Changeset 860 for vendor/current/docs/manpages/ntlm_auth.1
- Timestamp:
- May 12, 2014, 8:58:38 PM (12 years ago)
- File:
-
- 1 edited
-
vendor/current/docs/manpages/ntlm_auth.1 (modified) (16 diffs)
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/docs/manpages/ntlm_auth.1
r746 r860 2 2 .\" Title: ntlm_auth 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 5.2<http://docbook.sf.net/>5 .\" Date: 10/29/20124 .\" Generator: DocBook XSL Stylesheets v1.7 <http://docbook.sf.net/> 5 .\" Date: 6 6 .\" Manual: User Commands 7 7 .\" Source: Samba 3.6 8 8 .\" Language: English 9 9 .\" 10 .TH "NTLM_AUTH" "1" "10/29/2012" "Samba 3\&.6" "User Commands" 10 .TH "NTLM_AUTH" "1" "09/18/2013" "Samba 3\&.6" "User Commands" 11 .\" ----------------------------------------------------------------- 12 .\" * Define some portability stuff 13 .\" ----------------------------------------------------------------- 14 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 15 .\" http://bugs.debian.org/507673 16 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html 17 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 18 .ie \n(.g .ds Aq \(aq 19 .el .ds Aq ' 11 20 .\" ----------------------------------------------------------------- 12 21 .\" * set default formatting … … 20 29 .\" ----------------------------------------------------------------- 21 30 .SH "NAME" 22 ntlm_auth \- tool to allow external access to Winbind\ 's NTLM authentication function31 ntlm_auth \- tool to allow external access to Winbind\s NTLM authentication function 23 32 .SH "SYNOPSIS" 24 33 .HP \w'\ 'u … … 55 64 squid\-2\&.4\-basic 56 65 .RS 4 57 Server\-side helper for use with Squid 2\&.4\ 's basic (plaintext) authentication\&.66 Server\-side helper for use with Squid 2\&.4\s basic (plaintext) authentication\&. 58 67 .RE 59 68 .PP 60 69 squid\-2\&.5\-basic 61 70 .RS 4 62 Server\-side helper for use with Squid 2\&.5\ 's basic (plaintext) authentication\&.71 Server\-side helper for use with Squid 2\&.5\s basic (plaintext) authentication\&. 63 72 .RE 64 73 .PP 65 74 squid\-2\&.5\-ntlmssp 66 75 .RS 4 67 Server\-side helper for use with Squid 2\&.5\ 's NTLMSSP authentication\&.76 Server\-side helper for use with Squid 2\&.5\s NTLMSSP authentication\&. 68 77 .sp 69 78 Requires access to the directory … … 78 87 ntlmssp\-client\-1 79 88 .RS 4 80 Client\-side helper for use with arbitrary external programs that may wish to use Samba\ 's NTLMSSP authentication knowledge\&.89 Client\-side helper for use with arbitrary external programs that may wish to use Samba\s NTLMSSP authentication knowledge\&. 81 90 .sp 82 91 This helper is a client, and as such may be run by any user\&. The protocol used is effectively the reverse of the previous protocol\&. A … … 103 112 ntlm\-server\-1 104 113 .RS 4 105 Server\-side helper protocol, intended for use by a RADIUS server or the \ 'winbind\'plugin for pppd, for the provision of MSCHAP and MSCHAPv2 authentication\&.114 Server\-side helper protocol, intended for use by a RADIUS server or the \ plugin for pppd, for the provision of MSCHAP and MSCHAPv2 authentication\&. 106 115 .sp 107 116 This protocol consists of lines in the form: … … 116 125 Username 117 126 .RS 4 118 The username, expected to be in Samba\ 's127 The username, expected to be in Samba\s 119 128 \m[blue]\fBunix charset\fR\m[]\&. 120 .PP \fBExample\ \&1.\ \&\fR Username: bob 121 .PP \fBExample\ \&2.\ \&\fR Username:: Ym9i 129 .PP 130 Examples: 131 .RS 4 132 Username: bob 133 .sp 134 Username:: Ym9i 135 .RE 122 136 .RE 123 137 .PP 124 138 NT\-Domain 125 139 .RS 4 126 The user\ 's domain, expected to be in Samba\'s140 The user\s 127 141 \m[blue]\fBunix charset\fR\m[]\&. 128 .PP \fBExample\ \&3.\ \&\fR NT\-Domain: WORKGROUP 129 .PP \fBExample\ \&4.\ \&\fR NT\-Domain:: V09SS0dST1VQ 142 .PP 143 Examples: 144 .RS 4 145 NT\-Domain: WORKGROUP 146 .sp 147 NT\-Domain:: V09SS0dST1VQ 148 .RE 130 149 .RE 131 150 .PP 132 151 Full\-Username 133 152 .RS 4 134 The fully qualified username, expected to be in Samba\ 's153 The fully qualified username, expected to be in Samba\s 135 154 \m[blue]\fBunix charset\fR\m[] 136 155 and qualified with the 137 156 \m[blue]\fBwinbind separator\fR\m[]\&. 138 .PP \fBExample\ \&5.\ \&\fR Full\-Username: WORKGROUP\ebob 139 .PP \fBExample\ \&6.\ \&\fR Full\-Username:: V09SS0dST1VQYm9i 157 .PP 158 Examples: 159 .RS 4 160 Full\-Username: WORKGROUP\ebob 161 .sp 162 Full\-Username:: V09SS0dST1VQYm9i 163 .RE 140 164 .RE 141 165 .PP … … 145 169 LANMAN Challenge 146 170 value, generated randomly by the server, or (in cases such as MSCHAPv2) generated in some way by both the server and the client\&. 147 .PP \fBExample\ \&7.\ \&\fR LANMAN\-Challenge: 0102030405060708 171 .PP 172 Examples: 173 .RS 4 174 LANMAN\-Challenge: 0102030405060708 175 .RE 148 176 .RE 149 177 .PP … … 152 180 The 24 byte 153 181 LANMAN Response 154 value, calculated from the user\ 's password and the supplied182 value, calculated from the user\s password and the supplied 155 183 LANMAN Challenge\&. Typically, this is provided over the network by a client wishing to authenticate\&. 156 .PP \fBExample\ \&8.\ \&\fR LANMAN\-Response: 0102030405060708090A0B0C0D0E0F101112131415161718 184 .PP 185 Examples: 186 .RS 4 187 LANMAN\-Response: 0102030405060708090A0B0C0D0E0F101112131415161718 188 .RE 157 189 .RE 158 190 .PP … … 161 193 The >= 24 byte 162 194 NT Response 163 calculated from the user\ 's password and the supplied195 calculated from the user\s password and the supplied 164 196 LANMAN Challenge\&. Typically, this is provided over the network by a client wishing to authenticate\&. 165 .PP \fBExample\ \&9.\ \&\fR NT\-Response: 0102030405060708090A0B0C0D0E0F101112131415161718 197 .PP 198 Examples: 199 .RS 4 200 NT\-Response: 0102030405060708090A0B0C0D0E0F10111213141516171 201 .RE 166 202 .RE 167 203 .PP 168 204 Password 169 205 .RS 4 170 The user\'s password\&. This would be provided by a network client, if the helper is being used in a legacy situation that exposes plaintext passwords in this way\&. 171 .PP \fBExample\ \&10.\ \&\fR Password: samba2 172 .PP \fBExample\ \&11.\ \&\fR Password:: c2FtYmEy 206 The user\*(Aqs password\&. This would be provided by a network client, if the helper is being used in a legacy situation that exposes plaintext passwords in this way\&. 207 .PP 208 Examples: 209 .RS 4 210 Password: samba2 211 .sp 212 Password:: c2FtYmEy 213 .RE 173 214 .RE 174 215 .PP … … 176 217 .RS 4 177 218 Upon successful authenticaiton, return the user session key associated with the login\&. 178 .PP \fBExample\ \&12.\ \&\fR Request\-User\-Session\-Key: Yes 219 .PP 220 Examples: 221 .RS 4 222 Request\-User\-Session\-Key: Yes 223 .RE 179 224 .RE 180 225 .PP … … 182 227 .RS 4 183 228 Upon successful authenticaiton, return the LANMAN session key associated with the login\&. 184 .PP \fBExample\ \&13.\ \&\fR Request\-LanMan\-Session\-Key: Yes 185 .RE 229 .PP 230 Examples: 231 .RS 4 232 Request\-LanMan\-Session\-Key: Yes 233 .RE 234 .RE 235 .RE 236 .sp 186 237 .if n \{\ 187 238 .sp … … 196 247 .ps -1 197 248 .br 198 Implementers should take care to base64 encode 199 any data (such as usernames/passwords) that may contain malicous user data, such as 200 a newline\&. They may also need to decode strings from 201 the helper, which likewise may have been base64 encoded\&..sp .5v 202 .RE 249 Implementers should take care to base64 encode any data (such as usernames/passwords) that may contain malicous user data, such as a newline\&. They may also need to decode strings from the helper, which likewise may have been base64 encoded\&. 250 .sp .5v 203 251 .RE 204 252 .RE … … 236 284 \-\-password=PASSWORD 237 285 .RS 4 238 User\ 's plaintext password286 User\s plaintext password 239 287 .sp 240 288 If not specified on the command line, this is prompted for when required\&. … … 275 323 .sp 276 324 Note that specifying this parameter here will override the 277 \m[blue]\fB \%smb.conf.5.html#\fR\m[]325 \m[blue]\fB\fR\m[] 278 326 parameter in the 279 327 smb\&.conf … … 350 398 .\} 351 399 .nf 352 auth_param ntlm program ntlm_auth \-\-helper\-protocol=squid\-2\&.5\-ntlmssp \-\-require\-membership\-of=\ 'WORKGROUP\eDomain Users\'353 auth_param basic program ntlm_auth \-\-helper\-protocol=squid\-2\&.5\-basic \-\-require\-membership\-of=\ 'WORKGROUP\eDomain Users\'400 auth_param ntlm program ntlm_auth \-\-helper\-protocol=squid\-2\&.5\-ntlmssp \-\-require\-membership\-of=\ 401 auth_param basic program ntlm_auth \-\-helper\-protocol=squid\-2\&.5\-basic \-\-require\-membership\-of=\ 354 402 .fi 355 403 .if n \{\ … … 358 406 .SH "TROUBLESHOOTING" 359 407 .PP 360 If you\ 're experiencing problems with authenticating Internet Explorer running under MS Windows 9X or Millennium Edition against ntlm_auth\'s NTLMSSP authentication helper (\-\-helper\-protocol=squid\-2\&.5\-ntlmssp), then please read408 If you\s NTLMSSP authentication helper (\-\-helper\-protocol=squid\-2\&.5\-ntlmssp), then please read 361 409 the Microsoft Knowledge Base article #239869 and follow instructions described there\&. 362 410 .SH "VERSION"
Note:
See TracChangeset
for help on using the changeset viewer.
