IF YOU WOULD LIKE TO GET AN ACCOUNT, please write an
email to Administrator. User accounts are meant only to access repo
and report issues and/or generate pull requests.
This is a purpose-specific Git hosting for
BaseALT
projects. Thank you for your understanding!
Только зарегистрированные пользователи имеют доступ к сервису!
Для получения аккаунта, обратитесь к администратору.
The value 0x00080000 means permit only NTLMv2 session security. If either NtlmMinClientSec or
NtlmMinServerSec is set to 0x00080000, the connection will fail if NTLMv2
session security is not negotiated.
</para>
</sect2>
</sect1>
<sect1>
<title>Upgrading Samba</title>
<para>
Please check regularly on <ulinknoescape="1"url="http://www.samba.org/">http://www.samba.org/</ulink> for updates and
important announcements. Occasionally security releases are made and
it is highly recommended to upgrade Samba when a security vulnerability
is discovered. Check with your OS vendor for OS specific upgrades.
</para>
</sect1>
<sect1>
<title>Common Errors</title>
<para>
If all of Samba and host platform configuration were really as intuitive as one might like them to be, this
section would not be necessary. Security issues are often vexing for a support person to resolve, not
because of the complexity of the problem, but for the reason that most administrators who post what turns
out to be a security problem request are totally convinced that the problem is with Samba.
</para>
<sect2>
<title>Smbclient Works on Localhost, but the Network Is Dead</title>
<para>
This is a common problem. Red Hat Linux (and others) installs a default firewall.
With the default firewall in place, only traffic on the loopback adapter (IP address 127.0.0.1)
is allowed through the firewall.
</para>
<para>
The solution is either to remove the firewall (stop it) or modify the firewall script to
allow SMB networking traffic through. See section above in this chapter.
</para>
</sect2>
<sect2>
<title>Why Can Users Access Home Directories of Other Users?</title>
<para>
<quote>
We are unable to keep individual users from mapping to any other user's
home directory once they have supplied a valid password! They only need
to enter their own password. I have not found any method to configure
Samba so that users may map only their own home directory.
</quote>
</para>
<para><quote>
User xyzzy can map his home directory. Once mapped user xyzzy can also map
anyone else's home directory.
</quote></para>
<para>
This is not a security flaw, it is by design. Samba allows users to have
exactly the same access to the UNIX file system as when they were logged
onto the UNIX box, except that it only allows such views onto the file
system as are allowed by the defined shares.
</para>
<para>
If your UNIX home directories are set up so that one user can happily <command>cd</command>
into another users directory and execute <command>ls</command>, the UNIX security solution is to change file
permissions on the user's home directories such that the <command>cd</command> and <command>ls</command> are denied.
</para>
<para>
Samba tries very hard not to second guess the UNIX administrators security policies, and
trusts the UNIX admin to set the policies and permissions he or she desires.
</para>
<para>
Samba allows the behavior you require. Simply put the <smbconfoption><name>only user</name><value>%S</value></smbconfoption>
option in the <smbconfsection>[homes]</smbconfsection> share definition.
</para>
<para>
The <smbconfoption><name>only user</name><value></value></smbconfoption> works in conjunction with the <smbconfoption><name>users</name><value>list</value></smbconfoption>,
so to get the behavior you require, add the line :