diff options
author | Jelmer Vernooij <jelmer@samba.org> | 2003-02-18 20:12:20 +0000 |
---|---|---|
committer | Jelmer Vernooij <jelmer@samba.org> | 2003-02-18 20:12:20 +0000 |
commit | e657bccd25a33a7382c0a9a355b37c8dd3c1d536 (patch) | |
tree | 2a5997f73f6dfaf6a14753cbf69140cdd817ed78 | |
parent | 5eb7b6113b8d4b59de5177e8b1485dc0c3ae19db (diff) | |
download | samba-e657bccd25a33a7382c0a9a355b37c8dd3c1d536.tar.gz samba-e657bccd25a33a7382c0a9a355b37c8dd3c1d536.tar.bz2 samba-e657bccd25a33a7382c0a9a355b37c8dd3c1d536.zip |
Update introduction
(This used to be commit 46c99ff855ba273568785f118cd19a2788430c1e)
-rw-r--r-- | docs/docbook/projdoc/passdb.sgml | 102 |
1 files changed, 64 insertions, 38 deletions
diff --git a/docs/docbook/projdoc/passdb.sgml b/docs/docbook/projdoc/passdb.sgml index e058439388..4e0ee93a55 100644 --- a/docs/docbook/projdoc/passdb.sgml +++ b/docs/docbook/projdoc/passdb.sgml @@ -37,18 +37,32 @@ <sect1> <title>Introduction</title> + + <para>Old windows clients send plain text passwords over the wire. + Samba can check these passwords by crypting them and comparing them + to the hash stored in the unix user database. + </para> - <para>Newer windows clients send encrypted passwords over + <para> + Newer windows clients send encrypted passwords (so-called + Lanman and NT hashes) over the wire, instead of plain text passwords. The newest clients will only send encrypted passwords and refuse to send plain text - passwords, unless their registry is tweaked.</para> + passwords, unless their registry is tweaked. + </para> <para>These passwords can't be converted to unix style encrypted passwords. Because of that you can't use the standard unix user database, and you have to store the Lanman and NT hashes - somewhere else. Also, windows stores some data for each user - that is not stored by unix. Thus, samba has it's own user database. - This user database is maintained by a "passdb backend". Commonly + somewhere else. </para> + + <para>Next to a differently encrypted passwords, + windows also stores certain data for each user + that is not stored in a unix user database, e.g. + workstations the user may logon from, the location where his/her + profile is stored, etc. + Samba retrieves and stores this information using a "passdb backend". + Commonly available backends are LDAP, plain text file, MySQL and nisplus. For more information, see the documentation about the <command>passdb backend = </command> parameter. @@ -68,7 +82,8 @@ password from them, but they could potentially be used in a modified client to gain access to a server. This would require considerable technical knowledge on behalf of the attacker but is perfectly possible. - You should thus treat the smbpasswd file as though it contained the + You should thus treat the data stored in whatever + passdb backend you use (smbpasswd file, ldap, mysql) as though it contained the cleartext passwords of all your users. Its contents must be kept secret, and the file should be protected accordingly.</para> @@ -89,17 +104,17 @@ <para>Other Microsoft operating systems which also exhibit this behavior includes</para> - <itemizedlist> - <listitem><para>MS DOS Network client 3.0 with - the basic network redirector installed</para></listitem> + <simplelist> + <member>MS DOS Network client 3.0 with + the basic network redirector installed</member> - <listitem><para>Windows 95 with the network redirector - update installed</para></listitem> + <member>Windows 95 with the network redirector + update installed</member> - <listitem><para>Windows 98 [se]</para></listitem> + <member>Windows 98 [se]</member> - <listitem><para>Windows 2000</para></listitem> - </itemizedlist> + <member>Windows 2000</member> + </simplelist> <para><emphasis>Note :</emphasis>All current release of Microsoft SMB/CIFS clients support authentication via the @@ -111,38 +126,37 @@ <sect2> <title>Advantages of SMB Encryption</title> - <itemizedlist> - <listitem><para>plain text passwords are not passed across + <simplelist> + <member>plain text passwords are not passed across the network. Someone using a network sniffer cannot just - record passwords going to the SMB server.</para> - </listitem> + record passwords going to the SMB server.</member> - <listitem><para>WinNT doesn't like talking to a server + <member>WinNT doesn't like talking to a server that isn't using SMB encrypted passwords. It will refuse to browse the server if the server is also in user level security mode. It will insist on prompting the user for the password on each connection, which is very annoying. The only things you can do to stop this is to use SMB encryption. - </para></listitem> - </itemizedlist> + </member> + </simplelist> </sect2> <sect2> <title>Advantages of non-encrypted passwords</title> - <itemizedlist> - <listitem><para>plain text passwords are not kept - on disk. </para></listitem> + <simplelist> + <member>plain text passwords are not kept + on disk. </member> - <listitem><para>uses same password file as other unix - services such as login and ftp</para></listitem> + <member>uses same password file as other unix + services such as login and ftp</member> - <listitem><para>you are probably already using other + <member>you are probably already using other services (such as telnet and ftp) which send plain text passwords over the net, so sending them for SMB isn't - such a big deal.</para></listitem> - </itemizedlist> + such a big deal.</member> + </simplelist> </sect2> </sect1> @@ -150,17 +164,16 @@ <sect1> <title>The smbpasswd Command</title> - <para>The smbpasswd command maintains the two 32 byte password fields - in the smbpasswd file. If you wish to make it similar to the unix - <command>passwd</command> or <command>yppasswd</command> programs, - install it in <filename>/usr/local/samba/bin/</filename> (or your - main Samba binary directory).</para> FIXME + <para>The smbpasswd utility is a utility similar to the + <command>passwd</command> or <command>yppasswd</command> programs. + It maintains the two 32 byte password fields + in the passdb backend. </para> - <para><command>smbpasswd</command> now works in a client-server mode + <para><command>smbpasswd</command> works in a client-server mode where it contacts the local smbd to change the user's password on its behalf. This has enormous benefits - as follows.</para> - <para><command>smbpasswd</command> now has the capability + <para><command>smbpasswd</command> has the capability to change passwords on Windows NT servers (this only works when the request is sent to the NT Primary Domain Controller if you are changing an NT Domain user's password).</para> @@ -205,7 +218,20 @@ FIXME <sect1> <title>Plain text</title> -FIXME +<para> +Older versions of samba retrieved user information from the unix user database +and eventually some other fields from the file <filename>/etc/samba/smbpasswd</filename> +or <filename>/etc/smbpasswd</filename>. When password encryption is disabled, no +data is stored at all. +</para> +</sect1> + +<sect1> +<title>TDB</title> +<para>Samba can also store the user data in a "TDB" (Trivial Database). Using this backend +doesn't require any additional configuration. This backend is recommended for new installations who +don't require LDAP. +</para> </sect1> <sect1> @@ -759,7 +785,7 @@ ntPassword: 878D8014606CDA29677A44EFA1353FC7 </sect1> <sect1> -<title>Passdb MySQL plugin</title> +<title>MySQL</title> <sect2> <title>Building</title> |