Difference between revisions of "Samba 3.6 Features added/changed"

(Samba 3.6.14)
(Samba 3.6.15)
Line 2: Line 2:
 
*[https://bugzilla.samba.org/show_bug.cgi?id=8595 3.6 release bug]
 
*[https://bugzilla.samba.org/show_bug.cgi?id=8595 3.6 release bug]
 
*[https://bugzilla.samba.org/showdependencygraph.cgi?id=8595&display=tree&rankdir=LR 3.6 release bug]  Dependency Graph
 
*[https://bugzilla.samba.org/showdependencygraph.cgi?id=8595&display=tree&rankdir=LR 3.6 release bug]  Dependency Graph
 +
==Samba 3.6.15 ==
 +
:Release Notes for Samba 3.6.15
 +
:May 08, 2013
 +
 +
===This is is the latest stable release of Samba 3.6.===
 +
 +
====Major enhancements in Samba 3.6.15 include:====
 +
 +
*  Fix crash bug in Winbind [https://bugzilla.samba.org/show_bug.cgi?id=9854 bug #9854].
 +
 +
====Changes since 3.6.14:====
 +
 +
*  Andrew Bartlett <abartlet@samba.org>
 +
:* [https://bugzilla.samba.org/show_bug.cgi?id=9746 bug #9746]: Fix "guest ok", "force user" and "force group" for guest users.
 +
 +
*  David Disseldorp <ddiss@samba.org>
 +
:* [https://bugzilla.samba.org/show_bug.cgi?id=9830 bug #9830]: Fix panic in nt_printer_publish_ads.
 +
 +
*  Volker Lendecke <vl@samba.org>
 +
:* [https://bugzilla.samba.org/show_bug.cgi?id=9854 bug #9854]: Fix crash bug in Winbind.
 +
 +
*  Andreas Schneider <asn@samba.org>
 +
:* [https://bugzilla.samba.org/show_bug.cgi?id=9817 bug #9817]: Fix 'map untrusted to domain' with NTLMv2.
 +
 
==Samba 3.6.14==
 
==Samba 3.6.14==
 
:Release Notes for Samba 3.6.14
 
:Release Notes for Samba 3.6.14
Line 58: Line 82:
  
 
  [1] https://en.wikipedia.org/wiki/Code_page
 
  [1] https://en.wikipedia.org/wiki/Code_page
 
 
 
  
 
==Samba 3.6.13==
 
==Samba 3.6.13==

Revision as of 13:06, 8 May 2013

Contents

Samba 3.6 is the current release series

Samba 3.6.15

Release Notes for Samba 3.6.15
May 08, 2013

This is is the latest stable release of Samba 3.6.

Major enhancements in Samba 3.6.15 include:

Changes since 3.6.14:

  • Andrew Bartlett <abartlet@samba.org>
  • bug #9746: Fix "guest ok", "force user" and "force group" for guest users.
  • David Disseldorp <ddiss@samba.org>
  • bug #9830: Fix panic in nt_printer_publish_ads.
  • Volker Lendecke <vl@samba.org>
  • Andreas Schneider <asn@samba.org>
  • bug #9817: Fix 'map untrusted to domain' with NTLMv2.

Samba 3.6.14

Release Notes for Samba 3.6.14
April 29, 2013

This is is the latest stable release of Samba 3.6.

Major enhancements in Samba 3.6.14 include:

  • Certain xattrs cause Windows error 0x800700FF bug #9130.

Changes since 3.6.13:

  • Jeremy Allison <jra@samba.org>
  • bug #9130BUG 9130: Certain xattrs cause Windows error 0x800700FF.
  • bug #9724BUG 9724: Use is_encrypted_packet() function correctly inside server.
  • bug #9733: Fix 'smbcontrol close-share' is not working.
  • bug #9747: Make sure that we only propogate the INHERITED flag when we are allowed to.
  • bug #9748: Remove unneeded fstat system call from hot read path.
  • bug #9811: Fix bug in old create temp SMB request. Only use VFS functions.
  • David Disseldorp <ddiss@samba.org>
  • bug #9645: New or deleted CUPS printerqueues are not recognized by Samba.
  • bug #9807: wbinfo: Fix segfault in wbinfo_pam_logon.
  • Volker Lendecke <vl@samba.org>
  • bug #9727: wkssvc: Fix NULL pointer dereference.
  • bug #9736: smbd: Tune "dir" a bit.
  • bug #9775: Fix segfault for "artificial" conn_structs.
  • bug #9809: RHEL SPEC: Package dbwrap_tool man page.
  • Andreas Schneider <asn@samba.org>
  • bug #9139: Fix the username map optimization.
  • bug #9699: Fix adding case sensitive spn.
  • bug #9723: Add a tool to migrate latin1 printing tdbs to registry.
  • bug #9735: Fix Winbind separator in upn to username conversion.
  • bug #9766: Cache name_to_sid/sid_to_name correctly.


Note about upgrading from older versions:

It is still the case that there are printing tdbs (ntprinting.tdb, ntforms.tdb, ntdrivers.tdb) which are in latin1 or other encodings. When updating from Samba 3.5 or earlier to Samba 3.6 or 4.0 these tdbs need to be migrated to our new registry based printing management. This means during the migration we also need to do charset conversion. This can only been done manually cause we don't know in which encoding the tdb is. You have to specify the correct code page for the conversion, see iconv -l and Wikipedia [1] for the available codepages. The mostly used one is Windows Latin1 which is CP1252.

We've extended the 'net printing dump' and 'net printing migrate' commands to define the encoding of the tdb. So you can correctly view the tdb with:

 net printing dump encoding=CP1252 /path/to/ntprinters.tdb

or migrate it with e.g.:

 net printing migrate encoding=CP1252 /path/to/ntprinters.tdb

If you migrate printers we suggest you do it in the following order.

  1. ntforms.tdb
  2. ntdrivers.tdb
  3. ntprinting.tdb

Don't forget to rename, move or delete these files in /var/lib/samba after the migration.

[1] https://en.wikipedia.org/wiki/Code_page

Samba 3.6.13

Release Notes for Samba 3.6.13
March 18, 2013

This is is the latest stable release of Samba 3.6.

Major enhancements in Samba 3.6.13 include:

  • Fix two resource leaks in winbindd bug #9648.
  • Unlink after open causes smbd to panic bug #9571.

Changes since 3.6.12:

  • Jeremy Allison <jra@samba.org>
  • bug #9519: Samba returns unexpected error on SMB posix open.
  • bug #9585: Samba 3.6.x not correctly signing any but the last response in a compound request/response.
  • bug #9586: smbd[29175]: disk_free: sys_popen() failed" message logged in /var/log/messages many times.
  • bug #9587: Archive flag is always set on directories.
  • bug #9588: ACLs are not inherited to directories for DFS shares.
  • bug #9637: Renaming directories as guest user in security share mode doesn't work.
  • Björn Baumbach <bb@sernet.de>
  • Ira Cooper <ira@samba.org>
  • bug #9646: Make SMB2_GETINFO multi-volume aware.
  • Günther Deschner <gd@samba.org>
  • bug #9474: Downgrade v4 printer driver requests to v3.
  • David Disseldorp <ddiss@samba.org>
  • bug #9378: Add extra attributes for AD printer publishing.
  • bug #9658: Fix initial large PAC sess setup response.
  • Björn Jacke <bj@sernet.de>
  • bug #7825: Fix GNU ld version detection with old gcc releases.
  • Daniel Kobras <d.kobras@science-computing.de>
  • bug #9039: 'map untrusted to domain' treats WORKSTATION as bogus domain.
  • Guenter Kukkukk <kukks@samba.org>
  • Volker Lendecke <vl@samba.org>
  • Stefan Metzmacher <metze@samba.org>
  • bug #9625: wbcAuthenticateEx gives unix times.
  • Andreas Schneider <asn@samba.org>
  • bug #9574: Fix a possible null pointer dereference in spoolss.
  • bug #9684: Fix two resource leaks in winbindd.
  • bug #9686: Fix a possible buffer overrun in pdb_smbpasswd.
  • Pavel Shilovsky <piastry@etersoft.ru>
  • bug #9571: Unlink after open causes smbd to panic.
http://www.samba.org/samba/history/samba-3.6.13.html

Samba 3.6.12

Release Notes for Samba 3.6.12
January 30, 2013

This is a security release in order to address

All current released versions of Samba are vulnerable to clickjacking in the Samba Web Administration Tool (SWAT). When the SWAT pages are integrated into a malicious web page via a frame or iframe and then overlaid by other content, an attacker could trick an administrator to potentially change Samba settings.
In order to be vulnerable, SWAT must have been installed and enabled either as a standalone server launched from inetd or xinetd, or as a CGI plugin to Apache. If SWAT has not been installed or enabled (which is the default install state for Samba) this advisory can be ignored.
All current released versions of Samba are vulnerable to a cross-site request forgery in the Samba Web Administration Tool (SWAT). By guessing a user's password and then tricking a user who is authenticated with SWAT into clicking a manipulated URL on a different web page, it is possible to manipulate SWAT.
In order to be vulnerable, the attacker needs to know the victim's password. Additionally SWAT must have been installed and enabled either as a standalone server launched from inetd or xinetd, or as a CGI plugin to Apache. If SWAT has not been installed or enabled (which is the default install state for Samba) this advisory can be ignored.

Changes since 3.6.11:

  • Kai Blin <kai@samba.org>
  • bug #9576 CVE-2013-0213: Fix clickjacking issue in SWAT.
  • bug #9577 CVE-2013-0214: Fix potential XSRF in SWAT.
http://www.samba.org/samba/history/samba-3.6.12.html

Samba 3.6.11

Release Notes for Samba 3.6.11
January 21, 2013

This is is the latest stable release of Samba 3.6.

Major enhancements in Samba 3.6.11 include:

  • defer_open is triggered multiple times on the same request bug #9196.
  • Fix SEGV wh_n using second vfs module bug #9471.

Changes since 3.6.10:

  • Jeremy Allison <jra@samba.org>
  • bug #9196 defer_open is triggered multiple times on the same request.
  • bug #9550 Mask off signals the correct way from the signal handler.
  • Björn Baumbach <bb@sernet.de>
  • bug #9569 ntlm_auth.1: Fix format and make examples visible.
  • Tsukasa Hamano <hamano@osstech.co.jp>
  • bug #9471 Fix SEGV when using second vfs module.
  • Volker Lendecke <vl@samba.org>
http://www.samba.org/samba/history/samba-3.6.11.html

Samba 3.6.10

Release Notes for Samba 3.6.10
December 10, 2012

This is is the latest stable release of Samba 3.6.

Major enhancements in Samba 3.6.10 include:

  • Respond correctly to FILE_STREAM_INFO requests bug #9460.
  • Fix segfault when "default devmode" is disabled bug #9433.
  • Fix segfaults in "log level = 10" on Solaris bug #9390.
http://www.samba.org/samba/history/samba-3.6.10.html

Samba 3.6.9

Release Notes for Samba 3.6.9
Oct 29, 2012

This is is the latest stable release of Samba 3.6

Major enhancements in Samba 3.6.9 include:

  • When setting a non-default ACL, don't forget to apply masks to SMB_ACL_USER and SMB_ACL_GROUP entries bug #9236.
  • Winbind can't fetch user or group info from AD via LDAP bug #9147.
  • Fix segfault in smbd if user specified ports out for range bug #9218.
http://www.samba.org/samba/history/samba-3.6.9.html

Samba 3.6.8

Release Notes for Samba 3.6.8
Sep 17, 2012

This is is the latest stable release of Samba 3.6

Major enhancements in Samba 3.6.8 include:

  • Fix crash bug in smbd caused by a blocking lock followed by close bug #9084.
  • Fix Winbind panic if we couldn't find the domain bug #9135.
http://www.samba.org/samba/history/samba-3.6.8.html

Samba 3.6.7

Release Notes for Samba 3.6.7
Aug 6, 2012


This is is the latest stable release of Samba 3.6

Major enhancements in Samba 3.6.7 include:

  • Fix resolving our own "Domain Local" groups bug #9052.
  • Fix migrating printers while upgrading from 3.5.x bug #9026.
http://www.samba.org/samba/history/samba-3.6.7.html

Samba 3.6.6

Release Notes for Samba 3.6.6
June 25, 2012

This is the latest stable release of Samba 3.6

Major enhancements in Samba 3.6.6 include:

  • Fix possible memory leaks in the Samba master process bug #8970.
  • Fix uninitialized memory read in talloc_free().
  • Fix joining of XP Pro workstations to 3.6 DCs bug #8373.
http://www.samba.org/samba/history/samba-3.6.6.html

Samba 3.6.5

Release Notes for Samba 3.6.5
April 30, 2012

This is a security release in order to address CVE-2012-2111:

Incorrect permission checks when granting/removing privileges can compromise file server security.
Samba 3.4.x to 3.6.4 are affected by a vulnerability that allows arbitrary users to modify privileges on a file server.

Samba 3.6.4

Release Notes for Samba 3.6.4
April 10, 2012

This is a security release in order to address CVE-2012-1182:

Samba 3.0.x to 3.6.3 are affected by a vulnerability that allows remote code execution as the "root" user.
  • Bug 8815: PIDL based autogenerated code allows overwriting beyond of allocated array (CVE-2012-1182).

Samba 3.6.3

Release Notes for Samba 3.6.3
January 29, 2012

This is a security release in order to address CVE-2012-0817.

The Samba File Serving daemon (smbd) in Samba versions 3.6.0 to 3.6.2 is affected by a memory leak that can cause a server denial of service.
http://www.samba.org/samba/history/samba-3.6.3.html

Samba 3.6.2

Release Notes for Samba 3.6.2
January 25, 2012

This is the latest stable release of Samba 3.6

Major enhancements in Samba 3.6.2 include:

  • Make Winbind receive user/group information bug #8371.
  • Several SMB2 fixes.
  • Release Bug 3.6.2 bug#8595.
http://www.samba.org/samba/history/samba-3.6.1.html

Samba 3.6.1

Release Notes for Samba 3.6.1
October 20, 2011

This is the latest stable release of Samba 3.6

Major enhancements in Samba 3.6.1 include:

  • Fix smbd crashes triggered by Windows XP clients bug #8384.
  • Fix a Winbind race leading to 100% CPU load bug #8409.
  • Several SMB2 fixes.
  • The VFS ACL modules are no longer experimental but production-ready.
http://www.samba.org/samba/history/samba-3.6.1.html

Samba 3.6.0

Release Notes for Samba 3.6.0
August 9, 2011

This is the first release of Samba 3.6.0.

Major enhancements in Samba 3.6.0 include:

Changed security defaults

Samba 3.6 has adopted a number of improved security defaults that will impact on existing users of Samba.

client ntlmv2 auth = yes
client use spnego principal = no
send spnego principal = no

The impact of 'client ntlmv2 auth = yes' is that by default we will not use NTLM authentication as a client. This applies to the Samba client tools such as smbclient and winbind, but does not change the separately released in-kernel CIFS client. To re-enable the poorer NTLM encryption set '--option=clientusentlmv2auth=no' on your smbclient command line, or set 'client ntlmv2 auth = no' in your smb.conf

The impact of 'client use spnego principal = no' is that Samba will use CIFS/hostname to obtain a kerberos ticket, acting more like Windows when using Kerberos against a CIFS server in smbclient, winbind and other Samba client tools. This will change which servers we will successfully negotiate kerberos connections to. This is due to Samba no longer trusting a server-provided hint which is not available from Windows 2008 or later. For correct operation with all clients, all aliases for a server should be recorded as a as a servicePrincipalName on the server's record in AD. (For this reason, this behavior change and parameter was also made in Samba 3.5.9)

The impact of 'send spnego principal = no' is to match Windows 2008 and not to send this principal, making existing clients give more consistent behaviour (more likely to fall back to NTLMSSP) between Samba and Windows 2008, and between Windows versions that did and no longer use this insecure hint.


SMB2 support

SMB2 support in 3.6.0 is fully functional (with one omission), and can be enabled by setting:

max protocol = SMB2

in the [global] section of your smb.conf and re-starting Samba. All features should work over SMB2 except the modification of user quotas using the Windows quota management tools.

As this is the first release containing what we consider to be a fully featured SMB2 protocol, we are not enabling this by default, but encourage users to enable SMB2 and test it. Once we have enough confirmation from Samba users and OEMs that SMB2 support is stable in wide user testing we will enable SMB2 by default in a future Samba release.


Internal Winbind passdb changes

Winbind has been changed to use the internal samr and lsa rpc pipe to get local user and group information instead of calling passdb functions. The reason is to use more of our infrastructure and test this infrastructure by using it. With this approach more code in Winbind is shared.

New Spoolss code

The spoolss and the old RAP printing code have been completely overhauled and refactored.

All calls from lanman/printing code has been changed to go through the spoolss RPC interfaces, this allows us to keep all checks in one place and avoid special cases in the main printing code. Printing code has been therefore confined within the spoolss code.

All the printing code, including the spoolss RPC interfaces has been changed to use the winreg RPC interfaces to store all data. All data has been migrated from custom, arbitrary TDB files to the registry interface. This transition allow us to present correct data to windows client accessing the server registry through the winreg RPC interfaces to query for printer data. Data is served out from a real registry implementation and therefore arguably 100% forward compatible.

Migration code from the previous TDB files formats is provided. This code is automatically invoked the first time the new code is run on the server. Although manual migration is also available using the 'net printer migrate' command.

These changes not only make all the spoolss code much more closer to "the spec", it also greatly improves our internal testing of both spoolss and winreg interfaces, and reduces overall code duplication.

As part of this work, new tests have been also added to increase coverage.

This code will also allow, in future, an easy transition to split out the spooling functions into a separate daemon for those OEMs that do not need printing functionality in their appliances, reducing the code footprint.


ID Mapping Changes

The id mapping configuration has been a source of much grief in the past. For this release, id mapping has been rewritten yet again with the goal of making the configuration more simple and more coherent while keeping the needed flexibility and even adding to the flexibility in some respects.

The major change that implies the configuration simplifications is at the heart of the id mapping system: The separation of the "idmap alloc system" that is responsible for the unix id counters in the tdb, tdb2 and ldap idmap backends from the id mapping code itself has been removed. The sids_to_unixids operation is now atomic and encapsulates (if needed) the action of allocating a unix id for a mapping that is to be created. Consequently all idmap alloc configuration parameters have vanished and it is hence now also not possible any more to specify an idmap alloc backend different from the idmap backend. Each idmap backend uses its own idmap unixid creation mechanism transparently.

As a consequence of the id mapping changes, the methods that are used for storing and deleting id mappings have been removed from the winbindd API. The "net idmap dump/restore" commands have been rewritten to not speak through winbindd any more but directly act on the databases. This is currently available for the tdb and tdb2 backends, the implementation for ldap still missing.

The allocate_id functionality is preserved for the unix id creator of the default idmap configuration is also used as the source of unix ids for the group mapping database and for the posix attributes in a ldapsam:editposix setup.

As part of the changes, the default idmap configuration has been changed to be more coherent with the per-domain configuration. The parameters "idmap uid", "idmap gid" and "idmap range" are now deprecated in favour of the systematic "idmap config * : range" and "idmap config * : backend" parameters. The reason for this change is that the old options only provided an incomplete and hence deceiving backwards compatibility, which was a source of many problems with upgrades. By introducing this change in configuration, it should be brought to the conciousness of the users that even the simple id mapping is not working exactly as in Samba 3.0 versions any more.

Endpoint Mapper

As Microsoft is more and more relying on endpoint mapper and we didn't have a complete implementation we decided to create an instance for Samba. The endpoint mapper is like a DNS server but for ports. If you want to talk to a certain RPC service over TCP/IP, you just ask the endpoint mapper on which port it is running. Then you can connect to the service and make sure that it is running.

The code is deactivated by default, because it needs more testing and it doesn't scale yet. If you want to enable and test the endpoint mapper you can set "rpc_server:epmapper = daemon" in the smb.conf file.

Internal restructuring

Ongoing internal restructuring for better separation of internal subsystem to achieve a faster build, smaller binaries and cleaner dependencies for the samba3 waf build.

SMB Traffic Analyzer

Added the new SMB Traffic Analyzer (SMBTA) VFS module protocol 2 featuring encryption, multiple arguments, and easier parseability. A new tool 'smbta-util' has been created to control the encryption behaviour of SMBTA. For compatibility, SMBTA by default operates on version 1. There are programs consuming the data that the module sends.

More information can be found on http://holger123.wordpress.com/smb-traffic-analyzer/

NFS quota backend on Linux

A new nfs quota backend for Linux has been added that is based on the existing Solaris/FreeBSD implementation. This allows samba to communicate correct diskfree information for nfs imports that are re-exported as samba shares.

Changes

smb.conf changes

  Parameter Name                      Description     Default
  --------------                      -----------     -------
  async smb echo handler	       New	       No
  client ntlmv2 auth           Changed Default Yes
  client use spnego principal	       New	       No
  ctdb locktime warn threshold	       New	       0
  idmap alloc backend		       Removed
  log writeable files on exit	       New	       No
  multicast dns register	       New	       Yes
  ncalrpc dir			       New
  send spnego principal	       New	       No
  smb2 max credits		       New	       128
  smb2 max read		       New	       1048576
  smb2 max trans		       New	       1048576
  smb2 max write		       New	       1048576
  username map cache time	       New	       0
  winbind max clients		       New	       200
The variable substitutions for %i and %I no longer use IPv4 addresses mapped to IPv6, e.g. '::ffff:192.168.0.1', if the host has IPv6 enabled. Now %i and %I contain just '192.168.0.1'.

Commit Highlights

  • Michael Adam <obnox@samba.org>
    • ID Mapping changes.


  • Jeremy Allison <jra@samba.org>
    • Implement SMB2 support.


  • Stefan Metzmacher <metze@samba.org>
    • Implement SMB2 support.


  • Andreas Schneider <asn@samba.org>
    • Add an Endpoint Mapper daemon.