smbpasswd(5)


NAME

   smbpasswd - The Samba encrypted password file

SYNOPSIS

   smbpasswd

DESCRIPTION

   This tool is part of the samba(7) suite.

   smbpasswd is the Samba encrypted password file. It contains the
   username, Unix user id and the SMB hashed passwords of the user, as
   well as account flag information and the time the password was last
   changed. This file format has been evolving with Samba and has had
   several different formats in the past.

FILE FORMAT

   The format of the smbpasswd file used by Samba 2.2 is very similar to
   the familiar Unix passwd(5) file. It is an ASCII file containing one
   line for each user. Each field within each line is separated from the
   next by a colon. Any entry beginning with '#' is ignored. The smbpasswd
   file contains the following information for each user:

   name
       This is the user name. It must be a name that already exists in the
       standard UNIX passwd file.

   uid
       This is the UNIX uid. It must match the uid field for the same user
       entry in the standard UNIX passwd file. If this does not match then
       Samba will refuse to recognize this smbpasswd file entry as being
       valid for a user.

   Lanman Password Hash
       This is the LANMAN hash of the user's password, encoded as 32 hex
       digits. The LANMAN hash is created by DES encrypting a well known
       string with the user's password as the DES key. This is the same
       password used by Windows 95/98 machines. Note that this password
       hash is regarded as weak as it is vulnerable to dictionary attacks
       and if two users choose the same password this entry will be
       identical (i.e. the password is not "salted" as the UNIX password
       is). If the user has a null password this field will contain the
       characters "NO PASSWORD" as the start of the hex string. If the hex
       string is equal to 32 'X' characters then the user's account is
       marked as disabled and the user will not be able to log onto the
       Samba server.

       WARNING !!  Note that, due to the challenge-response nature of the
       SMB/CIFS authentication protocol, anyone with a knowledge of this
       password hash will be able to impersonate the user on the network.
       For this reason these hashes are known as plain text equivalents
       and must NOT be made available to anyone but the root user. To
       protect these passwords the smbpasswd file is placed in a directory
       with read and traverse access only to the root user and the
       smbpasswd file itself must be set to be read/write only by root,
       with no other access.

   NT Password Hash
       This is the Windows NT hash of the user's password, encoded as 32
       hex digits. The Windows NT hash is created by taking the user's
       password as represented in 16-bit, little-endian UNICODE and then
       applying the MD4 (internet rfc1321) hashing algorithm to it.

       This password hash is considered more secure than the LANMAN
       Password Hash as it preserves the case of the password and uses a
       much higher quality hashing algorithm. However, it is still the
       case that if two users choose the same password this entry will be
       identical (i.e. the password is not "salted" as the UNIX password
       is).

       WARNING !!. Note that, due to the challenge-response nature of the
       SMB/CIFS authentication protocol, anyone with a knowledge of this
       password hash will be able to impersonate the user on the network.
       For this reason these hashes are known as plain text equivalents
       and must NOT be made available to anyone but the root user. To
       protect these passwords the smbpasswd file is placed in a directory
       with read and traverse access only to the root user and the
       smbpasswd file itself must be set to be read/write only by root,
       with no other access.

   Account Flags
       This section contains flags that describe the attributes of the
       users account. This field is bracketed by '[' and ']' characters
       and is always 13 characters in length (including the '[' and ']'
       characters). The contents of this field may be any of the following
       characters:

       *   U - This means this is a "User" account, i.e. an ordinary user.

       *   N - This means the account has no password (the passwords in
           the fields LANMAN Password Hash and NT Password Hash are
           ignored). Note that this will only allow users to log on with
           no password if the
            null passwords parameter is set in the smb.conf(5) config
           file.

       *   D - This means the account is disabled and no SMB/CIFS logins
           will be allowed for this user.

       *   X - This means the password does not expire.

       *   W - This means this account is a "Workstation Trust" account.
           This kind of account is used in the Samba PDC code stream to
           allow Windows NT Workstations and Servers to join a Domain
           hosted by a Samba PDC.

   Other flags may be added as the code is extended in future. The rest of
   this field space is filled in with spaces. For further information
   regarding the flags that are supported please refer to the man page for
   the pdbedit command.

   Last Change Time
       This field consists of the time the account was last modified. It
       consists of the characters 'LCT-' (standing for "Last Change Time")
       followed by a numeric encoding of the UNIX time in seconds since
       the epoch (1970) that the last change was made.

   All other colon separated fields are ignored at this time.

VERSION

   This man page is correct for version 3 of the Samba suite.

SEE ALSO

   smbpasswd(8), Samba(7), and the Internet RFC1321 for details on the MD4
   algorithm.

AUTHOR

   The original Samba software and related utilities were created by
   Andrew Tridgell. Samba is now developed by the Samba Team as an Open
   Source project similar to the way the Linux kernel is developed.

   The original Samba man pages were written by Karl Auer. The man page
   sources were converted to YODL format (another excellent piece of Open
   Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and
   updated for the Samba 2.0 release by Jeremy Allison. The conversion to
   DocBook for Samba 2.2 was done by Gerald Carter. The conversion to
   DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.


More Linux Commands

manpages/ber_bvfree.3.html
ber_bvfree(3) - OpenLDAP LBER types and allocation functions
The following are the basic types and structures defined for use with the Lightweight BER library. ber_int_t is a signed integer of at least 32 bits. It is comm

manpages/getdirentries.3.html
getdirentries(3) - get directory entries in a file system-in
Read directory entries from the directory specified by fd into buf. At most nbytes are read. Reading starts at offset *basep, and *basep is updated with the new

manpages/pcre32_free_substring.3.html
pcre32_free_substring(3) Perl-compatible regular expressions
This is a convenience function for freeing the store obtained by a previous call to pcre[16|32]_get_substring() or pcre[16|32]_get_named_substring(). Its only a

manpages/Tcl_LimitSetCommands.3.html
Tcl_LimitSetCommands(3) - manage and check resource limits o
Tcls interpreter resource limit subsystem allows for close control over how much computation time a script may use, and is useful for cases where a program is d

manpages/mv.1.html
mv(1) - move (rename) files (Commands - Linux man page).....
Rename SOURCE to DEST, or move SOURCE(s) to DIRECTORY. Mandatory arguments to long options are mandatory for short options too. --backup[=CONTROL] make a backup

manpages/gnutls_openpgp_crt_get_pk_rsa_raw.3.html
gnutls_openpgp_crt_get_pk_rsa_raw(3) - API function.........
gnutls_openpgp_crt_get_pk_rsa_raw.3 - This function will export the RSA public keys parameters found in the given structure. The new parameters will be allocate

manpages/outsl.2.html
outsl(2) - port I/O (System calls - Linux man page).........
This family of functions is used to do low-level port input and output. The out* functions do port output, the in* functions do port input; the b-suffix functio

manpages/toplevel.n.html
toplevel(n) - Create and manipulate toplevel widgets........
The toplevel command creates a new toplevel widget (given by the pathName argument). Additional options, described above, may be specified on the command line o

manpages/key_encryptsession.3.html
key_encryptsession(3) - interfaces to rpc keyserver daemon
The functions here are used within the RPCs secure authentication mechanism (AUTH_DES). There should be no need for user programs to use this functions. The fun

manpages/snmpd.8.html
snmpd(8) - daemon to respond to SNMP request packets........
snmpd is an SNMP agent which binds to a port and awaits requests from SNMP management software. Upon receiving a request, it processes the request(s), collects

manpages/gserialver-4.6.1.html
gserialver-4.6(1) - version command - Linux manual page.....
Print the serialVersionUID of the specified classes. OPTIONS -classpath PATH Class path to use to find classes. Standard options: -help Print help text, then ex

manpages/Tcl_SetByteArrayObj.3.html
Tcl_SetByteArrayObj(3) - manipulate Tcl objects as a arrays
These procedures are used to create, modify, and read Tcl byte-array objects from C code. Byte-array objects are typically used to hold the results of binary IO





We can't live, work or learn in freedom unless the software we use is free.