5 Winbind Support
This chapter describes the HP CIFS winbind feature and explains when to use it and how best to configure its use. This chapter addresses the following topics: Overview Winbind Features Winbind Process Flow User and Group Mapping Disabling Winbind Configuring HP CIFS Server with Winbind LDAP Backend Support
Overview
HP CIFS Server must resolve the fact that OpenVMS and Microsoft Windows use different technologies to represent user and group identity. Winbind is an HP CIFS feature which is one of several different ways in which HP CIFS can map the Windows implementation of user and group security identifiers, SIDs, to the OpenVMS implementation of user and group identifiers, UIDs, and GIDs. The purpose of winbind is to automate the creation of UIDs and GIDs and maintains their correspondence to the appropriate Windows SIDs to minimize identity management efforts. Winbind must be understood before you configure HP CIFS Server because choosing an appropriate configuration for your environment is the key to minimize IT management problems. Choosing the best way to map identities for your environment is important because directories and files populate file systems with permissions based on the identities of the owners. Over time, the difficulty of changing user maps will increase unless the proper configuration is chosen initially. This chapter will help you understand winbind and configure HP CIFS appropriately. For more information about winbind, see Samba 3.0 HOWTO Reference Guide at the following web address: http://us3.samba.org/samba/docs/man/Samba-HOWTO-Collection/ NOTE: You can refer the Samba 3.0 HOWTO Reference Guide for the winbind functionality as it remains same on HP CIFS for OpenVMS, but the implementation method is different.
Overview
59
Winbind Features
Winbind provides the following features: User and group ID allocation When winbind is presented with a Windows SID, for which there is no corresponding UID and GID, winbind generates a UID and GID. Depending on the configuration, winbind uses the following algorithm for creating IDs: Local increment Winbind default settings result in ID values based on a simple increment above the current highest value within a defined range. The pool of values is confined to the local HP CIFS Server. WARNING! You can back up and restore the idmap file to avoid recreating the UID and GID maps. The local increment model requires the idmap file to be backed up frequently. The solution is limited by the fact that UID and GID values may differ between systems for the same Windows user. Also, if the idmap file is recreated, the UID and GID maps could differ from the previous map which can lead to serious security issues (file ownership may change). ID mapping Winbind creates mappings between Windows SIDs and corresponding OpenVMS UIDs and GIDs. Winbind uses the method described above to create a mapping between OpenVMS UIDs/GIDs and Windows SIDs. With a Windows SID, winbind either finds the existing UID and GID map or creates a new map if none currently exists. Identity storage Winbind maintains a database where it stores the mappings between OpenVMS UIDs and GIDs and Windows SIDs. In the simplest case, winbind maintains the database in a local Trivial Data Base (TDB) file called winbind_idmap.tdb in the directory SAMBA$ROOT:[VAR.LOCKS].
60
Winbind Support
OpenVMS
14 10
SMBD Process
12
UID/GID now mapped
Client
11
OpenVMS
3 1
netlogin return user/group SIDs
map share
4 6
Is this SID mapped?
accept/deny
13
Domain Controller
5
Pass-thru authentication
Return UID/GID
winbind
DC returns user/group SID list
tdb
The following describes the winbind process flow shown in Figure 51: 1. A Windows client logs in to the domain (authentication). 2. The Windows domain controller authenticates client and returns user security data. 3. The Windows client maps an HP CIFS share. 4. The HP CIFS Member Server passes the user name to Windows Domain Controller to verify the user is a domain member. 5. The Windows Domain Controller returns the user authorization and member SID list. 6. The smbd process passes the SID and user information to the winbind module internal to the SMBD process. 7. Winbind checks the SID and user name against ID mapping data in its mapping database. Winbind either finds the existing mappings between the Windows SID and the OpenVMS UID/GID or creates a new map if no mapping currently exists. 8. Return the mapped UID or GID from TDB database. 9. Winbind returns UID and GID mappings to smbd. 10. The HP CIFS Server presents the mapped share to the Windows client. 11. The Windows client opens file on the HP CIFS Server share. 12. UID and GID are compared with file owner, group, and any ACE in the ACL. 13. The File open action is accepted or denied based on the result in step 12. 14. The HP CIFS Server returns the open status to the Windows client.
61
Winbind Functionality
Winbind supports the following functionalities: Automatic Mapping Nested Group Support Trusts
Automatic Mapping
For domain users and groups, winbind automatically creates the corresponding OpenVMS user or group (resource identifier) on an HP CIFS Member server if one does not exist. Winbind obtains the user IDs (UIDs) used to assign a UIC value, and group IDs (GIDs) used to assign a value to the Resource Identifier from the SMB.CONF global parameters "idmap UID" and "idmap GID", which must be set to a range of values allocated solely to winbind. Winbind uses the chosen integer "idmap UID" value, to derive both the OpenVMS account name and the UIC. The UID value is converted to a hexadecimal value and appended to the string "CIFS$" to derive the OpenVMS account name. The UID value is converted to octal and the octal value is used as the UIC group and member number. NOTE: Since UIC group numbers are limited to a maximum value of Octal 37776 (decimal 16382), the upper range limit on the "idmap UID value is 16382. Similarly, because UIC groups numbers below Octal 376 are reserved for use by HP, do not specify a value below 255 as the lower range of "idmap UID". For example, if the SMB.CONF file contains: idmap uid = 5000 - 10000 Winbind will allocate UID 5000 and create an OpenVMS account named CIFS$1388 with a UIC of [11610.11610]. The mapping of UID 5000 to CIFS$1388 is stored in the SAMBA$ROOT:[VAR.LOCKS]WINBINDD_IDMAP.TDB file. This file must be backed up regularly to avoid the loss of the required mappings necessary to maintain security. A similar process occurs for groups. Winbind uses the chosen integer "idmap GID" value to derive the name of the OpenVMS identifier it creates. The GID is converted to a hexadecimal value which is appended to the string "CIFS$GRP" to derive the name. NOTE: Because winbind creates Posix Group Resource Identifiers, the maximum value is limited to %xFFFFFF or %d16777215. The lower limit is 1. HP CIFS adds %xA4000000 to the value chosen. For example, if the SMB.CONF file contains: idmap gid = 5000 - 10000 Winbind will initially allocate GID 5000 and create an OpenVMS Resource Identifier named CIFS$GRP1388. The mapping of GID 5000 to CIFS$GRP1388 is stored in SAMBA$ROOT:[VAR.LOCKS]WINBINDD_IDMAP.TDB. It is critical that this file be backed up regularly as its loss will result in loss of the required mappings necessary to maintain security.
Trusts
Winbind is required for all Trust functionality.
62 Winbind Support
No
No
Yes
Obtain the UID for the domain user SID from Winbind
Yes
Map to CIFS$<%XUID>
Create host user CIFS$<%XUID> with UIC [%oUID, %oUID] and map to this newly created user
The following describes user authentication and host mapping process flow shown in Figure 52: 1. 2. 3. 4. 5. A domain user is authenticated successfully from the Domain Controller or an ACL is being added based on a user. HP CIFS checks if a mapping exists for the domain user in username map file. If there is a corresponding mapping, CIFS uses the mapped user. If there is no mapping, HP CIFS checks for a corresponding host user, matching the domain user. If there is a match CIFS uses that host user. If there is no corresponding host user, it obtains the UID for the domain user SID from the winbind, if enabled. With UID obtained, HP CIFS check for the host user in the format CIFS$<hexadecimal-value-of-UID>. If there is a user already present in the host system database, HP CIFS maps to this user. If no host account exists, HP CIFS creates one named CIFS$<%XUID>, with a UIC value of [%oUID,%oUID] and maps this to the domain user.
User and Group Mapping 63
6.
No
No
Yes
The following describes group mapping process flow shown in Figure 53: 1. 2. 3. 4. An authenticated domain user belongs to a group or a valid ACL is being added based on a group. HP CIFS obtains the GID for the domain group from winbind. HP CIFS checks for a resource identifier of the format CIFS$GRP<%XGID>. If there is a match, HP CIFS maps the domain group to the matching resource identifier. If there is no corresponding Resource Identifier, HP CIFS creates it in the format CIFS$GRP<%XGID>.
64
Winbind Support
Disabling Winbind
Unlike in Samba Linux/UNIX in HP CIFS for OpenVMS, the Windbind functionality is integrated with the SMBD process. Hence, no separate winbind daemon process is created. Winbind functionality is not required for all HP CIFS configurations. If CIFS needs to be configured as a standalone server, it is not mandatory to configure and enable winbind. To disable winbind on HP CIFS, define the following logical: $ DEFINE/SYSTEM WINBINDD_DONT_ENV 1 Winbind is also disabled if the SMB.CONF does not contain the "idmap UID" and "idmap GID" parameters.
Disabling Winbind
65
A SMB.CONF Example
An example of SMB.CONF file is shown below: [global] # Doamin name workgroup = DomainA security = domain # Winbindd section idmap uid = 5000-6000 idmap gid = 50000-60000 idmap backend = idmap_tdb winbind cache time = 300 winbind separator = \
wbinfo Utility
You can use the wbinfo tool to get information from winbind. For more information on this tool, see wbinfo (page 91).
66
Winbind Support
2.
Introduction
67
For example, to add the local member server user or group 'CATHY' to the group 'CIFSGROUP': $ NET RPC GROUP ADDMEM CIFSGROUP CATHY "-W" PIANO "-S" CIFS-PIANO "-U" CIFSADMIN%"PWD OF CIFSADMIN" 7. To list the members of the local HP CIFS group, enter the following command: $ NET RPC GROUP MEMBERS <windows-group> -S <cifs-node-name> -U <adminuser>%"<password-of-adminuser>" For example, to list the members of the group 'CIFSGROUP': $ NET RPC GROUP MEMBERS CIFSGROUP "-W" PIANO "-S" CIFS-PIANO "-U" CIFSADMIN%"PWD OF CIFSADMIN" 8. To add a domain user or group to a local HP CIFS group, enter the following command: $ NET RPC GROUP ADDMEM <windows-group> <domain-name>\<domain-user-or-group> -W <workgroup> -S <cifs-node-name> -U <adminuser>%"<password-of-adminuser>" For example, to add a domain user or group 'CIFSDOM\CINDY' to the local group 'CIFSGROUP': $ NET RPC GROUP ADDMEM CIFSGROUP CIFSDOM\CINDY "-W" PIANO "-S" CIFS-PIANO "-U" CIFSADMIN%"PWD OF CIFSADMIN" 9. To delete a domain user or group from the local HP CIFS group, enter the following command: $ NET RPC GROUP DELMEM <windows-group> <domain-name>\<domain-user-or-group> -W <workgroup> -S <cifs-node-name> -U <adminuser>%"<password-of-adminuser>" For example, to delete a domain user or group from the local group 'CIFSGROUP': $ NET RPC GROUP DELMEM CIFSGROUP "-W" PIANO "-S" CIFS-PIANO "-U" CIFSADMIN%"PWD OF CIFSADMIN" 10. To delete the local HP CIFS group, enter the following command: $ NET RPC GROUP DELETE <windows-group> -S <cifs-node-name> -U <adminuser>%"<password-of-adminuser>" For example, to delete the local group 'CIFSGROUP': $ NET RPC GROUP DELETE CIFSGROUP "-W" PIANO "-S" CIFS-PIANO "-U" CIFSADMIN%"PWD OF CIFSADMIN"
69
70
5.
To add the local user or group to the local or domain group, enter the following command: $ NET RPC GROUP ADDMEM <local-or-domain-group> <local-user-group> -W <Workgroup> -S <cifs-node-name> -U <adminuser>%"<password-of-adminuser> For example, to add the local user or group 'CATHY' to the group 'CIFSGROUP': $ NET RPC GROUP ADDMEM CIFSGROUP CATHY "-W" PIANO "-S" CIFS-PIANO "-U" CIFSADMIN%"PWD OF CIFSADMIN"
6.
To list the members of the local or domain HP CIFS group, enter the following command: $ NET RPC GROUP MEMBERS <local-or-domain-group> -S <cifs-node-name> -U <adminuser>%"<password-of-adminuser> For example, to list the members of the group 'CIFSGROUP': $ NET RPC GROUP MEMBERS CIFSGROUP "-W" PIANO "-S" CIFS-PIANO "-U" CIFSADMIN%"PWD OF CIFSADMIN"
7.
To add a domain user or group to a local or domain HP CIFS group, enter the following command: $ NET RPC GROUP ADDMEM <local-or-domain-group> <domain-name>\<domain-user-or-group> -W <workgroup> -S <cifs-node-name> -U <adminuser>%"<password-of-adminuser> For example, to add a domain user or group 'CIFSDOM\CINDY' to a HP CIFS local or domain group 'CIFSGROUP': $ NET RPC GROUP ADDMEM CIFSGROUP CIFSDOM\CINDY "-W" PIANO "-S" CIFS-PIANO "-U" CIFSADMIN%"PWD OF CIFSADMIN"
8.
To delete a domain user or group from the local or domain HP CIFS group, enter the following command: $ NET RPC GROUP DELMEM <local-or-domain-group> <domain-name>\<domain-user-or-group> -W <workgroup> -S <cifs-node-name> -U <adminuser>%"<password-of-adminuser> For example, to delete a local or domain group from the local group 'CIFSGROUP': $ NET RPC GROUP DELMEM CIFSGROUP "-W" PIANO "-S" CIFS-PIANO "-U" CIFSADMIN%"PWD OF CIFSADMIN"
9.
To delete the local HP CIFS group, enter the following command: $ NET RPC GROUP DELETE <local-or-domain-group> -S <cifs-node-name> -U <adminuser>%"<password-of-adminuser> For example, to delete the local or domain group 'CIFSGROUP': $ NET RPC GROUP DELETE CIFSGROUP "-W" PIANO "-S" CIFS-PIANO "-U" CIFSADMIN%"PWD OF CIFSADMIN"
Username Mapping
Username map allows you to map domain user names to host names. Due to a restriction in the OpenVMS SYSUAF, HP CIFS does not support user accounts with more than 12 characters and does not allow some special character in the user name. However, this can be overcome by modifying the username map parameter under the [global] section in the SMB.CONF file. In the member server configuration, username mapping is applied only after the user has been successfully authenticated by the domain controllers. In a standalone server configurations, the username mapping is applied before validating the user credentials. Username mapping can be specified using the following parameter in the SMB.CONF file under [global]section:
Managing Local Users in Member Server or PDC or BDC 71
NOTE: This username.map template file is provided with the HP CIFS Server software kit and can be located in the following directory SAMBA$ROOT:[LIB]USERNAME.MAP. If you create a user name map file on OpenVMS system, ensure that the file format is in Stream record format. The map file is parsed line by line. Each line must contain a single <vms-host-name> on the left of a '=' sign followed by a list of user names on the right. For example, to map administrator of GANGES to System, enter as follows: System=GANGES\administrator In the username.map file comment lines begin with '#' or ';'. For example, #cifsuser = GANGES\Tunga If a line begins with an '!' then the processing will stop after that line if a mapping was done by the line. Otherwise mapping continues with every line being processed. Using '!' is most useful when you have a wildcard mapping line later in the file. For example, !cifsuser=GANGES\Tunga Username mapping allows mapping Windows user names containing spaces in them by using double quotes around the name. For example, to map Himalaya River to the user Ganga, enter as follows: Ganga=Himalaya River You can also map multiple users to a single hostname. For example, to map multiple users GANGES\narmada and GANGES\kaveri to user asvuser, enter as follows: asvuser=GANGES\narmada GANGES\kaveri To map all the users to a single hostuser, you can use the wildcard as shown in the example below. cifs$default=* Note that with this setting all the users will have similar permissions.
Method 1: Setting protections from Windows system which is a member of the domain
1. 2. 3. 4. 5. 6. Connect to the HP CIFS Server using the privileged account. Right-click on a file or a directory and select Properties. Click Security. Click Advanced. Select an ACE or Permission entries, click Edit. In the Permission Entry for test screen, check/uncheck the boxes next to each permission to add/remove any permission that you want. Figure 61 shows modifying ACE permissions.
72
7. 8. 9.
Click OK. The Advanced Security Settings screen appears. Repeat step 4 through step 6 to modify or set other ACEs. Click OK or Apply on the Advanced Security Settings screen. Verify the security protection settings on the command-line in the host system by entering the following command: $ DIR/PROT <file/directory path>
$ DIR/PROT/OWN TEMP.TXT Directory DKA0:[SAMBA.TEMP.TEST2] temp.txt;1 temp.txt;1 [TELNETS,TEST1] (RWED,RWED,RWD,R) Total of 1 file
NOTE: An error message is displayed if you try to set protections from the windows system which is not a member of the domain. To manage protection on PDC or BDC, first you need to add Windows client as workstation to the domain. For adding Windows client as workstation, see Configure the HP CIFS Server as a PDC (page 41). After adding Windows client as workstation, follow the procedure as described in section Managing File and Directory Protections (page 72) for settings protections on PDC or BDC.
73
NOTE: The above-mentioned methods are applicable for setting protections for files created on PDC or BDC.
Method 1: Setting ACLs from Windows system which is a member of the domain
1. 2. 3. 4. 5. 6. 7. Connect to the HP CIFS Server using the privileged account. Right-click on a file or a directory and select Properties. Click Security. Click Advanced. Click on Add. The Select Users, Computers, or Groups window is displayed. Click Locations to specify the search location. In the Enter the object names to select (examples): box, type the names of the objects you want to search for and click Check Names. If Windows system can resolve the names it underlines the name that you have added by post fixing the corresponding domain names appropriately. 8. Click OK. A dialog box appears prompting you to enter ACE permissions and the type of ACE. 9. Enter the desired permissions and click OK. 10. Click OK or Apply on the Advanced Security Settings screen to add the new ACE. 11. Verify the ACL settings on the command-line in the host system by entering the following command: $ DIR/SEC <file/directory path> 12. The appropriate ACEs are added with the host user names with the Identifiers. 13. Execute the SAMBA$UAF_TO_CIFSNAME.COM command procedure to get the user and group mappings. See the following for more information about user and group mappings: Managing Local Users in Member Server or PDC or BDC (page 67) Managing Local Groups in Member Server (page 68) Managing Groups in PDC or BDC (page 70) NOTE: Please note that SAMBA$UAF_TO_CIFSNAME.COM lists only those users or groups that are created by winbind.
Method 2: Setting ACLs using native DCL command for Member Server
1. Log into the SYSTEM account or a privileged account.
74
2.
For setting ACLs based on the users, follow these procedures to find out the resource identifier for a user: a. For local user, the identifier will be the local host user name. b. For domain user, execute the following command procedure and then choose option 1. $ @SAMBA$ROOT:[BIN]SAMBA$UAF_TO_CIFSNAME.COM The host name displayed for each domain user is the identifier for that domain user. NOTE: Please note that SAMBA$UAF_TO_CIFSNAME.COM lists only those users or groups that are created by winbind.
3.
For setting ACLs based on the groups, follow these procedures to find out the resource identifier for a group: For local group, enter the following command: $ NET GROUPMAP LIST The name that maps to the corresponding local group is the resource identifier.
4.
For domain group, execute the following command procedure and then choose option 2 . $ @SAMBA$ROOT:[BIN]SAMBA$UAF_TO_CIFSNAME.COM The host name displayed for each domain group is the identifier for that domain group. NOTE: The domain group has a resource identifier of the format CIFS$GRP<hexa value of the number displayed>.
5.
To add an ACL for a file or share or folder, enter the following command: $ set security/acl=(identifier=<resource-identifier>, access=read+execute) <filename/share path directory/sub folder> For example, if you want to grant read and execute, permissions, you can execute: $ set security/acl=(identifier=<resource-identifier>, access=read+execute) <filename/share path directory/sub folder>
6.
To remove the ACL, execute the following command: $ set security/acl=(identifier=<resource-identifier>)/delete <file/folder/share path directory name>
4.
To remove the ACL, execute the following command: $ set security/acl=(identifier=<resource-identifier>)/delete <file/folder/share path directory name>
76
7 Configuring Printers
Introduction
This chapter provides information about configuring Print Services on systems running HP CIFS version 1.1. The HP CIFS Server now provides the following NT printing functionalities: Printer driver files may be downloaded to Windows 2000, XP, and Vista clients that do not have them Printer driver files may be uploaded using the Windows 2000//XP/Vista Add Printer wizard Support for Windows Access Control Lists (ACL) on printer objects
Information about setting up and configuring each of the Print Services (except ACLs) is described in the following sections.
Introduction
77
NOTE:
Spool directory holds the print jobs when they are submitted for printing.
Queue Setup
This section describes the different OpenVMS queue setups that are supported by HP CIFS. It includes the following sections: DCPS Print Queues TCPIP$TELNETSYM Print Queues LPD Print Queues
1. 2. 3.
Substitute P1 with an appropriate name to create the DCPS execution queue name. The "ip_rawtcp" in P2 enables DCPS to support "Raw TCP" printing. The P2 can be replaced with "IP_LPD/<printer-ip-address>" if you want to use DCPS IP_LPD printing. HP CIFS VMS is also tested with DCPS IP_LPD print queues. However, you must define the logical "DCPS$_<print-queuename>_ PRODUCT_NAME", which is required for the printer driver when using DCPS IP_LPD printing. For example, define DCPS$_<print-queuename>_ PRODUCT_ NAME as "HP LaserJet 8150 Series PS", if you want to use 8150 PS driver. "9100" is the raw TCP printer port. Specify "DATA=POSTSCRIPT" when PS drivers are used for printing. Specify "DATA=PCL" when PCL drivers are used for printing. The DCPS queues are not used when the printer supports only the PCL.
4. 5. 6.
See the comments included in DCPS$STARTUP.COM for details. After editing DCPS$STARTUP.COM, execute the procedure to create the queue: $ @SYS$STARTUP:DCPS$STARTUP Add the above command to the site-specific system startup procedures to ensure the print queues are creating each time the system boots.
The following logical names may be helpful when using TCPIP$TELNSYM print queues:
DEFINE/SYSTEM TCPIP$TELNETSYM_RAW_TCP 1 DEFINE/SYSTEM TCPIP$TELNETSYM_SUPPRESS_FORMFEEDS 35
Add the above definitions to the site-specific system startup procedures to ensure they are defined each time the system boots. For more information about TCPIP$TELNETSYM print queues, see HP TCP/IP Services for OpenVMS Management Guide.
nd for the /NODELETE flag cr for the cr flag sn for the setup NoLF flag p1-p8 for the /PARAMETER=(p1,...,p8) field Enter symbol name: q Symbol type value ------ ---- ----Error log file : lf STR /TCPIP$LPD_ROOT/000000/LPDPRINTER.LOG Printer Queue : lp STR LPDPRINTER PS extensions flag: ps STR Remote Host : rm STR TEST123 Remote Printer : rp STR Text Spool Directory : sd STR /TCPIP$LPD_ROOT/LPDPRINTER Are these the final values for printer LPDPRINTER ? [y] y Adding comments to printcap file for new printer, type ? for help. Do you want to add comments to the printcap file [n] ? : n Do you want the queue to default to print flag pages [y] : n Do you want this procedure to start the queue [y] : y Creating execution queue: LPDPRINTER Updating TCPIP$LPD_SYSTARTUP.COM Updating TCPIP$LPD_SYSHUTDOWN.COM ************************************************* * TCPIP$LPD_SYSTARTUP.COM, the printcap file * * and TCPIP$LPD_SYSHUTDOWN.COM * * have been updated for this printer * * * * Set up activity is complete for this printer * *************************************************
NOTE:
80
Configuring Printers
To download the printer drivers to a Windows client automatically, follow these steps:
81
82
8 Tool Reference
This chapter describes some of the management tools included with HP CIFS for OpenVMS, including many native Samba utilities, such as pdbedit and smbclient. Other tools, such as SMBSHOW, are unique to HP CIFS for OpenVMS. For more information on Samba utilities, see Samba website: http://samba.org
83
smbpasswd
This tool is used to manage a users' SMB password that is stored in the HP CIFS encrypted password file, smbpasswd or tdbsam, or in the LDAP directory server. The Samba password database contains the user name, OpenVMS user ID, the SMB hashed passwords of the user, account flag information, and the time the password was last changed. Use smbpasswd to perform the following operations: Add user or machine accounts Delete user or machine accounts Enable user or machine accounts Disable user or machine accounts Set user passwords to NULL Manage inter-domain trust accounts
For more information on the smbpasswd command, see the SWAT or The Official Samba HOWTO and Reference Guide. The smbpasswd tool performs its operations on the data store specified by the passdb backend parameter in the SMB.CONF file. If an LDAP directory must be used, this parameter is set to ldapsam:ldap://<LDAP server name>. If a Samba password file, smbpasswd, is used, this parameter is set to smbpasswd. If an NT-type SAM database is used, this parameter is set to tdbsam (the default).
Syntax
smbpasswd [options] [username]
where options can be any of the following: -L -h -s -c <config file> Runs in the local mode (must be first option). Prints a list of options that the HP CIFS Server supports. Uses stdin for password prompt. This option causes smbpasswd to read passwords from standard input. Specifies the path and file name of the SMB.CONF configuration file when you want to use a file other than the default file. Specifies the debug level. The debug level is an integer from 0 to 10. If this parameter is not specified, the default value is zero. Allows users to specify which machine they want to change their password on. Without this parameter, smbpasswd defaults to the local host. The remote machine name is the NetBIOS name of the SMB/CIFS server to contact to attempt the password change. Specifies the remote user name. This option may only be used in conjunction with the -r option. When changing a password on a remote machine, it allows the user to specify the user name on that machine whose password will be changed.
-U <username [%password]>
Additional Options -a This option adds the username specified to the passdb backend. It prompts for the password to assign and request verification (enter Return to set a blank password). This option specifies that the account of the specified username must be disabled in the configured passdb backend.
-d
84
Tool Reference
-e
-i -n -m -w < password>
-W
-x username
This option specifies that the account of the specified username must be enabled if the account was previously disabled. If the account was not disabled, this option has no effect. This option specifies that the account is an inter- domain trust account. This option specifies that the specified username must have itz password set to null (that is, a blank password) in the configured passdb backend. This option specifies that the account is a machine account. This option specifies the password to be used with the ldap admin dn. The password is stored in the SAMBA$ROOT:[PRIVATE]SECRETS.TDB file. If the password of ldap admin dn ever changes, the password must also be manually updated. The password is entered in the command line. Changes the LDAP directory manager password. With the -W option, the user is prompted for the password. The password is entered using stdin and thus the clear text password never appears on the command line. This option specifies that the specified username must be deleted from the configured passdb backend. Specifies the username of the account.
Examples
Run the following command to create a CIFS account for the user cifsuser1:
$ smbpasswd -a cifsuser1
Run the following command to delete a CIFS account for the user cifsuser2:
$ smbpasswd -x cifsuser2
Run the following command to change the LDAP directory manager password:
$ smbpasswd $ smbpasswd -"W" <password of the LDAP Directory Manager> -"W" dmpasswd
For example, the following command changes the credentials of the LDAP directory manager: or you can run the smbpasswd -"W" command to change the LDAP directory manager password as follows:
$ smbpasswd -"W"
With the -W option, the user is prompted for the password. The password is entered using stdin.
pdbedit
You can use the pdbedit tool to manage the CIFS user accounts stored in the SAM database (database of CIFS users). You must be logged in as the privileged user to run this tool. The pdbedit tool can be used to perform the following operations: Add, remove or modify user accounts List user accounts Manage account policies Manage domain access policy settings
For more information on the pdbedit command, see the SWAT or The Official Samba HOWTO and Reference Guide. The pdbedit tool performs its operations on the data store specified by the passdb backend parameter in the SMB.CONF file. If an LDAP directory must be used, the parameter is set to ldapsam:ldap://<LDAP server name>. If the CIFS user account database file, smbpasswd, is used, the parameter is set to smbpasswd.
Syntax
pdbedit [options]
HP CIFS Management Tools 85
where options can be any of the following: Lists all the user accounts in the users database. This option displays a list of uid/user pairs information separated by the : character. -v, --verbose Enables the verbose listing format. It causes pdbedit to list the users in the database, display the account fields in a descriptive format. -w, --smbpasswd-style This option enables pdbedit to list the users in the database, display the account fields in the smbpasswd style file format. Specifies the user name to be used for the operation -u, --user=username requested (listing, adding, modifying, and removing). It is required for add, remove, and modify operations and is optional for list operations. Specifies the account description to be set. -N, --account-desc=ARG Specifies the user's full name. This option can be used while -f, --fullname=ARG adding or modifying a user account. Sets the user's home directory. This option can be used -h, --homedir=ARG when adding or modifying a user account. Specifies the windows driver letter to be used to map the -D, --drive=ARG home directory. This option can be used while adding or modifying a user account. Sets the user's logon script path. This option can be used -S, --script=ARG while adding or modifying a user account. Specifies the user's profile directory. This option can be -p, --profile=ARG used while adding or modifying a user account. Specifies the user's domain name. -I, --domain=ARG Specifies the user's SID (Security Identifier) or RID. This -U <user SID/RID> option can be used while adding or modifying a user account. Specifies the user's group SID (Security Identifier) or RID. -G <group SID/RID> This option can be used while adding or modifying a user account. Adds a CIFS user account. This command needs a user -a, --create name specified with the -u option. When adding a new user, pdbedit prompts for the password to be used. Modifies an existing CIFS user account. This command -r, --modify requires a user name specified with the -u option. Adds a new machine account. This option may only be -m, --machine used in conjunction with the -a option. It will cause pdbedit to add a machine trust account instead of a user account (The -m -u <machine name> option provides the machine account name). Deletes a CIFS user account. This command needs a user -x, --delete name specified with the -u option. -b, --backend=ARG Use a different passdb backend as the default password backend. -i, --import=ARG <in-backend> Use a different passdb backend to retrieve user accounts other than the one specified in the SMB.CONF passdb -L, --list
86
Tool Reference
backend parameter. This option can be used to import user accounts from this passdb backend. This option eases migration of user accounts from one passdb backend to another. -e, --export=ARG <out-backend> Exports all currently available user accounts to the specified password database backend. This option eases migration of user accounts from one passdb backend to another. -g, --group Uses this option with the -i <in-passdb backend> option to import groups from this passdb backend. You can use the -g -e <out-passdb backend> options to exports all currently available groups to the specified password database backend. Account Policy Setting Options Use the following options to manage account policy settings: -P, --account-policy=ARG Displays an account policy. Valid policies are minimum password age, reset count minutes, disconnect time, user must logon to change password, password history, lockout duration, min password length, maximum password age, and bad lockout attempt. Sets an account policy to a specified value. This option may only be used in conjunction with the -P option. Specifies the user's account control property. This option can be used while adding or modifying a user account. Possible flags are listed below: N: No password required D: Account disabled H: Home directory required T: Temporary duplicate of other account U: Regular user account M: MNS logon user account W: Workstation Trust Account S: Server Trust Account L: Automatic Locking X: Password does not expire I: Domain Trust Account Resets the bad password count value. Resets the login hours. Sets the password-can-change-time policy value. Sets the password-must-change-time policy value (UNIX time in seconds since 1970 if time format not provided). The time format for time parameters. Reads password from standard input. If redirecting input from a file, the Record format of the file must be Stream_LF.
-z, --bad-password-count-reset -Z, --logon-hours-reset <logon-hours-reset> --pwd-can-change-time =ARG --pwd-must-change-time =ARG --time-format=STRING --t, password-from-stdin
87
Help Options -?, help --usage Show this help message. Displays brief usage message.
Common CIFS Options The following is a list of common CIFS options: -d, --debuglevel=DEBUGLEVEL Specifies the debug level, which is an integer from 0 to 10. If this parameter is not specified, the default value is zero. Specifies base name for log files. -l, --log-basename=LOGFILEBASE -s, --configfile=CONFIGFILE Specifies the alternative CIFS configuration file. Prints the program version number. -V, --version
Examples
Run the following command to display a list of the pdbedit options:
$ pdbedit -?
Run the following command to create a CIFS account for the user cifsuser1 with the home directory /home/cifsuser1. The pdbedit tool prompts for input of an initial user password.
$ pdbedit -a cifsuser1 -h /home/cifsuser1
Run the following command to delete a CIFS account for the user cifsuser2:
$ pdbedit -x cifsuser2
net
This tool is used for administration of CIFS and remote CIFS servers. The CIFS net utility is meant to work just like the net utility available for windows and DOS. The first argument of the net utility is used to specify the protocol to use when executing the net command. The argument can be ADS, RAP, or RPC. ADS is used for Windows Active Directory, RAP is used for old Windows clients (Win9x/NT3) and RPC can be used for DCE-RPC. The net tool performs its operations on the LDAP directory if the SMB.CONF passdb backend parameter is set to ldapsam:ldap://<LDAP server name>. There are many net commands. This section describes a portion of the available commands. This section only describes syntaxes for the net rpc user command that you can use to manage CIFS user account database. For a complete description of how to use the net commands and syntaxes, see the SWAT, net help text or The Official Samba HOWTO and Reference Guide.
Net Commands
The following is a partial description of the net commands. For more information on a specified command and its syntax, use net help <command option>. net net net net net net net net time lookup user group groupmap idmap join cache Displays or set time information. Lookups the IP address or host name for a specified host. Manages users. Manages groups. Manages group mappings. Manages the idmap id mappings. Joins a CIFS server to a domain. Operates on cache Trivial Database (tdb) file.
88
Tool Reference
Displays the domain SID for the specified domain. If the [domain] parameter is not specified, The SID of the domain the local CIFS server is in. Sets the local domain SID. This command allows the CIFS machine account password to be set from an external application to a machine account password that has already been stored in a Windows Active Directory. Do not use this command unless you know exactly what you are doing. The use of this command requires that the force flag (-f) is used also. There will be no command prompt. Whatever information is input into stdin is stored as the literal machine password. Do not use this without care and attention because it will overwrite a legitimate machine password without warning. Displays machine account status of the local server. Gets a list of all users with their Windows SIDs. Runs RPC commands. Runs RAP (pre-RPC) commands.
Lookup the IP address of the given host with the specified type. Give IP address of LDAP server of specified DOMAIN. Give IP address of KDC for the specified REALM. Give IP's of Domain Controllers for specified DOMAIN. Give IP of master browser for specified DOMAIN or workgroup. Display the SID (and account type). Give SID's name and type.
Run the following command to list the SID and account type of the group account named sydney:
$ net lookup name sydney
Use the following command syntax to delete a specified CIFS user account:
net [<method>]user DELETE <name> [options] [targets]
Use the following command syntax to list the domain groups of the specified CIFS user:
net [<method>]user INFO <name> [options] [targets]
Valid Methods The valid methods can be any of the following: ads rpc rap Can be used for Windows Active Directory. Can be used for systems with DCE-RPC. Can be used for older systems such as Windows 9x or NT3 clients.
Valid Targets The valid targets can be any of the following. If this argument is not specified, the default is the local host. -S or --server=<server> -I or --ipaddress=<ipaddr> -w or --workgroup=<wg> Valid Options The valid options can be any of the following: -p or --port=<port> -W or --myworkgroup=<wg> -d or --<debuglevel=<level> -n or --myname=<name> Specifies the port number on the target server to connect to. Specifies the client workgroup or domain. Specifies the debug level, which is an integer from 0 to 10. If this parameter is not specified, the default value is zero. Specifies the NetBIOS name. This option allows you to override the NetBIOS name that CIFS uses. The command line setting takes precedence over parameter settings in the SMB.CONF file. Specifies the user name. Specifies the alternative path name of the CIFS configuration file. Displays full information on each item when listing data. Prints CIFS version information. Authenticate as the machine account. Specifies the descriptive comments. This option is only valid for the ADD operation. Specifies the LDAP container when adding a user to the LDAP directory server. The default value is cn=Users. Prints a summary of command line options and usage. Specifies the target server name. Specifies the IP address of the target server. Specifies the target workgroup or domain.
Run the following command to create a CIFS user account for the user cifsuser1:
$ net rpc user ADD cifsuser1 --user administrator
Run the following command to delete a CIFS account for the user cifsuser2:
$ net rpc user DELETE cifsuser2 --user administrator
Run the following command to list the domain groups for the user cifsuser3:
$ net rpc user INFO cifsuser3 --user administrator
90
Tool Reference
wbinfo
Use the wbinfo tool to get winbind information.
Syntax
wbinfo [option]
where option can be any of the following: -u, --domain-users -g, --domain-groups -N, --WINS-by-name=NETBIOS-NAME -I, --WINS-by-ip=IP -n, --name-to-sid=NAME h, --domainname-to-hostname=NAME -s, --sid-to-name=SID -R, --lookup-rids=RIDs -U, --uid-to-sid=UID -G, --gid-to-sid=GID -S, --sid-to-uid=SID -Y, --sid-to-gid=SID --allocate-uid --allocate-gid -t, --check-secret -m, --trusted-domains --all-domains --own-domain --sequence -D, --domain-info=STRING -i, --user-info=USER --group-info=GROUP -r, --user-groups=USER --user-domgroups=SID --user-sids=SID -a, --authenticate=user%password --set-auth-user=user%password --getdcname=domainname --get-auth-user -p, --ping --domain=domain --separator Help Options -?, help --usage Show this help message. Displays brief usage message. Lists all domain users. Lists all domain groups. Converts NetBIOS name to IP address. Converts IP address to NetBIOS name. Converts name to SID. Converts domain-name to host-name. Converts sid to name. Converts RIDs to names. Converts uid to sid. Converts gid to sid. Converts sid to uid. Converts sid to gid. Get a new UID out of idmap. Get a new GID out of idmap. Check shared secret. List trusted domains. List all domains (trusted and own domain). List own domain. Show sequence numbers of all domains. Show most of the info we have about the domain. Get user info. Get group info. Get user groups. Get user domain groups. Get user group sids for user SID. Authenticate user. Store user and password used by winbind (root only). Get a DC name for a foreign domain. Retrieve user and password used by winbind (root only). Ping winbindd to see if it is alive. Define to the domain to restrict operation. Get the active winbind separator.
Common CIFS Options -V, --version Prints the program version number.
HP CIFS Management Tools 91
For more information on how to use this tool, see /opt/samba/man/man1/wbinfo.1 file.
Examples
The following is an example of the output using the wbinfo -u command:
$ wbinfo -u DOMAIN_DOM\johnb DOMAIN_DOM\user1 DOMAIN_DOM\user2 DOMAIN_DOM\user3 DOMAIN_DOM\user4 DOMAIN_DOM\Guest DOMAIN_DOM\user5 DOMAIN_DOM\ntuser DOMAIN_DOM\root DOMAIN_DOM\pcuser DOMAIN_DOM\winusr DOMAIN_DOM\maryw
92
Tool Reference
smbclient
smbclient is a client that can talk to an SMB/CIFS server. It offers an interface similar to that of the ftp program. Operations include functions, such as setting files from the server to the local machine, putting files from the local machine to the server, retrieving directory information from the server, and so on.
Syntax
SAMBA$SMBCLIENT.EXE service <options>
where options can be any of the following Use these name resolution services only. -R, --name-resolve=NAME-RESOLVE-ORDER This option allows you to send messages, using the -M, --message=HOST "WinPopup" protocol, to another computer. IP address is the address of the server to connect to. -I, --ip-address=IP Write messages to stderr instead of stdout. -E, --stderr Get a list of shares available on a host. -L, --list=HOST Terminal I/O code {sjis|euc|jis7|jis8|junet|hex}. -t, --terminal=CODE Set the max protocol level. -m, --max-protocol=LEVEL This option may be used to create tar compatible backups -T, --tar=<c|x>IXFqgbNan of all the files on an SMB/CIFS share. Change to initial directory before starting. -D, --directory=DIR Execute semicolon separated commands. -c, --command=STRING This option changes the transmit/send buffer size. -b, --send-buffer=BYTES This number is the TCP port number that is used when -p, --port=PORT making connections to the server. Produce grepable output. -g, --grepable Help Options -?, --help --usage Show this help message. Display brief usage message.
Common CIFS Options The following is a list of common CIFS options: -d, debuglevel=DEBUGLEVEL -l, log-basename=LOGFILEBASE -s, configfile=CONFIGFILE -V, version Connection Options -O, --socket-options=SOCKETOPTIONS -n, --netbiosname=NETBIOSNAME -W, --workgroup=WORKGROUP -i, --scope=SCOPE TCP socket options to set on the client socket. Primary NetBIOS name. Set the workgroup name. This specifies a NetBIOS scope that nmblookup uses to communicate with when generating NetBIOS names. Specifies the debug level, which is an integer from 0 to 10. If this parameter is not specified, the default value is zero. Specifies base name for log files. The extension ".progname" is appended (for example, log.smbclient, log.smbd). Specifies the alternative CIFS configuration file. Prints the program version number.
93
Authentication Options -U, --user=USERNAME -N, --no-pass -k, --kerberos -A, --authentication-file=FILE -S, --signing=on|off|required -P, --machine-pass Set the network user name. Does not prompt for password. Try to authenticate with kerberos. Only useful in an Active Directory environment. Get the credentials from a file. Set the client signing state. Use stored machine account password.
Examples
$ smbclient --list mtabca --user mtabca\dynac Password: Anonymous login successful Domain=[CIFSDOM] OS=[Unix] Server=[Samba 3.0.24] Sharename Type Comment -----------------IPC$ IPC IPC Service (CIFS for OpenVMS 3.0.24) Anonymous login successful Domain=[CIFSDOM] OS=[Unix] Server=[Samba 3.0.24] Server Comment --------------CIFSCLUSTER CIFS for OpenVMS 3.0.24 HOMERJ CIFS for OpenVMS 3.0.24 HOMERJ_ALIAS CIFS for OpenVMS 3.0.24 Workgroup --------CIFSDOM Master -------
94
Tool Reference
smbstatus
smbstatus is a simple program that lists the current Samba connections.
Syntax
smbstatus <options>
Where options can be any of the following -p, -v, -L, -S, -u, -b, -P, --processes --verbose --locks --shares --user=STRING --brief --profile Print a list of processess. Gives verbose output. Causes smbstatus to only list locks. Causes smbstatus to only list share connection. Selects information relevant to user name only. Gives brief output. If Samba has been compiled with the profiling option, print only the contents of the profiling shared memory area. Causes smbstatus to include byte range locks. Numeric UID/GID.
-R, --profile-rates -B, --byterange -n, --numeric Help Options -?, --help --usage
Common CIFS Options The following is a list of common CIFS options: -d, debuglevel=DEBUGLEVEL -l, log-basename=LOGFILEBASE -s, configfile=CONFIGFILE -V, version Specifies the debug level, which is an integer from 0 to 10. If this parameter is not specified, the default value is zero. Specifies base name for log files. The extension ".progname" is appended (for example, log.smbclient, log.smbd). Specifies the alternative CIFS configuration file. Prints the program version number.
Examples
Run the following command to list the current Samba connections:
$ smbstatus Samba version 3.0.28a PID Username Group Machine -------------------------------------------------------------00000430 TEST1 TELNETS test01(16.91.77.23) Service pid machine Connected at ------------------------------------------------------IPC$ 00000430 test01 Thu Apr 24 17:13:01 2008
95
nmblookup
nmblookup is used to query NetBIOS names and map them to IP addresses in a network using NetBIOS over TCP/IP queries.
Syntax
nmblookup <options>
where options can be any of the following -B, --broadcast=BROADCAST-ADDRESS -f, --flags -U, --unicast=STRING -M, --master-browser -R, --recursion -S, --status Specify address to use for broadcasts.
List the NMB flags returned. Specify address to use for unicast. Search for a master browser. Set recursion desired in package. Once the name query has returned an IP address then do a node status query as well. Translate IP addresses into names. -T, --translate Use root port 137 (Windows 95 only replies). -r, --root-port Interpret <name> as an IP Address and do a node status -A, --lookup-by-ip query on this address. Show this help message. -?, --help Display brief usage message. --usage -d, --debuglevel=DEBUGLEVEL Set debug level -s, --configfile=CONFIGFILE Use alternate configuration file. Base name for log files. -l, --log-basename=LOGFILEBASE Prints the program version number. -V, --version TCP socket options to set on the client socket. -O, --socket-options=SOCKETOPTIONS Primary netbios name. -n, --netbiosname=NETBIOSNAME Set the workgroup name. -W, --workgroup=WORKGROUP This specifies a NetBIOS scope that nmblookup uses to -i, --scope=SCOPE communicate when generating NetBIOS names. Help Options -?, --help --usage Show this help message. Display brief usage message.
Common CIFS Options The following is a list of common CIFS options: -d, debuglevel=DEBUGLEVEL -l, log-basename=LOGFILEBASE -s, configfile=CONFIGFILE -V, version Specifies the debug level, which is an integer from 0 to 10. If this parameter is not specified, the default value is zero. Specifies base name for log files. The extension ".progname" is appended (for example, log.smbclient, log.smbd). Specifies the alternative CIFS configuration file. Prints the program version number.
96
Tool Reference
Connection Options -O, --socket-options=SOCKETOPTIONS -n, --netbiosname=NETBIOSNAME -W, --workgroup=WORKGROUP -i, --scope=SCOPE TCP socket options to set on the client socket. Primary NetBIOS name. Set the workgroup name. This specifies a NetBIOS scope that nmblookup uses to communicate when generating NetBIOS names.
Examples
Run the following command to send a NetBIOS Node Status query to the IP address specified. The result, if successful, a list of NetBIOS name is registered by that system.
$ nmblookup --lookup-by-ip 16.105.15.72 -d0 Looking up status of 16.105.15.72 SYDNEY <00> B <ACTIVE> SYDNEY <03> B <ACTIVE> SYDNEY <20> B <ACTIVE> CIFSDOM <1e> -<GROUP> B <ACTIVE> CIFSDOM <00> -<GROUP> B <ACTIVE> MAC Address = 00-00-00-00-00-00
Run the following command to resolve the name 'Syndney' to its IP address and, if successful, send a NetBIOS Node Status request to the IP address returned.
$ nmblookup --status sydney querying sydney on 16.105.15.72 16.105.15.72 sydney<00> Looking up status of 16.138.185.72 SYDNEY <00> B <ACTIVE> SYDNEY <03> B <ACTIVE> SYDNEY <20> B <ACTIVE> CIFSDOM <1e> -<GROUP> B <ACTIVE> CIFSDOM <00> -<GROUP> B <ACTIVE> MAC Address = 00-00-00-00-00-00
smbshow
This tool is used to display system information about all the HP CIFS Server processes. When you start HP CIFS Server, NMBD process is created. As each client establishes a session with the server, a new SMBD process is created.
Examples
Run the following command to get the information about all the processes when a client session is not open:
NELTON\SYSTEM>smbshow 20203D7E NMBD LEF 6 421150 0 00:00:23.51 714 916
Run the following command to get the information about all the processes when a client session is open:
NELTON\SYSTEM>smbshow 20203D7E NMBD LEF 20203E61 SMBD445_BG19299 LEF 5 8 421976 2151 0 00:00:23.59 0 00:00:00.56 714 1643 916 1788 N
97
Smbver
This tool is used to get the information about various images being used as part of the HP CIFS Server.
Example
NELTON\SYSTEM>smbver Information on NELTON for OpenVMS images installed on this system: Image Name -----------------SAMBA$ADD_DSKSHARE SAMBA$ADD_PRNFORM SAMBA$ADD_PRNQUEUE SAMBA$ADD_PRNSHARE SAMBA$NET SAMBA$NMBD SAMBA$NMBLOOKUP SAMBA$NTLMAUTH Image Version ------------T1.1-EFT2 T1.1-EFT2 T1.1-EFT2 T1.1-EFT2 T1.1-EFT2 T1.1-EFT2 T1.1-EFT2 T1.1-EFT2 Link date --------------18-AUG-2008 15:47 18-AUG-2008 15:47 18-AUG-2008 15:47 18-AUG-2008 15:47 18-AUG-2008 15:47 18-AUG-2008 15:47 18-AUG-2008 15:47 18-AUG-2008 15:47 Linker ID ---------I02-31 I02-31 I02-31 I02-31 I02-31 I02-31 I02-31 I02-31
SAMBA$DEFINE_COMMANDS.COM
This command procedure defines symbols for all the HP CIFS utilities. It also defines symbols, namely, SMBSTART, SMBSTOP, SMBSHOW, and SMBVERSION.
SAMBA$GATHER_INFO.COM
This is the command procedure that gathers information and data files and creates a backup save set file for reporting problems. All the log files, configuration file, lmhosts file, user mapping file, tdb files for password and other mapping related tdb's can be fetched from the saveset for debugging purpose.
testparm
testparm is a program to test the contents of SMB.CONF file. Whenever you modify the SMB.CONF file you need to run the testparm utility. The testparm examines the SMB.CONF file for syntax errors and reports them, if they are found, along with a list of the services enabled on your system. NOTE: Run the testparm utility whenever you modify the SMB.CONF file.
Syntax
testparm <options>
Where options can be any of the following -s, --suppress-prompt Without this option, testparm will prompt for a carriage return after printing the service names and before dumping the service definitions. Gives verbose output. Sets the value of the %L macro to servername. Prints parameters with encoding. Shows the parameter, type, and possible values. Limit testparm to a named parameter. Limit testparm to a named section.
98
Tool Reference
Help Options -?, --help --usage Show this help message. Display brief usage message.
Common CIFS Options -V, version Prints the program version number.
Example
NELTON\SYSTEM>testparm Load smb config files from /SAMBA$ROOT/LIB/SMB.CONF Processing section "[homes]" Processing section "[streamlf]" Processing section "[vfc]" Processing section "[shared]" creating default valid table Loaded services file OK. Server role: ROLE_DOMAIN_MEMBER Press enter to see a dump of your service definitions [global] workgroup = CIFSDOM server string = Samba %v running on %h (OpenVMS) security = DOMAIN client schannel = Yes server schannel = Yes username map = samba$root:[lib]usermap.map log level = 10 log file = /samba$root/var/log_%h.%m name resolve order = lmhosts wins bcast add user script = @samba$root:[bin]useradd %u wins server = 16.138.16.104 idmap uid = 2000-20000 idmap gid = 5000-15000 admin users = system create mask = 0755 vms path names = No [homes] comment = Home Directories read only = No create mask = 0750 browseable = No
tdbbackup
tdbbackup is a tool that may be used to backup HP CIFS .tdb files. This tool may also be used to verify the integrity of the .tdb files prior to HP CIFS startup or during normal operation. If it finds file damage and it finds a prior backup the backup file will be restored. The tdbbackup utility can safely be run at any time. It was designed so that it can be used at any time to validate the integrity of tdb files, even during HP CIFS operation. Typical usage for the command will be: tdbbackup [-s suffix] *.tdb Before restarting HP CIFS Server the following command may be run to validate .tdb files: tdbbackup -v [-s suffix] *.tdb
Syntax
tdbbackup <options>
-h -s suffix -v -n
Get help information. This option allows the administrator to specify a file back-up extension. The -v will check the database for damages (corrupt data) which if detected causes the backup to be restored. Set the new hash size for the backup.
Tdbdump
Tdbdump is a very simple utility that 'dumps' the contents of a TDB (Trivial DataBase) file to standard output in a human-readable format. This tool can be used when debugging problems with TDB files.
Syntax
tdbdump <options>
Where options can be any of the following -h -k keyname Get help information. Dumps the value of the keyname.
smbcontrol
smbcontrol sends messages to the NMBD or an SMBD process.
Syntax
smbcontrol [OPTION...] <destination> <message-type> <parameters>
Where options can be any of the following -t, --timeout=TIMEOUT Help Options -?, --help --usage Show this help message. Display brief usage message. Set timeout value in seconds.
Common CIFS Options The following is a list of common CIFS options: -d, debuglevel=DEBUGLEVEL -l, log-basename=LOGFILEBASE -s, configfile=CONFIGFILE -V, version Specifies the debug level, which is an integer from 0 to 10. If this parameter is not specified, the default value is zero. Specifies base name for log files. The extension ".progname" will be appended (for example, log.smbclient, log.smbd, and so on). Specifies the alternative CIFS configuration file. Prints the program version number.
<destination> is the Process ID (PID) of the target process. Message Types Available message types are: close-share Order smbd to close the client connections to the named share. Note that this does not affect client connections to any other shares. This message-type takes an argument of the share name for which client connections will be closed, or the "*" character which will close all currently open shares. This may be useful if you made changes to the access controls on the share. This message can only be sent to smbd.
100
Tool Reference
Set debug level to the value specified by the parameter. This can be sent to any of the destinations. This message causes the nmbd daemon to force a new browse master election. Send specified number of "ping" messages and wait for the same number of reply "pong" messages. This can be sent to any of the destinations. Change profile settings of a daemon, based on the parameter. The parameter can be "on" to turn on profile stats collection, "off" to turn off profile stats collection, "count" to enable only collection of count stats (time stats are disabled), and "flush" to zero the current profile stats. Request debuglevel of a certain daemon and write it to stdout. Request profilelevel of a certain daemon and write it to stdout. Order smbd to send a printer notify message to any Windows NT clients connected to a printer. This message-type takes the following arguments: Send a queue pause change notify queuepause printername message to the printer specified. Send a queue resume change notify queueresume printername message for the printer specified. Send a job pause change notify jobpause printername message for the printer and unix unixjobid jobid specified. Send a job resume change notify jobresume printername message for the printer and unix unixjobid jobid specified. Send a job delete change notify jobdelete printername message or the printer and unix unixjobid jobid specified.
Note that this message only sends notification that an event has occurred. It does not actually cause the event to happen. This message can only be sent to smbd. samsync samrepl dmalloc-mark dmalloc-log-changed Order smbd to synchronize sam database from PDC (being BDC). Can only be sent to smbd. Send sam replication message, with specified serial. Can only be sent to smbd. Should not be used manually. Set a mark for dmalloc. Can be sent to both smbd and nmbd. Only available if samba is built with dmalloc support. Dump the pointers that have changed since the mark set by dmalloc-mark. Can be sent to both smbd and nmbd. Only available if samba is built with dmalloc support. Shut down specified daemon. Can be sent to both smbd and nmbd. Print a human-readable description of all talloc(pool) memory usage by the specified daemon/process. Available for both smbd and nmbd. Force clients of printers using specified driver to update their local version of the driver. Can only be sent to smbd. Force daemon to reload smb.conf configuration file.
shutdown pool-usage
5 6
448071 3031
0 00:00:25.02 0 00:00:00.65
714 1647
916 1792
102
Tool Reference
Enter UIC group number for default accounts Group: [360] Creating CIFS User Accounts ... User Accounts Creation Completed Successsfully .... The release notes for HP CIFS on OpenVMS, CIFS_REL_NOTES.TXT is available at SYS$COMMON:[SYSHLP] To Configure HP CIFS, execute "$ @SAMBA$ROOT:[BIN]SAMBA$CONFIG.COM" ...100% The following product has been installed: HP I64VMS SAMBA V1.1 Layered Product $
104
105
106
Index
B
Backend ldap, 26 smbpasswd, 26 tdbsam, 26
L
LDAP advantages, 53 cifs authentication, 54 configuring, 55 domain model , 54 installing, 55 overview, 53 workgroup model, 54
C
CIFS protocol, 11 CIFS configuration file, 24 file structure, 24 sample configuration file, 25 verify, 25 Cluster environment configuring SMB.CONF file,, 26 Common Internet File System. See CIFS, 11 configuration directory, 55 subsequent clients, 57 Configuring cluster environment, 26 cluster with common HP CIFS disk, 23 international character set, 27 OpenVMS File format, 27 using SWAT, 23 configuring printers queue setup, 78 spool directory, 77
M
management tools net commands, 88 nmblookup, 96 pdbedit, 85 smbclient, 93 smbcontrol, 100 smbpasswd, 84, 98 smbstatus, 95 smbver, 97 tdbbackup, 99 tdbdump, 100 testparm, 98 wbinfo, 91 Managing file and directory ACLs, 74 file and directory protections, 72 groups in PDC or BDC, 70 HP CIFS security, 72 managing local groups in member server, 68 local users, 67
D
directory, 55 configuration, 55 Disk space requirements, 15 documentation HP CIFS Server, 12 documentations and directory structure , 13
N
NetBIOS, 33 Network File System, 33
G
GNU Public License, 11
O
Open Source Software, 11 OpenVMS cluster considerations, 18 OSS. See Open Source Software, 11
H
HP CIFS description, 11 introduction, 11 HP CIFS Server directory structure, 13 disk space requirements, 15 documentation, 12 requirements and limitations, 15 software requirements, 15
P
port 445, 33 Postinstallation tasks, 22 Preinstallation tasks, 16 print driver files, 81 print drivers automatic driver installation, 80 manual driver installation, 80 print queues DCPS, 78 LPD, 79 TCPIP$TELNETSYM, 78
I
Installing CIFS Server software, 20
107
R
release notes, 16
S
samba domain model , 36 Samba server description, 12 features, 12 Server Message Block, 11, 12 SMB. See Server Message Block, 12 Staring HP CIFS automatically, 28 in an OpenVMS cluster, 28 manually, 28 Stopping HP CIFS, 29
T
Troubleshooting installation and configuration issues, 29 verifying the client connection, 31
U
uninstalling HP CIFS server software, 34 Upgrading HP CIFS Server, 20 username mapping, 71
W
Winbind disabling, 65 features, 60 overview, 59 parameters, 65 Winbind automatic mapping group mapping, 64 user authentication and host mapping, 63 Winbind functionality automatic mapping, 62 nested group, 62 trusts, 62 windows domain model, 43
108
Index