summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
Diffstat (limited to 'docs')
-rw-r--r--docs/Samba3-HOWTO/TOSHARG-BDC.xml14
-rw-r--r--docs/Samba3-HOWTO/TOSHARG-IDMAP.xml2
-rw-r--r--docs/Samba3-HOWTO/TOSHARG-NetworkBrowsing.xml189
-rw-r--r--docs/Samba3-HOWTO/TOSHARG-PDC.xml12
4 files changed, 119 insertions, 98 deletions
diff --git a/docs/Samba3-HOWTO/TOSHARG-BDC.xml b/docs/Samba3-HOWTO/TOSHARG-BDC.xml
index dfd8281408..ba36d5627f 100644
--- a/docs/Samba3-HOWTO/TOSHARG-BDC.xml
+++ b/docs/Samba3-HOWTO/TOSHARG-BDC.xml
@@ -469,9 +469,9 @@ act as a BDC to an Active Directory domain controller.
<indexterm><primary>WINS</primary></indexterm>
<indexterm><primary>NetBIOS</primary></indexterm>
Every machine that is a domain controller for the domain MIDEARTH has to register the NetBIOS
-group name MIDEARTH&lt;#1C&gt; with the WINS server and/or by broadcast on the local network.
-The PDC also registers the unique NetBIOS name MIDEARTH&lt;#1B&gt; with the WINS server.
-The name type &lt;#1B&gt; name is normally reserved for the Domain Master Browser (DMB), a role
+group name MIDEARTH&lt;1C&gt; with the WINS server and/or by broadcast on the local network.
+The PDC also registers the unique NetBIOS name MIDEARTH&lt;1B&gt; with the WINS server.
+The name type &lt;1B&gt; name is normally reserved for the Domain Master Browser (DMB), a role
that has nothing to do with anything related to authentication, but the Microsoft domain
implementation requires the DMB to be on the same machine as the PDC.
</para>
@@ -516,7 +516,7 @@ environment all machines require appropriate DNS entries. More information may b
<indexterm><primary>credentials validation</primary></indexterm>
An MS Windows NT4/200x/XP Professional workstation in the domain MIDEARTH that wants a
local user to be authenticated has to find the domain controller for MIDEARTH. It does this
-by doing a NetBIOS name query for the group name MIDEARTH&lt;#1C&gt;. It assumes that each
+by doing a NetBIOS name query for the group name MIDEARTH&lt;1C&gt;. It assumes that each
of the machines it gets back from the queries is a domain controller and can answer logon
requests. To not open security holes, both the workstation and the selected domain controller
authenticate each other. After that the workstation sends the user's credentials (name and
@@ -704,10 +704,10 @@ by Example</quote> that may be obtained from local and on-line book stores.
<indexterm><primary>NetBIOS</primary></indexterm>
<indexterm><primary>group</primary></indexterm>
<indexterm><primary>PDC</primary></indexterm>
-This configuration causes the BDC to register only the name MIDEARTH&lt;#1C&gt; with the WINS server. This is
-not a problem, as the name MIDEARTH&lt;#1C&gt; is a NetBIOS group name that is meant to be registered by more
+This configuration causes the BDC to register only the name MIDEARTH&lt;1C&gt; with the WINS server. This is
+not a problem, as the name MIDEARTH&lt;1C&gt; is a NetBIOS group name that is meant to be registered by more
than one machine. The parameter <smbconfoption name="domain master">no</smbconfoption> forces the BDC not to
-register MIDEARTH&lt;#1B&gt;, which is a unique NetBIOS name that is reserved for the PDC.
+register MIDEARTH&lt;1B&gt;, which is a unique NetBIOS name that is reserved for the PDC.
</para>
<para>
diff --git a/docs/Samba3-HOWTO/TOSHARG-IDMAP.xml b/docs/Samba3-HOWTO/TOSHARG-IDMAP.xml
index e975158e55..4e7a0b978b 100644
--- a/docs/Samba3-HOWTO/TOSHARG-IDMAP.xml
+++ b/docs/Samba3-HOWTO/TOSHARG-IDMAP.xml
@@ -503,7 +503,7 @@ Join to domain 'MEGANET2' is not valid
<step><para>
Execute:
- <indexterm><primary>net ads join</primary></indexterm>
+ <indexterm><primary>net</primary><secondary>ads</secondary><tertiary>join</tertiary></indexterm>
<screen>
&rootprompt; net ads join -UAdministrator%password
Joined domain BUTTERNET.
diff --git a/docs/Samba3-HOWTO/TOSHARG-NetworkBrowsing.xml b/docs/Samba3-HOWTO/TOSHARG-NetworkBrowsing.xml
index e4ef237035..6324bdfdd0 100644
--- a/docs/Samba3-HOWTO/TOSHARG-NetworkBrowsing.xml
+++ b/docs/Samba3-HOWTO/TOSHARG-NetworkBrowsing.xml
@@ -11,9 +11,9 @@
<title>Network Browsing</title>
<para>
-This document contains detailed information as well as a fast-track guide to
+This chapter contains detailed information as well as a fast-track guide to
implementing browsing across subnets and/or across workgroups (or domains).
-WINS is the best tool for resolution of NetBIOS names to IP addresses. WINS is
+WINS is the best tool for resolution of NetBIOS names to IP addresses; however, WINS is
not involved in browse list handling except by way of name-to-address resolution.
</para>
@@ -107,34 +107,49 @@ The Samba application that controls browse list management and name resolution i
called <filename>nmbd</filename>. The configuration parameters involved in nmbd's operation are:
</para>
-<para>Browsing options:
- <smbconfoption name="os level"/>(*),
- <smbconfoption name="lm announce"/>,
- <smbconfoption name="lm interval"/>,
- <smbconfoption name="preferred master"/>(*),
- <smbconfoption name="local master"/>(*),
- <smbconfoption name="domain master"/>(*),
- <smbconfoption name="browse list"/>,
- <smbconfoption name="enhanced browsing"/>.
+<para>
+Browsing options:
+</para>
+<itemizedlist>
+ <listitem><smbconfoption name="os level"/></listitem>
+ <listitem><smbconfoption name="lm announce"/></listitem>
+ <listitem><smbconfoption name="lm interval"/></listitem>
+ <listitem><smbconfoption name="preferred master"/>(*)</listitem>
+ <listitem><smbconfoption name="local master"/>(*)</listitem>
+ <listitem><smbconfoption name="domain master"/>(*)</listitem>
+ <listitem><smbconfoption name="browse list"/></listitem>
+ <listitem><smbconfoption name="enhanced browsing"/></listitem>
+</itemizedlist>
+
+<para>
+Name Resolution Method:
</para>
+<itemizedlist>
+ <listitem><smbconfoption name="name resolve order"/>(*)</listitem>
+</itemizedlist>
-<para>Name Resolution Method:
- <smbconfoption name="name resolve order"/>(*).
+<para>
+WINS options:
</para>
+<itemizedlist>
+ <listitem><smbconfoption name="dns proxy"/></listitem>
+ <listitem><smbconfoption name="wins proxy"/></listitem>
+ <listitem><smbconfoption name="wins server"/>(*)</listitem>
+ <listitem><smbconfoption name="wins support"/>(*)</listitem>
+ <listitem><smbconfoption name="wins hook"/></listitem>
+</itemizedlist>
-<para>WINS options:
- <smbconfoption name="dns proxy"/>,
- <smbconfoption name="wins proxy"/>,
- <smbconfoption name="wins server"/>(*),
- <smbconfoption name="wins support"/>(*),
- <smbconfoption name="wins hook"/>.
+<para>
+Those marked with an (*) are the only options that commonly may need to be modified. Even if none of these
+parameters is set, <filename>nmbd</filename> will still do its job.
</para>
<para>
<indexterm><primary>WINS</primary></indexterm>
-For Samba, the WINS Server and WINS Support are mutually exclusive options. Those marked with
-an (*) are the only options that commonly may need to be modified. Even if none of these
-parameters is set, <filename>nmbd</filename> will still do its job.
+For Samba, the WINS Server and WINS Support are mutually exclusive options. When <command>nmbd</ocmmand> is
+started it will fail to execute if both options are set in the &smb.conf; file. The <command>nmbd</ocmmand>
+understands that when it spawns an instance of itself to run as a WINS server that it has to use its own WINS
+server also.
</para>
</sect1>
@@ -159,9 +174,8 @@ out NetBIOS support.
<indexterm><primary>unicast</primary></indexterm>
<indexterm><primary>UDP</primary></indexterm>
Samba implements NetBIOS, as does MS Windows NT/200x/XP, by encapsulating it over TCP/IP.
-MS Windows products can do likewise. NetBIOS-based networking uses broadcast messaging to
-effect browse list management. When running NetBIOS over TCP/IP, this uses UDP-based messaging.
-UDP messages can be broadcast or unicast.
+NetBIOS-based networking uses broadcast messaging to effect browse list management. When running NetBIOS over
+TCP/IP, this uses UDP-based messaging. UDP messages can be broadcast or unicast.
</para>
<para>
@@ -175,7 +189,7 @@ implements browse list collation using unicast UDP.
<para>
The methods used by MS Windows to perform name lookup requests (name resolution) is determined by a
-configuration parameter called the netbios node-type. There are four basic NetBIOS node types:
+configuration parameter called the NetBIOS node-type. There are four basic NetBIOS node types:
</para>
<indexterm><primary>b-node</primary></indexterm>
@@ -228,23 +242,25 @@ the use of the <smbconfoption name="remote announce"/> and the
<para>
<indexterm><primary>replication</primary><secondary>WINS</secondary></indexterm>
-As of Samba-3 WINS replication is being worked on. The bulk of the code has
-been committed, but it still needs maturation. This is not a supported feature
-of the Samba-3.0.20 release. Hopefully, this will become a supported feature
-of one of the Samba-3 release series.
+As of Samba-3, WINS replication is being worked on. The bulk of the code has been committed, but it still
+needs maturation. This is not a supported feature of the Samba-3.0.20 release. Hopefully, this will become a
+supported feature of one of the Samba-3 release series. The delay is caused by the fact that this feature has
+not been of sufficient significance to inspire someone to pay a developer to complete it.
</para>
<para>
-Right now Samba WINS does not support MS-WINS replication. This means that
-when setting up Samba as a WINS server, there must only be one <filename>nmbd</filename>
-configured as a WINS server on the network. Some sites have used multiple Samba WINS
-servers for redundancy (one server per subnet) and then used
-<smbconfoption name="remote browse sync"/> and <smbconfoption name="remote announce"/>
-to effect browse list collation across all segments. Note that this means clients
-will only resolve local names and must be configured to use DNS to resolve names
-on other subnets in order to resolve the IP addresses of the servers they can see
-on other subnets. This setup is not recommended but is mentioned as a practical
-consideration (i.e., an <quote>if all else fails</quote> scenario).
+Right now Samba WINS does not support MS-WINS replication. This means that when setting up Samba as a WINS
+server, there must only be one <filename>nmbd</filename> configured as a WINS server on the network. Some
+sites have used multiple Samba WINS servers for redundancy (one server per subnet) and then used
+<smbconfoption name="remote browse sync"/> and <smbconfoption name="remote announce"/> to effect browse list
+collation across all segments. Note that this means clients will only resolve local names and must be
+configured to use DNS to resolve names on other subnets in order to resolve the IP addresses of the servers
+they can see on other subnets. This setup is not recommended but is mentioned as a practical consideration
+(i.e., an <quote>if all else fails</quote> scenario). NetBIOS over TCP/IP is an ugly and difficult to manage
+protocol. Its replacement, NetBIOSless SMB over TCP/IP is not without its own manageability concerns. NetBIOS
+based networking is a life of compromise and trade-offs. WINS stores information that can not be stored in
+DNS; consequently, DNS is a poor substitute for WINS given that when NetBIOS over TCP/IP is used Windows
+clients are designed to use WINS.
</para>
<para>
@@ -255,38 +271,44 @@ minutes to stabilize, particularly across network segments.
</para>
<para>
-When an MS Windows 200x/XP system attempts to resolve a host name to an IP address,
-it follows a defined path:
+When an MS Windows 200x/XP system attempts to resolve a host name to an IP address, it follows a defined path:
</para>
<orderedlist>
<listitem><para>
- Checks the <filename>hosts</filename> file. It is located in
- <filename>%SystemRoot%\System32\Drivers\etc</filename>.
+ Checks the <filename>hosts</filename> file. It is located in <filename>%SystemRoot%\System32\Drivers\etc</filename>.
</para></listitem>
<listitem><para>
Does a DNS lookup.
</para></listitem>
- <listitem><para>
+ <listitem><para>
Checks the NetBIOS name cache.
- </para></listitem>
+ </para></listitem>
- <listitem><para>
+ <listitem><para>
Queries the WINS server.
- </para></listitem>
+ </para></listitem>
- <listitem><para>
+ <listitem><para>
Does a broadcast name lookup over UDP.
- </para></listitem>
+ </para></listitem>
- <listitem><para>
- Looks up entries in LMHOSTS, located in
- <filename>%SystemRoot%\System32\Drivers\etc</filename>.
- </para></listitem>
+ <listitem><para>
+ Looks up entries in LMHOSTS, located in <filename>%SystemRoot%\System32\Drivers\etc</filename>.
+ </para></listitem>
</orderedlist>
+<para>
+Given the nature of how the NetBIOS over TCP/IP protocol is implemented, only WINS is capable of resolving
+with any reliability name lookups for service oriented names such as TEMPTATION&lt;1C&gt; &smbmdash; a NetBIOS
+name query that seeks to find network logon servers. DNS has not concept of service oriented names such as
+this. In fact, the Microsoft ADS implementation specifically manages a whole range of extended service
+oriented DNS entries. This type of facility is not implemented and is not supported for the NetBIOS over
+TCP/IP protocol name space.
+</para>
+
</sect2>
<sect2>
@@ -305,31 +327,24 @@ TCP/IP-enabled systems. Only a few embedded TCP/IP systems do not support DNS.
<para>
<indexterm><primary>DNS</primary></indexterm>
-Windows 200x/XP can register its hostname with a dynamic DNS server. You can
-force register with a dynamic DNS server in Windows 200x/XP using
-<command>ipconfig /registerdns</command>.
-</para>
-
-<para>
-With Active Directory, a correctly functioning DNS server is absolutely
-essential. In the absence of a working DNS server that has been correctly configured,
-MS Windows clients and servers will be unable to locate each other, so
-network services consequently will be severely impaired.
+Windows 200x/XP can register its hostname with a Dynamic DNS server (DDNS). It is possible to force register with a
+dynamic DNS server in Windows 200x/XP using <command>ipconfig /registerdns</command>.
</para>
<para>
-The use of dynamic DNS is highly recommended with Active Directory, in which case
-the use of BIND9 is preferred for its ability to adequately support the SRV (service)
-records that are needed for Active Directory.
+With Active Directory, a correctly functioning DNS server is absolutely essential. In the absence of a working
+DNS server that has been correctly configured, MS Windows clients and servers will be unable to locate each
+other, so network services consequently will be severely impaired.
</para>
<para>
-Use of raw SMB over TCP/IP (No NetBIOS layer) can be done only with Active
-Directory domains. Samba is not an Active Directory domain controller: ergo,
-it is not possible run Samba as a domain controller and at the same time <emphasis>not</emphasis> use
-NetBIOS. Where Samba is used as an Active Directory domain member server (DMS)
-it is possible to configure Samba to not use NetBIOS over TCP/IP. A Samba DMS
-can integrate fully into an Active Directory domain.
+Use of raw SMB over TCP/IP (No NetBIOS layer) can be done only with Active Directory domains. Samba is not an
+Active Directory domain controller: ergo, it is not possible to run Samba as a domain controller and at the same
+time <emphasis>not</emphasis> use NetBIOS. Where Samba is used as an Active Directory domain member server
+(DMS) it is possible to configure Samba to not use NetBIOS over TCP/IP. A Samba DMS can integrate fully into
+an Active Directory domain, however, if NetBIOS over TCP/IP is disabled it is necessary manually to create
+appropriate DNS entries for the Samba DMS because they will not be automatically generated either by Samba, or
+by the ADS environment.
</para>
</sect2>
@@ -337,15 +352,21 @@ can integrate fully into an Active Directory domain.
<sect2 id="adsdnstech">
<title>DNS and Active Directory</title>
-
<para>
<indexterm><primary>DNS</primary><secondary>Active Directory</secondary></indexterm>
-Occasionally we hear from UNIX network administrators who want to use a UNIX-based dynamic
-DNS server in place of the Microsoft DNS server. While this might be desirable to some, the
-MS Windows 200x DNS server is autoconfigured to work with Active Directory. It is possible
-to use BIND version 8 or 9, but it will almost certainly be necessary to create service records
-(SRV records) so MS Active Directory clients can resolve hostnames to locate essential network services.
-The following are some of the default service records that Active Directory requires:
+Occasionally we hear from UNIX network administrators who want to use a UNIX-based dynamic DNS server in place
+of the Microsoft DNS server. While this might be desirable to some, the MS Windows 200x DNS server is
+autoconfigured to work with Active Directory. It is possible to use BIND version 8 or 9, but it will almost
+certainly be necessary to create service records (SRV records) so MS Active Directory clients can resolve
+hostnames to locate essential network services. The following are some of the default service records that
+Active Directory requires:
+</para>
+
+<para>
+The use of DDNS is highly recommended with Active Directory, in which case the use of BIND9 is preferred for
+its ability to adequately support the SRV (service) records that are needed for Active Directory. Of course,
+when running ADS it makes sense to use Microsoft's own DDNS server because of the natural affinity between ADS
+and MS DNS.
</para>
<variablelist>
@@ -553,10 +574,10 @@ criteria, will win the election as DMB.
<para>
Where a WINS server is used, the DMB registers its IP address with the WINS server using the name of the
-domain and the NetBIOS name type #1B. e.g., DOMAIN&lt;1B&gt;. All LMBs register their IP address with the WINS
-server, also with the name of the domain and the NetBIOS name type of #1D. The #1B name is unique to one
-server within the domain security context, and only one #1D name is registered for each network segment.
-Machines that have registered the #1D name will be authoritive browse list maintainers for the network segment
+domain and the NetBIOS name type 1B. e.g., DOMAIN&lt;1B&gt;. All LMBs register their IP address with the WINS
+server, also with the name of the domain and the NetBIOS name type of 1D. The 1B name is unique to one
+server within the domain security context, and only one 1D name is registered for each network segment.
+Machines that have registered the 1D name will be authoritive browse list maintainers for the network segment
they are on. The DMB is responsible for synchronizing the browse lists it obtains from the LMBs.
</para>
diff --git a/docs/Samba3-HOWTO/TOSHARG-PDC.xml b/docs/Samba3-HOWTO/TOSHARG-PDC.xml
index 99014eba01..dc090d876f 100644
--- a/docs/Samba3-HOWTO/TOSHARG-PDC.xml
+++ b/docs/Samba3-HOWTO/TOSHARG-PDC.xml
@@ -1020,13 +1020,13 @@ performs a logon:
<orderedlist>
<listitem>
<para>
- <indexterm><primary>DOMAIN&lt;#1C&gt;</primary></indexterm>
+ <indexterm><primary>DOMAIN&lt;1C&gt;</primary></indexterm>
<indexterm><primary>logon server</primary></indexterm>
The client broadcasts (to the IP broadcast address of the subnet it is in)
- a NetLogon request. This is sent to the NetBIOS name DOMAIN&lt;#1C&gt; at the
+ a NetLogon request. This is sent to the NetBIOS name DOMAIN&lt;1C&gt; at the
NetBIOS layer. The client chooses the first response it receives, which
contains the NetBIOS name of the logon server to use in the format of
- <filename>\\SERVER</filename>. The <literal>#1C</literal> name is the name
+ <filename>\\SERVER</filename>. The <literal>1C</literal> name is the name
type that is registered by domain controllers (SMB/CIFS servers that provide
the netlogon service).
</para>
@@ -1140,7 +1140,7 @@ and server mode security are really just a variation on SMB user-level security.
<para>
<indexterm><primary>DOMAIN&lt;1C&gt;</primary></indexterm>
-<indexterm><primary>DOMAIN&lt;#1B&gt;</primary></indexterm>
+<indexterm><primary>DOMAIN&lt;1B&gt;</primary></indexterm>
<indexterm><primary>DMB</primary></indexterm>
<indexterm><primary>PDC</primary></indexterm>
<indexterm><primary>NetBIOS name</primary></indexterm>
@@ -1148,7 +1148,7 @@ and server mode security are really just a variation on SMB user-level security.
<indexterm><primary>election</primary></indexterm>
Actually, this issue is also closely tied to the debate on whether Samba must be the DMB for its workgroup
when operating as a domain controller. In a pure Microsoft Windows NT domain, the PDC wins the election to be
-the DMB, and then registers the DOMAIN&lt;#1B&gt; NetBIOS name. This is not the name used by Windows clients
+the DMB, and then registers the DOMAIN&lt;1B&gt; NetBIOS name. This is not the name used by Windows clients
to locate the domain controller, all domain controllers register the DOMAIN&lt;1C&gt; name and Windows clients
locate a network logon server by seraching for the DOMAIN&lt;1C&gt; name. A DMB is a Domain Master Browser
&smbmdash; see <link linkend="NetworkBrowsing">The Network Browsing Chapter</link>, <link
@@ -1169,7 +1169,7 @@ service. Server that register the DOMAIN&lt;1B&gt; name are DMBs &smbmdash; mean
for browse list synchronization across all machines that have registered the DOMAIN&lt;1D&gt; name. The later
are LMBs that have the responsibility to listen to all NetBIOS name registrations that occur locally to their
own network segment. The network logon service (NETLOGON) is germane to domain control and has nothing to do
-with network browsing and browse list management. The #1C and #1B/#1D name services are orthogonal to each
+with network browsing and browse list management. The 1C and 1B/1D name services are orthogonal to each
other.
</para></note>