5 <!-- Email Address' -->
6 <!ENTITY email.dbannon 'D.Bannon@latrobe.edu.au'>
7 <!ENTITY email.jerry 'jerry@samba.org'>
8 <!ENTITY email.patches 'samba-patches@samba.org'>
9 <!ENTITY email.jelmer 'jelmer@samba.org'>
10 <!ENTITY email.jht 'jht@samba.org'>
11 <!ENTITY email.ghenry 'ghenry@suretecsystems.com'>
12 <!ENTITY email.asn 'asn@samba.org'>
14 <!-- Author entities -->
16 <firstname>Andreas</firstname><surname>Schneider</surname>
18 <orgname>The Samba Team</orgname>
19 <address><email>asn@samba.org</email></address>
22 <!ENTITY author.asn '<author>&person.asn;</author>'>
24 <!ENTITY person.jelmer '
25 <firstname>Jelmer</firstname><othername>R.</othername><surname>Vernooij</surname><othername>R.</othername>
27 <orgname>The Samba Team</orgname>
28 <address><email>jelmer@samba.org</email></address>
31 <!ENTITY author.jelmer '<author>&person.jelmer;</author>'>
33 <!ENTITY person.jerry '
34 <firstname>Gerald</firstname><surname>Carter</surname><othername>(Jerry)</othername>
36 <orgname>Samba Team</orgname>
37 <address><email>jerry@samba.org</email></address>
40 <!ENTITY author.jerry '<author>&person.jerry;</author>'>
42 <!ENTITY author.jeremy '
44 <firstname>Jeremy</firstname><surname>Allison</surname>
46 <orgname>Samba Team</orgname>
47 <address><email>jra@samba.org</email></address>
52 <firstname>John</firstname><surname>Terpstra</surname><othername>H.</othername>
54 <orgname>Samba Team</orgname>
55 <address><email>jht@samba.org</email></address>
58 <!ENTITY author.jht '<author>&person.jht;</author>'>
61 <firstname>Guenther</firstname><surname>Deschner</surname>
63 <orgname>Samba Team</orgname>
64 <address><email>gd@samba.org</email></address>
67 <!ENTITY author.gd '<author>&person.gd;</author>'>
69 <!ENTITY person.kauer '
70 <firstname>Karl</firstname><surname>Auer</surname>
72 <orgname>Samba Team</orgname>
73 <address><email>kauer@biplane.com.au</email></address>
77 <!ENTITY author.kauer '<author>&person.kauer;</author>'>
79 <!ENTITY person.danshearer '
80 <firstname>Dan</firstname><surname>Shearer</surname>
82 <orgname>Samba Team</orgname>
83 <address><email>dan@samba.org</email></address>
87 <!ENTITY author.danshearer '<author>&person.danshearer;</author>'>
89 <!ENTITY person.tpot '
90 <firstname>Tim</firstname><surname>Potter</surname>
92 <orgname>Samba Team</orgname>
93 <address><email>tpot@samba.org</email></address>
97 <!ENTITY author.tpot '<author>&person.tpot;</author>'>
99 <!ENTITY author.tridge '
101 <firstname>Andrew</firstname><surname>Tridgell</surname>
103 <orgname>Samba Team</orgname>
104 <address><email>tridge@samba.org</email></address>
108 <!ENTITY person.jmcd '
109 <firstname>Jim</firstname><surname>McDonough</surname>
111 <orgname>IBM</orgname>
112 <address><email>jmcd@us.ibm.com</email></address>
115 <!ENTITY author.jmcd '<author>&person.jmcd;</author>'>
118 <firstname>Volker</firstname><surname>Lendecke</surname>
120 <orgname>Samba Team</orgname>
121 <address><email>Volker.Lendecke@SerNet.DE</email></address>
124 <!ENTITY author.vl '<author>&person.vl;</author>'>
126 <!ENTITY author.dbannon '
128 <firstname>David</firstname><surname>Bannon</surname>
130 <orgname>Samba Team</orgname>
131 <address><email>dbannon@samba.org</email></address>
135 <!ENTITY author.mimir '
137 <firstname>Rafal</firstname><surname>Szczesniak</surname>
139 <orgname>Samba Team</orgname>
140 <address><email>mimir@samba.org</email></address>
144 <!ENTITY author.dlechnyr '
146 <firstname>David</firstname><surname>Lechnyr</surname>
148 <orgname>Unofficial HOWTO</orgname>
149 <address><email>david@lechnyr.com</email></address>
153 <!ENTITY author.eroseme '
155 <firstname>Eric</firstname><surname>Roseme</surname>
157 <orgname>HP Oplocks Usage Recommendations Whitepaper</orgname>
158 <address><email>eric.roseme@hp.com</email></address>
162 <!ENTITY author.ghenry '
164 <firstname>Gavin</firstname><surname>Henry</surname>
166 <orgname>Suretec Systems Limited, UK</orgname>
167 <address><email>ghenry@suretecsystems.com</email></address>
171 <!ENTITY cmdline.common.debug.client '
173 <term>-d|--debuglevel=level</term>
176 <replaceable>level</replaceable> is an integer from 0
177 to 10. The default value if this parameter is not
178 specified is 1 for client applications.
182 The higher this value, the more detail will be logged
183 to the log files about the activities of the server. At
184 level 0, only critical errors and serious warnings will
185 be logged. Level 1 is a reasonable level for day-to-day
186 running - it generates a small amount of information
187 about operations carried out.
191 Levels above 1 will generate considerable amounts of
192 log data, and should only be used when investigating a
193 problem. Levels above 3 are designed for use only by
194 developers and generate HUGE amounts of log data, most
195 of which is extremely cryptic.
199 Note that specifying this parameter here will override
200 the <smbconfoption name="log level" /> parameter in the
207 <term>--debug-stdout</term>
210 This will redirect debug output to STDOUT. By default
211 all clients are logging to STDERR.
217 <!ENTITY cmdline.common.debug.server '
219 <term>-d|--debuglevel=level</term>
223 <replaceable>level</replaceable> is an integer from 0
224 to 10. The default value if this parameter is not
229 The higher this value, the more detail will be logged
230 to the log files about the activities of the server. At
231 level 0, only critical errors and serious warnings will
232 be logged. Level 1 is a reasonable level for day-to-day
233 running - it generates a small amount of information
234 about operations carried out.
238 Levels above 1 will generate considerable amounts of
239 log data, and should only be used when investigating a
240 problem. Levels above 3 are designed for use only by
241 developers and generate HUGE amounts of log data, most
242 of which is extremely cryptic.
246 Note that specifying this parameter here will override
247 the <smbconfoption name="log level" /> parameter in the
254 <term>--debug-stdout</term>
257 This will redirect debug output to STDOUT. By default
258 server daemons are logging to a log file.
264 <!ENTITY cmdline.common.option '
266 <term>--option=<name>=<value></term>
270 <citerefentry><refentrytitle>smb.conf</refentrytitle>
271 <manvolnum>5</manvolnum></citerefentry> option
272 "<name>" to value "<value>" from the
273 command line. This overrides compiled-in defaults and
274 options read from the configuration file. If a name or
275 a value includes a space, wrap whole
276 --option=name=value into quotes.
282 <!ENTITY cmdline.common.config.client '
284 <term>--configfile=<configuration file></term>
287 The file specified contains the configuration details
288 required by the client. The information in this file
289 can be general for client and server or only provide
290 client specific like options such as
291 <smbconfoption name="client smb encrypt" />. See
292 &smb.conf; for more information. The default
293 configuration file name is determined at compile time.
299 <!ENTITY cmdline.common.config.server '
301 <term>--configfile=CONFIGFILE</term>
304 The file specified contains the configuration details
305 required by the server. The information in this file
306 includes server-specific information such as what
307 printcap file to use, as well as descriptions of all
308 the services that the server is to provide. See
309 &smb.conf; for more information. The default
310 configuration file name is determined at compile
317 <!ENTITY cmdline.version '
319 <term>-V|--version</term>
322 Prints the program version number.
328 <!ENTITY cmdline.common.samba.logbasename '
330 <term>-l|--log-basename=logdirectory</term>
333 Base directory name for log/debug files. The extension
334 <constant>".progname"</constant> will be appended (e.g.
335 log.smbclient, log.smbd, etc...). The log file is never
336 removed by the client.
342 <!ENTITY cmdline.common.samba.leakreport '
344 <term>--leak-report</term>
347 Enable talloc leak reporting on exit.
353 <!ENTITY cmdline.common.samba.leakreportfull '
355 <term>--leak-report-full</term>
358 Enable full talloc leak reporting on exit.
364 <!ENTITY cmdline.common.samba.client '
365 &cmdline.common.debug.client;
366 &cmdline.common.config.client;
367 &cmdline.common.option;
368 &cmdline.common.samba.logbasename;
369 &cmdline.common.samba.leakreport;
370 &cmdline.common.samba.leakreportfull;
374 <!ENTITY cmdline.common.samba.server '
375 &cmdline.common.debug.server;
376 &cmdline.common.config.server;
377 &cmdline.common.option;
378 &cmdline.common.samba.logbasename;
379 &cmdline.common.samba.leakreport;
380 &cmdline.common.samba.leakreportfull;
384 <!ENTITY cmdline.common.connection.nameresolve '
386 <term>-R|--name-resolve=NAME-RESOLVE-ORDER</term>
389 This option is used to determine what naming services
390 and in what order to resolve host names to IP
391 addresses. The option takes a space-separated string of
392 different name resolution options. The best is to wrap
393 the whole --name-resolve=NAME-RESOLVE-ORDER into
398 The options are: "lmhosts", "host", "wins" and "bcast".
399 They cause names to be resolved as follows:
405 <constant>lmhosts</constant>: Lookup an
406 IP address in the Samba lmhosts file.
407 If the line in lmhosts has no name type
408 attached to the NetBIOS name (see the
409 <citerefentry><refentrytitle>lmhosts</refentrytitle>
410 <manvolnum>5</manvolnum></citerefentry>
411 for details) then any name type matches
418 <constant>host</constant>: Do a
419 standard host name to IP address
420 resolution, using the system
421 <filename>/etc/hosts</filename>, NIS,
422 or DNS lookups. This method of name
423 resolution is operating system
424 dependent, for instance on IRIX or
425 Solaris this may be controlled by the
426 <filename>/etc/nsswitch.conf
427 </filename> file). Note that this
428 method is only used if the NetBIOS name
429 type being queried is the 0x20 (server)
430 name type, otherwise it is ignored.
436 <constant>wins</constant>: Query a name
437 with the IP address listed in the
438 <parameter>wins server</parameter>
439 parameter. If no WINS server has been
440 specified this method will be ignored.
446 <constant>bcast</constant>: Do a
447 broadcast on each of the known local
448 interfaces listed in the
449 <parameter>interfaces</parameter>
450 parameter. This is the least reliable
451 of the name resolution methods as it
452 depends on the target host being on a
453 locally connected subnet.
459 If this parameter is not set then the name resolve
460 order defined in the &smb.conf; file parameter
461 (<smbconfoption name="name resolve order" />) will be
466 The default order is lmhosts, host, wins, bcast.
467 Without this parameter or any entry in the
468 <smbconfoption name="name resolve order" /> parameter
469 of the &smb.conf; file, the name resolution methods
470 will be attempted in this order.
476 <!ENTITY cmdline.common.connection.socketoptions '
478 <term>-O|--socket-options=SOCKETOPTIONS</term>
481 TCP socket options to set on the client socket. See the
482 socket options parameter in the &smb.conf; manual page
483 for the list of valid options.
489 <!ENTITY cmdline.common.connection.netbiosname '
491 <term>-n|--netbiosname=NETBIOSNAME</term>
494 This option allows you to override the NetBIOS name
495 that Samba uses for itself. This is identical to
496 setting the <smbconfoption name="netbios name" />
497 parameter in the &smb.conf; file. However, a command
498 line setting will take precedence over settings in
505 <!ENTITY cmdline.common.connection.workgroup '
507 <term>-W|--workgroup=WORKGROUP</term>
510 Set the SMB domain of the username. This overrides
511 the default domain which is the domain defined in
512 smb.conf. If the domain specified is the same as the
513 servers NetBIOS name, it causes the client to log on
514 using the servers local SAM (as opposed to the Domain
519 Note that specifying this parameter here will override
520 the <smbconfoption name="workgroup" /> parameter in the
527 <!ENTITY cmdline.common.connection.realm '
529 <term>-r|--realm=REALM</term>
532 Set the realm for the domain.
536 Note that specifying this parameter here will override
537 the <smbconfoption name="realm" /> parameter in the
543 <!ENTITY cmdline.common.connection.netbiosscope '
545 <term>--netbios-scope=SCOPE</term>
548 This specifies a NetBIOS scope that
549 <command>nmblookup</command> will use to communicate
550 with when generating NetBIOS names. For details on the
551 use of NetBIOS scopes, see rfc1001.txt and rfc1002.txt.
552 NetBIOS scopes are <emphasis>very</emphasis> rarely
553 used, only set this parameter if you are the system
554 administrator in charge of all the NetBIOS systems you
561 <!ENTITY cmdline.common.connection.max-protocol '
563 <term>-m|--max-protocol=MAXPROTOCOL</term>
566 The value of the parameter (a string) is the highest
567 protocol level that will be supported by the client.
571 Note that specifying this parameter here will override
572 the <smbconfoption name="client max protocol" />
573 parameter in the &smb.conf; file.
579 <!ENTITY cmdline.common.connection '
580 &cmdline.common.connection.nameresolve;
581 &cmdline.common.connection.socketoptions;
582 &cmdline.common.connection.max-protocol;
583 &cmdline.common.connection.netbiosname;
584 &cmdline.common.connection.netbiosscope;
585 &cmdline.common.connection.workgroup;
586 &cmdline.common.connection.realm;
589 <!ENTITY pct "%">
591 <!ENTITY cmdline.common.credentials.user '
593 <term>-U|--user=[DOMAIN\]USERNAME[&pct;PASSWORD]</term>
596 Sets the SMB username or username and password.
600 If &pct;PASSWORD is not specified, the user will be
601 prompted. The client will first check the
602 <envar>USER</envar> environment variable
603 (which is also permitted to also contain the
604 password separated by a &pct;), then the
605 <envar>LOGNAME</envar> variable (which is not
606 permitted to contain a password) and if either exists,
607 the value is used. If these environmental
608 variables are not found, the username
609 found in a Kerberos Credentials cache may be used.
613 A third option is to use a credentials file which
614 contains the plaintext of the username and password.
615 This option is mainly provided for scripts where the
616 admin does not wish to pass the credentials on the
617 command line or via environment variables. If this
618 method is used, make certain that the permissions on
619 the file restrict access from unwanted users. See the
620 <parameter>-A</parameter> for more details.
624 Be cautious about including passwords in scripts
625 or passing user-supplied values onto the command line. For
626 security it is better to let the Samba client tool ask for the
627 password if needed, or obtain the password once with <command>kinit</command>.
630 While Samba will attempt to scrub the password
631 from the process title (as seen in ps), this
632 is after startup and so is subject to a race.
638 <!ENTITY cmdline.common.credentials.nopass '
640 <term>-N|--no-pass</term>
643 If specified, this parameter suppresses the normal
644 password prompt from the client to the user. This is
645 useful when accessing a service that does not require a
650 Unless a password is specified on the command line or
651 this parameter is specified, the client will request a
656 If a password is specified on the command line and this
657 option is also defined the password on the command line
658 will be silently ignored and no password will be
665 <!ENTITY cmdline.common.credentials.password '
667 <term>--password</term>
670 Specify the password on the commandline.
673 <para> Be cautious about including passwords in
674 scripts or passing user-supplied values onto
675 the command line. For security it is better to
676 let the Samba client tool ask for the password
677 if needed, or obtain the password once with
678 <command>kinit</command>.
681 <para> If --password is not specified,
682 the tool will check the <envar>PASSWD</envar>
683 environment variable, followed by <envar>PASSWD_FD</envar>
684 which is expected to contain an open
685 file descriptor (FD) number.
688 Finally it will check <envar>PASSWD_FILE</envar> (containing
689 a file path to be opened). The file should only
690 contain the password. Make certain that the
691 permissions on the file restrict
692 access from unwanted users!
695 While Samba will attempt to scrub the password
696 from the process title (as seen in ps), this
697 is after startup and so is subject to a race.
703 <!ENTITY cmdline.common.credentials.pwnthash '
705 <term>--pw-nt-hash</term>
708 The supplied password is the NT hash.
714 <!ENTITY cmdline.common.credentials.authenticationfile '
716 <term>-A|--authentication-file=filename</term>
719 This option allows you to specify a file from which to
720 read the username and password used in the connection.
721 The format of the file is:
726 username = <value>
727 password = <value>
728 domain = <value>
733 Make certain that the permissions on the file restrict
734 access from unwanted users!
740 <!ENTITY cmdline.common.credentials.machinepass '
742 <term>-P|--machine-pass</term>
745 Use stored machine account password.
751 <!ENTITY cmdline.common.credentials.simplebinddn '
753 <term>--simple-bind-dn=DN</term>
756 DN to use for a simple bind.
762 <!ENTITY cmdline.common.credentials.usekerberos '
764 <term>--use-kerberos=desired|required|off</term>
767 This parameter determines whether Samba client tools
768 will try to authenticate using Kerberos. For Kerberos
769 authentication you need to use dns names instead of IP
770 addresses when connecting to a service.
774 Note that specifying this parameter here will override
775 the <smbconfoption name="client use kerberos" />
776 parameter in the &smb.conf; file.
782 <!ENTITY cmdline.common.credentials.usekrb5ccache '
784 <term>--use-krb5-ccache=CCACHE</term>
787 Specifies the credential cache location for Kerberos
792 This will set --use-kerberos=required too.
798 <!ENTITY cmdline.common.credentials.usewinbindccache '
800 <term>--use-winbind-ccache</term>
803 Try to use the credential cache by winbind.
809 <!ENTITY cmdline.common.credentials.clientprotection '
811 <term>--client-protection=sign|encrypt|off</term>
814 Sets the connection protection the client tool should
819 Note that specifying this parameter here will override
820 the <smbconfoption name="client protection" />
821 parameter in the &smb.conf; file.
825 In case you need more fine grained control you can use:
826 <command>--option=clientsmbencrypt=OPTION</command>,
827 <command>--option=clientipcsigning=OPTION</command>,
828 <command>--option=clientsigning=OPTION</command>.
834 <!ENTITY cmdline.common.credentials '
835 &cmdline.common.credentials.user;
836 &cmdline.common.credentials.nopass;
837 &cmdline.common.credentials.password;
838 &cmdline.common.credentials.pwnthash;
839 &cmdline.common.credentials.authenticationfile;
840 &cmdline.common.credentials.machinepass;
841 &cmdline.common.credentials.simplebinddn;
842 &cmdline.common.credentials.usekerberos;
843 &cmdline.common.credentials.usekrb5ccache;
844 &cmdline.common.credentials.usewinbindccache;
845 &cmdline.common.credentials.clientprotection;
848 <!ENTITY cmdline.legacy.kerberos.s3 '
850 <term>-k|--kerberos</term>
853 Use kerberos authentication. This option is deprecated.
854 Migrate to --use-kerberos!
860 <!ENTITY cmdline.legacy.kerberos.s4 '
862 <term>-k|--kerberos=yes|no</term>
865 Whether to use kerberos authentication. This option is
866 deprecated. Migrate to --use-kerberos!
875 <!ENTITY stdarg.help '
877 <term>-?|--help</term>
878 <listitem><para>Print a summary of command line options.
883 <!ENTITY stdarg.usage '
886 <listitem><para>Display brief usage message.
891 <!ENTITY popt.autohelp '
896 <!-- Entities for the various programs -->
897 <!ENTITY OL '<application>OpenLDAP</application>'>
898 <!ENTITY smbd '<application>smbd</application>'>
899 <!ENTITY nmbd '<application>nmbd</application>'>
900 <!ENTITY testparm '<application>testparm</application>'>
901 <!ENTITY smb.conf '<filename>&pathconfig.CONFIGFILE;</filename>'>
902 <!ENTITY smbclient '<application>smbclient</application>'>
903 <!ENTITY winbindd '<application>winbindd</application>'>
904 <!ENTITY net '<application>net</application>'>
906 <!ENTITY not.implemented "<note><para>Currently NOT implemented.</para></note>">
907 <!ENTITY rootprompt "<prompt>root# </prompt>">
908 <!ENTITY prompt "<prompt>$ </prompt>">
909 <!ENTITY dosprompt "<prompt>C:\> </prompt>">
911 <!ENTITY example.workgroup "MIDEARTH">
912 <!ENTITY example.server.samba "GANDALF">
913 <!ENTITY example.server.windows "SARUMAN">
914 <!ENTITY example.workstation.windows "FRODO">
915 <!ENTITY example.workstation.samba "BILBO">
916 <!ENTITY example.pdc.samba "SAURON">
917 <!ENTITY example.server.wins "noldor">
919 <!ENTITY smbmdash "<?latex --- ?>">