From 5d759393e5c3279edfb10c8d09a400699078fb25 Mon Sep 17 00:00:00 2001 From: Andreas Schneider Date: Tue, 6 Jun 2023 12:54:17 +0200 Subject: [PATCH] libgpo:admx: Fix code spelling Signed-off-by: Andreas Schneider Reviewed-by: Andrew Bartlett --- libgpo/admx/en-US/samba.adml | 18 +++++++++--------- libgpo/admx/ru-RU/samba.adml | 2 +- 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/libgpo/admx/en-US/samba.adml b/libgpo/admx/en-US/samba.adml index c073758b004..3bfb30c5649 100755 --- a/libgpo/admx/en-US/samba.adml +++ b/libgpo/admx/en-US/samba.adml @@ -234,16 +234,16 @@ Example: searching Example: off ldap group suffix - This parameter specifies the suffix that is used for groups when these are added to the LDAP directory. If this parameter is unset, the value of will be used instead. The suffix string is pre-pended to the + This parameter specifies the suffix that is used for groups when these are added to the LDAP directory. If this parameter is unset, the value of will be used instead. The suffix string is prepended to the string so use a partial DN. Example: ou=Groups ldap idmap suffix - This parameters specifies the suffix that is used when storing idmap mappings. If this parameter is unset, the value of will be used instead. The suffix string is pre-pended to the string so use a partial DN. + This parameters specifies the suffix that is used when storing idmap mappings. If this parameter is unset, the value of will be used instead. The suffix string is prepended to the string so use a partial DN. Example: ou=Idmap ldap machine suffix - It specifies where machines should be added to the ldap tree. If this parameter is unset, the value of will be used instead. The suffix string is pre-pended to the string so use a partial DN. + It specifies where machines should be added to the ldap tree. If this parameter is unset, the value of will be used instead. The suffix string is prepended to the string so use a partial DN. Example: ou=Computers ldap page size @@ -301,7 +301,7 @@ Example: dc=samba,dc=org ldap timeout This parameter defines the number of seconds that Samba should use as timeout for LDAP operations. ldap user suffix - This parameter specifies where users are added to the tree. If this parameter is unset, the value of will be used instead. The suffix string is pre-pended to the string so use a partial DN. + This parameter specifies where users are added to the tree. If this parameter is unset, the value of will be used instead. The suffix string is prepended to the string so use a partial DN. Example: ou=people ldap max anonymous request size @@ -602,7 +602,7 @@ Example: \\remote_smb_server\%U The share and the path must be readable by the user for the preferences and directories to be loaded onto the Windows NT client. The share must be writeable when the user logs in for the first time, in order that the Windows NT client can create the NTuser.dat and other directories. Thereafter, the directories and any of the contents can, if required, be made read-only. It is not advisable that the NTuser.dat file be made read-only - rename it to NTuser.man to achieve the desired effect (a MANdatory profile). Windows clients can sometimes maintain a connection to the [homes] share, even though there is no user logged in. Therefore, it is vital that the logon path does not include a reference to the homes share (i.e. setting this parameter to \\%N\homes\profile_path will cause problems). This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine. - Do not quote the value. Setting this as \\%N\profile\%U will break profile handling. Where the tdbsam or ldapsam passdb backend is used, at the time the user account is created the value configured for this parameter is written to the passdb backend and that value will over-ride the parameter value present in the smb.conf file. Any error present in the passdb backend account record must be editted using the appropriate tool (pdbedit on the command-line, or any other locally provided system tool). + Do not quote the value. Setting this as \\%N\profile\%U will break profile handling. Where the tdbsam or ldapsam passdb backend is used, at the time the user account is created the value configured for this parameter is written to the passdb backend and that value will over-ride the parameter value present in the smb.conf file. Any error present in the passdb backend account record must be edited using the appropriate tool (pdbedit on the command-line, or any other locally provided system tool). Note that this option is only useful if Samba is set up as a domain controller. Disable the use of roaming profiles by setting the value of this parameter to the empty string. For example, "". Take note that even if the default setting in the smb.conf file is the empty string, any value specified in the user account settings in the passdb backend will over-ride the effect of setting this parameter to null. Disabling of all roaming profile use requires that the user account settings must also be blank. An example of use is: @@ -1222,7 +1222,7 @@ Example: LANMAN1 Example: NT1 client use spnego This variable controls whether Samba clients will try - to use Simple and Protected NEGOciation (as specified by rfc2478) with + to use Simple and Protected NEGOtiation (as specified by rfc2478) with supporting servers (including WindowsXP, Windows2000 and Samba 3.0) to agree upon an authentication mechanism. This enables Kerberos authentication in particular. @@ -2446,7 +2446,7 @@ Example: DOMAIN controller, providing domain logon services to Windows and Samba clients of an NT4-like domain. Clients must be joined to the domain to create a secure, trusted path across the network. There must be - only one PDC per NetBIOS scope (typcially a broadcast network or + only one PDC per NetBIOS scope (typically a broadcast network or clients served by a single WINS server). SERVER ROLE = CLASSIC BACKUP DOMAIN CONTROLLER @@ -2836,7 +2836,7 @@ Example: IPTOS_LOWDELAY depend on mmap working correctly on the running system. Samba requires a coherent mmap/read-write system memory cache. Currently only OpenBSD and HPUX do not have such a coherent cache, and on those platforms this parameter is overridden internally - to be effeceively no. On all systems this parameter should be left alone. This + to be effectively no. On all systems this parameter should be left alone. This parameter is provided to help the Samba developers track down problems with the tdb internal code. get quota command @@ -3158,7 +3158,7 @@ General rule structure: "priority": "priority" }, "source [not] address | mac | ipset": "address[/mask] | mac-address | ipset", - "destination [not] adress": "address[/mask]", + "destination [not] address": "address[/mask]", "service name": "service name", "port": { "port": "port value", diff --git a/libgpo/admx/ru-RU/samba.adml b/libgpo/admx/ru-RU/samba.adml index d6b8cf3bc45..0ca7c02ead8 100644 --- a/libgpo/admx/ru-RU/samba.adml +++ b/libgpo/admx/ru-RU/samba.adml @@ -2034,7 +2034,7 @@ NT1 То есть в будущем параметр 'client use spnego' будет установлен по умолчанию. -Эта переменная определяет, будут ли клиенты Samba пытаться использовать простой и защищенный NEGOciation (как указано в rfc2478) с поддерживающими серверами (включая WindowsXP, Windows2000 и Samba 3.0) для согласования механизма аутентификации. Это, в частности, включает проверку подлинности Kerberos. +Эта переменная определяет, будут ли клиенты Samba пытаться использовать простой и защищенный NEGOgiation (как указано в rfc2478) с поддерживающими серверами (включая WindowsXP, Windows2000 и Samba 3.0) для согласования механизма аутентификации. Это, в частности, включает проверку подлинности Kerberos. Когда этот параметр установлен, для использования NTLMv2 только в рамках NTLMSSP требуется расширенная безопасность (SPNEGO). Такое поведение было введено в исправлениях для CVE-2016-2111.