1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-29 11:21:54 +03:00
samba-mirror/docs
0001-01-01 00:00:00 +00:00
..
docbook merge from 2.2 and regenerate 0001-01-01 00:00:00 +00:00
faq merge from 2.2 0001-01-01 00:00:00 +00:00
htmldocs merge from 2.2 and regenerate 0001-01-01 00:00:00 +00:00
manpages merge from 2.2 0001-01-01 00:00:00 +00:00
OID fixes from 2,2 0001-01-01 00:00:00 +00:00
Registry merge from 2.2 0001-01-01 00:00:00 +00:00
textdocs Same as in 2_2 0001-01-01 00:00:00 +00:00
yodldocs merge from 2.2 0001-01-01 00:00:00 +00:00
announce merge from 2.2 0001-01-01 00:00:00 +00:00
history yet another person asked me where the name Samba came from, so I put 0001-01-01 00:00:00 +00:00
README.ldap merge from 2.2 0001-01-01 00:00:00 +00:00
README.Win2kSP2 merge from 2.2 0001-01-01 00:00:00 +00:00
README.Win32-Viruses couple of updates mentioned on samba@samba.org 0001-01-01 00:00:00 +00:00
Samba-HOWTO-Collection.pdf merge from 2.2 and regenerate 0001-01-01 00:00:00 +00:00
THANKS global change from samba.anu.edu.au to samba.org 0001-01-01 00:00:00 +00:00

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

While this article is specific to the recent Nimda worm, 
the information can be applied to preventing the spread
of many Win32 viruses.  Thanks to the Samba Users Group of Japan
(SUGJ) for this article.
===============================================================================
Steps againt Nimba Worm for Samba

Author: HASEGAWA Yosuke
Translator: TAKAHASHI Motonobu <monyo@samba.gr.jp>

The information in this article applies to
    Samba 2.0.x
    Samba 2.2.x
    Windows 95/98/Me/NT/2000

SYMPTOMS
  This article has described the measure against Nimba Worm for Samba
  server.

DESCRIPTION
  Nimba Worm is infected through the shared disk on a network besides
  Microsoft IIS, Internet Explorer and mailer of Outlook series.

  At this time, the worm copies itself by the name *.nws and *.eml on
  the shared disk, moreover, by the name of Riched20.dll in the folder
  where *.doc file is included.

  To prevent infection through the shared disk offered by Samba, set
  up as follows:

-----
[global]
  ...
  # This can break Administration installations of Office2k.
  # in that case, don't veto the riched20.dll
  veto files = /*.eml/*.nws/riched20.dll/
-----

  Setting up "veto files" parameter, the matched files on the Samba
  server are completely hidden from the clients and become impossible
  to access them at all.

  In addition to it, the following setting are also pointed out by the
  samba-jp:09448 thread: when the
  "(Jreadme.txt.{3050F4D8-98B5-11CF-BB82-00AA00BDCE0B}"(B file exists on
  a Samba server, it is visible only with "readme.txt" and a dangerous
  code may be performed when this file is double-clicked.

  Setting the following,
-----
  veto files = /*.{*}/
-----
  no files having CLSID in its file extension can be accessed from any
  clients.

This technical article is created based on the discussion of
samba-jp:09448 and samba-jp:10900 threads.