From 07fdf8d7560e728596c9376966474b88a00e19fc Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Sat, 1 Jun 2019 09:04:48 +1200 Subject: [PATCH] docs: Improve documentation of "lanman auth" and "ntlm auth" connection BUG: https://bugzilla.samba.org/show_bug.cgi?id=13981 Signed-off-by: Andrew Bartlett Reviewed-by: Andreas Schneider (cherry picked from commit dbf3e81f7f0b28c69dca004b32ea3a7344b0cad3) --- docs-xml/smbdotconf/security/lanmanauth.xml | 14 ++++++++------ docs-xml/smbdotconf/security/ntlmauth.xml | 9 +++++---- 2 files changed, 13 insertions(+), 10 deletions(-) diff --git a/docs-xml/smbdotconf/security/lanmanauth.xml b/docs-xml/smbdotconf/security/lanmanauth.xml index a9e4f88b89f..97f2fb04dcb 100644 --- a/docs-xml/smbdotconf/security/lanmanauth.xml +++ b/docs-xml/smbdotconf/security/lanmanauth.xml @@ -24,16 +24,18 @@ auth is re-enabled later on. - Unlike the encrypt - passwords option, this parameter cannot alter client + Unlike the encrypt + passwords option, this parameter cannot alter client behaviour, and the LANMAN response will still be sent over the network. See the client lanman auth to disable this for Samba's clients (such as smbclient) - If this option, and ntlm - auth are both disabled, then only NTLMv2 logins will be - permited. Not all clients support NTLMv2, and most will require - special configuration to use it. + This parameter is overriden by ntlm + auth, so unless that it is also set to + ntlmv1-permitted or yes, + then only NTLMv2 logins will be permited and no LM hash will be + stored. All modern clients support NTLMv2, and but some older + clients require special configuration to use it. no diff --git a/docs-xml/smbdotconf/security/ntlmauth.xml b/docs-xml/smbdotconf/security/ntlmauth.xml index dceae44d81b..dd5dbaea117 100644 --- a/docs-xml/smbdotconf/security/ntlmauth.xml +++ b/docs-xml/smbdotconf/security/ntlmauth.xml @@ -19,11 +19,9 @@ control NTLM authentiation for domain users, this must option must be configured on each DC. - By default with lanman - auth set to no and - ntlm auth set to + By default with ntlm auth set to ntlmv2-only only NTLMv2 logins will be - permited. Most clients support NTLMv2 by default, but some older + permited. All modern clients support NTLMv2 by default, but some older clients will require special configuration to use it. The primary user of NTLMv1 is MSCHAPv2 for VPNs and 802.1x. @@ -35,6 +33,9 @@ ntlmv1-permitted (alias yes) - Allow NTLMv1 and above for all clients. + This is the required setting for to enable the lanman auth parameter. + -- 2.17.1