DVB-Cube <<< Das deutsche PC und DVB-Forum >>>

PC-Ecke => # Unix/Linux/BSD => Thema gestartet von: SiLæncer am 21 August, 2005, 15:18

Titel: Dateiserver Samba ...
Beitrag von: SiLæncer am 21 August, 2005, 15:18
Der freie SMB-Server Samba steht jetzt in Version 3.0.20 im Quelltext zum Download bereit; für Fedora Core 4 findet sich im Download-Bereich auch bereits ein Binär-Paket. Die Vorgängerversion trug die Nummer 3.0.14; mit dem Überspringen der Nummern 3.0.15 bis 3.0.19 wollen die Entwickler den großen Umfang der Änderungen signalisieren.

So wurde der Authentifizierungsdienst Winbind komplett neu geschrieben. Er arbeitet jetzt asynchron und soll in großen Domänen oder Netzen mit hoher Latenzzeit besser skalieren. Samba 3.0.20 unterstützt den Microsoft Print Migrator, ein Tool für das Backup und die Wiederherstellung von Druckerkonfigurationen auf Print Servern. Damit können Drucker komfortabel von anderen Samba- oder Windows-Servern umziehen. Weitere Details finden sich in den Release Notes.

Quelle und Links : http://www.heise.de/newsticker/meldung/63038
Titel: Samba lernt WINS-Replikation
Beitrag von: SiLæncer am 02 Februar, 2006, 10:42
Das unter Schirmherrschaft eines neuen deutschen Linux-Interessenverbands entwickelte "samba4WINS" steht nunmehr zum Download bereit. Dahinter steckt eine Software, die Bestandteil des kommenden Samba 4 werden soll, sich aber schon jetzt in Samba-3-Umgebungen einsetzen lässt. Sie rüstet ein bisher schmerzlich vermisstes Feature nach, um mehrere WINS-Server mit freier Software zu betreiben, die untereinander den Datenbestand abgleichen.

WINS ist der Namensdienst, den Microsoft vor der Einführung des Active Directory in Windows-Netzen benutzt hat. Er ist, wenn Samba als Server zum Einsatz kommt, noch heute kaum verzichtbar und auch in reinen Windows-Umgebungen anzutreffen. Windows-Server können die im Namensdienst verwalteten Daten untereinander verteilen (replizieren) – mithin der Grund, in manchen Netzen überhaupt noch Windows-Server mitlaufen zu lassen, die genau diese Aufgabe erfüllen. Mit samba4WINS kann das jetzt überflüssig sein.

Entwickelt hat die Software Stefan Metzmacher, ein Mitglied des Samba-Teams, im Auftrag seines Arbeitgebers Sernet GmbH (Göttingen). Der Bedarf entstand bei Kunden der Projekt-Partner Computacenter und Fujitsu Siemens Computers, die zusammen mit der Linux Solutions Group e.V. (LiSoG) die Entwicklung finanziell gefördert haben. samba4WINS ist damit das erste Projekt, das die 2005 gegründete LiSoG hervorgebracht hat.

Die unter GPLv2 gestellten samba4WINS-Quelltexte und fertige Binärpakete für Redhat Enterprise Linux und Suse Linux Enterprise Server bietet Sernet auf seinem Enterprise-Samba-Portal an. Ein Paket für Debian GNU/Linux soll in den nächsten Tagen folgen. Interessierte können dort auch die Dokumentation zum neuen Dienst studieren. samba4WINS lässt sich parallel zu einer bestehenden Samba-Installation ab Version 3.0.21 einsetzen. Es läuft als separater Daemon und beherrscht laut Dokumentation auch die Replikation mit Windows-Servern.

Quelle und Links : http://www.heise.de/newsticker/meldung/69132
Titel: Dateiserver Samba ...
Beitrag von: SiLæncer am 27 Januar, 2009, 17:03
Das Samba-Entwicklerteam hat die Version 3.3.0 des SMB/CIFS-Dateiserver für Unix-Betriebssysteme freigeben. Samba 3.3.0 erweitert die Unterstützung für Cluster und verbessert Verwaltungswerkzeuge wie smbcontrol und das Kommando net, das ab sofort Kerberos für die Anmeldung nutzen kann. Zwei noch als experimentell markierte VFS-Module helfen, NTFS-typische Zugriffslisten (ACLs) auf dem Samba-Server zu verwalten.

Die Entwickler haben desweiteren zwei Parameter aus der Konfigurationsdatei smb.conf entfernt (idmap config DOM:range, idmap domains), vier neue hinzugefügt (cups connection timeout, init logon delayed hosts, init logon delay, winbind reconnect delay) und die Vorgabe für den Parameter "ldap ssl" in "start tls" geändert. Die Einstellung "share modes" wurde als veraltet markiert.

Auch soll sich die Einrichtung des Idmap-Dienstes, der zwischen Unix-User-IDs und Windows-Benutzerkennungen übersetzt, vereinfacht haben. Der Dienst versteht nun Aliase für Benutzer und Gruppen und kann mit mehrere Domains umgehen. Größere Änderungen gab es am Passwortdatenbank-Backend tdbsam, das zu Vorgängerversionen nicht mehr kompatibel ist. Die Entwickler empfehlen im Changelog vor der Aktualisierung auf Version 3.3.0 ein Backup der Datei /etc/samba/passdb.tdb.

http://news.samba.org/releases/3.3.0/ (http://news.samba.org/releases/3.3.0/)

Quelle : www.heise.de (http://www.heise.de)
Titel: Dateiserver Samba 3.3.4 veröffentlicht
Beitrag von: SiLæncer am 30 April, 2009, 20:05
Major enhancements in Samba 3.3.4 include:

    o Fix domain logins for WinXP clients pre SP3 (bug #6263).
    o Fix samr_OpenDomain access checks (bug #6089).
    o Fix usrmgr.exe creating a user (bug #6243).

changelog (http://samba.org/samba/history/samba-3.3.4.html)

http://us6.samba.org/samba/
Titel: Samba 3.4 hat Samba 4 dabei
Beitrag von: SiLæncer am 03 Juli, 2009, 22:02
Kurze Zeit nach den letzten Sicherheits-Updates für die Version 3.3.6 haben die Entwickler des freien Datei- und Druckerservers Samba die Version 3.4 freigegeben. Änderungen und Verbesserungen hat es zum Beispiel bei der Druckfunktion und bei der Authentifizierung gegeben.

Vor allem aber bringt Samba 3.4 schon den Sourcecode der Version 4.0 mit, deren Veröffentlichungstermin noch nicht einmal feststeht. Per Vorgabe wird nur der Code der von Samba 3.4 kompiliert. Setzt man jedoch die Option "--enable-merged-build", wird auch der Samba-4-Quelltext im Verzeichnis "source4" übersetzt. Die beiden Daemons Samba3 und Samba4 laufen parallel und teilen sich die Aufgaben: Während Samba3 für die SMB-Ports zuständig ist, kümmert sich Samba4 um Kerberos, LDAP und WINS.

Mit Samba 3.4 löst "tdbsam" das bisher verwendete "smbpasswd" als Standard-Account-Datenbank ab (smb.conf-Option: passwd backend). Damit es nicht zu Problemen kommt, ist daher eine entsprechende Konfigurationsänderung oder eine Konvertierung der vorhandenen Benutzerdaten nötig. Details finden sich in der Changelog-Datei der Software.

Quelle : www.heise.de (http://www.heise.de)



Major enhancements in Samba 3.4.0 include:
------------------------------------------

Configuration changes:
o The default passdb backend has been changed to 'tdbsam'!

General changes:
o Samba4 and Samba3 sources are included in the tarball

Authentication Changes:
o Changed the way smbd handles untrusted domain names given during user
  authentication.

Printing Changes:
o Various fixes including printer change notificiation for Samba spoolss
  print servers.

Internal changes:
o The remaining hand-marshalled DCE/RPC services (ntsvcs, svcctl, eventlog
  and spoolss) were replaced by autogenerated code based on PIDL.
o Samba3 and Samba4 do now share a common tevent library.
o The code has been cleaned up and the major basic interfaces are shared with
  Samba4 now.
o An asynchronous API has been added.

http://samba.org/samba/ (http://samba.org/samba/)
Titel: Dateiserver Samba 3.3.7 erschienen
Beitrag von: SiLæncer am 29 Juli, 2009, 18:38
This is the latest stable release of the Samba 3.3 series

The uncompressed tarballs and patch files have been signed using GnuPG (ID 6568B7EA). The source code can be downloaded (http://us1.samba.org/samba/ftp/stable/samba-3.3.7.tar.gz) now. A patch against Samba 3.3.6 (http://us1.samba.org/samba/ftp/patches/patch-3.3.6-3.3.7.diffs.gz) is also available. See the release notes (http://us1.samba.org/samba/history/samba-3.3.7.html) for more info.

http://us1.samba.org/samba/ (http://us1.samba.org/samba/)
Titel: Keine Unterstützung mehr für Samba 3.0
Beitrag von: SiLæncer am 06 August, 2009, 16:34
Version 3.0.36 als letzte Wartungs-Ausgabe

Die Entwickler des Samba-Projekts haben eine letzte Wartungs-Version vor Einstellung der offiziellen Unterstützung des Zweigs 3.0 veröffentlicht. Samba 3.0 erblickte im September 2003 das Licht der Welt.
Administratoren, die immer noch Samba 3.0 einsetzen können ab sofort Ausgabe 3.0.36 als Quellcode herunterladen. Ebenso stellen die Entwickler einen Patch gegen Samba 3.0.35 zur Verfügung. Die Änderungen gegenüber der Vorgänger-Version finden Sie im Changelog.

Die Entwickler raten zum Einsatz des derzeit aktuellen Zweiges 3.4. Im Release-Plan ist ebenfalls schon vermerkt, dass Version 3.0 keine weitere Liebe erhalten wird. Für den Zweig 3.2 gibt es nur noch Sicherheits-Update. Ausgabe 3.3 erhalte hingegen noch Fehlerbereinigungen und Sicherheits-Flicken. Samba 3.4 hat offiziell a, 30. Juli 2009 das Licht der Welt erblickt. Version 3.5.0 soll am 15. Dezember 2009 erscheinen.

Quelle : www.tecchannel.de (http://www.tecchannel.de)


Titel: Samba 3.2.14 Maintenance Release Available
Beitrag von: SiLæncer am 12 August, 2009, 16:26
This is the last bug fix release for Samba 3.2. The uncompressed tarball and patch files have been signed using GnuPG (ID 6568B7EA). The source code can be downloaded (http://download.samba.org/samba/ftp/stable/samba-3.2.14.tar.gz) now. A patch against Samba 3.2.13 (http://download.samba.org//samba/ftp/patches/patch-3.2.13-3.2.14.diffs.gz) is also available. See the release notes for more info.

http://us1.samba.org/samba/ (http://us1.samba.org/samba/)
Titel: Samba 3.4.3 freigegeben
Beitrag von: SiLæncer am 29 Oktober, 2009, 10:24
29 October 2009

Samba 3.4.3 Available for Download

This is the latest stable release of the Samba 3.4 series.
See the release notes (http://us1.samba.org/samba/history/samba-3.4.3.html) for more info.

http://us1.samba.org/samba/
Titel: Samba 3.5.0pre1 mit experimenteller SMB2-Unterstützung
Beitrag von: SiLæncer am 30 November, 2009, 18:00
Die Entwicklerversion 3.5.0pre1 der Samba Suite bringt eine experimentelle Unterstützung des neuen SMB2-Protokolls mit. Die Version ist nicht für den produktiven Einsatz geeignet.

In der Version 3.5.0pre1 können Tester und Entwickler einen ersten Blick auf die Unterstützung des neuen Netzwerkprotokolls SMB2 in Samba werfen. SMB2 wird in allen Windows Versionen seit Vista verwendet. Außerdem kann Samba nun verschlüsselt mit dem Cups-Server kommunizieren.

Zusätzlich unterstützt Samba die Windows-Timestamp-Auflösung jetzt komplett, so wie sie der Linux-Kernel seit Version 2.6.22 verwendet. Außerdem wurde der Winbind Daemon so aktualisiert, dass er asynchron arbeitet, die Befehle "wbinfo -g" or "wbinfo -u" können ab sofort problemlos ausgeführt werden.

Der Quellcode und Binärdateien für ausgewählte Linux-Distributionen steht auf Servern im Internet bereit. Entwickler warnen aber ausdrücklich vor dem Einsatz auf einem Produktivsystem.

Quelle und Links : http://www.golem.de/0911/71553.html
Titel: Samba 3.4.4 erschienen
Beitrag von: SiLæncer am 07 Januar, 2010, 10:31
Die Release Notes gibts hier (http://us1.samba.org/samba/history/samba-3.4.4.html).

http://us1.samba.org/samba/
Titel: Samba 3.4.5 erschienen
Beitrag von: SiLæncer am 20 Januar, 2010, 08:57
Die Release Notes gibts hier (http://us1.samba.org/samba/history/samba-3.4.5.html).

http://us1.samba.org/samba/
Titel: Samba kann bald mit Active Directory umgehen
Beitrag von: SiLæncer am 04 Februar, 2010, 16:33
Das Open-Source-Projekt Samba will noch in diesem Jahr die Version 4 veröffentlichen. Darin soll die Implementierung des Active Directory(AD)-Protokolls dafür sorgen, dass Unix-Server auch in heterogenen Umgebungen die Aufgaben eines AD-Servers übernehmen kann.

Andrew Tridgell, Gründer und Leiter des Samba-Projekts, beschreibt ausführlich in einem halbstündigen Video, welche Fortschritte die Arbeit an der Implementierung des Active-Directory-Protokolls in der zukünftigen Version Samba 4 macht. Die meisten Hürden seien bereits genommen, sagt er.

Gegenwärtig fehle noch die Unterstützung für die unter Active Directory verwendete DNS-Struktur. Tridgell erklärt, das Samba noch nicht willkürlich DNS-Namen in einer Bind9-Server-Implementierung vergeben kann, wenn DNS-Anfragen mit Kerberos-Authentifizierung vorliegen. Daher muss bislang für Samba-Server im Netzwerk weiterhin ein DNS-Server bereitgestellt werden.

Außerdem beschränkt sich Samba gegenwärtig auf die Unterstützung lediglich einer Domäne pro Forest und einer Site pro Domäne. Tridgell ist aber zuversichtlich, dass diese Einschränkungen bald der Vergangenheit angehören, sie werden mit höchster Priorität bearbeitet. Dann fehle noch ein ausgiebiger Test in der Praxis.

Die größte Aufgabe bestehe aber darin, den gut funktionierenden Datei- und Druckerzugriff aus Samba 3 mit Samba 4 zu verschmelzen. Gegenwärtig seien mehrere Ansätze im Gespräch, darunter die Idee, beide Samba-Versionen parallel laufen zu lassen oder AD-relevante Anfragen zunächst von Samba 3 zu akzeptieren und an Samba 4 weiterzugeben.

Tridgell lobt auch die Zusammenarbeit mit Microsoft. Zunächst hatte das Unternehmen nach einer durch die Europäische Kommission verhängten Strafe 2007, dem Projekt Teile der Dokumentation zu Active Directory zugänglich gemacht, inklusive Server-Server-Protokoll. Später waren Microsoft-Mitarbeiter bei Fragen zu fehlenden Teilen äußerst hilfreich. Tridgell nennt die Zusammenarbeit bei der Dokumentation der entsprechenden WSPP- und MCPP-Protokolle eines der größten Projekte der IT-Geschichte.

Quelle : www.golem.de
Titel: Samba 3.5 unterstützt SMB2 und 100ns-Zeitstempel
Beitrag von: SiLæncer am 02 März, 2010, 12:43
Die aktuelle Version 3.5 der Samba-Tools bringt experimentelle Unterstützung für das Protokoll SMB2 mit. Zusätzlich haben die Entwickler die Anmeldung am Samba-Server erleichtert: Ab sofort puffert Winbind Zugangsdaten zur Weiterverwendung.

Ab Version 3.5 kann Samba auch mit der aktuelleren Version 2 des SMB-Protokolls für Windows Vista und 7 kommunizieren. Allerdings ist die SMB2-Unterstützung noch experimentell und nicht standardmäßig aktiviert. Zusätzlich wurde die Zeitstempelauflösung komplett an Windows angepasst und kann nun alle 100 Millisekunden gesetzt werden. Dafür ist ein Kernel ab Version 2.6.22 und Glibc 2.6 oder höher Voraussetzung.

Die Kontenverwaltung Winbind puffert ab sofort Zugangsdaten, so dass ein erneutes Anmelden während einer Sitzung nicht nötig ist, was vor allem die Anmeldung an Samba-Server durch grafische Dateimanager erleichtert. Zusätzlich funktioniert Winbind asynchron. Samba 3.5 verbindet sich nun verschlüsselt mit dem Druckserver CUPS und kann per VFS-Modul scannedonly Ergebnisse eines Virenscans filtern und daraufhin nur unbedenkliche Dateien anzeigen.

Samba 3.5 steht bislang lediglich im Quellcode auf der Webseite des Projekts zur Verfügung. Das Benutzerhandbuch, bislang Teil des Pakets, wurde ausgelagert. Es steht ebenfalls auf der Projektseite zum Download bereit.

Quelle : www.golem.de
Titel: Samba 3.5.1
Beitrag von: SiLæncer am 08 März, 2010, 22:30
08 March 2010

Samba 3.5.1 Available for Download

This is a security release to address CVE-2010-0728, Patches for all current versions and security advisories are available on our security page.

The uncompressed tarballs and patch files have been signed using GnuPG (ID 6568B7EA). The source code can be downloaded now. See the release notes (http://us1.samba.org/samba/history/samba-3.5.1.html) for more info.

http://us1.samba.org/samba/
Titel: Samba 3.5.2
Beitrag von: SiLæncer am 07 April, 2010, 12:36
Samba 3.5.2 Available for Download

This is the latest stable release of the Samba 3.5 series.

The uncompressed tarballs and patch files have been signed using GnuPG (ID 6568B7EA). The source code can be downloaded now (http://samba.org/samba/ftp/stable/samba-3.5.2.tar.gz). See the release notes (http://samba.org/samba/history/samba-3.5.2.html) for more info.

http://us1.samba.org/samba/
Titel: Papierkorb für Samba-Freigaben
Beitrag von: SiLæncer am 12 April, 2010, 16:16
Werkzeugkasten (http://www.golem.de/specials/werkzeugkasten/): Der Windows-Papierkorb kann nicht auf Samba-Freigaben verwendet werden. Stattdessen haben die Samba-Entwickler ein Modul für das virtuelle Dateisystem VFS entwickelt, das Löschvorgänge abfängt. Ein Segen für Benutzer, die gerne versehentlich Dateien auf Serverfreigaben entsorgen.

Nichts ist ärgerlicher, als auf einer Samba-Freigabe Dateien aus Versehen zu löschen, denn diese sind dann unwiderruflich weg. Einen entsprechenden Warnhinweis gibt Windows zwar aus, der ist aber schnell weggeklickt. Auf solchen Freigaben kann sich der Windows-Papierkorb auch nicht ausbreiten, ihm fehlt das Windows-Dateisystem, in dem er das versteckte Systemverzeichnis Recycled ablegen kann.

Video: Golem.de - Werkzeugkasten - Papierkorb für Samba-Freigaben (0:58)

Dafür haben die Samba-Entwickler seit der Version 3 eine eigene Lösung ersonnen: einen Papierkorb, der über das virtuelle Dateisystem VFS (http://linux.die.net/man/8/vfs_recycle) realisiert wird. Er ist weitaus konfigurierbarer als sein Windows-Pendant. Zunächst kann er für jede Freigabe einzeln eingerichtet werden, wenn er nicht global für alle Freigaben gebraucht wird. Standardmäßig werden gelöschte Dateien mit den Rechten eines Benutzers versehen (0700), außer ihm darf nur noch der Benutzer root-Dateien dort endgültig löschen oder wiederherstellen. Per Option können die Dateirechte allerdings angepasst werden. Wenn gewünscht können gelöschte Dateien, samt Verzeichnisbaum, in dem sie lagen, im Samba-Papierkorb abgelegt werden.

(http://scr3.golem.de/screenshots/1004/samba/thumb480/01_samba_pap.png)

Zunächst gilt es, das entsprechende Modul in der Konfigurationsdatei /etc/samba/smb.conf mit dem Eintrag "vfs module = recycle" zu aktivieren. Wird es in den globalen Einstellungen platziert, taucht der Papierkorb in allen Freigaben auf. Alternativ kann das Modul auch in den Einträgen einzelner Freigaben eingetragen werden.

Mit dem Eintrag "recycle:repository =" wird der Name definiert, mit dem das Papierkorbverzeichnis angelegt wird. Steht ein Punkt vor dem Namen, wird es sowohl von Linux als auch von Samba als verstecktes Verzeichnis behandelt und bleibt bei Standardeinstellungen im Windows-Explorer unsichtbar.

Wer will, kann auch die Zugriffszeiten der dort abgelegten Dateien beeinflussen. Über die Option recycle:touch wird das Datum des letzten Zugriffs beim Verschieben in den Papierkorb aktualisiert. Die Option recycled:touch_mtime setzt bei dorthin verschobenen Dateien den Zeitstempel "zuletzt modifiziert".

Die Zeitstempel sind vor allem dann wichtig, wenn per Skript gesteuert werden soll, was der Samba-Papierkorb im Gegensatz zu seinem Windows-Pendant nicht kann: das automatische Löschen seines Inhalts. Per find-Befehl und dem Parameter -mtime +7 in einem Bash-Skript untergebracht, können beispielsweise Dateien gelöscht werden, die länger als eine Woche im Papierkorb lagern.

Bei entsprechender Samba-Version und einkompiliertem VFS kann der virtuelle Papierkorb überall verwendet werden, ob in Netzwerkfreigaben auf einem Dateiserver oder auf einem entsprechend ausgestatteten NAS-Gerät. Der Samba-Papierkorb dürfte so manchem Schnelllöscher und dessen Administrator einen entspannteren Schlaf bereiten.

Quelle : www.golem.de
Titel: Samba 3.5.6 erschienen
Beitrag von: SiLæncer am 08 Oktober, 2010, 15:56
Major enhancements in Samba 3.5.6 include:

  o Fix smbd panic on invalid NetBIOS session request (bug #7698).
  o Fix smbd crash caused by "%D" in "printer admin" (bug #7541).
  o Fix crash bug with invalid SPNEGO token (bug #7694).
  o Fix Winbind internal error (bug #7636).

http://us1.samba.org/samba/
Titel: Samba 3.6 mit SMB2 und verbesserten Druckdiensten
Beitrag von: SiLæncer am 10 August, 2011, 13:28
Die Samba-Entwickler haben Samba, eine freie Implementierung des SMB-Protokolls, das Linux-Rechnern ermöglicht, in Windows-Netzwerken Datei- und Druckdienste anzubieten, in Version 3.6 veröffentlicht.

Im Interesse der Sicherheit ändert Samba 3.6 im Vergleich zur Vorgängerversion drei Einstellungen. So wird standardmäßig nicht mehr die schwache NTLM-Verschlüsselung verwendet, und es wird nicht mehr ein von einem Server bereitgestellter Name verwendet, um ein Kerberos-Ticket zu erhalten.

SMB2, in Samba 3.5 eingeführt, ist nach Angaben der Entwickler nun mit einer - wohl unwesentlichen - Ausnahme vollständig funktional. Da es noch nicht verbreitet getestet wurde, muss es noch von Hand aktiviert werden, in späteren Versionen wird es wohl automatisch aktiviert sein.

Das Programm Winbind greift nun mit Samba-Mitteln auf die Passwörter zu, wodurch Winbind-spezifischer Code entfällt. Der Code zum Drucken wurde vollständig überarbeitet und nutzt nun in allen Fällen die spoolss-RPC-Schnittstelle. Der Code wurde damit kleiner und besser getestet. Die bisherigen TDB-Datenbank-Dateien wurden verworfen und die Daten in die Registry verlagert. Dadurch sieht ein Windows-Client in der Registry die erwarteten Werte. Die Migration von den TDB-Dateien in die Registry geschieht automatisch.

Eine vollständige Überarbeitung wurde auch bei der Abbildung von verschiedenen IDs zwischen Windows und Unix vorgenommen. Nach Angaben des Teams war diese Komponente in der Vergangenheit die Ursache vieler Probleme. Jetzt wurde die Konfiguration radikal vereinfacht, soll aber dennoch die nötige Flexibilität beibehalten oder teilweise sogar mehr Flexibilität bieten.

Neu ist ein Endpoint Mapper, der in Windows immer mehr Bedeutung erlangt. Es handelt sich um eine Art DNS-Dienst für Ports und scheint einige Ähnlichkeit mit dem Unix-Portmapper zu besitzen. Er ist standardmäßig noch deaktiviert.

Neben diversen weiteren Umstrukturierungen zur Verbesserung des Samba-Codes erhielt die neue Version auch einen SMB Traffic Analyzer und ein zugehöriges Programm smbta-util. Ferner wurde ein NFS-Quota-Backend für Linux geschrieben, mit dem korrekte Informationen über Samba-Shares übermittelt werden können, die NFS-Volumes exportieren. Weitere Einzelheiten kann man dem ausführlichen Änderungslog entnehmen, das der Ankündigung (http://www.samba.org/samba/history/samba-3.6.0.html) angehängt ist.

Samba 3.6.0 löst das im März 2010 erschienene Samba 3.5 ab. Neben Samba 3.6 pflegt das Team weiterhin die Versionen 3.4 (nur noch Sicherheitskorrekturen) und 3.5 (Korrekturen und wichtige neue Funktionalität, die von Version 3.6 stammt).

Quelle : www.pro-linux.de
Titel: Samba 3.6.1
Beitrag von: SiLæncer am 21 Oktober, 2011, 07:15
Zitat
Major enhancements in Samba 3.6.1 include:

o  Fix smbd crashes triggered by Windows XP clients (bug #8384).
o  Fix a Winbind race leading to 100% CPU load (bug #8409).
o  Several SMB2 fixes.
o  The VFS ACL modules are no longer experimental but production-ready.

http://us1.samba.org/samba/
Titel: Microsoft patcht Samba
Beitrag von: SiLæncer am 03 November, 2011, 10:52
Eher unbemerkt hat am 10. Oktober ein Microsoft-Mitarbeiter einen ersten Patch für den freien Windows-Server auf der Entwicklerliste angeboten (http://marc.info/?l=samba-technical&m=131832776406276&w=2). Das war dem Samba-Team-Mitglied Chris Hertel jetzt eine eigene News wert (http://samba.org/samba/news/developers/ms-patch.html): Das Bemerkenswerte daran ist weniger, was der Beitrag technisch bedeutet – es geht um die transparente Nutzung einer Anmeldesession an einem SMB-Server im Browser –, sondern dass eine Beteiligung Microsofts vor einigen Jahren undenkbar gewesen wäre.

Über viele Jahre hatten die Samba-Entwickler ohne die Hilfe Microsofts auskommen müssen, weil die öffentlich zugängliche Dokumentation der Protokolle veraltet und die aktuellen nur mit Verschwiegenheitsvereinbarungen und Patentauflagen zu haben waren. Durch Druck der US-Kartellbehörden und der EU pflegt Microsoft nun offen zugängliche Dokumente und die Samba- und Microsoft-Entwickler haben ein freundschaftliches Verhältnis – viele Fortschritte der Active-Directory-Implementierung in Samba 4 haben die Entwickler in gemeinsamen Sessions erreicht.

Quelle : www.heise.de
Titel: Entwickler will Samba 4 in drei Monaten veröffentlichen
Beitrag von: ritschibie am 09 Dezember, 2011, 09:34
Die Samba-Entwickler diskutieren derzeit eine Veröffentlichung von Samba 4. An der Neuentwicklung wird seit acht Jahren gearbeitet, dennoch ist sie nur als Alphaversion verfügbar.

Die Entwickler des Samba-Teams diskutieren derzeit, ob und unter welchen Umständen Samba 4 noch in den kommenden Monaten veröffentlicht werden kann. Die Entwicklung von Samba 4 begann bereits 2003. Erst drei Jahre später erschien eine technische Vorschau, im September 2011 schließlich Alpha 17.

Samba 4 in "etwa drei Monaten"

Die nächste große Version von Samba soll neben den Neuerungen aus dem 3er Entwicklungszweig auch neue Funktionen enthalten, wie einen Active-Directory-Domänen-Controller (AD DC). Der Entwicklungsprozess ist längst noch nicht abgeschlossen, dennoch hat Andrew Bartlett vorgeschlagen, den Code so wie er ist ("as is") zu veröffentlichen. Mit ein wenig Arbeit könnte Samba 4 so schon in "etwa drei Monaten" erscheinen, schreibt Bartlett.

Dabei soll Samba 4 nicht als einzelner Server veröffentlicht werden, sondern wie bisher in den Alphaversionen auch, getrennt in "smbd, nmbd, winbindd, samba etc", schreibt Bartlett. Eines der Ziele für Samba 4 ist jedoch, einen einzelnen Server für sämtliche Funktionen bereitzustellen. Dementsprechend kontrovers wird die Idee auch von anderen Entwicklern diskutiert.

Code noch nicht vereinigen

Bartletts Vorschlag sieht vor, den Code der zwei Entwicklungszweige noch nicht zu vereinigen. Jedoch sollte es so etwas wie eine Interimslösung geben, damit Anwender den Active-Directory-Server nutzen können. Als Kompromiss schlägt Géza Gémes deshalb vor, Samba 4 als Samba-AD und Samba 3 als Samba-FS zu veröffentlichen.

Auf den Punkt bringt die Diskussion schließlich Bartlett. "Mir ist es egal, wie unsere nächste Veröffentlichung heißt, sei es 3.7, 4.0 oder 4.0 AD, solange der AD-Server enthalten ist und unsere Nutzer ihn einsetzen können."

Noch ist nicht entschieden, wann Samba mit dem AD-Server veröffentlicht wird und wie es dann heißen wird. Die Diskussion zeigt aber, dass einige Entwickler die Veröffentlichung für längst überfällig halten.

Quelle: www.golem.de
Titel: Samba 4 im Anmarsch
Beitrag von: SiLæncer am 03 Juni, 2012, 17:00
Voraussichtlich am kommenden Dienstag wollen die Samba-Entwickler die erste Beta-Version des lang erwarteten Samba**4 veröffentlichen. Nach einer letzten Alpha 21 am 24. Mai markiert das einen entscheidenden Schritt in der Implementierung eines Active Directory auf Open-Source-Basis. Samba 4 kann erstmals wie ein Windows Server seit 2000 einen echten Verzeichnisdienst im Netz bereitstellen.

In Samba 4 haben die Entwickler einen eigenen LDAP-Server und DNS-Server aufgenommen. Aufbauend auf Heimdal haben sie einen Kerberos-Server integriert. In den letzten Versionen haben sie den ursprünglich von Grund auf neu implementierten Dateiserver durch den bewährten Code aus Samba 3 ersetzt. Seit der Alpha 21 lässt sich dieser Stand ausprobieren. Die erste Beta ist letztlich der offizielle Startschuss für einen breiteren Test.

Zwar sind längst nicht 100% eines "echten" Active Directory in Samba 4 implementiert, aber für den Praxiseinsatz mehr als genug: Gruppenrichtlinien zur Verwaltung von Windows-Clients und die Replikation der Verzeichnisdaten, Daten auf der sysvol-Freigabe muss man indes noch mit cron-Jobs verteilen. Umfangreiche Howtos (http://wiki.samba.org/index.php/Samba4/HOWTO) der Entwickler helfen bei den ersten Schritten.

Quelle : www.heise.de
Titel: Erste Beta von Samba 4 ist da
Beitrag von: SiLæncer am 05 Juni, 2012, 18:30
Wie angekündigt steht seit dem heutigen Nachmittag die erste Beta-Version der kommenden Samba-Version 4 zum Download (http://ftp.samba.org/pub/samba/samba4/samba-4.0.0beta1.tar.gz) bereit. Seit der Freigabe der ersten Technology Preview Anfang 2006, vier weiteren Previews und insgesamt 21 Alpha-Versionen nähert sich damit die erste Open-Source-Implementierung von Microsofts Active Directory der Fertigstellung.

Samba 4 wird zwischenzeitlich von einigen Dienstleistern im Open-Source-Umfeld eingesetzt. So bindet es Univention auf Wunsch in eine Installation seines Corprate Servers ein. SerNet stellt eine Appliance zum kostenlosen Download bereit, mit der man Samba 4 mal eben ausprobieren kann.

Noch haben diese beiden Anbieter nicht auf den aktuellen Stand umgestellt. Das dürfte in den nächsten Tagen aber passieren, sobald es erste fertige Pakete für einige Distributionen gibt. Dann ist es auch nicht mehr nötig, die Software selbst zu übersetzen

Quelle : www.heise.de
Titel: Samba 3.6.7
Beitrag von: SiLæncer am 14 August, 2012, 12:42
Changes since 3.6.6:
--------------------

o   Jeremy Allison <jra@samba.org>
    * BUG 8974: Fix kernel oplocks when uid(file) != uid(process).
    * BUG 8989: Send correct responses to NT Transact Secondary when no data and
      no params for the Trans2 calls are set.
    * BUG 9034: Fix typo in set_re_uid() call when USE_SETRESUID selected in
      configure.


o   David Binderman <dcb314@hotmail.com>
    * BUG 9062: rpcclient: Fix bad call to data_blob_const.


o   Günther Deschner <gd@samba.org>
    * BUG 9026: Fix migrating printers while upgrading from 3.5.x.


o   David Disseldorp <ddiss@samba.org>
    * BUG 8719: Printing fails in function cups_job_submit.
    * BUG 9026: Fix migrating printers while upgrading from 3.5.x.


o   Olaf Flebbe <o.flebbe@science-computing.de>
    * BUG 8552: Correct documentation of "case sensitive".


o   Björn Jacke <bj@sernet.de>
    * BUG 8996: Fix build without ads support.


o   Volker Lendecke <vl@samba.org>
    * BUG 9003: Fix posix acl on gpfs.
    * BUG 9040: Using asynchronous IO with SMB2 can return NT_STATUS_FILE_CLOSED
      in error instead ofNT_STATUS_FILE_LOCK_CONFLICT.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 9002: Don't turn negative cache entries into valid idmappings.
    * BUG 9022: Make vfs_gpfs less verbose in get/set_xattr functions.
    * BUG 9057: Fix bugs in SMB2 credit handling code.


o   Jiri Popelka <jpopelka@redhat.com>
    * BUG 9055: Fix build against CUPS 1.6.


o   Jura Sasek <jiri.sasek@oracle.com>
    * BUG 9037: Fix 'net ads join' on T4 (sun4v) systems on Solaris 10.


o   Andreas Schneider <asn@samba.org>
    * BUG 9052: Fix resolving our own "Domain Local" groups.

http://us1.samba.org/samba/
Titel: Samba 4 als Release Candidate
Beitrag von: SiLæncer am 14 September, 2012, 10:20
Die Samba-Entwickler geben Gas und haben angekündigt, dass der erste Release Candidate von Samba 4 fertiggestellt ist. Die seit langer Zeit in der Entwicklung befindliche Version 4 des freien Windows-Servers bringt einen zu Microsofts Active Directory kompatiblen Verzeichnisdienst mit. Weiterhin raten die Entwickler von produktivem Einsatz ab, hoffen aber interessierte Samba-Nutzer für den Test einzuspannen.

Die Neuerungen, die der RC1 nach acht Beta-Versionen einführt, sind nicht allzu grundsätzlicher Natur: Der Dateiserver-Teil, der auf dem bewährten Code von Samba 3 aufbaut, handelt jetzt auch den SMB3-Dialekt aus. Die Samba-Entwickler haben aber längst nicht alle der optionalen, aushandelbaren Features implementiert, etwa Leases, eine verbesserte Form von Oplocks; eine erste Implementierung von durable Handles liefern sie ab.

Der ganze Artikel (http://www.heise.de/newsticker/meldung/Samba-4-als-Release-Candidate-1707991.html)

Quelle : www.heise.de
Titel: Samba 3.6.9
Beitrag von: SiLæncer am 29 Oktober, 2012, 13:41
Release Notes : http://samba.org/samba/history/samba-3.6.9.html

https://www.samba.org/samba/
Titel: Erstes freies Active Directory: Samba 4 ist da
Beitrag von: ritschibie am 12 Dezember, 2012, 10:58
Nach rund zehn Jahren und sechs Jahre nach der ersten Preview hat das Entwicklerteam die Version 4 des freien SMB/CIFS-Servers Samba offiziell für fertig erklärt und stellt es zum Download bereit. Voller Stolz beschreiben die Entwickler ihr Werk als die erste kompatible Implementierung von "Microsofts Active Directory"-Protokoll in freier Software. Nach Versuchen, ein solches System mit gängigen Open-Source-Komponenten wie OpenLDAP auf die Beine zustellen, hat das Team vieles selbst implementiert, etwa den LDAP- und DNS-Server sowie das zur Authentifizierung nötige Kerberos (aufbauend auf Heimdal).

Mit Samba 4 kann ein Unix-System die von Microsoft mit Windows 2000 eingeführten und in folgenden Server-Generationen verfeinerten Funktionen anbieten: Gruppenrichtlinien, Roaming Profiles, Exchange-Integration und Verwaltung über die unter Windows üblichen Management-Consolen. Samba 4 kann gegenüber Windows-Systemen bis einschließlich Windows 8 als vollwertiger Domain Controller eines Active Directory (AD) auftreten. Außerdem arbeitet es als Mitgliedsserver in einem AD und kann Windows-Server als Mitgliedsserver in "sein" AD aufnehmen.

Richtig Fahrt hat die Implementierung eines alternativen Active Directory aufgenommen, nachdem Microsoft offizielle Dokumentation des Protokolls veröffentlicht hat. Anfangs hatten die Samba-Entwickler sich noch durch das Mitschneiden von Paketen im Netz ein Bild der Funktionsweise machen müssen, inzwischen sitzen sie mit Microsoft-Entwicklern zusammen, um die Verträglichkeit ihrer Implementierungen abzustimmen.

Während das bisher für produktiven Einsatz empfohlene Samba 3 und die "Entwicklerversion" Samba 4 lange separate Entwicklungen waren, hat das Team mit dem jetzigen Release die beiden Schienen wieder zu einem Paket zusammengeführt. Die Quellen enthalten alle Komponenten. Je nachdem, ob Samba als AD-Server oder nur als Dateiserver arbeitet, laufen verschiedene Daemons (samba oder smbd mit den typischen Ergänzungen wie nmbd). Die Version 4 enthält anders als in der Beta-Phase den aktuellen Code des Samba-3-Dateiservers und nutzt ihn auch.

Fertig ist die Implementierung indes nicht. In einem Whitepaper dokumentiert das Team nicht nur Errungenschaften, sondern auch Einschränkungen. Die betreffen vor allem den Mischbetrieb mit Windows-Servern, fehlende Funktionen etwa für die Replikation der sysvol-Freigaben, die unter anderem die Gruppenrichtlinien beherbergen, und Einschränkungen in der Art wie DNS-Daten im Verzeichnis abgelegt und repliziert werden.

Schon während der Veröffentlichung der Vorabversionen ist umfangreiche Dokumentation enstanden, die Starthilfe für Samba 4 gibt. Die Entwickler ermuntern auch Nutzer, die noch mit der bisher aktuellen Version 3 eine sogenannte NT4-Domain betreiben, auf das neue Release und Active Directory umzusteigen. Dabei hilft auch das neue, zentrale Konfigurationswerkzeug "samba-tool", das eine spezielle Option für ein Domain-Upgrade bereitstellt.

Quelle: www.heise.de
Titel: Univention: Corporate Server 3.1 enthält Samba 4
Beitrag von: ritschibie am 15 Dezember, 2012, 12:15
(http://www.golem.de/1212/sp_96379-49566-i.jpg)
Univention Corporate Server setzt Samba 4
fast vollständig um. (Bild: Univention)
Mit der Veröffentlichung des Corporate Server 3.1 hat Univention die finale Version von Samba 4 weitgehend umgesetzt. Die aktuelle Version enthält außerdem ein Werkzeug, das eine einfache Migration von Active Directory ermöglicht.

Das Bremer Unternehmen Univention hat seinen Corporate Server (UCS) auf Version 3.1 aktualisiert. UCS 3.1 enthält zwar noch die Vorabversion 4.0rc6 von Samba 4 und 3.6.8 von Samba 3, Univention hat aber die Funktionen der finalen Version von Samba 4 weitgehend umgesetzt. So lässt sich UCS 3.1 mit Windows 8 und Windows Server 2012 nutzen. Außerdem lässt sich UCS 3.1 auf Servern mit UEFI installieren und unterstützt beispielsweise GUID Partitionstabellen.

Mit dem Werkzeug Univention AD Takeover sollen Microsofts Active-Directory-Verzeichnisse einfach auf USÇS migriert werden können, ohne dass Windows Clients erneut einer Domäne beitreten müssen. Allerdings fehlen noch einige Funktionen in der Samba-4-Umsetzung in UCS 3.1. So lassen sich beispielsweise keine Windows-Domaincontroller in einer Samba-4-Domäne nutzen.

App-Center für UCS

Univention bietet erstmals einen App-Center an, in dem zertifizierte Anwendungen einfach installierte werden können. Zu den dort bereits vorhandenen Applikationen gehört eine Vorabversion des Univention Corporate Client. Außerdem haben bereits Drittanbieter einige Applikationen bereitgestellt, etwa die Groupware Zafara oder Open-Xchange sowie die CRM-Lösung Sugar oder die Dokumentenverwaltung Agorum. Außerdem lässt sich darüber auch die Dropbox-Alternative Owncloud installieren.

UCS 3.1 nutzt weiterhin Debian 6.0 alias Squeeze als Basis. Der Linux-Kernel wurde hingegen auf Version 3.2.30 aktualisiert. UCS 3.1 verzichtet auf die freien Nouveau-Treiber für Grafikarten mit GPUs von Nvidia. Für diese stehen aber die Vesa-Treiber weiterhin zur Verfügung. Zu den weiteren aktualisierten Paketen gehören die Virtualisierungslösungen Xen 4.1.3, Qemu/KVM 1.1.2 und die Verwaltungsbibliothek Libvirt 0.9.12.

Eine Lizenz des Univention Corporate Server 3.1 für 50 Mitarbeiter kostet 985 Euro mit Installationssupport. Mit einem zusätzlichen Standardsupport kostet UCS 3.1 1.885 Euro. UCS ist als DVD-Image in einer 32- und 64-Bit-Version erhältlich. Außerdem gibt es die aktuelle Version bereits als VMware-Image oder als Amazon Machine Image. Ein detailliertes Changelog steht als PDF-Datei zum Download bereit.

Quelle: www.golem.de
Titel: Samba-4-Appliance: Kostenloses Samba-Active-Directory auf Debian-Basis
Beitrag von: ritschibie am 19 Dezember, 2012, 09:59
(http://www.golem.de/1212/sp_96452-49799-i.jpg)
Samba 4 mit Active Directory einfach
ausprobieren (Bild: Sernet)
Der Göttinger Samba-Spezialist Sernet bietet ab sofort ein kostenloses Active Directory auf Basis von Samba 4 an. Das Ganze kommt als fertiger Installer auf Basis von Debian daher.

Mit seinem Samba-4-Appliance will Sernet es einfach machen, einen mit Microsofts Active Directory kompatiblen Domain-Controller zu testen, der auf Samba 4 basiert. Dazu stellt Sernet einen Installer auf Basis von Debian GNU/Linux Squeeze zur Verfügung.

Der Installer führt durch die initiale Konfiguration einer Samba-4-Active-Directory-Domain, so dass Windows-Clients letztendlich komplett mit Hilfe von Gruppenregeln über die Windows Remote Server Administration Tools gesteuert werden können. Sernet hat zudem die freie Groupware Zarafa integriert und leitet durch die Installation der entsprechenden AD-Schema-Erweiterungen von Zarafa.

Sernet stellt die Software ab sofort unter enterprisesamba.org zum Download bereit. Samba 4 selbst ist in der vergangenen Woche erschienen.

Quelle: www.golem.de
Titel: Samba 4.0.5
Beitrag von: SiLæncer am 09 April, 2013, 13:13
Release Notes:>>

Samba 4.0.5 Available for Download

                   =============================
                   Release Notes for Samba 4.0.5
                           April 9, 2013
                   =============================


This is is the latest stable release of Samba 4.0.

Major enhancements in Samba 4.0.5 include:

o  Fix large reads/writes from some Linux clients (bug #9706).
o  Add 'samba-tool dbcheck --reset-well-known-acls' (bugs #9740 and #9267).


Changes since 4.0.4:
--------------------

o   Michael Adam <obnox@samba.org>
    * BUG 9617: libnss-winbindd does not provide pass struct for groups mapped
      with ID_TYPE_BOTH and vice versa.
    * BUG 9653: idmap_autorid: Fix freeing of non-talloced memory.
    * BUG 9711: s4:winbindd: Do not drop the workgroup name in the getgrnam, getgrent
      and getgrgid calls.


o   Jeremy Allison <jra@samba.org>
    * BUG 9130: Certain xattrs cause Windows error 0x800700FF.
    * BUG 9519: Samba returns unexpected error on SMB posix open.
    * BUG 9642: Fix the build of vfs_afsacl.
    * BUG 9695: Backport tevent changes to bring library to version 0.9.18.
    * BUG 9706: Fix large reads/writes from some Linux clients.
    * BUG 9724: is_encrypted_packet() function incorrectly used inside server.
    * BUG 9733: Fix 'smbcontrol close-share'.
    * BUG 9748: Remove unneeded fstat system call from hot read path.
    * BUG 9760: Fix incorrect parsing of SMB2 command codes.


o   Christian Ambach <ambi@samba.org>
    * BUG 9643: Fix the build with --fake-kaserver.
    * BUG 9644: Fix compile of source3/lib/afs.c.
    * BUG 9669: Fix crash in 'net rpc join' against a Samba 3.0.33 PDC.


o   Timur Bakeyev <timur@FreeBSD.org>
    * BUG 9666: Fix filtering of link-local addresses.


o   Andrew Bartlett <abartlet@samba.org>
    * BUG 9663: 'make test' hangs.
    * BUG 9697: DsReplicaGetInfo fails due to sendto() EMSGSIZE error
      on UNIX domain socket.
    * BUG 9703: Fix build on solaris8: Do not force a specific perl on
      pod2man.
    * BUG 9717: Set LD_LIBRARY_PATH in install_with_python.sh.
    * BUG 9718: s4-idmap: Remove requirement that posixAccount or posixGroup be set
      for rfc2307.
    * BUG 9719: Allow forcing an override of an old @MODULES record.
    * BUG 9720: Do not print the admin password during 'samba-tool
      classicupgrade'.
    * BUG 9721: Make samba_upgradedns more robust (do not guess addresses
      when just changing roles).
    * BUG 9725: upgradeprovision and 'samba-tool dbcheck' patches for 4.0.NEXT.
    * BUG 9728: DO NOT install samba_upgradeprovision in 4.0.x.
    * BUG 9739: PIDL: Build fixes for hosts without CPP (Solaris 11).
    * BUG 9740: Add 'samba-tool dbcheck --reset-well-known-acls'.
    * BUG 9267: Can't delegate adding computers to domain.


o   Alexander Bokovoy <ab@samba.org>
    * BUG 9636: PIDL: Fix parsing linemarkers in preprocessor output.
    * BUG 9639: Rename internal subsystem pdb_ldap to pdb_ldapsam.


o   Ira Cooper <ira@samba.org>
    * BUG 9646: Make SMB2_GETINFO multi-volume aware.


o   David Disseldorp <ddiss@samba.org>
    * BUG 9633: Recursive mget should continue on EPERM.


o   Landon Fuller <landonf@bikemonkey.org>
    * BUG 9656: Work around FreeBSD's getaddrinfo() underscore issue.
    * BUG 9696: Remove incomplete samba_dnsupdate IPv6 link-local address
      check.
    * BUG 9697: Handle EMSGSIZE on UNIX domain sockets.


o   Björn Jacke <bj@sernet.de>
    * BUG 7825: Fix GNU ld version detection with old gcc releases.


o   Daniel Kobras <d.kobras@science-computing.de>
    * BUG 9039: Never try to map global SAM name.


o   Guenter Kukkukk <kukks@samba.org>
    * BUG 9701: Fix vfs_catia and update documentation.


o   Volker Lendecke <vl@samba.org>
    * BUG 9695: Backport tevent changes to bring library to version 0.9.18.
    * BUG 9727: Fix NULL pointer dereference.
    * BUG 9736: Change to smbd/dir.c code gives significant performance
      increases on large directory listings.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 9557: Fix build on AIX.
    * BUG 9625: Reauth-capable client fails to access shares on Windows member.
    * BUG 9695: Backport tevent changes to bring library to version 0.9.18.
    * BUG 9706: Parameter is incorrect on Android.


o   Andreas Schneider <asn@samba.org>
    * BUG 9664: Fix correct linking of libreplace with cmdline-credentials.
    * BUG 9683: Fix several resource (fd) leaks.
    * BUG 9685: Fix a memory leak in spoolss rpc server.
    * BUG 9686: Fix a possible buffer overrun in pdb_smbpasswd.
    * BUG 9687: Fix several possible null pointer dereferences.
    * BUG 9723: Add a tool to migrate latin1 printing tdbs to registry.
    * BUG 9735: Fix Winbind separator in upn to username conversion.
    * BUG 9758: Don't leak the epm_Map policy handle.


o   Richard Sharpe <rsharpe@samba.org>
    * BUG 9674: Samba denies owner Read Control when there is a DENY entry
      while W2K08 does not.
    * BUG 9689: Make sure that domain joins work correctly when the DC disallows
      NTLM auth.
    * BUG 9704: Fix nss_winbind name on FreeBSD.
    * BUG 9747: Make sure that we only propogate the INHERITED flag when we are
      allowed to.


Note about upgrading from older versions:
-----------------------------------------

It is still the case that there are printing tdbs (ntprinting.tdb, ntforms.tdb,
ntdrivers.tdb) which are in latin1 or other encodings. When updating from
Samba 3.5 or earlier to Samba 3.6 or 4.0 these tdbs need to be migrated to our
new registry based printing management.  This means during the migration we
also need to do charset conversion. This can only been done manually cause we don't
know in which encoding the tdb is. You have to specify the correct code page
for the conversion, see iconv -l and Wikipedia [1] for the available codepages.
The mostly used one is Windows Latin1 which is CP1252.

We've extended the 'net printing dump' and 'net printing migrate' commands to
define the encoding of the tdb. So you can correctly view the tdb with:

  net printing dump encoding=CP1252 /path/to/ntprinters.tdb

or migrate it with e.g.:

  net printing migrate encoding=CP1252 /path/to/ntprinters.tdb

If you migrate printers we suggest you do it in the following order.

ntforms.tdb
ntdrivers.tdb
ntprinting.tdb

Don't forget to rename, move or delete these files in /var/lib/samba after the
migration.

[1] https://en.wikipedia.org/wiki/Code_page


https://www.samba.org/samba/
Titel: Samba 4.1 verschlüsselt Datenübertragung mit SMB3
Beitrag von: ritschibie am 14 Oktober, 2013, 11:42
Der Samba-Client des freien SMB/CIFS-Servers Samba 4.1 unterstützt die Generationen 2 und 3 des SMB-Protokolls. Die Datenübertragung mit diesen kann deutlich effizienter sein, da Microsoft das Kommunikationsprotokoll SMB (Server Message Blocks) mit dem bei Vista eingeführten SMB2 erheblich modernisiert hat und dabei einigen historischen Ballast über Bord warf; bereits Samba 4.0 beherrscht serverseitig SMB3.

Der ganze Artikel (http://www.heise.de/newsticker/meldung/Samba-4-1-verschluesselt-Datenuebertragung-mit-SMB3-1977758.html)

Quelle: www.heise.de
Titel: Univention: Active Directory von Windows nach Linux migrieren
Beitrag von: SiLæncer am 13 Februar, 2014, 19:28
Mit AD-Takeover hat der Bremer Linux-Abieter einen Assistenten entwickelt, der die Migration von Active-Directory-Domänen auf den Univention Corporate Server (UCS) erleichtern soll.

Mit AD-Takeover will Univention die Migration von Windows Server auf den hauseigenen Univention Corporate Server (UCS) vereinfachen: Der Assistent soll den Umzug von Active-Directory-Domänen auf den Univention Corporate Server (UCS) zum Kinderspiel machen, indem er die notwendigen Arbeiten wie das Kopieren der Berechtigungsdaten übernimmt. Nach Abschluss dieses Vorgangs können laut dem Hersteller die Microsoft Active Directory Server abgeschaltet werden, UCS übernimmt deren Aufgaben.

Quelle : www.heise.de
Titel: Samba 4.1.8
Beitrag von: SiLæncer am 03 Juni, 2014, 18:52
Release Notes
Samba 4.1.8 Available for Download

                   =============================
                   Release Notes for Samba 4.1.8
                           June 3, 2014
                   =============================


This is the latest stable release of Samba 4.1.

Please note that this bug fix release also addresses two minor security issues
without being a dedicated security release:

  o CVE-2014-0239: dns: Don't reply to replies (bug #10609).
  o CVE-2014-0178: Malformed FSCTL_SRV_ENUMERATE_SNAPSHOTS response
    (bug #10549).

For more details including security advisories and patches, please see

  http://www.samba.org/samba/history/security.html


Changes since 4.1.7:
--------------------

o   Michael Adam <obnox@samba.org>
    * BUG 10548: build: Fix ordering problems with lib-provided and internal
      RPATHs.


o   Jeremy Allison <jra@samba.org>
    * BUG 3124: s3: smb2: Fix 'xcopy /d' with samba shares.
    * BUG 10544: s3: lib/util: Fix logic inside set_namearray loops.
    * BUG 10564: Fix lock order violation and file lost.
    * BUG 10577: Fix wildcard unlink to fail if we get an error rather than
      trying to continue.


o   Andrew Bartlett <abartlet@samba.org>
    * BUG 10569: dsdb: Do checks for invalid renames in samldb, before
      repl_meta_data.


o   Björn Baumbach <bb@sernet.de>
    * BUG 10239: s3: nmbd: Reset debug settings after reading config file.
    * BUG 10544: s3: lib/util: set_namearray reads across end of namelist
    * BUG 10556: lib-util: Rename memdup to smb_memdup and fix all callers.


o   Kai Blin <kai@samba.org>
    * BUG 10609: CVE-2014-0239: dns: Don't reply to replies.


o   Alexander Bokovoy <ab@samba.org>
    * BUG 10517: Use exit_daemon() to communicate status of startup to
      systemd.


o   David Disseldorp <ddiss@samba.org>
    * BUG 10590: byteorder: Do not assume PowerPC is big-endian.
    * BUG 10612: printing: Fix purge of all print jobs.


o   Benjamin Franzke <benjaminfranzke@googlemail.com>
    * BUG 10524: Fix adding NetApps.


o   Abhidnya Joshi <achirmul@in.ibm.com>
    * BUG 10547: idmap_autorid: Fix failure in reverse lookup if ID is from
      domain range index #0.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 10472: script/autobuild: Make use of
      '--with-perl-{arch,lib}-install-dir'.


o   Noel Power <nopower@suse.com>
    * BUG 10554: Fix read of deleted memory in reply_writeclose()'.


o   Jose A. Rivera <jarrpa@redhat.com>
    * BUG 10151: Extra ':' in msg for Waf Cross Compile Build System with
      Cross-answers command.
    * BUG 10348: Fix empty body in if-statement in continue_domain_open_lookup.


o   Christof Schmitt <christof.schmitt@us.ibm.com>
    * BUG 10549: CVE-2014-0178: Malformed FSCTL_SRV_ENUMERATE_SNAPSHOTS
      response.


o   Andreas Schneider <asn@samba.org>
    * BUG 10472: wafsamba: Fix the installation on FreeBSD.

[close]

https://www.samba.org/samba/
Titel: Samba 4.2 läutet das Ende von 3.6 ein
Beitrag von: SiLæncer am 06 März, 2015, 18:05
Die Entwickler des freien SMB-Servers Samba haben die Version 4.2 veröffentlicht und läuten damit das Ende der Samba-3-Zeit ein – auch die letzte Version der 3.6-Serie soll demnach keine Sicherheitskorrekturen mehr erfahren.

Die frische Samba-Version 4.2 bringt einige interessante Neuerungen mit: Danke einer weiter ausgebauten Erweiterung (VFS-Modul) für das Dateisystem Btrfs können Windows-Clients Optionen zur transparenten Kompression von Dateien auf einer Freigabe direkt steuern. Ein anderes Modul macht Snapshots, die mit Btrfs oder auf LVM-Volumes angefertigt wurden, von Windows-Clients aus als "vorherige Versionen" zugänglich. Die Release Notes (https://www.samba.org/samba/history/samba-4.2.0.html) führen noch viele weitere Verbesserungen auf, darunter etwa Funktionen für Kontosperrungen bei häufigen Anmeldefehlern sowie VFS-Module für WORM-Medien und Apple-Clients.

Die Entwickler nutzen die Ankündigung der neuen Fassung, um detailliert über ihre Release- und Supportfristen zu informieren (https://wiki.samba.org/index.php/Samba_Release_Planning): Samba 3.6 wird demnach ebenso wie schon seine Vorgänger ab sofort nicht mehr mit Korrekturen bedacht. Die Version 4.0 erhält lediglich noch Sicherheits-Fixes. Die letzte Veröffentlichungsreihe 4.1 erfährt noch regelmäßig Fehlerkorrekturen, selbst wenn es sich dabei nicht um Sicherheitslücken handelt.

Das Samba-Team weist dabei noch mal explizit daraufhin, dass der Umstieg von Samba 3 auf Version 4 nicht dazu zwingt, auf das damit als Verzeichnisdienst eingeführte Active Directory umzusteigen. Für besonders Hartgesottene: Samba 4.x arbeitet auf Wunsch sogar weiterhin als NT4-kompatibler Primary Domain Controller.

Quelle : www.heise.de
Titel: Samba 4.3 freigegeben
Beitrag von: SiLæncer am 09 September, 2015, 16:30
Changelog

Samba 4.3.0 Available for Download

Samba 4.3.0 (gzipped)
Signature

                   =============================
                   Release Notes for Samba 4.3.0
                           September 8, 2015
                   =============================


This is the first stable release of Samba 4.3.


UPGRADING
=========

Read the "New FileChangeNotify subsystem" and "smb.conf changes" sections
(below).


NEW FEATURES
============

Logging
-------

The logging code now supports logging to multiple backends.  In
addition to the previously available syslog and file backends, the
backends for logging to the systemd-journal, lttng and gpfs have been
added. Please consult the section for the 'logging' parameter in the
smb.conf manpage for details.

Spotlight
---------

Support for Apple's Spotlight has been added by integrating with Gnome
Tracker.

For detailed instructions how to build and setup Samba for Spotlight,
please see the Samba wiki: <https://wiki.samba.org/index.php/Spotlight>

New FileChangeNotify subsystem
------------------------------

Samba now contains a new subsystem to do FileChangeNotify. The
previous system used a central database, notify_index.tdb, to store
all notification requests. In particular in a cluster this turned out
to be a major bottleneck, because some hot records need to be bounced
back and forth between nodes on every change event like a new created
file.

The new FileChangeNotify subsystem works with a central daemon per
node. Every FileChangeNotify request and every event are handled by an
asynchronous message from smbd to the notify daemon. The notify daemon
maintains a database of all FileChangeNotify requests in memory and
will distribute the notify events accordingly. This database is
asynchronously distributed in the cluster by the notify daemons.

The notify daemon is supposed to scale a lot better than the previous
implementation. The functional advantage is cross-node kernel change
notify: Files created via NFS will be seen by SMB clients on other
nodes per FileChangeNotify, despite the fact that popular cluster file
systems do not offer cross-node inotify.

Two changes to the configuration were required for this new subsystem:
The parameters "change notify" and "kernel change notify" are not
per-share anymore but must be set globally. So it is no longer
possible to enable or disable notify per share, the notify daemon has
no notion of a share, it only works on absolute paths.

New SMB profiling code
----------------------

The code for SMB (SMB1, SMB2 and SMB3) profiling uses a tdb instead
of sysv IPC shared memory. This avoids performance problems and NUMA
effects. The profile stats are a bit more detailed than before.

Improved DCERPC man in the middle detection for kerberos
--------------------------------------------------------

The gssapi based kerberos backends for gensec have support for
DCERPC header signing when using DCERPC_AUTH_LEVEL_PRIVACY.

SMB signing required in winbindd by default
-------------------------------------------

The effective value for "client signing" is required
by default for winbindd, if the primary domain uses active directory.

Experimental NTDB was removed
-----------------------------

The experimental NTDB library introduced in Samba 4.0 has been
removed again.

Improved support for trusted domains (as AD DC)
-----------------------------------------------

The support for trusted domains/forests has improved a lot.

samba-tool got "domain trust" subcommands to manage trusts:

  create      - Create a domain or forest trust.
  delete      - Delete a domain trust.
  list        - List domain trusts.
  namespaces  - Manage forest trust namespaces.
  show        - Show trusted domain details.
  validate    - Validate a domain trust.

External trusts between individual domains work in both ways
(inbound and outbound). The same applies to root domains of
a forest trust. The transitive routing into the other forest
is fully functional for kerberos, but not yet supported for NTLMSSP.

While a lot of things are working fine, there are currently a few limitations:

  - Both sides of the trust need to fully trust each other!
  - No SID filtering rules are applied at all!
  - This means DCs of domain A can grant domain admin rights
    in domain B.
  - It's not possible to add users/groups of a trusted domain
    into domain groups.

SMB 3.1.1 supported
-------------------

Both client and server have support for SMB 3.1.1 now.

This is the dialect introduced with Windows 10, it improves the secure
negotiation of SMB dialects and features.

There's also a new optinal encryption algorithm aes-gcm-128,
but for now this is only selected as fallback and aes-ccm-128
is preferred because of the better performance. This might change
in future versions when hardware encryption will be supported.
See https://bugzilla.samba.org/show_bug.cgi?id=11451.

New smbclient subcommands
-------------------------

  - Query a directory for change notifications: notify <dir name>
  - Server side copy: scopy <source filename> <destination filename>

New rpcclient subcommands
-------------------------

  netshareenumall    - Enumerate all shares
  netsharegetinfo    - Get Share Info
  netsharesetinfo    - Set Share Info
  netsharesetdfsflags   - Set DFS flags
  netfileenum      - Enumerate open files
  netnamevalidate   - Validate sharename
  netfilegetsec      - Get File security
  netsessdel      - Delete Session
  netsessenum      - Enumerate Sessions
  netdiskenum      - Enumerate Disks
  netconnenum      - Enumerate Connections
  netshareadd      - Add share
  netsharedel      - Delete share

New modules
-----------

  idmap_script       - see 'man 8 idmap_script'
  vfs_unityed_media   - see 'man 8 vfs_unityed_media'
  vfs_shell_snap   - see 'man 8 vfs_shell_snap'

New sparsely connected replia graph (Improved KCC)
--------------------------------------------------

The Knowledge Consistency Checker (KCC) maintains a replication graph
for DCs across an AD network. The existing Samba KCC uses a fully
connected graph, so that each DC replicates from all the others, which
does not scale well with large networks. In 4.3 there is an
experimental new KCC that creates a sparsely connected replication
graph and closely follows Microsoft's specification. It is turned off
by default. To use the new KCC, set "kccsrv:samba_kcc=true" in
smb.conf and let us know how it goes. You should consider doing this
if you are making a large new network. For small networks there is
little benefit and you can always switch over at a later date.

Configurable TLS protocol support, with better defaults
-------------------------------------------------------

The "tls priority" option can be used to change the supported TLS
protocols. The default is to disable SSLv3, which is no longer
considered secure.

Samba-tool now supports all 7 FSMO roles
-------------------------------------------------------

Previously "samba-tool fsmo" could only show, transfer or seize the
five well-known FSMO roles:

   Schema Master
   Domain Naming Master
   RID Master
   PDC Emulator
   Infrastructure Master

It can now also show, transfer or seize the DNS infrastructure roles:

   DomainDnsZones Infrastructure Master
   ForestDnsZones Infrastructure Master

CTDB logging changes
--------------------

The destination for CTDB logging is now set via a single new
configuration variable CTDB_LOGGING.  This replaces CTDB_LOGFILE and
CTDB_SYSLOG, which have both been removed.  See ctdbd.conf(5) for
details of CTDB_LOGGING.

CTDB no longer runs a separate logging daemon.

CTDB NFS support changes
------------------------

CTDB's NFS service management has been combined into a single 60.nfs
event script.  This updated 60.nfs script now uses a call-out to
interact with different NFS implementations.  See the CTDB_NFS_CALLOUT
option in the ctdbd.conf(5) manual page for details.  A default
call-out is provided to interact with the Linux kernel NFS
implementation.  The 60.ganesha event script has been removed - a
sample call-out is provided for NFS Ganesha, based on this script.

The method of configuring NFS RPC checks has been improved.  See
ctdb/config/nfs-checks.d/README for details.

Improved Cross-Compiling Support
--------------------------------

A new "hybrid" build configuration mode is added to improve
cross-compilation support.

A common challenge in cross-compilation is that of obtaining the results
of tests that have to run on the target, during the configuration
phase of the build. The Samba build system already supports the following
means to do so:

  - Executing configure tests using the --cross-execute parameter
  - Obtaining the results from an answers file using the --cross-answers
    parameter

The first method has the drawback of inaccurate results if the tests are
run using an emulator, or a need to be connected to a running target
while building, if the tests are to be run on an actual target. The
second method presents a challenge of figuring out the test results.

The new hybrid mode runs the tests and records the result in an answer file.
To activate this mode, use both --cross-execute and --cross-answers in the
same configure invocation. This mode can be activated once against a
running target, and then the generated answers file can be used in
subsequent builds.

Also supplied is an example script that can be used as the
cross-execute program. This script copies the test to a running target
and runs the test on the target, obtaining the result. The obtained
results are more accurate than running the test with an emulator, because
they reflect the exact kernel and system libraries that exist on the
target.

Improved Sparse File Support
----------------------------
Support for the FSCTL_SET_ZERO_DATA and FSCTL_QUERY_ALLOCATED_RANGES
SMB2 requests has been added to the smbd file server.
This allows for clients to deallocate (hole punch) regions within a
sparse file, and check which portions of a file are allocated.


######################################################################
Changes
#######

smb.conf changes
----------------

  Parameter Name      Description      Default
  --------------      -----------      -------
  logging         New         (empty)
  msdfs shuffle referrals   New         no
  smbd profiling level      New         off
  spotlight         New         no
  tls priority         New          NORMAL:-VERS-SSL3.0
  use ntdb         Removed
  change notify         Changed to [global]
  kernel change notify      Changed to [global]
  client max protocol      Changed   default      SMB3_11
  server max protocol      Changed default      SMB3_11

Removed modules
---------------

vfs_notify_fam - see section 'New FileChangeNotify subsystem'.


KNOWN ISSUES
============

Currently none.


CHANGES SINCE 4.2.0rc4
======================

o   Andrew Bartlett <abartlet@samba.org>
    * Bug 10973: No objectClass found in replPropertyMetaData on ordinary
      objects (non-deleted)
    * Bug 11429: Python bindings don't check integer types
    * Bug 11430: Python bindings don't check array sizes

o   Ralph Boehme <slow@samba.org>
    * Bug 11467: Handling of 0 byte resource fork stream

o   Volker Lendecke <vl@samba.org>
    * Bug 11488: AD samr GetGroupsForUser fails for users with "()" in
      their name

o   Stefan Metzmacher <metze@samba.org>
    * Bug 11429: Python bindings don't check integer types

o   Matthieu Patou <mat@matws.net>
    * Bug 10973: No objectClass found in replPropertyMetaData on ordinary
      objects (non-deleted)


CHANGES SINCE 4.2.0rc3
======================

o   Ralph Boehme <slow@samba.org>
    * Bug 11444: Crash in notify_remove caused by change notify = no

o   Günther Deschner <gd@samba.org>
    * Bug 11411: smbtorture does not build when configured --with-system-mitkrb5

o   Volker Lendecke <vl@samba.org>
    * Bug 11455: fix recursion problem in rep_strtoll in lib/replace/replace.c
    * Bug 11464: xid2sid gives inconsistent results
    * Bug 11465: ctdb: Fix the build on FreeBSD 10.1

o   Roel van Meer <roel@1afa.com>
    * Bug 11427: nmbd incorrectly matches netbios names as own name

o   Stefan Metzmacher <metze@samba.org>
    * Bug 11451: Poor SMB3 encryption performance with AES-GCM
    * Bug 11458: --bundled-libraries=!ldb,!pyldb,!pyldb-util doesn't
      disable ldb build and install

o   Andreas Schneider <asn@samba.org>
    * Bug 9862: Samba "map to guest = Bad uid" doesn't work


CHANGES SINCE 4.3.0rc2
======================

o   Andrew Bartlett <abartlet@samba.org>
    * Bug 11436: samba-tool uncaught exception error
    * Bug 10493: revert LDAP extended rule 1.2.840.113556.1.4.1941
                 LDAP_MATCHING_RULE_IN_CHAIN changes

o   Ralph Boehme <slow@samba.org>
    * Bug 11278: Stream names with colon don't work with
                 fruit:encoding = native
    * Bug 11426: net share allowedusers crashes

o   Amitay Isaacs <amitay@gmail.com>
    * Bug 11432: Fix crash in nested ctdb banning
    * Bug 11434: Cannot build ctdbpmda
    * Bug 11431: CTDB's eventscript error handling is broken

o   Stefan Metzmacher <metze@samba.org>
    * Bug 11451: Poor SMB3 encryption performance with AES-GCM (part1)
    * Bug 11316: tevent_fd needs to be destroyed before closing the fd

o   Arvid Requate <requate@univention.de>
    * Bug 11291: NetApp joined to a Samba/ADDC cannot resolve SIDs

o   Martin Schwenke <martin@meltin.net>
    * Bug 11432: Fix crash in nested ctdb banning


CHANGES SINCE 4.3.0rc1
======================

o   Jeremy Allison <jra@samba.org>
    * BUG 11359: strsep is not available on Solaris

o   Björn Baumbach <bb@sernet.de>
    * BUG 11421: Build with GPFS support is broken

o   Justin Maggard <jmaggard@netgear.com>
    * BUG 11320: "force group" with local group not working

o   Martin Schwenke <martin@meltin.net>
    * BUG 11424: Build broken with --disable-python

[close]

http://www.samba.org/
Titel: Samba 4.3.2
Beitrag von: SiLæncer am 09 Dezember, 2015, 18:15
Changelog

Samba 4.3.2 Available for Download

Samba 4.3.2 (gzipped)
Signature

Patch (gzipped) against Samba 4.3.1
Signature

                   =============================
                   Release Notes for Samba 4.3.2
                         December 01, 2015
                   =============================


This is the latest stable release of Samba 4.3.


Changes since 4.3.1:
--------------------

o   Michael Adam <obnox@samba.org>
    * BUG 11577: ctdb: Open the RO tracking db with perms 0600 instead of 0000.

o   Jeremy Allison <jra@samba.org>
    * BUG 11452: s3-smbd: Fix old DOS client doing wildcard delete - gives an
      attribute type of zero.
    * BUG 11565: auth: gensec: Fix a memory leak.
    * BUG 11566: lib: util: Make non-critical message a warning.
    * BUG 11589: s3: smbd: If EAs are turned off on a share don't allow an SMB2
      create containing them.
    * BUG 11615: s3: smbd: have_file_open_below() fails to enumerate open files
      below an open directory handle.

o   Ralph Boehme <slow@samba.org>
    * BUG 11562: s4:lib/messaging: Use correct path for names.tdb.
    * BUG 11564: async_req: Fix non-blocking connect().

o   Volker Lendecke <vl@samba.org>
    * BUG 11243: vfs_gpfs: Re-enable share modes.
    * BUG 11570: smbd: Send SMB2 oplock breaks unencrypted.
    * BUG 11612: winbind: Fix crash on invalid idmap configs.

o   YvanM <yvan.masson@openmailbox.org>
    * BUG 11584: manpage: Correct small typo error.

o   Stefan Metzmacher <metze@samba.org>
    * BUG 11327: dcerpc.idl: Accept invalid dcerpc_bind_nak pdus.
    * BUG 11581: s3:smb2_server: Make the logic of SMB2_CANCEL DLIST_REMOVE()
      clearer.

o   Marc Muehlfeld <mmuehlfeld@samba.org>
    * BUG 9912: Changing log level of two entries to DBG_NOTICE.
    * BUG 11581: s3-smbd: Fix use after issue in smbd_smb2_request_dispatch().

o   Noel Power <noel.power@suse.com>
    * BUG 11569: Fix winbindd crashes with samlogon for trusted domain user.
    * BUG 11597: Backport some valgrind fixes from upstream master.

o   Andreas Schneider <asn@samba.org
    * BUG 11563: Fix segfault of 'net ads (join|leave) -S INVALID' with
      nss_wins.

o   Tom Schulz <schulz@adi.com>
    * BUG 11511: Add libreplace dependency to texpect, fixes a linking error on
      Solaris.
    * BUG 11512: s4: Fix linking of 'smbtorture' on Solaris.

o   Uri Simchoni <uri@samba.org>
    * BUG 11608: auth: Consistent handling of well-known alias as primary gid.


[close]

http://www.samba.org/
Titel: Samba 4.4 freigegeben
Beitrag von: SiLæncer am 24 März, 2016, 12:45
Changelog


Samba 4.4.0 Available for Download

Samba 4.4.0 (gzipped)
Signature

Release Announcements
=====================

This is the first stable release of the Samba 4.4 release series.


UPGRADING
=========

Nothing special.


NEW FEATURES/CHANGES
====================

Asynchronous flush requests
---------------------------

Flush requests from SMB2/3 clients are handled asynchronously and do
not block the processing of other requests. Note that 'strict sync'
has to be set to 'yes' for Samba to honor flush requests from SMB
clients.

s3: smbd
--------

Remove '--with-aio-support' configure option. We no longer would ever prefer
POSIX-RT aio, use pthread_aio instead.

samba-tool sites
----------------

The 'samba-tool sites' subcommand can now be run against another server by
specifying an LDB URL using the '-H' option and not against the local database
only (which is still the default when no URL is given).

samba-tool domain demote
------------------------

Add '--remove-other-dead-server' option to 'samba-tool domain demote'
subcommand. The new version of this tool now can remove another DC that is
itself offline.  The '--remove-other-dead-server' removes as many references
to the DC as possible.

samba-tool drs clone-dc-database
--------------------------------

Replicate an initial clone of domain, but do not join it.
This is developed for debugging purposes, but not for setting up another DC.

pdbedit
-------

Add '--set-nt-hash' option to pdbedit to update user password from nt-hash
hexstring. 'pdbedit -vw' shows also password hashes.

smbstatus
---------

'smbstatus' was enhanced to show the state of signing and encryption for
sessions and shares.

smbget
------
The -u and -p options for user and password were replaced by the -U option that
accepts username[%password] as in many other tools of the Samba suite.
Similary, smbgetrc files do not accept username and password options any more,
only a single "user" option which also accepts user%password combinations.
The -P option was removed.

s4-rpc_server
-------------

Add a GnuTLS based backupkey implementation.

ntlm_auth
---------

Using the '--offline-logon' enables ntlm_auth to use cached passwords when the
DC is offline.

Allow '--password' force a local password check for ntlm-server-1 mode.

vfs_offline
-----------

A new VFS module called vfs_offline has been added to mark all files in the
share as offline. It can be useful for shares mounted on top of a remote file
system (either through a samba VFS module or via FUSE).

KCC
---

The Samba KCC has been improved, but is still disabled by default.

DNS
---

There were several improvements concerning the Samba DNS server.

Active Directory
----------------

There were some improvements in the Active Directory area.

WINS nsswitch module
--------------------

The WINS nsswitch module has been rewritten to address memory issues and to
simplify the code. The module now uses libwbclient to do WINS queries. This
means that winbind needs to be running in order to resolve WINS names using
the nss_wins module. This does not affect smbd.

CTDB changes
------------

* CTDB now uses a newly implemented parallel database recovery scheme
  that avoids deadlocks with smbd.

  In certain circumstances CTDB and smbd could deadlock.  The new
  recovery implementation avoid this.  It also provides improved
  recovery performance.

* All files are now installed into and referred to by the paths
  configured at build time.  Therefore, CTDB will now work properly
  when installed into the default location at /usr/local.

* Public CTDB header files are no longer installed, since Samba and
  CTDB are built from within the same source tree.

* CTDB_DBDIR can now be set to tmpfs[:<tmpfs-options>]

  This will cause volatile TDBs to be located in a tmpfs.  This can
  help to avoid performance problems associated with contention on the
  disk where volatile TDBs are usually stored.  See ctdbd.conf(5) for
  more details.

* Configuration variable CTDB_NATGW_SLAVE_ONLY is no longer used.
  Instead, nodes should be annotated with the "slave-only" option in
  the CTDB NAT gateway nodes file.  This file must be consistent
  across nodes in a NAT gateway group.  See ctdbd.conf(5) for more
  details.

* New event script 05.system allows various system resources to be
  monitored

  This can be helpful for explaining poor performance or unexpected
  behaviour.  New configuration variables are
  CTDB_MONITOR_FILESYSTEM_USAGE, CTDB_MONITOR_MEMORY_USAGE and
  CTDB_MONITOR_SWAP_USAGE.  Default values cause warnings to be
  logged.  See the SYSTEM RESOURCE MONITORING CONFIGURATION in
  ctdbd.conf(5) for more information.

  The memory, swap and filesystem usage monitoring previously found in
  00.ctdb and 40.fs_use is no longer available.  Therefore,
  configuration variables CTDB_CHECK_FS_USE, CTDB_MONITOR_FREE_MEMORY,
  CTDB_MONITOR_FREE_MEMORY_WARN and CTDB_CHECK_SWAP_IS_NOT_USED are
  now ignored.

* The 62.cnfs eventscript has been removed.  To get a similar effect
  just do something like this:

      mmaddcallback ctdb-disable-on-quorumLoss \
        --command /usr/bin/ctdb \
        --event quorumLoss --parms "disable"

      mmaddcallback ctdb-enable-on-quorumReached \
        --command /usr/bin/ctdb \
        --event quorumReached --parms "enable"

* The CTDB tunable parameter EventScriptTimeoutCount has been renamed
  to MonitorTimeoutCount

  It has only ever been used to limit timed-out monitor events.

  Configurations containing CTDB_SET_EventScriptTimeoutCount=<n> will
  cause CTDB to fail at startup.  Useful messages will be logged.

* The commandline option "-n all" to CTDB tool has been removed.

  The option was not uniformly implemented for all the commands.
  Instead of command "ctdb ip -n all", use "ctdb ip all".

* All CTDB current manual pages are now correctly installed


EXPERIMENTAL FEATURES
=====================

SMB3 Multi-Channel
------------------

Samba 4.4.0 adds *experimental* support for SMB3 Multi-Channel.
Multi-Channel is an SMB3 protocol feature that allows the client
to bind multiple transport connections into one authenticated
SMB session. This allows for increased fault tolerance and
throughput. The client chooses transport connections as reported
by the server and also chooses over which of the bound transport
connections to send traffic. I/O operations for a given file
handle can span multiple network connections this way.
An SMB multi-channel session will be valid as long as at least
one of its channels are up.

In Samba, multi-channel can be enabled by setting the new
smb.conf option "server multi channel support" to "yes".
It is disabled by default.

Samba has to report interface speeds and some capabilities to
the client. On Linux, Samba can auto-detect the speed of an
interface. But to support other platforms, and in order to be
able to manually override the detected values, the "interfaces"
smb.conf option has been given an extended syntax, by which an
interface specification can additionally carry speed and
capability information. The extended syntax looks like this
for setting the speed to 1 gigabit per second:

    interfaces = 192.168.1.42;speed=1000000000

This extension should be used with care and are mainly intended
for testing. See the smb.conf manual page for details.

CAVEAT: While this should be working without problems mostly,
there are still corner cases in the treatment of channel failures
that may result in DATA CORRUPTION when these race conditions hit.
It is hence

    NOT RECOMMENDED TO USE MULTI-CHANNEL IN PRODUCTION

at this stage. This situation can be expected to improve during
the life-time of the 4.4 release. Feed-back from test-setups is
highly welcome.


REMOVED FEATURES
================

Public headers
--------------

Several public headers are not installed any longer. They are made for internal
use only. More public headers will very likely be removed in future releases.

The following headers are not installed any longer:
dlinklist.h, gen_ndr/epmapper.h, gen_ndr/mgmt.h, gen_ndr/ndr_atsvc_c.h,
gen_ndr/ndr_epmapper_c.h, gen_ndr/ndr_epmapper.h, gen_ndr/ndr_mgmt_c.h,
gen_ndr/ndr_mgmt.h,gensec.h, ldap_errors.h, ldap_message.h, ldap_ndr.h,
ldap-util.h, pytalloc.h, read_smb.h, registry.h, roles.h, samba_util.h,
smb2_constants.h, smb2_create_blob.h, smb2.h, smb2_lease.h, smb2_signing.h,
smb_cli.h, smb_cliraw.h, smb_common.h, smb_composite.h, smb_constants.h,
smb_raw.h, smb_raw_interfaces.h, smb_raw_signing.h, smb_raw_trans2.h,
smb_request.h, smb_seal.h, smb_signing.h, smb_unix_ext.h, smb_util.h,
torture.h, tstream_smbXcli_np.h.

vfs_smb_traffic_analyzer
------------------------

The SMB traffic analyzer VFS module has been removed, because it is not
maintained any longer and not widely used.

vfs_scannedonly
---------------

The scannedonly VFS module has been removed, because it is not maintained
any longer.

smb.conf changes
----------------

  Parameter Name      Description      Default
  --------------      -----------      -------
  aio max threads               New                     100
  ldap page size      Changed default      1000
  server multi channel support   New         No
  interfaces         Extended syntax


KNOWN ISSUES
============

Currently none.


CHANGES SINCE 4.4.0rc5
======================

o  Michael Adam <obnox@samba.org>
   * BUG 11796: smbd: Enable multi-channel if 'server multi channel support =
     yes' in the config.

o  Günther Deschner <gd@samba.org>
   * BUG 11802: lib/socket/interfaces: Fix some uninitialied bytes.

o  Uri Simchoni <uri@samba.org>
   * BUG 11798: build: Fix build when '--without-quota' specified.


CHANGES SINCE 4.4.0rc4
======================

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 11780: mkdir can return ACCESS_DENIED incorrectly on create race.
   * BUG 11783: Mismatch between local and remote attribute ids lets
     replication fail with custom schema.
   * BUG 11789: Talloc: Version 2.1.6.

o  Ira Cooper <ira@samba.org>
   * BUG 11774: vfs_glusterfs: Fix use after free in AIO callback.

o  Günther Deschner <gd@samba.org>
   * BUG 11755: Fix net join.

o  Amitay Isaacs <amitay@gmail.com>
   * BUG 11770: Reset TCP Connections during IP failover.

o  Justin Maggard <jmaggard10@gmail.com>
   * BUG 11773: s3:smbd: Add negprot remote arch detection for OSX.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 11772: ldb: Version 1.1.26.
   * BUG 11782: "trustdom_list_done: Got invalid trustdom response" message
     should be avoided.

o  Uri Simchoni <uri@samba.org>
   * BUG 11769: libnet: Make Kerberos domain join site-aware.
   * BUG 11788: Quota is not supported on Solaris 10.


CHANGES SINCE 4.4.0rc3
======================

o  Jeremy Allison <jra@samba.org>
   * BUG 11648: CVE-2015-7560: Getting and setting Windows ACLs on symlinks can
     change permissions on link target.

o  Christian Ambach <ambi@samba.org>
   * BUG 11767: s3:utils/smbget: Fix option parsing.

o  Alberto Maria Fiaschi <alberto.fiaschi@estar.toscana.it>
   * BUG 8093: Access based share enum: handle permission set in configuration
     files.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 11702: s3:clispnego: Fix confusing warning in spnego_gen_krb5_wrap().
   * BUG 11742: tevent: version 0.9.28: Fix memory leak when old signal action
     restored.
   * BUG 11755: s3:libads: setup the msDS-SupportedEncryptionTypes attribute on
     ldap_add.
   * BUGs 11128, 11686: CVE-2016-0771: Read of uninitialized memory DNS TXT
     handling.

o  Garming Sam <garming@catalyst.net.nz>
   * BUGs 11128, 11686: CVE-2016-0771: Read of uninitialized memory DNS TXT
     handling.

o  Uri Simchoni <uri@samba.org>
   * BUG 11691: winbindd: Return trust parameters when listing trusts.
   * BUG 11753: smbd: Ignore SVHDX create context.
   * BUG 11763: passdb: Add linefeed to debug message.


CHANGES SINCE 4.4.0rc2
======================

o  Michael Adam <obnox@samba.org>
   * BUG 11723: lib:socket: Fix CID 1350010: Integer OVERFLOW_BEFORE_WIDEN.
   * BUG 11735: lib:socket: Fix CID 1350009: Fix illegal memory accesses
     (BUFFER_SIZE_WARNING).

o  Jeremy Allison <jra@samba.org>
   * BUG 10489: s3: smbd: posix_acls: Fix check for setting u:g:o entry on a
     filesystem with no ACL support.

o  Christian Ambach <ambi@samba.org>
   * BUG 11700: s3:utils/smbget: Set default blocksize.

o  Anoop C S <anoopcs@redhat.com>
   * BUG 11734: lib/socket: Fix improper use of default interface speed.

o  Ralph Boehme <slow@samba.org>
   * BUG 11714: lib/tsocket: Work around sockets not supporting FIONREAD.

o  Volker Lendecke <vl@samba.org>
   * BUG 11724: smbd: Fix CID 1351215 Improper use of negative value.
   * BUG 11725: smbd: Fix CID 1351216 Dereference null return value.
   * BUG 11732: param: Fix str_list_v3 to accept ; again.

o  Noel Power <noel.power@suse.com>
   * BUG 11738: libcli: Fix debug message, print sid string for new_ace trustee.

o  Jose A. Rivera <jarrpa@samba.org>
   * BUG 11727: s3:smbd:open: Skip redundant call to file_set_dosmode when
     creating a new file.

o  Andreas Schneider <asn@samba.org>
   * BUG 11730: docs: Add manpage for cifsdd.
   * BUG 11739: Fix installation path of Samba helper binaries.

o  Berend De Schouwer <berend.de.schouwer@gmail.com>
   * BUG 11643: docs: Add example for domain logins to smbspool man page.

o  Martin Schwenke <martin@meltin.net>
   * BUG 11719: ctdb-scripts: Drop use of "smbcontrol winbindd ip-dropped ..."

o  Hemanth Thummala <hemanth.thummala@nutanix.com>
   * BUG 11708: loadparm: Fix memory leak issue.
   * BUG 11740: Fix memory leak in loadparm.


CHANGES SINCE 4.4.0rc1
======================

o  Michael Adam <obnox@samba.org>
   * BUG 11715: s3:vfs:glusterfs: Fix build after quota changes.

o  Jeremy Allison <jra@samba.org>
   * BUG 11703: s3: smbd: Fix timestamp rounding inside SMB2 create.

o  Christian Ambach <ambi@samba.org>
   * BUG 11700: Streamline 'smbget' options with the rest of the Samba utils.

o  Günther Deschner <gd@samba.org>
   * BUG 11696: ctdb: Do not provide a useless pkgconfig file for ctdb.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 11699: Crypto.Cipher.ARC4 is not available on some platforms, fallback
     to M2Crypto.RC4.RC4 then.

o  Amitay Isaacs <amitay@gmail.com>
   * BUG 11705: Sockets with htons(IPPROTO_RAW) and CVE-2015-8543.

o  Andreas Schneider <asn@samba.org>
   * BUG 11690: docs: Add smbspool_krb5_wrapper manpage.

o  Uri Simchoni <uri@samba.org>
   * BUG 11681: smbd: Show correct disk size for different quota and dfree block
     sizes.

[close]

http://www.samba.org/
Titel: Samba 4.6 freigegeben
Beitrag von: SiLæncer am 09 März, 2017, 15:50
Changelog

This is the first stable release of Samba 4.6.
Please read the release notes carefully before upgrading.


UPGRADING
=========

ID Mapping
----------
We discovered that the majority of users have an invalid or incorrect
ID mapping configuration. We implemented checks in the 'testparm' tool to
validate the ID mapping configuration. You should run it and check if it prints
any warnings or errors after upgrading! If it does you should fix them. See the
'IDENTITY MAPPING CONSIDERATIONS' section in the smb.conf manpage.
There are some ID mapping backends which are not allowed to be used for the
default backend. Winbind will no longer start if an invalid backend is
configured as the default backend.

To avoid problems in future we advise all users to run 'testparm' after
changing the smb.conf file!

vfs_fruit option "fruit:resource" spelling correction
-----------------------------------------------------

Due to a spelling error in the vfs_fruit option parsing for the "fruit:resource"
option, users who have set this option in their smb.conf were still using the
default setting "fruit:resource = file" as the parser was looking for the string
"fruit:ressource" (two "s").

After upgrading to this Samba version 4.6, you MUST either remove the option
from your smb.conf or set it to the default "fruit:resource = file", otherwise
your macOS clients will not be able to access the resource fork data.

This version Samba 4.6 accepts both the correct and incorrect spelling, but the
next Samba version 4.7 will not accept the wrong spelling.

Users who were using the wrong spelling "ressource" with two "s" can keep the
setting, but are advised to switch to the correct spelling.

vfs_fruit Netatalk metadata xattr name on *BSD
----------------------------------------------

Users on *BSD must rename the metadata xattr used by vfs_fruit when
using the default setting "fruit:metadata = netatalk".

Due to a glitch in the Samba xattr API compatibility layer for FreeBSD and a
mistake in vfs_fruit, vfs_fruit ended up using the wrong xattr name when
configured with "fruit:metadata = netatalk" (default). Instead of the correct

  org.netatalk.Metadata

it used

  netatalk.Metadata

Starting with Samba 4.6 vfs_fruit will use the correct "org.netatalk.Metadata"
which means existing installations must rename this xattrs. For this purpose
Samba now includes a new tool `mvxattr`. See below for further details.


NEW FEATURES/CHANGES
====================

Kerberos client encryption types
--------------------------------
Some parts of Samba (most notably winbindd) perform Kerberos client
operations based on a Samba-generated krb5.conf file. A new
parameter, "kerberos encryption types" allows configuring the
encryption types set in this file, thereby allowing the user to
enforce strong or legacy encryption in Kerberos exchanges.

The default value of "all" is compatible with previous behavior, allowing
all encryption algorithms to be negotiated. Setting the parameter to "strong"
only allows AES-based algorithms to be negotiated. Setting the parameter to
"legacy" allows only RC4-HMAC-MD5 - the legacy algorithm for Active Directory.
This can solves some corner cases of mixed environments with Server 2003R2 and
newer DCs.

Printing
--------
Support for uploading printer drivers from newer Windows clients (Windows 10)
has been added until our implementation of [MS-PAR] protocol is ready.
Several issues with uploading different printing drivers have been addressed.

The OS Version for the printing server has been increased to announce
Windows Server 2003 R2 SP2. If a driver needs a newer version then you should
check the smb.conf manpage for details.

New option for owner inheritance
--------------------------------
The "inherit owner" smb.conf parameter instructs smbd to set the
owner of files to be the same as the parent directory's owner.
Up until now, this parameter could be set to "yes" or "no".
A new option, "unix only", enables this feature only for the UNIX owner
of the file, not affecting the SID owner in the Windows NT ACL of the
file. This can be used to emulate something very similar to folder quotas.

Multi-process Netlogon support
------------------------------

The Netlogon server in the Samba AD DC can now run as multiple
processes.  The Netlogon server is a part of the AD DC that handles
NTLM authentication on behalf of domain members, including file
servers, NTLM-authenticated web servers and 802.1x gateways.  The
previous restriction to running as a single process has been removed,
and it will now run in the same process model as the rest of the
'samba' binary.

As part of this change, the NETLOGON service will now run on a distinct
TCP port, rather than being shared with all other RPC services (LSA,
SAMR, DRSUAPI etc).

New options for controlling TCP ports used for RPC services
-----------------------------------------------------------

The new 'rpc server port' option controls the default port used for
RPC services other than Netlogon.  The Netlogon server honours instead
the 'rpc server port:netlogon' option.  The default value for both
these options is the first available port including or after 1024.

AD LDAP and replication performance improvements
------------------------------------------------

Samba's LDB (the database holding the AD directory tree, as seen via
LDAP) and our DRSUAPI replication code continues to improve,
particularly in respect to the handling of large numbers of objects or
linked attributes.

 * We now respect an 'uptodateness vector' which will dramatically
   reduce the over-replication of links from new DCs.

 * We have also made the parsing of on-disk linked attributes much
   more efficient.

 * We rely on ldb 1.1.28.  This ldb version has improved memory
   handling for ldb search results, improving poorly indexed and
   unindexed search result processing speed by around 20%.

DNS improvements
----------------

The samba-tool dns subcommand is now much more robust and can delete
records in a number of situations where it was not possible to do so
in the past.

On the server side, DNS names are now more strictly validated.

CTDB changes
------------

* "ctdb event" is a new top-level command for interacting with event scripts

  "ctdb event status" replaces "ctdb scriptstatus" - the latter is
  maintained for backward compatibility but the output format has been
  cleaned up

  "ctdb event run" replaces "ctdb eventscript"

  "ctdb event script enable" replaces "ctdb enablescript"

  "ctdb event script disable" replaces "ctdb disablescript"

  The new command "ctdb event script list" lists event scripts.

* CTDB's back-end for running event scripts has been replaced by a
  separate, long-running daemon ctdbd_eventd.

* Running ctdb interactively will log to stderr

* CTDB logs now include process id for each process

* CTDB tags log messages differently.  Changes include:

  ctdb-recoverd: Messages from CTDB's recovery daemon
  ctdb-recovery: Messages from CTDB database recovery
  ctdb-eventd: Messages from CTDB's event daemon
  ctdb-takeover: Messages from CTDB's public IP takeover subsystem

* The mapping between symbolic and numeric debug levels has changed

  Configurations containing numeric debug levels should be updated.
  Symbolic debug levels are recommended.  See the DEBUG LEVEL section
  of ctdb(7) for details.

* Tunable IPAllocAlgorithm replaces LCP2PublicIPs, DeterministicIPs

  See ctdb-tunables(7) for details.

* CTDB's configuration tunables should be consistently set across a cluster

  This has always been the cases for most tunables but this fact is
  now documented.

* CTDB ships with recovery lock helper call-outs for etcd and Ceph RADOS

  To build/install these, use the "--enable-etcd-reclock" and
  "--enable-ceph-reclock" configure options.

winbind changes
---------------

winbind contains code that tries to emulate the group membership calculation
that domain controllers do when a user logs in. This group membership calculation
is a very complex process, in particular for domain trust relationship
situations. Also, in many scenarios it is impossible for winbind to
correctly do this calculation due to access restrictions in the
domains: winbind using its machine account simply does not have the
rights to ask for an arbitrary user's group memberships.

When a user logs in to a Samba server, the domain controller correctly
calculates the user's group memberships authoritatively and makes the
information available to the Samba server. This is the only reliable
way Samba can get informed about the groups a user is member of.

Because of its flakiness, the fallback group membership code is unwished,
and our code pathes try hard to only use of the group memberships
calculated by the domain controller.

However, a lot of admins rely on the fallback behavior in order to support
access for nfs access, ssh public key authentication and passwordless sudo.

That's the reason for changing this back between 4.6.0rc4 and 4.6.0
(See BUG 12612).

The winbind change to simplify the calculation of supplementary groups to make
it more reliable and predictable has been deferred to 4.7 or later.

This means that 'id <username>' without the user having logged in
previously works similar to 4.5.

winbind primary group and nss info
----------------------------------

With 4.6, it will be possible to optionally use the primary group as
set in the "Unix Attributes" tab for the local unix token of a domain
user.  Before 4.6, the Windows primary group was always chosen as
primary group for the local unix token.

To activate the unix primary group, set

idmap config <DOMAIN> : unix_primary_group = yes

Similarly, set

idmap config <DOMAIN> : unix_nss_info = yes

to retrieve the home directory and login shell from the "Unix
Attributes" of the user. This supersedes the "winbind nss info"
parameter with a per-domain configuration option.

mvxattr
-------

mvxattr is a simple utility to recursively rename extended attributes of all
files and directories in a directory tree.

  Usage: mvxattr -s STRING -d STRING PATH [PATH ...]
    -s, --from=STRING         xattr source name
    -d, --to=STRING           xattr destination name
    -l, --follow-symlinks     follow symlinks, the default is to ignore them
    -p, --print               print files where the xattr got renamed
    -v, --verbose             print files as they are checked
    -f, --force               force overwriting of destination xattr

  Help options:
    -?, --help                Show this help message
    --usage                   Display brief usage message

idmap_hash
----------

The idmap_hash module is marked as deprecated with this release and will be
removed in a future version. See the manpage of the module for details.


smb.conf changes
================

  Parameter Name                Description             Default
  --------------                -----------             -------
  kerberos encryption types     New                     all
  inherit owner                 New option
  fruit:resource                Spelling correction
  lsa over netlogon             New (deprecated)        no
  rpc server port               New                     0


KNOWN ISSUES
============

https://wiki.samba.org/index.php/Release_Planning_for_Samba_4.6#Release_blocking_bugs


CHANGES SINCE 4.6.0rc4
======================

o  Jeremy Allison <jra@samba.org>
   * BUG 12592: Fix several issues found by covscan.
   * BUG 12608: s3: smbd: Restart reading the incoming SMB2 fd when the send
     queue is drained.

o  Ralph Boehme <slow@samba.org>
   * BUG 12427: vfs_fruit doesn't work with fruit:metadata=stream.
   * BUG 12526: vfs_fruit: Only veto AppleDouble files if "fruit:resource" is
     set to "file".
   * BUG 12604: vfs_fruit: Enabling AAPL extensions must be a global switch.

o  Volker Lendecke <vl@samba.org>
   * BUG 12612: Re-enable token groups fallback.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 9048: Samba4 ldap error codes.
   * BUG 12557: gensec:spnego: Add debug message for the failed principal.
   * BUG 12605: s3:winbindd: Fix endless forest trust scan.
   * BUG 12612: winbindd: Find the domain based on the sid within
     wb_lookupusergroups_send().

o  Andreas Schneider <asn@samba.org>
   * BUG 12557: s3:librpc: Handle gss_min in gse_get_client_auth_token()
     correctly.
   * BUG 12582: idmap_hash: Add a deprecation message, improve the idmap_hash
     manpage.
   * BUG 12592: Fix several issues found by covscan.

o  Martin Schwenke <martin@meltin.net>
   * BUG 12592: ctdb-logging: CID 1396883 Dereference null return value
     (NULL_RETURNS).


CHANGES SINCE 4.6.0rc3
======================

o  Jeremy Allison <jra@samba.org>
   * BUG 12545: s3: rpc_server/mdssvc: Add attribute "kMDItemContentType".
   * BUG 12572: s3: smbd: Don't loop infinitely on bad-symlink resolution.

o  Ralph Boehme <slow@samba.org>
   * BUG 12490: vfs_fruit: Correct Netatalk metadata xattr on FreeBSD.
   * BUG 12536: s3/smbd: Check for invalid access_mask
     smbd_calculate_access_mask().
   * BUG 12591: vfs_streams_xattr: use fsp, not base_fsp.

o  Amitay Isaacs <amitay@gmail.com>
   * BUG 12580: ctdb-common: Fix use-after-free error in comm_fd_handler().
   * BUG 12595: build: Fix generation of CTDB manpages while creating tarball.

o  Bryan Mason <bmason@redhat.com>
   * BUG 12575: Modify smbspool_krb5_wrapper to just fall through to smbspool if
     AUTH_INFO_REQUIRED is not set or is not "negotiate".

o  Stefan Metzmacher <metze@samba.org>
   * BUG 11830: s3:winbindd: Try a NETLOGON connection with noauth over NCACN_NP
     against trusted domains.
   * BUG 12262: 'net ads testjoin' and smb access fails after winbindd changed the
     trust password.
   * BUG 12585: librpc/rpc: fix regression in
     NT_STATUS_RPC_ENUM_VALUE_OUT_OF_RANGE error mapping.
   * BUG 12586: netlogon_creds_cli_LogonSamLogon doesn't work without
     netr_LogonSamLogonEx.
   * BUG 12587: winbindd child segfaults on connect to an NT4 domain.
   * BUG 12588: s3:winbindd: Make sure cm_prepare_connection() only returns OK
     with a valid tree connect.
   * BUG 12598: winbindd (as member) requires kerberos against trusted ad domain,
     while it shouldn't.
   * BUG 12601: Backport pytalloc_GenericObject_reference() related changes to
     4.6.

o  Garming Sam <garming@catalyst.net.nz>
   * BUG 12600: dbchecker: Stop ignoring linked cases where both objects are
     alive.

o  Andreas Schneider <asn@samba.org>
   * BUG 12571: s3-vfs: Only walk the directory once in open_and_sort_dir().

o  Martin Schwenke <martin@meltin.net>
   * BUG 12589: CTDB statd-callout does not cause grace period when
     CTDB_NFS_CALLOUT="".
   * BUG 12595: ctdb-build: Fix RPM build.


CHANGES SINCE 4.6.0rc2
======================

o  Jeremy Allison <jra@samba.org>
   * BUG 12499: s3: vfs: dirsort doesn't handle opendir of "." correctly.
   * BUG 12546: s3: VFS: vfs_streams_xattr.c: Make streams_xattr_open() store
     the same path as streams_xattr_recheck().
   * BUG 12531: Make vfs_shadow_copy2 cope with server changing directories.

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 12543: samba-tool: Correct handling of default value for use_ntvfs and
     use_xattrs.
   * BUG 12573: Samba < 4.7 does not know about compatibleFeatures and
     requiredFeatures.
   * BUG 12577: 'samba-tool dbcheck' gives errors on one-way links after a
     rename.

o  Ralph Boehme <slow@samba.org>
   * BUG 12184: s3/rpc_server: Shared rpc modules loading.
   * BUG 12520: Ensure global "smb encrypt = off" is effective.
   * BUG 12524: s3/rpc_server: Move rpc_modules.c to its own subsystem.
   * BUG 12541: vfs_fruit: checks wrong AAPL config state and so always uses
     readdirattr.

o  Volker Lendecke <vl@samba.org>
   * BUG 12551: smbd: Fix "map acl inherit" = yes.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 12398: Replication with DRSUAPI_DRS_CRITICAL_ONLY and
     DRSUAPI_DRS_GET_ANC results in WERR_DS_DRA_MISSING_PARENT S
   * BUG 12540: s3:smbd: allow "server min protocol = SMB3_00" to go via "SMB
     2.???" negprot.

o  John Mulligan <jmulligan@nasuni.com>
   * BUG 12542: docs: Improve description of "unix_primary_group" parameter in
     idmap_ad manpage.

o  Andreas Schneider <asn@samba.org>
   * BUG 12552: waf: Do not install the unit test binary for krb5samba.

o  Amitay Isaacs <amitay@gmail.com>
   * BUG 12547: ctdb-build: Install CTDB tests correctly from toplevel.
   * BUG 12549: ctdb-common: ioctl(.. FIONREAD ..) returns an int value.

o  Garming Sam <garming@catalyst.net.nz>
   * BUG 12577: 'samba-tool dbcheck' gives errors on one-way links after a
     rename.

o  Uri Simchoni <uri@samba.org>
   * BUG 12529: waf: Backport finding of pkg-config.


CHANGES SINCE 4.6.0rc1
======================

o  Amitay Isaacs <amitay@gmail.com>
   * BUG 12469: CTDB lock helper getting stuck trying to lock a record.
   * BUG 12500: ctdb-common: Fix a bug in packet reading code for generic socket
     I/O.
   * BUG 12510: sock_daemon_test 4 crashes with SEGV.
   * BUG 12513: ctdb-daemon: Remove stale eventd socket.

o  Björn Jacke <bj@sernet.de>
   * BUG 12535: vfs_default: Unlock the right file in copy chunk.

o  Volker Lendecke <vl@samba.org>
   * BUG 12509: messaging: Fix dead but not cleaned-up-yet destination sockets.
   * BUG 12538: Backport winbind fixes.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 12501: s3:winbindd: talloc_steal the extra_data in
     winbindd_list_users_recv().

o  Martin Schwenke <martin@meltin.net>
   * BUG 12511: ctdb-takeover: Handle case where there are no RELEASE_IPs to
     send.
   * BUG 12512: ctdb-scripts: Fix remaining uses of "ctdb gratiousarp".
   * BUG 12516: ctdb-scripts: /etc/iproute2/rt_tables gets populated with multiple
     'default' entries.

[close]

http://www.samba.org/
Titel: Samba 4.7 freigegeben
Beitrag von: SiLæncer am 25 September, 2017, 13:15
Changelog


Samba 4.7.0 Available for Download

Samba 4.7.0 (gzipped)
Signature

                   =============================
                   Release Notes for Samba 4.7.0
                        September 20, 2017
                   =============================


This is the first stable release of Samba 4.7.
Please read the release notes carefully before upgrading.

UPGRADING
=========

'smbclient' changes
------------------

'smbclient' no longer prints a 'Domain=[...] OS=[Windows 6.1] Server=[...]'
banner when connecting to the first server. With SMB2 and Kerberos,
there's no way to print this information reliably. Now we avoid it at all
consistently. In interactive sessions the following banner is now presented
to the user: 'Try "help" do get a list of possible commands.'.

The default for "client max protocol" has changed to "SMB3_11",
which means that 'smbclient' (and related commands) will work against
servers without SMB1 support.

It's possible to use the '-m/--max-protocol' option to overwrite
the "client max protocol" option temporarily.

Note that the '-e/--encrypt' option also works with most SMB3 servers
(e.g. Windows >= 2012 and Samba >= 4.0.0), so the SMB1 unix extensions
are not required for encryption.

The change to SMB3_11 as default also means 'smbclient' no longer
negotiates SMB1 unix extensions by default, when talking to a Samba server with
"unix extensions = yes".  As a result, some commands are not available, e.g.
'posix_encrypt', 'posix_open', 'posix_mkdir', 'posix_rmdir', 'posix_unlink',
'posix_whoami', 'getfacl' and 'symlink'. Using "-mNT1" reenables them, if the
server supports SMB1.

Note the default ("CORE") for "client min protocol" hasn't changed,
so it's still possible to connect to SMB1-only servers by default.

'smbclient' learned a new command 'deltree' that is able to do
a recursive deletion of a directory tree.


NEW FEATURES/CHANGES
====================

Whole DB read locks: Improved LDAP and replication consistency
--------------------------------------------------------------

Prior to Samba 4.7 and ldb 1.2.0, the LDB database layer used by Samba
erroneously did not take whole-DB read locks to protect search
and DRS replication operations.

While each object returned remained subject to a record-level lock (so
would remain consistent to itself), under a race condition with a
rename or delete, it and any links (like the member attribute) to it
would not be returned.

The symptoms of this issue include:

Replication failures with this error showing in the client side logs:
 error during DRS repl ADD: No objectClass found in replPropertyMetaData for
 Failed to commit objects:
 WERR_GEN_FAILURE/NT_STATUS_INVALID_NETWORK_RESPONSE

A crash of the server, in particular the rpc_server process with
 INTERNAL ERROR: Signal 11

LDAP read inconsistency
 A DN subject to a search at the same time as it is being renamed
 may not appear under either the old or new name, but will re-appear
 for a subsequent search.

See https://bugzilla.samba.org/show_bug.cgi?id=12858 for more details
and updated advise on database recovery for affected installations.

Samba AD with MIT Kerberos
--------------------------

After four years of development, Samba finally supports compiling and
running Samba AD with MIT Kerberos. You can enable it with:

    ./configure --with-system-mitkrb5

Samba requires version 1.15.1 of MIT Kerberos to build with AD DC support.
The krb5-devel and krb5-server packages are required.
The feature set is not on par with the Heimdal build but the most important
things, like forest and external trusts, are working. Samba uses the KDC binary
provided by MIT Kerberos.

Missing features, compared to Heimdal, are:
  * PKINIT support
  * S4U2SELF/S4U2PROXY support
  * RODC support (not fully working with Heimdal either)

The Samba AD process will take care of starting the MIT KDC and it will load a
KDB (Kerberos Database) driver to access the Samba AD database.  When
provisioning an AD DC using 'samba-tool' it will take care of creating a correct
kdc.conf file for the MIT KDC.

For further details, see:
https://wiki.samba.org/index.php/Running_a_Samba_AD_DC_with_MIT_Kerberos_KDC

Dynamic RPC port range
----------------------

The dynamic port range for RPC services has been changed from the old default
value "1024-1300" to "49152-65535". This port range is not only used by a
Samba AD DC, but also applies to all other server roles including NT4-style
domain controllers. The new value has been defined by Microsoft in Windows
Server 2008 and newer versions. To make it easier for Administrators to control
those port ranges we use the same default and make it configurable with the
option: "rpc server dynamic port range".

The "rpc server port" option sets the first available port from the new
"rpc server dynamic port range" option. The option "rpc server port" only
applies to Samba provisioned as an AD DC.

Authentication and Authorization audit support
----------------------------------------------

Detailed authentication and authorization audit information is now
logged to Samba's debug logs under the "auth_audit" debug class,
including in particular the client IP address triggering the audit
line.  Additionally, if Samba is compiled against the jansson JSON
library, a JSON representation is logged under the "auth_json_audit"
debug class.

Audit support is comprehensive for all authentication and
authorisation of user accounts in the Samba Active Directory Domain
Controller, as well as the implicit authentication in password
changes.  In the file server and classic/NT4 domain controller, NTLM
authentication, SMB and RPC authorization is covered, however password
changes are not at this stage, and this support is not currently
backed by a testsuite.

For further details, see:
https://wiki.samba.org/index.php/Setting_up_Audit_Logging

Multi-process LDAP Server
-------------------------

The LDAP server in the AD DC now honours the process model used for
the rest of the 'samba' process, rather than being forced into a single
process.  This aids in Samba's ability to scale to larger numbers of AD
clients and the AD DC's overall resiliency, but will mean that there is a
fork()ed child for every LDAP client, which may be more resource
intensive in some situations.  If you run Samba in a
resource-constrained VM, consider allocating more RAM and swap space.

Improved Read-Only Domain Controller (RODC) Support
---------------------------------------------------

Support for RODCs in Samba AD until now has been experimental. With this latest
version, many of the critical bugs have been fixed and the RODC can be used in
DC environments requiring no writable behaviour. RODCs now correctly support
bad password lockouts and password disclosure auditing through the
msDS-RevealedUsers attribute.

The fixes made to the RWDC will also allow Windows RODC to function more
correctly and to avoid strange data omissions such as failures to replicate
groups or updated passwords. Password changes are currently rejected at the
RODC, although referrals should be given over LDAP. While any bad passwords can
trigger domain-wide lockout, good passwords which have not been replicated yet
for a password change can only be used via NTLM on the RODC (and not Kerberos).

The reliability of RODCs locating a writable partner still requires some
improvements and so the 'password server' configuration option is generally
recommended on the RODC.

Samba 4.7 is the first Samba release to be secure as an RODC or when
hosting an RODC.  If you have been using earlier Samba versions to
host or be an RODC, please upgrade.

In particular see https://bugzilla.samba.org/show_bug.cgi?id=12977 for
details on the security implications for password disclosure to an
RODC using earlier versions.

Additional password hashes stored in supplementalCredentials
------------------------------------------------------------

A new config option 'password hash userPassword schemes' has been added to
enable generation of SHA-256 and SHA-512 hashes (without storing the plaintext
password with reversible encryption). This builds upon previous work to improve
password sync for the AD DC (originally using GPG).

The user command of 'samba-tool' has been updated in order to be able to
extract these additional hashes, as well as extracting the (HTTP) WDigest
hashes that we had also been storing in supplementalCredentials.

Improvements to DNS during Active Directory domain join
-------------------------------------------------------

The 'samba-tool' domain join command will now add the A and GUID DNS records
(on both the local and remote servers) during a join if possible via RPC. This
should allow replication to proceed more smoothly post-join.

The mname element of the SOA record will now also be dynamically generated to
point to the local read-write server. 'samba_dnsupdate' should now be more
reliable as it will now find the appropriate name server even when resolv.conf
points to a forwarder.

Significant AD performance and replication improvements
-------------------------------------------------------

Previously, replication of group memberships was been an incredibly expensive
process for the AD DC. This was mostly due to unnecessary CPU time being spent
parsing member linked attributes. The database now stores these linked
attributes in sorted form to perform efficient searches for existing members.
In domains with a large number of group memberships, a join can now be
completed in half the time compared with Samba 4.6.

LDAP search performance has also improved, particularly in the unindexed search
case. Parsing and processing of security descriptors should now be more
efficient, improving replication but also overall performance.

Query record for open file or directory
---------------------------------------

The record attached to an open file or directory in Samba can be
queried through the 'net tdb locking' command. In clustered Samba this
can be useful to determine the file or directory triggering
corresponding "hot" record warnings in ctdb.

Removal of lpcfg_register_defaults_hook()
-----------------------------------------

The undocumented and unsupported function lpcfg_register_defaults_hook()
that was used by external projects to call into Samba and modify
smb.conf default parameter settings has been removed. If your project
was using this call please raise the issue on
samba-technical@lists.samba.org in order to design a supported
way of obtaining the same functionality.

Change of loadable module interface
-----------------------------------

The _init function of all loadable modules in Samba has changed
from:

NTSTATUS _init(void);

to:

NTSTATUS _init(TALLOC_CTX *);

This allows a program loading a module to pass in a long-lived
talloc context (which must be guaranteed to be alive for the
lifetime of the module). This allows modules to avoid use of
the talloc_autofree_context() (which is inherently thread-unsafe)
and still be valgrind-clean on exit. Modules that don't need to
free long-lived data on exit should use the NULL talloc context.

SHA256 LDAPS Certificates
-------------------------

The self-signed certificate generated for use on LDAPS will now be
generated with a SHA256 self-signature, not a SHA1 self-signature.

Replacing this certificate with a certificate signed by a trusted
CA is still highly recommended.

CTDB changes
------------

* CTDB no longer allows mixed minor versions in a cluster

  See the AllowMixedVersions tunable option in ctdb-tunables(7) and also
  https://wiki.samba.org/index.php/Upgrading_a_CTDB_cluster#Policy

* CTDB now ignores hints from Samba about TDB flags when attaching to databases

  CTDB will use the correct flags depending on the type of database.
  For clustered databases, the smb.conf setting
  dbwrap_tdb_mutexes:*=true will be ignored. Instead, CTDB continues
  to use the TDBMutexEnabled tunable.

* New configuration variable CTDB_NFS_CHECKS_DIR

  See ctdbd.conf(5) for more details.

* The CTDB_SERVICE_AUTOSTARTSTOP configuration variable has been
  removed

  To continue to manage/unmanage services while CTDB is running:

  - Start service by hand and then flag it as managed

  - Mark service as unmanaged and shut it down by hand

  - In some cases CTDB does something fancy - e.g. start Samba under
    "nice", so care is needed. One technique is to disable the
    eventscript, mark as managed, run the startup event by hand and then
    re-enable the eventscript.

* The CTDB_SCRIPT_DEBUGLEVEL configuration variable has been removed

* The example NFS Ganesha call-out has been improved

* A new "replicated" database type is available

  Replicated databases are intended for CTDB's internal use to
  replicate state data across the cluster, but may find other
  uses. The data in replicated databases is valid for the lifetime of
  CTDB and cleared on first attach.

Using x86_64 Accelerated AES Crypto Instructions
------------------------------------------------

Samba on x86_64 can now be configured to use the Intel accelerated AES
instruction set, which has the potential to make SMB3 signing and
encryption much faster on client and server. To enable this, configure
Samba using the new option --accel-aes=intelaesni.

This is a temporary solution that is being included to allow users
to enjoy the benefits of Intel accelerated AES on the x86_64 platform,
but the longer-term solution will be to move Samba to a fully supported
external crypto library.

The third_party/aesni-intel code will be removed from Samba as soon as
external crypto library performance reaches parity.

The default is to build without setting --accel-aes, which uses the
existing Samba software AES implementation.

Parameter changes
-----------------

The "strict sync" global parameter has been changed from
a default of "no" to "yes". This means smbd will by default
obey client requests to synchronize unwritten data in operating
system buffers safely onto disk. This is a safer default setting
for modern SMB1/2/3 clients.

The 'ntlm auth' option default is renamed to 'ntlmv2-only', reflecting
the previous behaviour.  Two new values have been provided,
'mschapv2-and-ntlmv2-only' (allowing MSCHAPv2 while denying NTLMv1)
and 'disabled', totally disabling NTLM authentication and password
changes.

smb.conf changes
================

  Parameter Name                     Description             Default
  --------------                     -----------             -------
  allow unsafe cluster upgrade       New parameter           no
  auth event notification            New parameter           no
  auth methods                       Deprecated
  client max protocol                Effective               SMB3_11
                                     default changed
  map untrusted to domain            New value/              auto
                                     Default changed/
                                     Deprecated
  mit kdc command                    New parameter
  profile acls                       Deprecated
  rpc server dynamic port range      New parameter           49152-65535
  strict sync                        Default changed         yes
  password hash userPassword schemes New parameter
  ntlm auth                          New values              ntlmv2-only


KNOWN ISSUES
============

https://wiki.samba.org/inFdex.php/Release_Planning_for_Samba_4.7#Release_blocking_bugs


CHANGES SINCE 4.7.0rc6
======================

o  CVE-2017-12150:
   A man in the middle attack may hijack client connections.

o  CVE-2017-12151:
   A man in the middle attack can read and may alter confidential
   documents transferred via a client connection, which are reached
   via DFS redirect when the original connection used SMB3.

o  CVE-2017-12163:
   Client with write access to a share can cause server memory contents to be
   written into a file or printer.


CHANGES SINCE 4.7.0rc5
======================

o  Jeremy Allison <jra@samba.org>
   * BUG 13003: s3: vfs: catia: compression get/set must act only on base file, and
     must cope with fsp==NULL.
   * BUG 13008: lib: crypto: Make smbd use the Intel AES instruction set for signing
     and encryption.

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 12946: s4-drsuapi: Avoid segfault when replicating as a non-admin with
     GUID_DRS_GET_CHANGES.
   * BUG 13015: Allow re-index of newer databases with binary GUID TDB keys
     (this officially removes support for re-index of the original pack format 0,
     rather than simply segfaulting).
   * BUG 13017: Add ldb_ldif_message_redacted_string() to allow debug of redacted
     log messages, avoiding showing secret values.
   * BUG 13023: ldb: version 1.2.2.
   * BUG 13025: schema: Rework dsdb_schema_set_indices_and_attributes() db
     operations.

o  Alexander Bokovoy <ab@samba.org>
   * BUG 13030: Install dcerpc/__init__.py for all Python environments.

o  Ralph Boehme <slow@samba.org>
   * BUG 13024: s3/smbd: Sticky write time offset miscalculation causes broken
     timestamps
   * BUG 13037: lib/util: Only close the event_fd in tfork if the caller didn't
     call tfork_event_fd().

o  Volker Lendecke <vl@samba.org>
   * BUG 13006: messaging: Avoid a socket leak after fork.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 13018: charset: Fix str[n]casecmp_m() by comparing lower case values.

o  Gary Lockyer <gary@catalyst.net.nz>
   * BUG 13037: util_runcmd: Free the fde in event handler.

o  Amitay Isaacs <amitay@gmail.com>
   * BUG 13012: ctdb-daemon: Fix implementation of process_exists control.
   * BUG 13021: GET_DB_SEQNUM control can cause ctdb to deadlock when databases
     are frozen.
   * BUG 13029: ctdb-daemon: Free up record data if a call request is deferred.
   * BUG 13036: ctdb-client: Initialize ctdb_ltdb_header completely for empty
     record.

o  Christof Schmitt <cs@samba.org>
   * BUG 13032: vfs_streams_xattr: Fix segfault when running with log level 10.


CHANGES SINCE 4.7.0rc4
======================

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 12929: smb.conf: Explain that "ntlm auth" is a per-passdb setting.
   * BUG 12953: s4/lib/tls: Use SHA256 to sign the TLS certificates.

o  Jeremy Allison <jra@samba.org>
   * BUG 12932: Get rid of talloc_autofree_context().

o  Amitay Isaacs <amitay@gmail.com>
   * BUG 12978: After restarting CTDB, it attaches replicated databases with
     wrong flags.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 12863: s3:smbclient: Don't try any workgroup listing with
     "client min protocol = SMB2".
   * BUG 12876: s3:libsmb: Don't call cli_NetServerEnum() on SMB2/3 connections
     in SMBC_opendir_ctx().
   * BUG 12881: s3:libsmb: Let do_connect() debug the negotiation result
     similar to "session request ok".
   * BUG 12919: s4:http/gensec: add missing tevent_req_done() to
     gensec_http_ntlm_update_done().
   * BUG 12968: Fix 'smbclient tarmode' with SMB2/3.
   * BUG 12973: 'smbd': Don't use a lot of CPU on startup of a connection.

o  Christof Schmitt <cs@samba.org>
   * BUG 12983: vfs_default: Fix passing of errno from async calls.

o  Andreas Schneider <asn@samba.org>
   * BUG 12629: s3:utils: Do not report an invalid range for AD DC role.
   * BUG 12704: s3:libsmb: Let get_ipc_connect() use
     CLI_FULL_CONNECTION_FORCE_SMB1.
   * BUG 12930: Fix build issues with GCC 7.1.
   * BUG 12950: s3:script: Untaint user supplied data in modprinter.pl.
   * BUG 12956: s3:libads: Fix changing passwords with Kerberos.
   * BUG 12975: Fix changing the password with 'smbpasswd' as a local user on
     a domain member.


CHANGES SINCE 4.7.0rc3
======================

o  Jeremy Allison <jra@samba.org>
   * BUG 12913: Implement cli_smb2_setatr() by calling cli_smb2_setpathinfo().

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 11392: s4-cldap/netlogon: Match Windows 2012R2 and return
     NETLOGON_NT_VERSION_5 when version unspecified.
   * BUG 12855: dsdb: Do not force a re-index of sam.ldb on upgrade to 4.7.
   * BUG 12904: dsdb: Fix dsdb_next_callback to correctly use ldb_module_done()
     etc.
   * BUG 12939: s4-rpc_server: Improve debug of new endpoints.

o  Ralph Boehme <slow@samba.org>
   * BUG 12791: Fix kernel oplocks issues with named streams.
   * BUG 12944: vfs_gpfs: Handle EACCES when fetching DOS attributes from xattr.

o  Bob Campbell <bobcampbell@catalyst.net.nz>
   * BUG 12842: samdb/cracknames: Support user and service principal as desired
     format.

o  David Disseldorp <ddiss@samba.org>
   * BUG 12911: vfs_ceph: Fix cephwrap_chdir().

o  Gary Lockyer <gary@catalyst.net.nz>
   * BUG 12865: Track machine account ServerAuthenticate3.

o  Marc Muehlfeld <mmuehlfeld@samba.org>
   * BUG 12947: python: Fix incorrect kdc.conf parameter name in kerberos.py.

o  Noel Power <noel.power@suse.com>
   * BUG 12937: s3/utils: 'smbcacls' failed to detect DIRECTORIES using SMB2
     (Windows only).

o  Arvid Requate <requate@univention.de>
   * BUG 11392: s4-dsdb/netlogon: Allow missing ntver in cldap ping.

o  Anoop C S <anoopcs@redhat.com>
   * BUG 12936: source3/client: Fix typo in help message displayed by default.

o  Andreas Schneider <asn@samba.org>
   * BUG 12930: Fix building with GCC 7.1.1.


CHANGES SINCE 4.7.0rc2
======================

o  Jeremy Allison <jra@samba.org>
   * BUG 12836: s3: smbd: Fix a read after free if a chained SMB1 call goes
     async.
   * BUG 12899: s3: libsmb: Reverse sense of 'clear all attributes', ignore
     attribute change in SMB2 to match SMB1.
   * BUG 12914: s3: smbclient: Add new command deltree.

o  Ralph Boehme <slow@samba.org>
   * BUG 12885: s3/smbd: Let non_widelink_open() chdir() to directories
     directly.
   * BUG 12887: Remove SMB_VFS_STRICT_UNLOCK noop from the VFS.
   * BUG 12891: Enable TDB mutexes in dbwrap and ctdb.
   * BUG 12897: vfs_fruit: don't use MS NFS ACEs with Windows clients.
   * BUG 12910: s3/notifyd: Ensure notifyd doesn't return from
     smbd_notifyd_init.

o  Alexander Bokovoy <ab@samba.org>
   * BUG 12905: Build py3 versions of other rpc modules.

o  Günther Deschner <gd@samba.org>
   * BUG 12840: vfs_fruit: Add "fruit:model = <modelname>" parametric option.

o  Dustin L. Howett
   * BUG 12720: idmap_ad: Retry query_user exactly once if we get
     TLDAP_SERVER_DOWN.

o  Amitay Isaacs <amitay@gmail.com>
   * BUG 12891: dbwrap_ctdb: Fix calculation of persistent flag.

o  Thomas Jarosch <thomas.jarosch@intra2net.com>
   * BUG 12927: s3: libsmb: Fix use-after-free when accessing pointer *p.

o  Volker Lendecke <vl@samba.org>
   * BUG 12925: smbd: Fix a connection run-down race condition.

o  Stefan Metzmacher <metze@samba.org>
   * tevent: version 0.9.33: make tevent_req_print() more robust against crashes.
   * ldb: version 1.2.1
   * BUG 12882: Do not install _ldb_text.py if we have system libldb.
   * BUG 12890: s3:smbd: consistently use talloc_tos() memory for
     rpc_pipe_open_interface().
   * BUG 12900: Fix index out of bound in ldb_msg_find_common_values.

o  Rowland Penny <rpenny@samba.org>
   * BUG 12884: Easily edit a users object in AD, as if using 'ldbedit'.

o  Bernhard M. Wiedemann <bwiedemann@suse.de>
   * BUG 12906: s3: drop build_env

o  Andreas Schneider <asn@samba.org>
   * BUG 12882: waf: Do not install _ldb_text.py if we have system libldb.

o  Martin Schwenke <martin@meltin.net>
   * BUG 12898: ctdb-common: Set close-on-exec when creating PID file.


CHANGES SINCE 4.7.0rc1
======================

o  Jeffrey Altman <jaltman@secure-endpoints.com>
   * BUG 12894: CVE-2017-11103: Orpheus' Lyre KDC-REP service name validation

[close]

http://www.samba.org/
Titel: Samba 4.8.3
Beitrag von: SiLæncer am 26 Juni, 2018, 21:10
Changelog

Changes since 4.8.2:
--------------------

o  Jeremy Allison <jra@samba.org>
   * BUG 13428: s3: smbd: Fix SMB2-FLUSH against directories.
   * BUG 13457: s3: smbd: printing: Re-implement delete-on-close semantics for
     print files missing since 3.5.x.
   * BUG 13474: python: Fix talloc frame use in make_simple_acl().

o  Jeffrey Altman <jaltman@secure-endpoints.com>
   * BUG 11573: heimdal: lib/krb5: Do not fail set_config_files due to parse
     error.

o  Andrew Bartlett <abartlet@samba.org>
   * ldb: version 1.3.4
   * BUG 13448: ldb: One-level search was incorrectly falling back to full DB
     scan.
   * BUG 13452: ldb: Save a copy of the index result before calling the
     callbacks.
   * BUG 13454: No Backtrace given by Samba's AD DC by default.
   * BUG 13471: ldb_tdb: Use mem_ctx and so avoid leak onto long-term memory
     on duplicated add.

o  Ralph Boehme <slow@samba.org>
   * BUG 13432: s3:smbd: Fix interaction between chown and SD flags.

o  Günther Deschner <gd@samba.org>
   * BUG 13437: Fix building Samba with gcc 8.1.

o  Andrej Gessel <Andrej.Gessel@janztec.com>
   * BUG 13475: Fix several mem leaks in ldb_index ldb_search ldb_tdb.

o  Volker Lendecke <vl@samba.org>
   * BUG 13331: libgpo: Fix the build --without-ads.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 13369: Looking up the user using the UPN results in user name with the
     REALM instead of the DOMAIN.
   * BUG 13427: Fix broken server side GENSEC_FEATURE_LDAP_STYLE handling
     (NTLMSSP NTLM2 packet check failed due to invalid signature!).

o  Christof Schmitt <cs@samba.org>
   * BUG 13446: smbd: Flush dfree memcache on service reload.
   * BUG 13478: krb5_wrap: Fix keep_old_entries logic for older Kerberos
     libraries.

o  Andreas Schneider <asn@samba.org>
   * BUG 13369: Looking up the user using the UPN results in user name with the
     REALM instead of the DOMAIN.
   * BUG 13437: Fix building Samba with gcc 8.1.
   * BUG 13440: s3:utils: Do not segfault on error in DoDNSUpdate().
   * BUG 13480: krb5_plugin: Add winbind localauth plugin for MIT Kerberos.

o  Lukas Slebodnik <lslebodn@fedoraproject.org>
   * BUG 13459: ldb: Fix memory leak on module context.

[close]

http://www.samba.org/
Titel: Samba 4.8.4, 4.7.9 and 4.6.16 Security Releases
Beitrag von: SiLæncer am 15 August, 2018, 16:45
Whats new:>>

These are security releases in order to address

CVE-2018-10858 (Insufficient input validation on client directory listing in libsmbclient.),
CVE-2018-10918 (Denial of Service Attack on AD DC DRSUAPI server.),
CVE-2018-10919 (Confidential attribute disclosure from the AD LDAP server.),
CVE-2018-1139 (Weak authentication protocol allowed.) and
CVE-2018-1140 (Denial of Service Attack on DNS and LDAP server.).

http://www.samba.org/
Titel: Samba 4.8.5
Beitrag von: SiLæncer am 24 August, 2018, 21:15
Changelog

Changes since 4.8.4:
--------------------

o  Jeremy Allison <jra@samba.org>
   * BUG 13474: python: pysmbd: Additional error path leak fix.
   * BUG 13511: libsmbclient: Initialize written value before use.
   * BUG 13519: ldb: Refuse to build Samba against a newer minor version of
     ldb.
   * BUG 13527: s3: libsmbclient: Fix cli_splice() fallback when reading less
     than a complete file.
   * BUG 13537: Using "sendfile = yes" with SMB2 can cause CPU spin.

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 13575: ldb: Release LDB 1.3.6.

o  Bailey Berro <baileyberro@chromium.org>
   * BUG 13511: libsmbclient: Initialize written in cli_splice_fallback().

o  Ralph Boehme <slow@samba.org>
   * BUG 13318: Durable Handles reconnect fails in a cluster when the cluster
     fs uses different device ids.
   * BUG 13351: s3: smbd: Always set vuid in check_user_ok().
   * BUG 13441: vfs_fruit: Delete 0 byte size streams if AAPL is enabled.
   * BUG 13451: Fail renaming file if that file has open streams.
   * BUG 13505: lib: smb_threads: Fix access before init bug.
   * BUG 13535: s3: smbd: Fix path check in
     smbd_smb2_create_durable_lease_check().

o  Alexander Bokovoy <ab@samba.org>
   * BUG 13538: samba-tool trust: Support discovery via netr_GetDcName.

o  Samuel Cabrero <scabrero@suse.de>
   * BUG 13540: ctdb_mutex_ceph_rados_helper: Set SIGINT signal handler.

o  David Disseldorp <ddiss@samba.org>
   * BUG 13506: vfs_ceph: Don't lie about flock support.
   * BUG 13540: Fix deadlock with ctdb_mutex_ceph_rados_helper.

o  Amitay Isaacs <amitay@gmail.com>
   * BUG 13493: ctdb: Fix build on FreeBSD and AIX.

o  Volker Lendecke <vl@samba.org>
   * BUG 13553: libsmb: Fix CID 1438243 (Unchecked return value), CID 1438244
     (Unsigned compared against 0), CID 1438245 (Dereference before null check),
     CID 1438246 (Unchecked return value).
   * BUG 13584: vfs_fruit: Fix a panic if fruit_access_check detects a locking
     conflict.

o  Gary Lockyer <gary@catalyst.net.nz>
   * BUG 13536: The current position in the dns name was not advanced past the
     '.' character.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 13308: samba-tool domain trust: Fix trust compatibility to Windows
     Server 1709 and FreeIPA.

o  Oleksandr Natalenko <oleksandr@redhat.com>
   * BUG 13559: systemd: Only start smb when network interfaces are up.

o  Noel Power <noel.power@suse.com>
   * BUG 13553: Fix quotas with SMB2.
   * BUG 13563: s3/smbd: Ensure quota code is only called when quota support
     detected.

o  Anoop C S <anoopcs@redhat.com>
   * BUG 13204: s3/libsmb: Explicitly set delete_on_close token for rmdir.

o  Andreas Schneider <asn@samba.org>
   * BUG 13489: krb5_plugin: Install plugins to krb5 modules dir.
   * BUG 13503: s3:winbind: Do not lookup local system accounts in AD.

o  Martin Schwenke <martin@meltin.net>
   * BUG 13499: Don't use CTDB_BROADCAST_VNNMAP.
   * BUG 13500: ctdb-daemon: Only consider client ID for local database attach.

o  Justin Stephenson <jstephen@redhat.com>
   * BUG 13485: s3:client: Add "--quiet" option to smbclient.

o  Ralph Wuerthner <ralph.wuerthner@de.ibm.com>
   * BUG 13568: s3: vfs: time_audit: Fix handling of token_blob in
     smb_time_audit_offload_read_recv().

[close]


http://www.samba.org/
Titel: Samba 4.9.3, 4.8.7 & 4.7.12
Beitrag von: SiLæncer am 29 November, 2018, 21:15
Changelog

These are security releases in order to address

CVE-2018-14629 (Unprivileged adding of CNAME record causing loop in AD Internal DNS server),
CVE-2018-16841 (Double-free in Samba AD DC KDC with PKINIT),
CVE-2018-16851 (NULL pointer de-reference in Samba AD DC LDAP server),
CVE-2018-16852 (NULL pointer de-reference in Samba AD DC DNS servers),
CVE-2018-16853 (Samba AD DC S4U2Self crash in experimental MIT Kerberos configuration (unsupported)) and
CVE-2018-16857 (Bad password count in AD DC not always effective).

The uncompressed tarball has been signed using GnuPG (ID 6F33915B6568B7EA).
The 4.9.3 source code can be downloaded now. A patch against Samba 4.9.2 is also available. See the release notes for more info.
The 4.8.7 source code can be downloaded now. A patch against Samba 4.8.6 is also available. See the release notes for more info.
The 4.7.12 source code can be downloaded now. A patch against Samba 4.7.11 is also available.

[close]

http://www.samba.org/
Titel: Samba 4.10.2, 4.9.6 & 4.8.11
Beitrag von: SiLæncer am 08 April, 2019, 21:10
Release Notes

These are security releases in order to address CVE-2019-3870 (World writable files in Samba AD DC private/ dir) and CVE-2019-3880 (Save registry file outside share as unprivileged user).

The uncompressed tarballs have been signed using GnuPG (ID 6F33915B6568B7EA). The 4.10.2 source code can be downloaded now. A patch against Samba 4.10.1 is also available. See the release notes for more info. The 4.9.6 source code can be downloaded now. A patch against Samba 4.9.5 is also available. See the release notes for more info. The 4.8.11 source code can be downloaded now. A patch against Samba 4.8.10 is also available. See the release notes for more info.

[close]

http://www.samba.org/
Titel: Samba 4.10.8 & 4.9.13
Beitrag von: SiLæncer am 03 September, 2019, 18:45
Whats new:>>

These are security releases in order to address CVE-2019-10197 (https://www.samba.org/samba/security/CVE-2019-10197.html) (Combination of parameters and permissions can allow user to escape from the share path definition).

http://www.samba.org/
Titel: Samba 4.11
Beitrag von: SiLæncer am 24 September, 2019, 18:20
Changelog


Samba 4.11.0 Available for Download

Samba 4.11.0 (gzipped)
Signature

                   ==============================
                   Release Notes for Samba 4.11.0
                         September 17, 2019
         ==============================


This is the first stable release of the Samba 4.11 release series.
Please read the release notes carefully before upgrading.


UPGRADING
=========

AD Database compatibility
-------------------------

Samba 4.11 has changed how the AD database is stored on disk. AD users should
not really be affected by this change when upgrading to 4.11. However, AD
users should be extremely careful if they need to downgrade from Samba 4.11 to
an older release.

Samba 4.11 maintains database compatibility with older Samba releases. The
database will automatically get rewritten in the new 4.11 format when you
first start the upgraded samba executable.

However, when downgrading from 4.11 you will need to manually downgrade the AD
database yourself. Note that you will need to do this step before you install
the downgraded Samba packages. For more details, see:
https://wiki.samba.org/index.php/Downgrading_an_Active_Directory_DC

When either upgrading or downgrading, users should also avoid making any
database modifications between installing the new Samba packages and starting
the samba executable.

SMB1 is disabled by default
---------------------------

The defaults of 'client min protocol' and 'server min protocol'
have been changed to SMB2_02.

This means clients without support for SMB2 or SMB3 are no longer
able to connect to smbd (by default).

It also means client tools like smbclient and other,
as well as applications making use of libsmbclient are no longer
able to connect to servers without SMB2 or SMB3 support (by default).

It's still possible to allow SMB1 dialects, e.g. NT1, LANMAN2
and LANMAN1 for client and server, as well as CORE and COREPLUS on
the client.

Note that most commandline tools e.g. smbclient, smbcacls and others
also support the '--option' argument to overwrite smb.conf options,
e.g. --option='client min protocol=NT1' might be useful.

As Microsoft no longer installs SMB1 support in recent releases
or uninstalls it after 30 days without usage, the Samba Team
tries to get remove the SMB1 usage as much as possible.

SMB1 is officially deprecated and might be removed step by step
in the following years. If you have a strong requirement for SMB1
(except for supporting old Linux Kernels), please file a bug
at https://bugzilla.samba.org and let us know about the details.

LanMan and plaintext authentication deprecated
----------------------------------------------

The "lanman auth" and "encrypt passwords" parameters are deprecated
with this release as both are only applicable to SMB1 and are quite
insecure.  NTLM, NTLMv2 and Kerberos authentication are unaffected, as
"encrypt passwords = yes" has been the default since Samba 3.0.0.

If you have a strong requirement for these authentication protocols,
please file a bug at https://bugzilla.samba.org and let us know about
the details.

BIND9_FLATFILE deprecated
-------------------------

The BIND9_FLATFILE DNS backend is deprecated in this release and will
be removed in the future.  This was only practically useful on a single
domain controller or under expert care and supervision.

This release therefore deprecates the "rndc command" smb.conf
parameter, which is used to support this configuration.  After writing
out a list of DCs permitted to make changes to the DNS Zone "rndc
command" is called with reload to tell the 'named' server if a DC was
added/removed to to the domain.


NEW FEATURES/CHANGES
====================

Default samba process model
---------------------------

The default for the '--model' argument passed to the samba executable has changed
from 'standard' to 'prefork'. This means a difference in the number of samba
child processes that are created to handle client connections. The previous
default would create a separate process for every LDAP or NETLOGON client
connection. For a network with a lot of persistent client connections, this
could result in significant memory overhead.  Now, with the new default of
'prefork', the LDAP, NETLOGON, and KDC services will create a fixed number of
worker processes at startup and share the client connections amongst these
workers. The number of worker processes can be configured by the 'prefork
children' setting in the smb.conf (the default is 4).

Authentication Logging
----------------------

Winbind now logs PAM_AUTH and NTLM_AUTH events, a new attribute "logonId" has
been added to the Authentication JSON log messages.  This contains a random
logon id that is generated for each PAM_AUTH and NTLM_AUTH request and is passed
to SamLogon, linking the windbind and SamLogon requests.

The serviceDescription of the messages is set to "winbind", the authDescription
is set to one of:
   "PASSDB, <command>, <pid>"
   "PAM_AUTH, <command>, <pid>"
   "NTLM_AUTH, <command>, <pid>"
where:
   <command> is the name of the command makinmg the winbind request i.e. wbinfo
   <pid>     is the process id of the requesting process.

The version of the JSON Authentication messages has been changed from 1.1 to
1.2.

LDAP referrals
--------------

The scheme of returned LDAP referrals now reflects the scheme of the original
request, i.e. referrals received via ldap are prefixed with "ldap://"
and those over ldaps are prefixed with "ldaps://".

Previously all referrals were prefixed with "ldap://".

Bind9 logging
-------------

It is now possible to log the duration of DNS operations performed by Bind9.
This should aid future diagnosis of performance issues and could be used to
monitor DNS performance. The logging is enabled by setting log level to
"dns:10" in smb.conf.

The logs are currently human readable text only, i.e. no JSON formatted output.

Log lines are of the form:

    <function>: DNS timing: result: [<result>] duration: (<duration>)
    zone: [<zone>] name: [<name>] data: [<data>]

    durations are in microseconds.

Default schema updated to 2012_R2
---------------------------------

Default AD schema changed from 2008_R2 to 2012_R2.  2012_R2 functional level
is not yet available.  Older schemas can be used by provisioning with the
'--base-schema' argument.  Existing installations can be updated with the
samba-tool command "domain schemaupgrade".

Samba's replication code has also been improved to handle replication
with the 2012 schema (the core of this replication fix has also been
backported to 4.9.11 and will be in a 4.10.x release).

For more about how the AD schema relates to overall Windows compatibility,
please read:
https://wiki.samba.org/index.php/Windows_2012_Server_compatibility

GnuTLS 3.2 required
-------------------

Samba is making efforts to remove in-tree cryptographic functionality,
and to instead rely on externally maintained libraries.  To this end,
Samba has chosen GnuTLS as our standard cryptographic provider.

Samba now requires GnuTLS 3.2 to be installed (including development
headers at build time) for all configurations, not just the Samba AD
DC.

NOTE WELL: The use of GnuTLS means that Samba will honour the
system-wide 'FIPS mode' (a reference to the US FIPS-140 cryptographic
standard) and so will not operate in many still common situations if
this system-wide parameter is in effect, as many of our protocols rely
on outdated cryptography.

A future Samba version will mitigate this to some extent where good
cryptography effectively wraps bad cryptography, but for now that above
applies.

samba-tool improvements
-----------------------

A new "samba-tool contact" command has been added to allow the
command-line manipulation of contacts, as used for address book
lookups in LDAP.

The "samba-tool [user|group|computer|group|contact] edit" command has been
improved to operate more pleasantly on international character sets.

100,000 USER and LARGER Samba AD DOMAINS
========================================

Extensive efforts have been made to optimise Samba for use in
organisations (for example) targeting 100,000 users, plus 120,000
computer objects, as well as large number of group memberships.

Many of the specific efforts are detailed below, but the net results
is to remove barriers to significantly larger Samba deployments
compared to previous releases.

Reindex performance improvements
--------------------------------

The performance of samba-tool dbcheck --reindex has been improved,
especially for large domains.

join performance improvements
-----------------------------

The performance of samba-tool domain join has been improved,
especially for large domains.

LDAP Server memory improvements
-------------------------------

The LDAP server has improved memory efficiency, ensuring that large
LDAP responses (for example a search for all objects) is not copied
multiple times into memory.

Setting lmdb map size
---------------------

It is now possible to set the lmdb map size (the maximum permitted
size for the database).  "samba-tool" now accepts the
"--backend-store-size" i.e. --backend-store-size=4Gb.  If not
specified it defaults to 8Gb.

This option is avaiable for the following sub commands:
 * domain provision
 * domain join
 * domain dcpromo
 * drs clone-dc-database

LDB "batch_mode"
----------------

To improve performance during batch operations i.e. joins, ldb now
accepts a "batch_mode" option.  However to prevent any index or
database inconsistencies if an operation fails, the entire transaction
will be aborted at commit.

New LDB pack format
-------------------

On first use (startup of 'samba' or the first transaction write)
Samba's sam.ldb will be updated to a new more efficient pack format.
This will take a few moments.

New LDB <= and >= index mode to improve replication performance
---------------------------------------------------------------

As well as a new pack format, Samba's sam.ldb uses a new index format
allowing Samba to efficiently select objects changed since the last
replication cycle.  This in turn improves performance during
replication of large domains.

https://wiki.samba.org/index.php/LDB_Greater_than_and_Less_than_indexing

Improvements to ldb search performance
--------------------------------------

Search performance on large LDB databases has been improved by
reducing memory allocations made on each object.

Improvements to subtree rename performance
------------------------------------------

Improvements have been made to Samba's handling of subtree renames,
for example of containers and organisational units, however large
renames are still not recommended.

CTDB changes
============

* nfs-linux-kernel-callout now defaults to using systemd service names

  The Red Hat service names continue to be the default.

  Other distributions should patch this file when packaging it.

* The onnode -o option has been removed

* ctdbd logs when it is using more than 90% of a CPU thread

  ctdbd is single threaded, so can become saturated if it uses the
  full capacity of a CPU thread.  To help detect this situation, ctdbd
  now logs messages when CPU utilisation exceeds 90%.  Each change in
  CPU utilisation over 90% is logged.  A message is also logged when
  CPU utilisation drops below the 90% threshold.

* Script configuration variable CTDB_MONITOR_SWAP_USAGE has been removed

  05.system.script now monitors total memory (i.e. physical memory +
  swap) utilisation using the existing CTDB_MONITOR_MEMORY_USAGE
  script configuration variable.

CephFS Snapshot Integration
---------------------------

CephFS snapshots can now be exposed as previous file versions using the new
ceph_snapshots VFS module. See the vfs_ceph_snapshots(8) man page for details.


REMOVED FEATURES
================

Web server
----------

As a leftover from work related to the Samba Web Administration Tool (SWAT),
Samba still supported a Python WSGI web server (which could still be turned on
from the 'server services' smb.conf parameter). This service was unused and has
now been removed from Samba.

samba-tool join subdomain
-------------------------

The subdomain role has been removed from the join command.  This option did
not work and has no tests.

Python2 support
---------------

Samba 4.11 will not have any runtime support for Python 2.

If you are building Samba using the '--disable-python' option
(i.e. you're excluding all the run-time Python support), then this
will continue to work on a system that supports either python2 or
python3.

To build Samba with python2 you *must* set the 'PYTHON' environment
variable for both the 'configure' and 'make' steps, i.e.
   'PYTHON=python2 ./configure'
   'PYTHON=python2 make'
This will override the python3 default.

Except for this specific build-time use of python2, Samba now requires
Python 3.4 as a minimum.

smb.conf changes
================

  Parameter Name                     Description                Default
  --------------                     -----------                -------

  allocation roundup size            Default changed/           0
                                     Deprecated
  client min protocol                Changed default            SMB2_02
  server min protocol                Changed default            SMB2_02
  mangled names                      Changed default            illegal
  web port                           Removed
  fruit:zero_file_id                 Changed default            False
  debug encryption                   New: dump encryption keys  False
  rndc command                       Deprecated
  lanman auth                        Deprecated
  encrypt passwords                  Deprecated


CHANGES SINCE 4.11.0rc4
=======================


CHANGES SINCE 4.11.0rc3
=======================

o  Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
   * BUG 14049: ldb: Don't try to save a value that isn't there.
   * ldb_dn: Free dn components on explode failure.
   * ldb: Do not allow adding a DN as a base to itself.

o  Andrew Bartlett <abartlet@samba.org>
   * ldb: Release ldb 2.0.7.
   * BUG 13695: ldb: Correct Pigeonhole principle validation in
     ldb_filter_attrs().
   * BUG 14049: Fix ldb dn crash.
   * BUG 14117: Deprecate "lanman auth = yes" and "encrypt passwords = no".

o  Ralph Boehme <slow@samba.org>
   * BUG 14038: Fix compiling ctdb on older systems lacking POSIX robust
     mutexes.
   * BUG 14121: smbd returns bad File-ID on filehandle used to create a file or
     directory.

o  Poornima G <pgurusid@redhat.com>
   * BUG 14098: vfs_glusterfs: Use pthreadpool for scheduling aio operations.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 14055: Add the target server name of SMB 3.1.1 connections as a hint to
     load balancers or servers with "multi-tenancy" support.
   * BUG 14113: Fix byte range locking bugs/regressions.

o  Swen Schillig <swen@linux.ibm.com>
   * ldb: Fix mem-leak if talloc_realloc fails.

o  Evgeny Sinelnikov <sin@altlinux.org>
   * BUG 14007: Fix join with don't exists machine account.

o  Martin Schwenke <martin@meltin.net>
   * BUG 14085: ctdb-recoverd: Only check for LMASTER nodes in the VNN map.


CHANGES SINCE 4.11.0rc2
=======================

o  Michael Adam <obnox@samba.org>
   * BUG 13972: Different Device Id for GlusterFS FUSE mount is causing data
     loss in CTDB cluster.

o  Jeremy Allison <jra@samba.org>
   * BUG 14035: CVE-2019-10197: Permissions check deny can allow user to escape
     from the share.

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 14059: ldb: Release ldb 2.0.6 (log database repack so users know what
     is happening).
   * BUG 14092: docs: Deprecate "rndc command" for Samba 4.11.

o  Tim Beale <timbeale@catalyst.net.nz>
   * BUG 14059: ldb: Free memory when repacking database.

o  Ralph Boehme <slow@samba.org>
   * BUG 14089: vfs_default: Use correct flag in vfswrap_fs_file_id.
   * BUG 14090: vfs_glusterfs: Initialize st_ex_file_id, st_ex_itime and
     st_ex_iflags.

o  Anoop C S <anoopcs@redhat.com>
   * BUG 14093: vfs_glusterfs: Enable profiling for file system operations.

o  Aaron Haslett <aaronhaslett@catalyst.net.nz>
   * BUG 14059: Backport sambadowngradedatabase for v4.11.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 14035: CVE-2019-10197: Permissions check deny can allow user to escape
     from the share.

o  Christof Schmitt <cs@samba.org>
   * BUG 14032: vfs_gpfs: Implement special case for denying owner access to
     ACL.

o  Martin Schwenke <martin@meltin.net>
   * BUG 14084: Avoid marking a node as connected before it can receive packets.
   * BUG 14086: Fix onnode test failure with ShellCheck >= 0.4.7.
   * BUG 14087: ctdb-daemon: Stop "ctdb stop" from completing before freezing
     databases.


KNOWN ISSUES
============

https://wiki.samba.org/index.php/Release_Planning_for_Samba_4.11#Release_blocking_bugs

[close]

http://www.samba.org/
Titel: Samba 4.11.2
Beitrag von: SiLæncer am 30 Oktober, 2019, 20:15
Changelog

This is a security release in order to address the following defects:

o CVE-2019-10218: Client code can return filenames containing path separators.
o CVE-2019-14833: Samba AD DC check password script does not receive the full
        password.
o CVE-2019-14847: User with "get changes" permission can crash AD DC LDAP server
        via dirsync.

=======
Details
=======

o  CVE-2019-10218:
   Malicious servers can cause Samba client code to return filenames containing
   path separators to calling code.

o  CVE-2019-14833:
   When the password contains multi-byte (non-ASCII) characters, the check
   password script does not receive the full password string.

o  CVE-2019-14847:
   Users with the "get changes" extended access right can crash the AD DC LDAP
   server by requesting an attribute using the range= syntax.

For more details and workarounds, please refer to the security advisories.


Changes since 4.11.1:
---------------------

o  Jeremy Allison <jra@samba.org>
   * BUG 14071: CVE-2019-10218 - s3: libsmb: Protect SMB1 and SMB2 client code
     from evil server returned names.

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 12438: CVE-2019-14833: Use utf8 characters in the unacceptable
     password.
   * BUG 14040: CVE-2019-14847 dsdb: Correct behaviour of ranged_results when
     combined with dirsync.

o  Björn Baumbach <bb@sernet.de>
   * BUG 12438: CVE-2019-14833 dsdb: Send full password to check password
     script.

[close]

http://www.samba.org/
Titel: Samba 4.11.3
Beitrag von: SiLæncer am 10 Dezember, 2019, 18:10
Changelog

This is a security release in order to address the following defects:

o CVE-2019-14861: Samba AD DC zone-named record Denial of Service in DNS
        management server (dnsserver).
o CVE-2019-14870: DelegationNotAllowed not being enforced in protocol transition
        on Samba AD DC.


=======
Details
=======

o  CVE-2019-14861:
   An authenticated user can crash the DCE/RPC DNS management server by creating
   records with matching the zone name.

o  CVE-2019-14870:
   The DelegationNotAllowed Kerberos feature restriction was not being applied
   when processing protocol transition requests (S4U2Self), in the AD DC KDC.

For more details and workarounds, please refer to the security advisories.


Changes since 4.11.2:
---------------------

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 14138: CVE-2019-14861: Fix DNSServer RPC server crash.

o  Isaac Boukris <iboukris@gmail.com>
   * BUG 14187: CVE-2019-14870: DelegationNotAllowed not being enforced.

[close]

http://www.samba.org/
Titel: Samba 4.11.4
Beitrag von: SiLæncer am 18 Dezember, 2019, 04:45
Changelog

Changes since 4.11.3:
---------------------

o  Jeremy Allison <jra@samba.org>
   * BUG 14161: s3: libsmb: Ensure SMB1 cli_qpathinfo2() doesn't return an inode
     number.
   * BUG 14174: s3: utils: smbtree. Ensure we don't call cli_RNetShareEnum()
     on an SMB1 connection.
   * BUG 14176: NT_STATUS_ACCESS_DENIED becomes EINVAL when using SMB2 in
     SMBC_opendir_ctx.
   * BUG 14189: s3: smbd: SMB2 - Ensure we use the correct session_id if
     encrypting an interim response.
   * BUG 14205: Prevent smbd crash after invalid SMB1 negprot.

o  Ralph Boehme <slow@samba.org>
   * BUG 13745: s3:printing: Fix %J substition.
   * BUG 13925: s3: Remove now unneeded call to cmdline_messaging_context().
   * BUG 14069: Incomplete conversion of former parametric options.
   * BUG 14070: Fix sync dosmode fallback in async dosmode codepath.
   * BUG 14171: vfs_fruit returns capped resource fork length.

o  Isaac Boukris <iboukris@gmail.com>
   * BUG 14116: libnet_join: Add SPNs for additional-dns-hostnames entries.

o  Volker Lendecke <vl@samba.org>
   * BUG 14211: smbd: Increase a debug level.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 14153: Prevent azure ad connect from reporting discovery errors:
     reference-value-not-ldap-conformant.

o  Christof Schmitt <cs@samba.org>
   * BUG 14179: krb5_plugin: Fix developer build with newer heimdal system
     library.

o  Andreas Schneider <asn@samba.org>
   * BUG 14168: replace: Only link libnsl and libsocket if requrired.

o  Martin Schwenke <martin@meltin.net>
   * BUG 14175: ctdb: Incoming queue can be orphaned causing communication
     breakdown.

o  Uri Simchoni <uri@samba.org>
   * BUG 13846: ldb: Release ldb 2.0.8. Cross-compile will not take
     cross-answers or cross-execute.
   * BUG 13856: heimdal-build: Avoid hard-coded /usr/include/heimdal in
     asn1_compile-generated code.

[close]

http://www.samba.org/
Titel: Samba 4.11.5
Beitrag von: SiLæncer am 21 Januar, 2020, 21:10
Changelog

This is a security release in order to address the following defects:

o CVE-2019-14902: Replication of ACLs set to inherit down a subtree on AD
        Directory not automatic.
o CVE-2019-14907: Crash after failed character conversion at log level 3 or
        above.
o CVE-2019-19344: Use after free during DNS zone scavenging in Samba AD DC.


=======
Details
=======

o  CVE-2019-14902:
   The implementation of ACL inheritance in the Samba AD DC was not complete,
   and so absent a 'full-sync' replication, ACLs could get out of sync between
   domain controllers.

o  CVE-2019-14907:
   When processing untrusted string input Samba can read past the end of the
   allocated buffer when printing a "Conversion error" message to the logs.

o  CVE-2019-19344:
   During DNS zone scavenging (of expired dynamic entries) there is a read of
   memory after it has been freed.

For more details and workarounds, please refer to the security advisories.


Changes since 4.11.4:
---------------------

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 12497: CVE-2019-14902: Replication of ACLs down subtree on AD Directory
     not automatic.
   * BUG 14208: CVE-2019-14907: lib/util: Do not print the failed to convert
     string into the logs.

o  Gary Lockyer <gary@catalyst.net.nz>
   * BUG 14050: CVE-2019-19344: kcc dns scavenging: Fix use after free in
     dns_tombstone_records_zone.

[close]

http://www.samba.org/
Titel: Samba 4.12 freigegeben
Beitrag von: SiLæncer am 05 März, 2020, 17:20
Changelog

                   ==============================
                   Release Notes for Samba 4.12.0
                           March 03, 2019
         ==============================


This is the first stable release of the Samba 4.12 release series.
Please read the release notes carefully before upgrading.


NEW FEATURES/CHANGES
====================

Python 3.5 Required
-------------------

Samba's minimum runtime requirement for python was raised to Python
3.4 with samba 4.11.  Samba 4.12 raises this minimum version to Python
3.5 both to access new features and because this is the oldest version
we test with in our CI infrastructure.

(Build time support for the file server with Python 2.6 has not
changed)

Removing in-tree cryptography: GnuTLS 3.4.7 required
----------------------------------------------------

Samba is making efforts to remove in-tree cryptographic functionality,
and to instead rely on externally maintained libraries.  To this end,
Samba has chosen GnuTLS as our standard cryptographic provider.

Samba now requires GnuTLS 3.4.7 to be installed (including development
headers at build time) for all configurations, not just the Samba AD
DC.

Thanks to this work Samba no longer ships an in-tree DES
implementation and on GnuTLS 3.6.5 or later Samba will include no
in-tree cryptography other than the MD4 hash and that
implemented in our copy of Heimdal.

Using GnuTLS for SMB3 encryption you will notice huge performance and copy
speed improvements. Tests with the CIFS Kernel client from Linux Kernel 5.3
show a 3x speed improvement for writing and a 2.5x speed improvement for reads!

NOTE WELL: The use of GnuTLS means that Samba will honour the
system-wide 'FIPS mode' (a reference to the US FIPS-140 cryptographic
standard) and so will not operate in many still common situations if
this system-wide parameter is in effect, as many of our protocols rely
on outdated cryptography.

A future Samba version will mitigate this to some extent where good
cryptography effectively wraps bad cryptography, but for now that above
applies.

zlib library is now required to build Samba
-------------------------------------------

Samba no longer includes a local copy of zlib in our source tarball.
By removing this we do not need to ship (even where we did not
build) the old, broken zip encryption code found there.

New Spotlight backend for Elasticsearch
---------------------------------------

Support for the macOS specific Spotlight search protocol has been enhanced
significantly. Starting with 4.12 Samba supports using Elasticsearch as search
backend. Various new parameters have been added to configure this:

  spotlight backend = noindex | elasticsearch | tracker
  elasticsearch:address = ADDRESS
  elasticsearch:port = PORT
  elasticsearch:use tls = BOOLEAN
  elasticsearch:index = INDEXNAME
  elasticsearch:mappings = PATH
  elasticsearch:max results = NUMBER

Samba also ships a Spotlight client command "mdfind" which can be used to search
any SMB server that runs the Spotlight RPC service. See the manpage of mdfind
for details.

Note that when upgrading existing installations that are using the previous
default Spotlight backend Gnome Tracker must explicitly set "spotlight backend =
tracker" as the new default is "noindex".

'net ads kerberos pac save' and 'net eventlog export'
-----------------------------------------------------

The 'net ads kerberos pac save' and 'net eventlog export' tools will
no longer silently overwrite an existing file during data export.  If
the filename given exits, an error will be shown.

Fuzzing
-------

A large number of fuzz targets have been added to Samba, and Samba has
been registered in Google's oss-fuzz cloud fuzzing service.  In
particular, we now have good fuzzing coverage of our generated NDR
parsing code.

A large number of issues have been found and fixed thanks to this
effort.

'samba-tool' improvements add contacts as member to groups
----------------------------------------------------------

Previously 'samba-tool group addmemers' can just add users, groups and
computers as members to groups. But also contacts can be members of
groups. Samba 4.12 adds the functionality to add contacts to
groups. Since contacts have no sAMAccountName, it's possible that
there are more than one contact with the same name in different
organizational units. Therefore it's necessary to have an option to
handle group members by their DN.

To get the DN of an object there is now the "--full-dn" option available
for all necessary commands.

The MS Windows UI allows to search for specific types of group members
when searching for new members for a group. This feature is included
here with the new samba-tool group addmembers "--object-type=OBJECTYPE"
option. The different types are selected accordingly to the Windows
UI. The default samba-toole behaviour shouldn't be changed.

Allow filtering by OU or subtree in samba-tool
----------------------------------------------

A new "--base-dn" and "--member-base-dn" option is added to relevant
samba-tool user, group and ou management commands to allow operation
on just one part of the AD tree, such as a single OU.

VFS
===

SMB_VFS_NTIMES
--------------

Samba now uses a sentinel value based on utimensat(2) UTIME_OMIT to denote
to-be-ignored timestamp variables passed to the SMB_VFS_NTIMES() VFS function.

VFS modules can check whether any of the time values inside a struct
smb_file_time is to be ignored by calling is_omit_timespec() on the value.

'io_uring' vfs module
---------------------

The module makes use of the new io_uring infrastructure
(intruduced in Linux 5.1), see https://lwn.net/Articles/776703/

Currently this implements SMB_VFS_{PREAD,PWRITE,FSYNC}_SEND/RECV
and avoids the overhead of the userspace threadpool in the default
vfs backend. See also vfs_io_uring(8).

In order to build the module you need the liburing userspace library
and its developement headers installed, see
https://git.kernel.dk/cgit/liburing/

At runtime you'll need a Linux kernel with version 5.1 or higher.
Note that 5.4.14 and 5.4.15 have a regression that breaks the Samba
module! The regression was fixed in Linux 5.4.16 again.

MS-DFS changes in the VFS
-------------------------

This release changes set getting and setting of MS-DFS redirects
on the filesystem to go through two new VFS functions:

SMB_VFS_CREATE_DFS_PATHAT()
SMB_VFS_READ_DFS_PATHAT()

instead of smbd explicitly storing MS-DFS redirects inside
symbolic links on the filesystem. The underlying default
implementations of this has not changed, the redirects are
still stored inside symbolic links on the filesystem, but
moving the creation and reading of these links into the VFS
as first-class functions now allows alternate methods of
storing them (maybe in extended attributes) for OEMs who
don't want to mis-use filesystem symbolic links in this
way.


CTDB changes
============

* The ctdb_mutex_fcntl_helper periodically re-checks the lock file

  The re-check period is specified using a 2nd argument to this
  helper.  The default re-check period is 5s.

  If the file no longer exists or the inode number changes then the
  helper exits.  This triggers an election.


REMOVED FEATURES
================

The smb.conf parameter "write cache size" has been removed.

Since the in-memory write caching code was written, our write path has
changed significantly. In particular we have gained very flexible
support for async I/O, with the new linux io_uring interface in
development.  The old write cache concept which cached data in main
memory followed by a blocking pwrite no longer gives any improvement
on modern systems, and may make performance worse on memory-contrained
systems, so this functionality should not be enabled in core smbd
code.

In addition, it complicated the write code, which is a performance
critical code path.

If required for specialist purposes, it can be recreated as a VFS
module.

Retiring DES encryption types in Kerberos.
------------------------------------------
With this release, support for DES encryption types has been removed from
Samba, and setting DES_ONLY flag for an account will cause Kerberos
authentication to fail for that account (see RFC-6649).

Samba-DC: DES keys no longer saved in DB.
-----------------------------------------
When a new password is set for an account, Samba DC will store random keys
in DB instead of DES keys derived from the password.  If the account is being
migrated to Windbows or to an older version of Samba in order to use DES keys,
the password must be reset to make it work.

Heimdal-DC: removal of weak-crypto.
-----------------------------------
Following removal of DES encryption types from Samba, the embedded Heimdal
build has been updated to not compile weak crypto code (HEIM_WEAK_CRYPTO).

vfs_netatalk: The netatalk VFS module has been removed.
-------------------------------------------------------

The netatalk VFS module has been removed. It was unmaintained and is not needed
any more.

BIND9_FLATFILE deprecated
-------------------------

The BIND9_FLATFILE DNS backend is deprecated in this release and will
be removed in the future.  This was only practically useful on a single
domain controller or under expert care and supervision.

This release removes the 'rndc command' smb.conf parameter, which
supported this configuration by writing out a list of DCs permitted to
make changes to the DNS Zone and nudging the 'named' server if a new
DC was added to the domain.  Administrators using BIND9_FLATFILE will
need to maintain this manually from now on.


smb.conf changes
================

  Parameter Name                     Description                Default
  --------------                     -----------                -------

  elasticsearch:address              New                        localhost
  elasticsearch:port                 New                        9200
  elasticsearch:use tls              New                        No
  elasticsearch:index                New                        _all
  elasticsearch:mappings             New                        DATADIR/elasticsearch_mappings.json
  elasticsearch:max results          New                        100
  nfs4:acedup                        Changed default            merge
  rndc command                       Removed
  write cache size                   Removed
  spotlight backend           New         noindex


CHANGES SINCE 4.12.0rc4
=======================

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 14258: dsdb: Correctly handle memory in objectclass_attrs.


CHANGES SINCE 4.12.0rc3
=======================

o  Jeremy Allison <jra@samba.org>
   * BUG 14269: s3: DFS: Don't allow link deletion on a read-only share.

o  Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
   * BUG 14284: pidl/wscript: configure should insist on Parse::Yapp::Driver.

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 14270: ldb: Fix search with scope ONE and small result sets.
   * BUG 14284: build: Do not check if system perl modules should be bundled.

o  Volker Lendecke <vl@samba.org>
   * BUG 14285: smbd fails to handle EINTR from open(2) properly.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 14270: ldb: version 2.1.1.


CHANGES SINCE 4.12.0rc2
=======================

o  Jeremy Allison <jra@samba.org>
   * BUG 14282: Set getting and setting of MS-DFS redirects on the filesystem
     to go through two new VFS functions SMB_VFS_CREATE_DFS_PATHAT() and
     SMB_VFS_READ_DFS_PATHAT().

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 14255: bootstrap: Remove un-used dependency python3-crypto.

o  Volker Lendecke <vl@samba.org>
   * BUG 14247: Fix CID 1458418 and 1458420.
   * BUG 14281: lib: Fix a shutdown crash with "clustering = yes".

o  Stefan Metzmacher <metze@samba.org>
   * BUG 14247: Winbind member (source3) fails local SAM auth with empty domain
     name.
   * BUG 14265: winbindd: Handle missing idmap in getgrgid().
   * BUG 14271: Don't use forward declaration for GnuTLS typedefs.
   * BUG 14280: Add io_uring vfs module.

o  Andreas Schneider <asn@samba.org>
   * BUG 14250: libcli:smb: Improve check for gnutls_aead_cipher_(en|de)cryptv2.


CHANGES SINCE 4.12.0rc1
=======================

o  Jeremy Allison <jra@samba.org>
   * BUG 14239: s3: lib: nmblib. Clean up and harden nmb packet processing.

o  Andreas Schneider <asn@samba.org>
   * BUG 14253: lib:util: Log mkdir error on correct debug levels.


KNOWN ISSUES
============

https://wiki.samba.org/index.php/Release_Planning_for_Samba_4.12#Release_blocking_bugs

[close]

http://www.samba.org/