summaryrefslogtreecommitdiff
path: root/docs/htmldocs/Samba3-ByExample/DomApps.html
diff options
context:
space:
mode:
Diffstat (limited to 'docs/htmldocs/Samba3-ByExample/DomApps.html')
-rw-r--r--docs/htmldocs/Samba3-ByExample/DomApps.html358
1 files changed, 179 insertions, 179 deletions
diff --git a/docs/htmldocs/Samba3-ByExample/DomApps.html b/docs/htmldocs/Samba3-ByExample/DomApps.html
index 70b5c08eef..ae1f4f6074 100644
--- a/docs/htmldocs/Samba3-ByExample/DomApps.html
+++ b/docs/htmldocs/Samba3-ByExample/DomApps.html
@@ -1,9 +1,9 @@
-<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 12. Integrating Additional Services</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.73.1"><link rel="start" href="index.html" title="Samba-3 by Example"><link rel="up" href="RefSection.html" title="Part III. Reference Section"><link rel="prev" href="kerberos.html" title="Chapter 11. Active Directory, Kerberos, and Security"><link rel="next" href="HA.html" title="Chapter 13. Performance, Reliability, and Availability"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapter 12. Integrating Additional Services</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="kerberos.html">Prev</a> </td><th width="60%" align="center">Part III. Reference Section</th><td width="20%" align="right"> <a accesskey="n" href="HA.html">Next</a></td></tr></table><hr></div><div class="chapter" lang="en"><div class="titlepage"><div><div><h2 class="title"><a name="DomApps"></a>Chapter 12. Integrating Additional Services</h2></div></div></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="sect1"><a href="DomApps.html#id2609265">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2609296">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2609396">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2609429">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2609585">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2609603">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2611455">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2611515">Questions and Answers</a></span></dt></dl></div><p>
- <a class="indexterm" name="id2609216"></a>
- <a class="indexterm" name="id2609222"></a>
- <a class="indexterm" name="id2609229"></a>
- <a class="indexterm" name="id2609236"></a>
- <a class="indexterm" name="id2609242"></a>
+<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 12. Integrating Additional Services</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.74.0"><link rel="home" href="index.html" title="Samba-3 by Example"><link rel="up" href="RefSection.html" title="Part III. Reference Section"><link rel="prev" href="kerberos.html" title="Chapter 11. Active Directory, Kerberos, and Security"><link rel="next" href="HA.html" title="Chapter 13. Performance, Reliability, and Availability"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapter 12. Integrating Additional Services</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="kerberos.html">Prev</a> </td><th width="60%" align="center">Part III. Reference Section</th><td width="20%" align="right"> <a accesskey="n" href="HA.html">Next</a></td></tr></table><hr></div><div class="chapter" lang="en"><div class="titlepage"><div><div><h2 class="title"><a name="DomApps"></a>Chapter 12. Integrating Additional Services</h2></div></div></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="sect1"><a href="DomApps.html#id2616162">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616193">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616294">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616327">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2616483">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616500">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2618352">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2618413">Questions and Answers</a></span></dt></dl></div><p>
+ <a class="indexterm" name="id2616113"></a>
+ <a class="indexterm" name="id2616119"></a>
+ <a class="indexterm" name="id2616126"></a>
+ <a class="indexterm" name="id2616133"></a>
+ <a class="indexterm" name="id2616140"></a>
You've come a long way now. You have pretty much mastered Samba-3 for
most uses it can be put to. Up until now, you have cast Samba-3 in the leading
role, and where authentication was required, you have used one or another of
@@ -14,7 +14,7 @@
implementing Samba and Samba-supported services in a domain controlled by
the latest Windows authentication technologies. Let's get started this is
leading edge.
- </p><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2609265"></a>Introduction</h2></div></div></div><p>
+ </p><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2616162"></a>Introduction</h2></div></div></div><p>
Abmas has continued its miraculous growth; indeed, nothing seems to be able
to stop its diversification into multiple (and seemingly unrelated) fields.
Its latest acquisition is Abmas Snack Foods, a big player in the snack-food
@@ -30,17 +30,17 @@
You have decided to set the ball rolling by introducing Samba-3 into the network
gradually, taking over key services and easing the way to a full migration and,
therefore, integration into Abmas's existing business later.
- </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2609296"></a>Assignment Tasks</h3></div></div></div><p>
- <a class="indexterm" name="id2609304"></a>
- <a class="indexterm" name="id2609312"></a>
+ </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2616193"></a>Assignment Tasks</h3></div></div></div><p>
+ <a class="indexterm" name="id2616201"></a>
+ <a class="indexterm" name="id2616210"></a>
You've promised the skeptical Abmas Snack Foods management team
that you can show them how Samba can ease itself and other Open Source
technologies into their existing infrastructure and deliver sound business
advantages. Cost cutting is high on their agenda (a major promise of the
acquisition). You have chosen Web proxying and caching as your proving ground.
</p><p>
- <a class="indexterm" name="id2609331"></a>
- <a class="indexterm" name="id2609338"></a>
+ <a class="indexterm" name="id2616228"></a>
+ <a class="indexterm" name="id2616235"></a>
Abmas Snack Foods has several thousand users housed at its head office
and multiple regional offices, plants, and warehouses. A high proportion of
the business's work is done online, so Internet access for most of these
@@ -50,9 +50,9 @@
the team soon discovered proxying and caching. In fact, they became one of
the earliest commercial users of Microsoft ISA.
</p><p>
- <a class="indexterm" name="id2609358"></a>
- <a class="indexterm" name="id2609365"></a>
- <a class="indexterm" name="id2609372"></a>
+ <a class="indexterm" name="id2616256"></a>
+ <a class="indexterm" name="id2616263"></a>
+ <a class="indexterm" name="id2616270"></a>
The team is not happy with ISA. Because it never lived up to its marketing promises,
it underperformed and had reliability problems. You have pounced on the opportunity
to show what Open Source can do. The one thing they do like, however, is ISA's
@@ -63,7 +63,7 @@
</p><p>
This is a hands-on exercise. You build software applications so
that you obtain the functionality Abmas needs.
- </p></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2609396"></a>Dissection and Discussion</h2></div></div></div><p>
+ </p></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2616294"></a>Dissection and Discussion</h2></div></div></div><p>
The key requirements in this business example are straightforward. You are not required
to do anything new, just to replicate an existing system, not lose any existing features,
and improve performance. The key points are:
@@ -73,20 +73,20 @@
Distributed system to accommodate load and geographical distribution of users
</p></li><li><p>
Seamless and transparent interoperability with the existing Active Directory domain
- </p></li></ul></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2609429"></a>Technical Issues</h3></div></div></div><p>
- <a class="indexterm" name="id2609437"></a>
- <a class="indexterm" name="id2609444"></a>
- <a class="indexterm" name="id2609451"></a>
- <a class="indexterm" name="id2609458"></a>
- <a class="indexterm" name="id2609464"></a>
- <a class="indexterm" name="id2609471"></a>
- <a class="indexterm" name="id2609478"></a>
- <a class="indexterm" name="id2609485"></a>
- <a class="indexterm" name="id2609492"></a>
- <a class="indexterm" name="id2609499"></a>
- <a class="indexterm" name="id2609506"></a>
- <a class="indexterm" name="id2609513"></a>
- <a class="indexterm" name="id2609522"></a><a class="indexterm" name="id2609528"></a>
+ </p></li></ul></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2616327"></a>Technical Issues</h3></div></div></div><p>
+ <a class="indexterm" name="id2616334"></a>
+ <a class="indexterm" name="id2616341"></a>
+ <a class="indexterm" name="id2616348"></a>
+ <a class="indexterm" name="id2616355"></a>
+ <a class="indexterm" name="id2616362"></a>
+ <a class="indexterm" name="id2616369"></a>
+ <a class="indexterm" name="id2616376"></a>
+ <a class="indexterm" name="id2616382"></a>
+ <a class="indexterm" name="id2616389"></a>
+ <a class="indexterm" name="id2616396"></a>
+ <a class="indexterm" name="id2616403"></a>
+ <a class="indexterm" name="id2616410"></a>
+ <a class="indexterm" name="id2616419"></a><a class="indexterm" name="id2616425"></a>
Functionally, the user's Internet Explorer requests a browsing session with the
Squid proxy, for which it offers its AD authentication token. Squid hands off
the authentication request to the Samba-3 authentication helper application
@@ -107,25 +107,25 @@
Configuring, compiling, and then installing the supporting Samba-3 components
</p></li><li><p>
Tying it all together
- </p></li></ul></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2609585"></a>Political Issues</h3></div></div></div><p>
+ </p></li></ul></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2616483"></a>Political Issues</h3></div></div></div><p>
You are a stranger in a strange land, and all eyes are upon you. Some would even like to see
you fail. For you to gain the trust of your newly acquired IT people, it is essential that your
solution does everything the old one did, but does it better in every way. Only then
will the entrenched positions consider taking up your new way of doing things on a
wider scale.
- </p></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2609603"></a>Implementation</h2></div></div></div><p>
- <a class="indexterm" name="id2609611"></a>
+ </p></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2616500"></a>Implementation</h2></div></div></div><p>
+ <a class="indexterm" name="id2616508"></a>
First, your system needs to be prepared and in a known good state to proceed. This consists
of making sure that everything the system depends on is present and that everything that could
interfere or conflict with the system is removed. You will be configuring the Squid and Samba-3
packages and updating them if necessary. If conflicting packages of these programs are installed,
they must be removed.
</p><p>
- <a class="indexterm" name="id2609628"></a>
+ <a class="indexterm" name="id2616525"></a>
The following packages should be available on your Red Hat Linux system:
</p><div class="itemizedlist"><ul type="disc"><li><p>
- <a class="indexterm" name="id2609643"></a>
- <a class="indexterm" name="id2609649"></a>
+ <a class="indexterm" name="id2616540"></a>
+ <a class="indexterm" name="id2616547"></a>
krb5-libs
</p></li><li><p>
krb5-devel
@@ -136,14 +136,14 @@
</p></li><li><p>
pam_krb5
</p></li></ul></div><p>
- <a class="indexterm" name="id2609680"></a>
+ <a class="indexterm" name="id2616577"></a>
In the case of SUSE Linux, these packages are called:
</p><div class="itemizedlist"><ul type="disc"><li><p>
heimdal-lib
</p></li><li><p>
heimdal-devel
</p></li><li><p>
- <a class="indexterm" name="id2609704"></a>
+ <a class="indexterm" name="id2616602"></a>
heimdal
</p></li><li><p>
pam_krb5
@@ -152,26 +152,26 @@
them from the vendor's installation media. Follow the administrative guide
for your Linux system to ensure that the packages are correctly updated.
</p><div class="note" style="margin-left: 0.5in; margin-right: 0.5in;"><h3 class="title">Note</h3><p>
- <a class="indexterm" name="id2609729"></a>
- <a class="indexterm" name="id2609736"></a>
- <a class="indexterm" name="id2609743"></a>
+ <a class="indexterm" name="id2616627"></a>
+ <a class="indexterm" name="id2616634"></a>
+ <a class="indexterm" name="id2616641"></a>
If the requirement is for interoperation with MS Windows Server 2003, it
will be necessary to ensure that you are using MIT Kerberos version 1.3.1
or later. Red Hat Linux 9 ships with MIT Kerberos 1.2.7 and thus requires
updating.
</p><p>
- <a class="indexterm" name="id2609757"></a>
- <a class="indexterm" name="id2609764"></a>
+ <a class="indexterm" name="id2616654"></a>
+ <a class="indexterm" name="id2616661"></a>
Heimdal 0.6 or later is required in the case of SUSE Linux. SUSE Enterprise
Linux Server 8 ships with Heimdal 0.4. SUSE 9 ships with the necessary version.
</p></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="ch10-one"></a>Removal of Pre-Existing Conflicting RPMs</h3></div></div></div><p>
- <a class="indexterm" name="id2609787"></a>
+ <a class="indexterm" name="id2616684"></a>
If Samba and/or Squid RPMs are installed, they should be updated. You can
build both from source.
</p><p>
- <a class="indexterm" name="id2609798"></a>
- <a class="indexterm" name="id2609805"></a>
- <a class="indexterm" name="id2609812"></a>
+ <a class="indexterm" name="id2616696"></a>
+ <a class="indexterm" name="id2616702"></a>
+ <a class="indexterm" name="id2616709"></a>
Locating the packages to be un-installed can be achieved by running:
</p><pre class="screen">
<code class="prompt">root# </code> rpm -qa | grep -i samba
@@ -181,11 +181,11 @@
</p><pre class="screen">
<code class="prompt">root# </code> rpm -e samba-common
</pre><p>
- </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2609852"></a>Kerberos Configuration</h3></div></div></div><p>
- <a class="indexterm" name="id2609860"></a>
- <a class="indexterm" name="id2609866"></a>
- <a class="indexterm" name="id2609876"></a>
- <a class="indexterm" name="id2609882"></a>
+ </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2616749"></a>Kerberos Configuration</h3></div></div></div><p>
+ <a class="indexterm" name="id2616757"></a>
+ <a class="indexterm" name="id2616764"></a>
+ <a class="indexterm" name="id2616774"></a>
+ <a class="indexterm" name="id2616780"></a>
The systems Kerberos installation must be configured to communicate with
your primary Active Directory server (ADS KDC).
</p><p>
@@ -193,13 +193,13 @@
although the current default Red Hat MIT version 1.2.7 gives acceptable results
unless you are using Windows 2003 servers.
</p><p>
- <a class="indexterm" name="id2609902"></a>
- <a class="indexterm" name="id2609908"></a>
- <a class="indexterm" name="id2609915"></a>
- <a class="indexterm" name="id2609922"></a>
- <a class="indexterm" name="id2609929"></a>
- <a class="indexterm" name="id2609938"></a>
- <a class="indexterm" name="id2609944"></a>
+ <a class="indexterm" name="id2616799"></a>
+ <a class="indexterm" name="id2616806"></a>
+ <a class="indexterm" name="id2616813"></a>
+ <a class="indexterm" name="id2616819"></a>
+ <a class="indexterm" name="id2616826"></a>
+ <a class="indexterm" name="id2616835"></a>
+ <a class="indexterm" name="id2616842"></a>
Officially, neither MIT (1.3.4) nor Heimdal (0.63) Kerberos needs an <code class="filename">/etc/krb5.conf</code>
file in order to work correctly. All ADS domains automatically create SRV records in the
DNS zone <code class="constant">Kerberos.REALM.NAME</code> for each KDC in the realm. Since both
@@ -207,25 +207,25 @@
automatically find the KDCs. In addition, <code class="filename">krb5.conf</code> allows
specifying only a single KDC, even if there is more than one. Using the DNS lookup
allows the KRB5 libraries to use whichever KDCs are available.
- </p><div class="procedure"><a name="id2609978"></a><p class="title"><b>Procedure 12.1. Kerberos Configuration Steps</b></p><ol type="1"><li><p>
- <a class="indexterm" name="id2609990"></a>
+ </p><div class="procedure"><a name="id2616876"></a><p class="title"><b>Procedure 12.1. Kerberos Configuration Steps</b></p><ol type="1"><li><p>
+ <a class="indexterm" name="id2616887"></a>
If you find the need to manually configure the <code class="filename">krb5.conf</code>, you should edit it
to have the contents shown in <a class="link" href="DomApps.html#ch10-krb5conf" title="Example 12.1. Kerberos Configuration File: /etc/krb5.conf">&#8220;Kerberos Configuration File: /etc/krb5.conf&#8221;</a>. The final fully qualified path for this file
should be <code class="filename">/etc/krb5.conf</code>.
</p></li><li><p>
- <a class="indexterm" name="id2610025"></a>
- <a class="indexterm" name="id2610031"></a>
- <a class="indexterm" name="id2610038"></a>
- <a class="indexterm" name="id2610045"></a>
- <a class="indexterm" name="id2610052"></a>
- <a class="indexterm" name="id2610059"></a>
- <a class="indexterm" name="id2610066"></a>
- <a class="indexterm" name="id2610072"></a>
- <a class="indexterm" name="id2610079"></a>
- <a class="indexterm" name="id2610088"></a>
- <a class="indexterm" name="id2610095"></a>
- <a class="indexterm" name="id2610102"></a>
- <a class="indexterm" name="id2610108"></a>
+ <a class="indexterm" name="id2616922"></a>
+ <a class="indexterm" name="id2616929"></a>
+ <a class="indexterm" name="id2616936"></a>
+ <a class="indexterm" name="id2616943"></a>
+ <a class="indexterm" name="id2616949"></a>
+ <a class="indexterm" name="id2616956"></a>
+ <a class="indexterm" name="id2616963"></a>
+ <a class="indexterm" name="id2616970"></a>
+ <a class="indexterm" name="id2616977"></a>
+ <a class="indexterm" name="id2616986"></a>
+ <a class="indexterm" name="id2616993"></a>
+ <a class="indexterm" name="id2617000"></a>
+ <a class="indexterm" name="id2617006"></a>
The following gotchas often catch people out. Kerberos is case sensitive. Your realm must
be in UPPERCASE, or you will get an error: &#8220;<span class="quote">Cannot find KDC for requested realm while getting
initial credentials</span>&#8221;. Kerberos is picky about time synchronization. The time
@@ -241,7 +241,7 @@
NetBIOS name. If Kerberos cannot do this reverse lookup, you will get a local error
when you try to join the realm.
</p></li><li><p>
- <a class="indexterm" name="id2610152"></a>
+ <a class="indexterm" name="id2617051"></a>
You are now ready to test your installation by issuing the command:
</p><pre class="screen">
<code class="prompt">root# </code> kinit [USERNAME@REALM]
@@ -261,29 +261,29 @@ Password for ADMINISTRATOR@LONDON.ABMAS.BIZ:
LONDON.ABMAS.BIZ = {
kdc = w2k3s.london.abmas.biz
}
-</pre></div></div><br class="example-break"><p><a class="indexterm" name="id2610217"></a>
+</pre></div></div><br class="example-break"><p><a class="indexterm" name="id2617116"></a>
The command
</p><pre class="screen">
<code class="prompt">root# </code> klist -e
</pre><p>
shows the Kerberos tickets cached by the system.
- </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2610240"></a>Samba Configuration</h4></div></div></div><p>
- <a class="indexterm" name="id2610248"></a>
+ </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2617139"></a>Samba Configuration</h4></div></div></div><p>
+ <a class="indexterm" name="id2617146"></a>
Samba must be configured to correctly use Active Directory. Samba-3 must be used, since it
has the necessary components to interface with Active Directory.
- </p><div class="procedure"><a name="id2610259"></a><p class="title"><b>Procedure 12.2. Securing Samba-3 With ADS Support Steps</b></p><ol type="1"><li><p>
- <a class="indexterm" name="id2610271"></a>
- <a class="indexterm" name="id2610278"></a>
- <a class="indexterm" name="id2610284"></a>
- <a class="indexterm" name="id2610292"></a>
- <a class="indexterm" name="id2610298"></a>
+ </p><div class="procedure"><a name="id2617157"></a><p class="title"><b>Procedure 12.2. Securing Samba-3 With ADS Support Steps</b></p><ol type="1"><li><p>
+ <a class="indexterm" name="id2617169"></a>
+ <a class="indexterm" name="id2617176"></a>
+ <a class="indexterm" name="id2617183"></a>
+ <a class="indexterm" name="id2617190"></a>
+ <a class="indexterm" name="id2617196"></a>
Download the latest stable Samba-3 for Red Hat Linux from the official Samba Team
<a class="ulink" href="http://ftp.samba.org" target="_top">FTP site.</a> The official Samba Team
RPMs for Red Hat Fedora Linux contain the <code class="literal">ntlm_auth</code> tool
needed, and are linked against MIT KRB5 version 1.3.1 and therefore are ready for use.
</p><p>
- <a class="indexterm" name="id2610325"></a>
- <a class="indexterm" name="id2610332"></a>
+ <a class="indexterm" name="id2617223"></a>
+ <a class="indexterm" name="id2617230"></a>
The necessary, validated RPM packages for SUSE Linux may be obtained from
the <a class="ulink" href="ftp://ftp.sernet.de/pub/samba" target="_top">SerNet</a> FTP site that
is located in Germany. All SerNet RPMs are validated, have the necessary
@@ -293,11 +293,11 @@ Password for ADMINISTRATOR@LONDON.ABMAS.BIZ:
Using your favorite editor, change the <code class="filename">/etc/samba/smb.conf</code>
file so it has contents similar to the example shown in <a class="link" href="DomApps.html#ch10-smbconf" title="Example 12.2. Samba Configuration File: /etc/samba/smb.conf">&#8220;Samba Configuration File: /etc/samba/smb.conf&#8221;</a>.
</p></li><li><p>
- <a class="indexterm" name="id2610383"></a>
- <a class="indexterm" name="id2610390"></a>
- <a class="indexterm" name="id2610396"></a>i
- <a class="indexterm" name="id2610408"></a>
- <a class="indexterm" name="id2610415"></a>
+ <a class="indexterm" name="id2617281"></a>
+ <a class="indexterm" name="id2617288"></a>
+ <a class="indexterm" name="id2617295"></a>i
+ <a class="indexterm" name="id2617306"></a>
+ <a class="indexterm" name="id2617313"></a>
Next you need to create a computer account in the Active Directory.
This sets up the trust relationship needed for other clients to
authenticate to the Samba server with an Active Directory Kerberos ticket.
@@ -307,24 +307,24 @@ Password for ADMINISTRATOR@LONDON.ABMAS.BIZ:
<code class="prompt">root# </code> net ads join -U administrator%vulcon
</pre><p>
</p></li><li><p>
- <a class="indexterm" name="id2610449"></a>
- <a class="indexterm" name="id2610456"></a>
- <a class="indexterm" name="id2610462"></a>
- <a class="indexterm" name="id2610469"></a>
- <a class="indexterm" name="id2610476"></a>
+ <a class="indexterm" name="id2617347"></a>
+ <a class="indexterm" name="id2617354"></a>
+ <a class="indexterm" name="id2617361"></a>
+ <a class="indexterm" name="id2617367"></a>
+ <a class="indexterm" name="id2617374"></a>
Your new Samba binaries must be started in the standard manner as is applicable
to the platform you are running on. Alternatively, start your Active Directory-enabled Samba with the following commands:
</p><pre class="screen">
<code class="prompt">root# </code> smbd -D
<code class="prompt">root# </code> nmbd -D
-<code class="prompt">root# </code> winbindd -B
+<code class="prompt">root# </code> winbindd -D
</pre><p>
</p></li><li><p>
- <a class="indexterm" name="id2610517"></a>
- <a class="indexterm" name="id2610524"></a>
- <a class="indexterm" name="id2610533"></a>
- <a class="indexterm" name="id2610540"></a>
- <a class="indexterm" name="id2610547"></a>
+ <a class="indexterm" name="id2617415"></a>
+ <a class="indexterm" name="id2617422"></a>
+ <a class="indexterm" name="id2617431"></a>
+ <a class="indexterm" name="id2617438"></a>
+ <a class="indexterm" name="id2617445"></a>
We now need to test that Samba is communicating with the Active
Directory domain; most specifically, we want to see whether winbind
is enumerating users and groups. Issue the following commands:
@@ -357,8 +357,8 @@ LONDON+DnsUpdateProxy
</pre><p>
This enumerates all the groups in your Active Directory tree.
</p></li><li><p>
- <a class="indexterm" name="id2610611"></a>
- <a class="indexterm" name="id2610618"></a>
+ <a class="indexterm" name="id2617509"></a>
+ <a class="indexterm" name="id2617516"></a>
Squid uses the <code class="literal">ntlm_auth</code> helper build with Samba-3.
You may test <code class="literal">ntlm_auth</code> with the command:
</p><pre class="screen">
@@ -370,14 +370,14 @@ password: XXXXXXXX
<code class="prompt">root# </code> NT_STATUS_OK: Success (0x0)
</pre><p>
</p></li><li><p>
- <a class="indexterm" name="id2610670"></a>
- <a class="indexterm" name="id2610677"></a>
- <a class="indexterm" name="id2610684"></a>
- <a class="indexterm" name="id2610690"></a>
- <a class="indexterm" name="id2610697"></a>
- <a class="indexterm" name="id2610704"></a>
- <a class="indexterm" name="id2610711"></a>
- <a class="indexterm" name="id2610718"></a>
+ <a class="indexterm" name="id2617568"></a>
+ <a class="indexterm" name="id2617575"></a>
+ <a class="indexterm" name="id2617582"></a>
+ <a class="indexterm" name="id2617588"></a>
+ <a class="indexterm" name="id2617595"></a>
+ <a class="indexterm" name="id2617602"></a>
+ <a class="indexterm" name="id2617609"></a>
+ <a class="indexterm" name="id2617616"></a>
The <code class="literal">ntlm_auth</code> helper, when run from a command line as the user
&#8220;<span class="quote">root</span>&#8221;, authenticates against your Active Directory domain (with
the aid of winbind). It manages this by reading from the winbind privileged pipe.
@@ -395,37 +395,37 @@ password: XXXXXXXX
<code class="prompt">root# </code> chgrp squid /var/lib/samba/winbindd_privileged
<code class="prompt">root# </code> chmod 750 /var/lib/samba/winbindd_privileged
</pre><p>
- </p></li></ol></div></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2610793"></a>NSS Configuration</h4></div></div></div><p>
- <a class="indexterm" name="id2610801"></a>
- <a class="indexterm" name="id2610807"></a>
- <a class="indexterm" name="id2610814"></a>
+ </p></li></ol></div></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2617691"></a>NSS Configuration</h4></div></div></div><p>
+ <a class="indexterm" name="id2617699"></a>
+ <a class="indexterm" name="id2617705"></a>
+ <a class="indexterm" name="id2617712"></a>
For Squid to benefit from Samba-3, NSS must be updated to allow winbind as a valid route to user authentication.
</p><p>
Edit your <code class="filename">/etc/nsswitch.conf</code> file so it has the parameters shown
in <a class="link" href="DomApps.html#ch10-etcnsscfg" title="Example 12.3. NSS Configuration File Extract File: /etc/nsswitch.conf">&#8220;NSS Configuration File Extract File: /etc/nsswitch.conf&#8221;</a>.
- </p><div class="example"><a name="ch10-smbconf"></a><p class="title"><b>Example 12.2. Samba Configuration File: <code class="filename">/etc/samba/smb.conf</code></b></p><div class="example-contents"><table class="simplelist" border="0" summary="Simple list"><tr><td> </td></tr><tr><td><em class="parameter"><code>[global]</code></em></td></tr><tr><td><a class="indexterm" name="id2610873"></a><em class="parameter"><code>workgroup = LONDON</code></em></td></tr><tr><td><a class="indexterm" name="id2610884"></a><em class="parameter"><code>netbios name = W2K3S</code></em></td></tr><tr><td><a class="indexterm" name="id2610896"></a><em class="parameter"><code>realm = LONDON.ABMAS.BIZ</code></em></td></tr><tr><td><a class="indexterm" name="id2610908"></a><em class="parameter"><code>security = ads</code></em></td></tr><tr><td><a class="indexterm" name="id2610919"></a><em class="parameter"><code>encrypt passwords = yes</code></em></td></tr><tr><td><a class="indexterm" name="id2610931"></a><em class="parameter"><code>password server = w2k3s.london.abmas.biz</code></em></td></tr><tr><td># separate domain and username with '/', like DOMAIN/username</td></tr><tr><td><a class="indexterm" name="id2610948"></a><em class="parameter"><code>winbind separator = /</code></em></td></tr><tr><td># use UIDs from 10000 to 20000 for domain users</td></tr><tr><td><a class="indexterm" name="id2610964"></a><em class="parameter"><code>idmap uid = 10000-20000</code></em></td></tr><tr><td># use GIDs from 10000 to 20000 for domain groups</td></tr><tr><td><a class="indexterm" name="id2610980"></a><em class="parameter"><code>idmap gid = 10000-20000</code></em></td></tr><tr><td># allow enumeration of winbind users and groups</td></tr><tr><td><a class="indexterm" name="id2610996"></a><em class="parameter"><code>winbind enum users = yes</code></em></td></tr><tr><td><a class="indexterm" name="id2611007"></a><em class="parameter"><code>winbind enum groups = yes</code></em></td></tr><tr><td><a class="indexterm" name="id2611019"></a><em class="parameter"><code>winbind user default domain = yes</code></em></td></tr></table></div></div><br class="example-break"><div class="example"><a name="ch10-etcnsscfg"></a><p class="title"><b>Example 12.3. NSS Configuration File Extract File: <code class="filename">/etc/nsswitch.conf</code></b></p><div class="example-contents"><pre class="screen">
+ </p><div class="example"><a name="ch10-smbconf"></a><p class="title"><b>Example 12.2. Samba Configuration File: <code class="filename">/etc/samba/smb.conf</code></b></p><div class="example-contents"><table class="simplelist" border="0" summary="Simple list"><tr><td> </td></tr><tr><td><em class="parameter"><code>[global]</code></em></td></tr><tr><td><a class="indexterm" name="id2617770"></a><em class="parameter"><code>workgroup = LONDON</code></em></td></tr><tr><td><a class="indexterm" name="id2617782"></a><em class="parameter"><code>netbios name = W2K3S</code></em></td></tr><tr><td><a class="indexterm" name="id2617794"></a><em class="parameter"><code>realm = LONDON.ABMAS.BIZ</code></em></td></tr><tr><td><a class="indexterm" name="id2617806"></a><em class="parameter"><code>security = ads</code></em></td></tr><tr><td><a class="indexterm" name="id2617817"></a><em class="parameter"><code>encrypt passwords = yes</code></em></td></tr><tr><td><a class="indexterm" name="id2617829"></a><em class="parameter"><code>password server = w2k3s.london.abmas.biz</code></em></td></tr><tr><td># separate domain and username with '/', like DOMAIN/username</td></tr><tr><td><a class="indexterm" name="id2617846"></a><em class="parameter"><code>winbind separator = /</code></em></td></tr><tr><td># use UIDs from 10000 to 20000 for domain users</td></tr><tr><td><a class="indexterm" name="id2617862"></a><em class="parameter"><code>idmap uid = 10000-20000</code></em></td></tr><tr><td># use GIDs from 10000 to 20000 for domain groups</td></tr><tr><td><a class="indexterm" name="id2617877"></a><em class="parameter"><code>idmap gid = 10000-20000</code></em></td></tr><tr><td># allow enumeration of winbind users and groups</td></tr><tr><td><a class="indexterm" name="id2617893"></a><em class="parameter"><code>winbind enum users = yes</code></em></td></tr><tr><td><a class="indexterm" name="id2617905"></a><em class="parameter"><code>winbind enum groups = yes</code></em></td></tr><tr><td><a class="indexterm" name="id2617917"></a><em class="parameter"><code>winbind user default domain = yes</code></em></td></tr></table></div></div><br class="example-break"><div class="example"><a name="ch10-etcnsscfg"></a><p class="title"><b>Example 12.3. NSS Configuration File Extract File: <code class="filename">/etc/nsswitch.conf</code></b></p><div class="example-contents"><pre class="screen">
passwd: files winbind
shadow: files
group: files winbind
-</pre></div></div><br class="example-break"></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2611058"></a>Squid Configuration</h4></div></div></div><p>
- <a class="indexterm" name="id2611066"></a>
- <a class="indexterm" name="id2611073"></a>
+</pre></div></div><br class="example-break"></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2617956"></a>Squid Configuration</h4></div></div></div><p>
+ <a class="indexterm" name="id2617964"></a>
+ <a class="indexterm" name="id2617971"></a>
Squid must be configured correctly to interact with the Samba-3
components that handle Active Directory authentication.
- </p></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2611088"></a>Configuration</h3></div></div></div></div><div class="procedure"><a name="id2611094"></a><p class="title"><b>Procedure 12.3. Squid Configuration Steps</b></p><ol type="1"><li><p>
- <a class="indexterm" name="id2611105"></a>
- <a class="indexterm" name="id2611112"></a>
- <a class="indexterm" name="id2611120"></a>
+ </p></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2617986"></a>Configuration</h3></div></div></div></div><div class="procedure"><a name="id2617991"></a><p class="title"><b>Procedure 12.3. Squid Configuration Steps</b></p><ol type="1"><li><p>
+ <a class="indexterm" name="id2618003"></a>
+ <a class="indexterm" name="id2618009"></a>
+ <a class="indexterm" name="id2618017"></a>
If your Linux distribution is SUSE Linux 9, the version of Squid
supplied is already enabled to use the winbind helper agent. You
can therefore omit the steps that would build the Squid binary
programs.
</p></li><li><p>
- <a class="indexterm" name="id2611137"></a>
- <a class="indexterm" name="id2611144"></a>
- <a class="indexterm" name="id2611150"></a>
- <a class="indexterm" name="id2611157"></a>
- <a class="indexterm" name="id2611164"></a>
+ <a class="indexterm" name="id2618034"></a>
+ <a class="indexterm" name="id2618041"></a>
+ <a class="indexterm" name="id2618048"></a>
+ <a class="indexterm" name="id2618055"></a>
+ <a class="indexterm" name="id2618062"></a>
Squid, by default, runs as the user <code class="constant">nobody</code>. You need to
add a system user <code class="constant">squid</code> and a system group
<code class="constant">squid</code> if they are not set up already (if the default
@@ -433,16 +433,16 @@ group: files winbind
<code class="constant">squid</code> user in <code class="filename">/etc/passwd</code>
and a <code class="constant">squid</code> group in <code class="filename">/etc/group</code> if these aren't there already.
</p></li><li><p>
- <a class="indexterm" name="id2611212"></a>
- <a class="indexterm" name="id2611218"></a>
+ <a class="indexterm" name="id2618109"></a>
+ <a class="indexterm" name="id2618116"></a>
You now need to change the permissions on Squid's <code class="constant">var</code>
directory. Enter the following command:
</p><pre class="screen">
<code class="prompt">root# </code> chown -R squid /var/cache/squid
</pre><p>
</p></li><li><p>
- <a class="indexterm" name="id2611249"></a>
- <a class="indexterm" name="id2611256"></a>
+ <a class="indexterm" name="id2618147"></a>
+ <a class="indexterm" name="id2618154"></a>
Squid must also have control over its logging. Enter the following commands:
</p><pre class="screen">
<code class="prompt">root# </code> chown -R chown squid:squid /var/log/squid
@@ -456,11 +456,11 @@ group: files winbind
<code class="prompt">root# </code> chmod 770 /var/cache/squid
</pre><p>
</p></li><li><p>
- <a class="indexterm" name="id2611316"></a>
+ <a class="indexterm" name="id2618214"></a>
The <code class="filename">/etc/squid/squid.conf</code> file must be edited to include the lines from
<a class="link" href="DomApps.html#etcsquidcfg" title="Example 12.4. Squid Configuration File Extract /etc/squid.conf [ADMINISTRATIVE PARAMETERS Section]">&#8220;Squid Configuration File Extract /etc/squid.conf [ADMINISTRATIVE PARAMETERS Section]&#8221;</a> and <a class="link" href="DomApps.html#etcsquid2" title="Example 12.5. Squid Configuration File extract File: /etc/squid.conf [AUTHENTICATION PARAMETERS Section]">&#8220;Squid Configuration File extract File: /etc/squid.conf [AUTHENTICATION PARAMETERS Section]&#8221;</a>.
</p></li><li><p>
- <a class="indexterm" name="id2611350"></a>
+ <a class="indexterm" name="id2618248"></a>
You must create Squid's cache directories before it may be run. Enter the following command:
</p><pre class="screen">
<code class="prompt">root# </code> squid -z
@@ -487,23 +487,23 @@ group: files winbind
auth_param basic credentialsttl 2 hours
acl AuthorizedUsers proxy_auth REQUIRED
http_access allow all AuthorizedUsers
-</pre></div></div><br class="example-break"></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2611455"></a>Key Points Learned</h3></div></div></div><p>
- <a class="indexterm" name="id2611463"></a>
- <a class="indexterm" name="id2611470"></a>
- <a class="indexterm" name="id2611477"></a>
- <a class="indexterm" name="id2611484"></a>
- <a class="indexterm" name="id2611495"></a>
+</pre></div></div><br class="example-break"></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2618352"></a>Key Points Learned</h3></div></div></div><p>
+ <a class="indexterm" name="id2618360"></a>
+ <a class="indexterm" name="id2618367"></a>
+ <a class="indexterm" name="id2618374"></a>
+ <a class="indexterm" name="id2618381"></a>
+ <a class="indexterm" name="id2618393"></a>
Microsoft Windows networking protocols permeate the spectrum of technologies that Microsoft
Windows clients use, even when accessing traditional services such as Web browsers. Depending
on whom you discuss this with, this is either good or bad. No matter how you might evaluate this,
the use of NTLMSSP as the authentication protocol for Web proxy access has some advantages over
the cookie-based authentication regime used by all competing browsers. It is Samba's implementation
of NTLMSSP that makes it attractive to implement the solution that has been demonstrated in this chapter.
- </p></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2611515"></a>Questions and Answers</h2></div></div></div><p>
- <a class="indexterm" name="id2611523"></a>
- <a class="indexterm" name="id2611530"></a>
- <a class="indexterm" name="id2611537"></a>
- <a class="indexterm" name="id2611544"></a>
+ </p></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2618413"></a>Questions and Answers</h2></div></div></div><p>
+ <a class="indexterm" name="id2618421"></a>
+ <a class="indexterm" name="id2618428"></a>
+ <a class="indexterm" name="id2618435"></a>
+ <a class="indexterm" name="id2618441"></a>
The development of the <code class="literal">ntlm_auth</code> module was first discussed in many Open Source circles
in 2002. At the SambaXP conference in Goettingen, Germany, Mr. Francesco Chemolli demonstrated the use of
<code class="literal">ntlm_auth</code> during one of the late developer meetings that took place. Since that time, the
@@ -522,34 +522,34 @@ group: files winbind
You would be well-advised to recognize that all cache-intensive proxying solutions demand a lot of memory.
Make certain that your Squid proxy server is equipped with sufficient memory to permit all proxy operations to run
out of memory without invoking the overheads involved in the use of memory that has to be swapped to disk.
- </p><div class="qandaset"><dl><dt> <a href="DomApps.html#id2611621">
+ </p><div class="qandaset"><dl><dt> <a href="DomApps.html#id2618519">
What does Samba have to do with Web proxy serving?
- </a></dt><dt> <a href="DomApps.html#id2611787">
+ </a></dt><dt> <a href="DomApps.html#id2618685">
What other services does Samba provide?
- </a></dt><dt> <a href="DomApps.html#id2611930">
+ </a></dt><dt> <a href="DomApps.html#id2618828">
Does use of Samba (ntlm_auth) improve the performance of Squid?
- </a></dt></dl><table border="0" summary="Q and A Set"><col align="left" width="1%"><tbody><tr class="question"><td align="left" valign="top"><a name="id2611621"></a><a name="id2611623"></a></td><td align="left" valign="top"><p>
+ </a></dt></dl><table border="0" summary="Q and A Set"><col align="left" width="1%"><tbody><tr class="question"><td align="left" valign="top"><a name="id2618519"></a><a name="id2618521"></a></td><td align="left" valign="top"><p>
What does Samba have to do with Web proxy serving?
</p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p>
- <a class="indexterm" name="id2611635"></a>
- <a class="indexterm" name="id2611642"></a>
- <a class="indexterm" name="id2611649"></a>
- <a class="indexterm" name="id2611658"></a>
- <a class="indexterm" name="id2611665"></a>
+ <a class="indexterm" name="id2618533"></a>
+ <a class="indexterm" name="id2618540"></a>
+ <a class="indexterm" name="id2618547"></a>
+ <a class="indexterm" name="id2618556"></a>
+ <a class="indexterm" name="id2618563"></a>
To provide transparent interoperability between Windows clients and the network services
that are used from them, Samba had to develop tools and facilities that deliver that feature. The benefit
of Open Source software is that it can readily be reused. The current <code class="literal">ntlm_auth</code>
module is basically a wrapper around authentication code from the core of the Samba project.
</p><p>
- <a class="indexterm" name="id2611688"></a>
- <a class="indexterm" name="id2611694"></a>
- <a class="indexterm" name="id2611704"></a>
- <a class="indexterm" name="id2611713"></a>
- <a class="indexterm" name="id2611722"></a>
- <a class="indexterm" name="id2611728"></a>
- <a class="indexterm" name="id2611735"></a>
- <a class="indexterm" name="id2611742"></a>
- <a class="indexterm" name="id2611749"></a>
+ <a class="indexterm" name="id2618585"></a>
+ <a class="indexterm" name="id2618592"></a>
+ <a class="indexterm" name="id2618601"></a>
+ <a class="indexterm" name="id2618610"></a>
+ <a class="indexterm" name="id2618619"></a>
+ <a class="indexterm" name="id2618626"></a>
+ <a class="indexterm" name="id2618633"></a>
+ <a class="indexterm" name="id2618640"></a>
+ <a class="indexterm" name="id2618647"></a>
The <code class="literal">ntlm_auth</code> module supports basic plain-text authentication and NTLMSSP
protocols. This module makes it possible for Web and FTP proxy requests to be authenticated without
the user being interrupted via his or her Windows logon credentials. This facility is available with
@@ -557,36 +557,36 @@ group: files winbind
There are a few open source initiatives to provide support for these protocols in the Apache Web server
also.
</p><p>
- <a class="indexterm" name="id2611774"></a>
+ <a class="indexterm" name="id2618671"></a>
The short answer is that by adding a wrapper around key authentication components of Samba, other
projects (like Squid) can benefit from the labors expended in meeting user interoperability needs.
- </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2611787"></a><a name="id2611789"></a></td><td align="left" valign="top"><p>
+ </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2618685"></a><a name="id2618687"></a></td><td align="left" valign="top"><p>
What other services does Samba provide?
</p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p>
- <a class="indexterm" name="id2611801"></a>
- <a class="indexterm" name="id2611808"></a>
- <a class="indexterm" name="id2611815"></a>
- <a class="indexterm" name="id2611822"></a>
- <a class="indexterm" name="id2611828"></a>
+ <a class="indexterm" name="id2618699"></a>
+ <a class="indexterm" name="id2618706"></a>
+ <a class="indexterm" name="id2618712"></a>
+ <a class="indexterm" name="id2618719"></a>
+ <a class="indexterm" name="id2618726"></a>
Samba-3 is a file and print server. The core components that provide this functionality are <code class="literal">smbd</code>,
<code class="literal">nmbd</code>, and the identity resolver daemon, <code class="literal">winbindd</code>.
</p><p>
- <a class="indexterm" name="id2611859"></a>
- <a class="indexterm" name="id2611866"></a>
+ <a class="indexterm" name="id2618757"></a>
+ <a class="indexterm" name="id2618763"></a>
Samba-3 is an SMB/CIFS client. The core component that provides this is called <code class="literal">smbclient</code>.
</p><p>
- <a class="indexterm" name="id2611883"></a>
- <a class="indexterm" name="id2611890"></a>
- <a class="indexterm" name="id2611897"></a>
- <a class="indexterm" name="id2611904"></a>
- <a class="indexterm" name="id2611910"></a>
+ <a class="indexterm" name="id2618781"></a>
+ <a class="indexterm" name="id2618788"></a>
+ <a class="indexterm" name="id2618794"></a>
+ <a class="indexterm" name="id2618801"></a>
+ <a class="indexterm" name="id2618808"></a>
Samba-3 includes a number of helper tools, plug-in modules, utilities, and test and validation facilities.
Samba-3 includes glue modules that help provide interoperability between MS Windows clients and UNIX/Linux
servers and clients. It includes Winbind agents that make it possible to authenticate UNIX/Linux access attempts
as well as logins to an SMB/CIFS authentication server backend. Samba-3 includes name service switch (NSS) modules
to permit identity resolution via SMB/CIFS servers (Windows NT4/200x, Samba, and a host of other commercial
server products).
- </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2611930"></a><a name="id2611933"></a></td><td align="left" valign="top"><p>
+ </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2618828"></a><a name="id2618830"></a></td><td align="left" valign="top"><p>
Does use of Samba (<code class="literal">ntlm_auth</code>) improve the performance of Squid?
</p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p>
Not really. Samba's <code class="literal">ntlm_auth</code> module handles only authentication. It requires that