*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->IRIX man pages -> smbpasswd.5 (5)              
Title
Content
Arch
Section
 

Contents


     SMBPASSWD(5)    UNIX System V (19 November	2002)	  SMBPASSWD(5)



     NAME    [Toc]    [Back]
	  smbpasswd - The Samba	encrypted password file

     SYNOPSIS    [Toc]    [Back]
	  smbpasswd

     DESCRIPTION    [Toc]    [Back]
	  This tool is part of the  Samba suite.

	  smbpasswd is the Samba encrypted password file. It contains
	  the username,	Unix user id and the SMB hashed	passwords of
	  the user, as well as account flag information	and the	time
	  the password was last	changed. This file format has been
	  evolving with	Samba and has had several different formats in
	  the past.

     FILE FORMAT    [Toc]    [Back]
	  The format of	the smbpasswd file used	by Samba 2.2 is	very
	  similar to the familiar Unix passwd(5) file. It is an	ASCII
	  file containing one line for each user. Each field within
	  each line is separated from the next by a colon. Any entry
	  beginning with '#' is	ignored. The smbpasswd file contains
	  the following	information for	each user:

	  name This is the user	name. It must be a name	that already
	       exists in the standard UNIX passwd file.

	  uid  This is the UNIX	uid. It	must match the uid field for
	       the same	user entry in the standard UNIX	passwd file.
	       If this does not	match then Samba will refuse to
	       recognize this smbpasswd	file entry as being valid for
	       a user.

	  Lanman Password Hash
	       This is the LANMAN hash of the user's password, encoded
	       as 32 hex digits. The LANMAN hash is created by DES
	       encrypting a well known string with the user's password
	       as the DES key. This is the same	password used by
	       Windows 95/98 machines. Note that this password hash is
	       regarded	as weak	as it is vulnerable to dictionary
	       attacks and if two users	choose the same	password this
	       entry will be identical (i.e. the password is not
	       "salted"	as the UNIX password is). If the user has a
	       null password this field	will contain the characters
	       "NO PASSWORD" as	the start of the hex string. If	the
	       hex string is equal to 32 'X' characters	then the
	       user's account is marked	as disabled and	the user will
	       not be able to log onto the Samba server.

	       WARNING !! Note that, due to the	challenge-response
	       nature of the SMB/CIFS authentication protocol, anyone
	       with a knowledge	of this	password hash will be able to



     Page 1					     (printed 2/13/04)






     SMBPASSWD(5)    UNIX System V (19 November	2002)	  SMBPASSWD(5)



	       impersonate the user on the network. For	this reason
	       these hashes are	known as plain text equivalents	and
	       must NOT	be made	available to anyone but	the root user.
	       To protect these	passwords the smbpasswd	file is	placed
	       in a directory with read	and traverse access only to
	       the root	user and the smbpasswd file itself must	be set
	       to be read/write	only by	root, with no other access.

	  NT Password Hash
	       This is the Windows NT hash of the user's password,
	       encoded as 32 hex digits. The Windows NT	hash is
	       created by taking the user's password as	represented in
	       16-bit, little-endian UNICODE and then applying the MD4
	       (internet rfc1321) hashing algorithm to it.

	       This password hash is considered	more secure than the
	       LANMAN Password Hash as it preserves the	case of	the
	       password	and uses a much	higher quality hashing
	       algorithm. However, it is still the case	that if	two
	       users choose the	same password this entry will be
	       identical (i.e. the password is not "salted" as the
	       UNIX password is).

	       WARNING !!. Note	that, due to the challenge-response
	       nature of the SMB/CIFS authentication protocol, anyone
	       with a knowledge	of this	password hash will be able to
	       impersonate the user on the network. For	this reason
	       these hashes are	known as plain text equivalents	and
	       must NOT	be made	available to anyone but	the root user.
	       To protect these	passwords the smbpasswd	file is	placed
	       in a directory with read	and traverse access only to
	       the root	user and the smbpasswd file itself must	be set
	       to be read/write	only by	root, with no other access.

	  Account Flags
	       This section contains flags that	describe the
	       attributes of the users account.	In the Samba 2.2
	       release this field is bracketed by '[' and ']'
	       characters and is always	13 characters in length
	       (including the '[' and ']' characters).	The contents
	       of this field may be any	of the characters.

	       o U - This means	this is	a "User" account, i.e. an
		 ordinary user.	Only User and Workstation Trust
		 accounts are currently	supported in the smbpasswd
		 file.

	       o N - This means	the account has	no password (the
		 passwords in the fields LANMAN	Password Hash and NT
		 Password Hash are ignored). Note that this will only
		 allow users to	log on with no password	if the	null
		 passwords parameter is	set in the smb.conf(5)



     Page 2					     (printed 2/13/04)






     SMBPASSWD(5)    UNIX System V (19 November	2002)	  SMBPASSWD(5)



		  config file.

	       o D - This means	the account is disabled	and no
		 SMB/CIFS logins will be allowed for this user.

	       o W - This means	this account is	a "Workstation Trust"
		 account. This kind of account is used in the Samba
		 PDC code stream to allow Windows NT Workstations and
		 Servers to join a Domain hosted by a Samba PDC.

	  Other	flags may be added as the code is extended in future.
	  The rest of this field space is filled in with spaces.

	  Last Change Time
	       This field consists of the time the account was last
	       modified. It consists of	the characters 'LCT-'
	       (standing for "Last Change Time") followed by a numeric
	       encoding	of the UNIX time in seconds since the epoch
	       (1970) that the last change was made.

	  All other colon separated fields are ignored at this time.

     VERSION    [Toc]    [Back]
	  This man page	is correct for version 2.2 of the Samba	suite.

     SEE ALSO    [Toc]    [Back]
	  smbpasswd(8) samba(7)	and the	Internet RFC1321 for details
	  on the MD4 algorithm.

     AUTHOR    [Toc]    [Back]
	  The original Samba software and related utilities were
	  created by Andrew Tridgell. Samba is now developed by	the
	  Samba	Team as	an Open	Source project similar to the way the
	  Linux	kernel is developed.

	  The original Samba man pages were written by Karl Auer. The
	  man page sources were	converted to YODL format (another
	  excellent piece of Open Source software, available at
	  ftp://ftp.icce.rug.nl/pub/unix/
	  <URL:ftp://ftp.icce.rug.nl/pub/unix/>) and updated for the
	  Samba	2.0 release by Jeremy Allison. The conversion to
	  DocBook for Samba 2.2	was done by Gerald Carter













     Page 3					     (printed 2/13/04)



[ Back ]
      
      
 Similar pages
Name OS Title
shadow Linux encrypted password file
SSL_CTX_set_default_passwd_cb_userdata Tru64 Set password callback for encrypted PEM file handling
SSL_CTX_set_default_passwd_cb Tru64 Set password callback for encrypted PEM file handling
lmhosts.5 IRIX The Samba NetBIOS hosts file
make_unicodemap.1 IRIX construct a unicode map file for Samba
make_smbcodepage.1 IRIX construct a codepage file for Samba
smb.conf.5 IRIX The configuration file for the Samba suite
SSL_CTX_set_default_passwd_cb NetBSD set passwd callback for encrypted PEM file handling
SSL_CTX_set_default_passwd_cb_userdata OpenBSD set passwd callback for encrypted PEM file handling
SSL_CTX_set_default_passwd_cb OpenBSD set passwd callback for encrypted PEM file handling
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service