Errata

Using Samba

Errata for Using Samba

Submit your own errata for this product.

The errata list is a list of errors and their corrections that were found after the product was released.

The following errata were submitted by our customers and have not yet been approved or disproved by the author or editor. They solely represent the opinion of the customer.

Color Key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update

Version Location Description Submitted by Date submitted
Printed Page Online
There is an error in your online version of 'Using Samba'. 'Figure 5.1

Multiple subnets with Samba servers' has wrong IP-addresses for the
workstations in the 192.168.222 subnet:
192.168.221.130 should be 192.168.222.130 and
192.168.221.140 should be 192.168.222.140

(?) Appendix F, "Sample Configuration File", entire chapter;
This is on safari.oreilly.com.

If a code fragment (fixed width type) immediately follows a normal Roman paragr
aph, and the first line of code is supposed to be indented, it isn't. Instead
it is flush left. The problem lines are:

comment = Samba ver. %v
guest ok = no
path = /u/programs

(?) Appendix F, "Sample Configuration File", fourth code fragment;
"deamon" should be "daemon" here:

# who is NOT allowed to connect to ANY service
invalid users = @wheel, mail, deamon, adt

This is on safari.oreilly.com.

(?) Appendix F, "Sample Configuration File", 4th code fragment;
Typo: "privilages" should be "privileges".

This is in the online edition on safari.oreilly.com.

Anonymous   
Printed Page 2
The output of the 'grep' command ought to be on separate lines

Anonymous   
Printed Page 4
In Figure 1-1, phoenix is shown running Win98.

In Figure 1-2, phoenix is shown running Linux.

Anonymous   
Printed Page 5
In Figure 1-3, the status bar displayed reads "3 object(s)", but

there are only two shown.

Anonymous   
Printed Page 5
Password-protection is done when sharing the drive,

not when mapping it.

The Example UNC "\HYDRA
etwork" is a mixture of roman (capitals)
and italic (lower case) text. This looks somewhat odd.
The conventions listed on p.xiii seem to imply that this should
all be in italics, though this is not particularly clear.

Anonymous   
Printed Page 6
Saying that browsers "typically" use forward slashes is confusing.

This is how a URL is formally defined.
A browser that accepts backward slashes is doing so purely for
user convenience (which is fair enough), but this shouldn't be
implied as having any formal standing.

Anonymous   
Printed Page 7
In Figure 1-6 on page 7, the status bar

reads "4 object(s)", but the window shows only 3.

Anonymous   
Printed Page 10
The fourth paragraph refers to "this document" (singular), but

this is referring back to RFCs 1001/2 - two documents (i.e. plural).

Anonymous   
Printed Page 11
The two approaches to name registration listed at the top of the

page appear in the opposite order in the accompanying diagram
(Figure 1-8).
The following equivalent descriptions and figure for name
resolution use the same order as Fig 1-8 (as does much of the
rest of this discussion). It would probably be sensible to
reverse the order of these first two approaches.

Anonymous   
Printed Page 14
The rules for an acceptable name state that it "may not begin

with an asterisk", but asterisk is not in the list of acceptable
characters at all.

Anonymous   
Printed Page 15
The description of resource types (at the bottom of p14) leads

into an example of the output of NBTSTAT, where "type" has a
different meaning.
This distinction isn't made particularly clear.

Anonymous   
Printed Page 16
The continuation header line does not actually appear in the

output of NBTSTAT, as implied. It would be preferable if this
title was put in a different typeface, to make this clear.
Alternatively, simply omit the word "continued".

The description of __MSBROWSE__ refers to "master browsers",
which is a concept which won't be described until p21 or so.
Is it necessary to mention this explicitly at this stage?

The description of name registration implies that names must
be unique, but it is not clear whether this uniqueness should
extend across different groups. Can you have two machines
with the same name, if they are in different groups?

Anonymous   
Printed Page 17
The second paragraph refers to a "full-duplex" connection,

with no further explanation. This is a term that may well
be unfamiliar to many experience network people, unless they
have had experience with low-level networking or telecomms.
This whole paragraph is rather less clearly explained
than I would expect from an O'Reilly book.

Anonymous   
Printed Page 18
The final paragraph refers to "domain controller (logon server)".

Are these two terms synonymous?

Anonymous   
Printed Page 20
Section 1.4.1.2 'Primary and backup domain controllers' - second

paragraph;
(Reading HTML version of the book that comes with 9781565924499-2.0.7)

In section 1.4.1.2, the second sentence of the second paragraph reads:
"This is not accidental since the concept of Windows domains did not evolve
until Windows NT 3.5 was introduced..."

This is incorrect. Domains were first introduced with Microsoft LAN Manager
2.0 as I recall. This was in the days of OS/2 1.2, long before the first
version of Windows NT was released.

Anonymous   
Printed Page 20
The initial description of the primary domain controller refers

to it as being "currently active", implying that backup domain
controllers are not. The final sentence then implies that any
domain controller (including BSCs) can be used to authenticate
users. This appears to contradict the initial description.

The third paragraph refers to "other PDC responsibilities"
in contrast to authentication. However, this is the only
responsibility that has been described so far. What other
PDC responsibilities are there?

Anonymous   
Printed Page 21
The fifth paragraph talks about a "Windows workgroup subnet".

This is the first time that "subnet" has been mentioned.
It either needs a word of explanation, or else to be skimmed
over until this is covered more fully on p24.

Anonymous   
Printed Page 22-23
The description of the algorithm for the number of backup

browsers seems overly complex. It seems to be simply one
backup browser for every 32 NT, or 16 Windows 9x workstations
(or part thereof).
What are the implications of a having mixture of NT and 9x
systems in the same workgroup? Are these two calculations
done independently, or does a 9x system count as equivalent to
2 NT systems?

Anonymous   
Printed Page 24
Again, the concept of a "subnet" seems to be taken for granted.

This may be reasonable, but it might be worth adding a word
of explanation.
Presumably "subnet" is intended to also cover distinct IP
networks, as well as IP subnets? (Since the examples in
Figure 1-14 are different networks, rather than subnets).

Anonymous   
Printed Page 25
Figure 1-14 labels one of the systems as a "WINS server".

Given that this figure is reference from the previous page
(where "WINS" has not yet been covered), and is not referred
to during the description of WINS, is this label necessary.
Either refer to a NBNS, primary name server, or similar
generic term, or don't bother labelling it at all.

The second sentence of the WINS desription seems to state
that all machines *must* be called "fred"! OK, it's clear
what this actually means, but the wording could be improved.

Anonymous   
Printed Page 26
How does the distinction between primary and secondary WINS

servers relate to the preceding discussion of multiple WINS
servers? Can you have multiple primary WINS servers?

The description of Samba states that it "cannot properly
synchronize its data", but the table implies that it can
act as Primary Domain Controller. Surely it needs to
be able to synchronize with NT backup controllers to do this?

Table 1-6 refers to "Samba 2.1 or higher recommended".
But Samba 2.1 isn't out yet!
This apparent contradiction isn't properly explained
until much later (p186)

Anonymous   
Printed Page 27
The third sentence begins:


"smdb handles all notifications..."

This should read "smbd", not "smdb".

Anonymous   
Printed Page 29
The third line should read "... not complete IN Samba 2.0".

(i.e. the second "is" should be "in").

Anonymous   
Printed Page 36
Pluggable Authentication Modules are not unique to Linux systems

(which is the impression given here).

The description of '--with-mmap' refers to "fast locking".
This is presumably a misprint for "file locking".

Anonymous   
Printed Page 38
The tee command shown does not attempt to catch standard error.

This may mean that important errors are not saved in the log file.
A better command would be
./configure 2>&1 | tee mylog

Anonymous   
Printed Page 39
The first paragraph of explanation (following the example output)

starts "If you encounter *problems* ... if *it* is easily fixable".
There's a mismatch between plural and singular here.

Describing compilation problems as "almost always easy to overcome"
strikes me as naively optimistic!

Anonymous   
Printed Page 40
The description about saving the old version (at the start of the

page) is not particularly clear.

Anonymous   
Printed Page 41
The fourth field of the inetd.conf entry - "nowait.400" would be

more commonly specified as simply "nowait". The limit on maximum
number of servers is not available on many Unix systems.

Anonymous   
Printed Page 41
Header Final Installation Steps

The changes to /etc/services and /etc/inetd.conf will not work on RedHat
7.0 Linux. RedHat has gone to xinetd and this has a different format.
Please include the necessary information to use this with RH's xinetd

Anonymous   
Printed Page 41
2.4 A basic SAMBA configuration file

(page 41 in french edition !)
The problem is online too :

----------------------
[global]
workgroup = SIMPLE
[test]
comment = For testing only, please
path = /export/9781565924499/test
read only = no
guest ok = yes
----------------------

In the first example given, the authors set "guest ok = 1", but "map to
guest" is not set, so it has its default value : Never.
Further more, map to guest doesn't appear in the list in the end (appendix C).

Anonymous   
Printed Page 42
The owl comment appears to refer to "access[ing] shares into Samba's

encrypted database", which doesn't make sense. This isn't what is
meant, but this sentence could be re-phrased to avoid this confusion.

Anonymous   
Printed Page 43-44
Figure 2-2 doesn't show all the fields mentioned, and does show

some fields that aren't described in the text. This is confusing.

The field values (SIMPLE, USER, etc) mentioned in the text should
probably be in constant width font (according to the conventions in
the introduction), and it might be helpful to have the field names
distinguished in some way as well.

How do you get from Figure 2-3 to Figure 2-4? Is selecting the
name from the list sufficient, or do you also need to press the
"Choose Share" button?

Anonymous   
Printed Page 45
What is the operation of the various "Set Default" buttons?

Is this significant here, or can they be ignored?

Anonymous   
Printed Page 46
The line "path = /export/9781565924499/test" in the example conf file

is not aligned correctly with the rest of the file.

Anonymous   
Printed Page 47
In the third line of the block of code at the bottom of the page,

There should be a space after the "." in the line that reads
"./etc/rc.d/init.d/functions".

Anonymous   
Printed Page 47
In the "if" statement, there needs to be a space between

"smbd" and the "]".

Anonymous   
Printed Page 48
Inetd is described as "listen[ing] on TCP ports" only. In fact,

it also listens on UDP ports as well (including 'netbios-ns').

Line 5 this paragraph: "listens in place*S* of all the others".

Anonymous   
Printed Page 52-53
The sentence crossing this page boundary - "After confirming..."

is not particularly clear. It might be easier to understand if
the existing username/password case was described separately.

Anonymous   
Printed Page 53
The last line of the second paragraph talks about "Password

encryption [being] improved between Win9x and Win2000".
Where does NT 4.0 fit in?

The second paragraph of "Setting up the Network" talks about
"see[ing] ... a network device ... bound to [a] protocol".
It's not clear how you can "see" this binding (unless you have
multiple devices). What you "see" is two apparently separate
things - a device and a protocol. The binding is implicit.

There is also no description of what binding means anyway,
in contrast with the NT equivalent on p71.

Anonymous   
Printed Page 54
The last paragraph talks about "selecting the protocol TCP/IP

from manufacturer Microsoft". In fact, you have to select the
manufacturer first, so these should be mentioned in the opposite
order.

Anonymous   
Printed Page 55
Figure 3-6 would be clearer if "Protocol" was highlighted

The "arrow" mentioned in the penultimate paragraph actually
refers to the binding (mentioned two pages earlier), but this is
not made explicit, either here or at the beginning of the section.

Anonymous   
Printed Page 56
Figure 3-9 uses a different example IP address from the accompanying

text on the next page.
The figure is also titled incorrectly (with an extraneous 'S').

Anonymous   
Printed Page 58
It's not clear that you actually need to enter the DNS server

address in the box that's shown empty in Figure 3-10.

The name "client" is a poor choice, and probably ought to match
the name used in the accompanying text ("hobbes"). This also
applies to the following figures 3-13 and 3-14.

The 'Domain' and the 'Domain Suffix Search Order' ought to match.

Anonymous   
Printed Page 59
The address given for the WINS server in Figure 3-11 is that being

used for the local machine in the preceding description.

The paragraph at the top of this page talks about entering NT WINS
servers as well as the example Samba server. The turkey comment
lower down says that mixing them does not work.
Which is correct?

Anonymous   
Printed Page 60
The Windows drive (second line) would normally be referred to

simply as "C:" - without the additional backslash.
C: refers to the root directory on that drive.

Anonymous   
Printed Page 61
The second paragraph talks about setting the workgroup to be the

same as that in the Samba configuration file "as well" as the example
"SIMPLE" (end of the second sentence, line 3). This implies a
system can be in more than one workgroup.
It would probably be better to say "instead" here.


Anonymous   
Printed Page 62
The Samba server set up in Chapter 2 was called "Hydra", not "Server"

(Figure 3-14).
This also only set up a single share "test" - would the "lp" share
be visible by default (Figure 3-15) ? The same question arises with
reference to Figure 3-27 on p73.

Anonymous   
Printed Page 62
The last paragraph is attempting to deal with the problem of servers

not appearing in the browse list immediately, which leads to users
(and sometimes new admins :-) ) to believe that 9781565924499 is not properly
configured. If the server is not so listed, it advises a test by
which a UNC can be tried out, involving using Windows Explorer to map
a network drive, the success of which means the server /is/ properly
configured.

This test is too complex, unnecessary, and potentially problematical.

A UNC of a server missing from the browse list can be tested far more
easily with clicking Start, then Run, entering the full UNC
(\server est) and hitting OK. A working server will instantly
return an open window on that share.

The original solution would stand for wfwg, WinNt < v4 and Win3.x.
However the context of the chapter is on configuring Win95/98/NT4.

The original solution is problematic in that it may well leave an
open network drive permanently mapped on the test machine.

This simplification would also apply to the NT4 explanation on page 73.

Anonymous   
Printed Page 63-73
A number of the descriptions in the NT section are _almost_

the same as the equivalent Win9x versions, but phrased slightly
differently in niggling little ways. Ideally, the two phrases
should be made consistent, taking the better of each.
I particularly noticed the descriptions for DNS (p57/68),
WINS (p59/70) and hosts (p60/71) as well as the description of
bindings (p71) which was not really properly explained in the
Win9x case (p60).

Anonymous   
Printed Page 66
In figure 3-20, highlight "Workstation" to match the text.

Anonymous   
Printed Page 67
Win9x needed to set four of the option tabs, not three.

The text description re-uses the IP address previously used for
the Win9x box (and doesn't match Figure 3-22 on the next anyway).

The owl comment refers to 192.168.x.x being "reserved for ... LANs".
The important thing about these addresses is that they are
reserved for *private* LANS, those not connected to the Internet.

Anonymous   
Printed Page 68
The description of DNS starts talking about "we", rather than "you".

This is inconsistent with most of rest of the book.

Anonymous   
Printed Page 69
Figure 3-23 has a different domain from that implied in the text,

and the DNS servers don't match the text either.
A similar comment holds for the WINS server in figure 3-24 (over).

Anonymous   
Printed Page 70
End of first sentence on page.; 5/00 printing

(before the NETBIOS name) -> (the NETBIOS name)

Anonymous   
Printed Page 70
first paragraph after figure 3-24, third sentence

5/00 printing:

wins service = yes => wins support = yes

Anonymous   
Printed Page 71-72
The text description under "Bindings" instructs the reader to click

on all the + buttons in the tree, but Figure 3-25 has only opened
one level, and there are still three + buttons shown.

Anonymous   
Printed Page 72
Figure 3-26 displays "Client" and "Server" rather than "Artish"

and "Hydra" (as with Figure 3-14 on p62)

Anonymous   
Printed Page 72
second sentence of last paragraph

5/00 printing:

the test and the default => the test directory and the default

"test" should be in italics the same as the last paragraph on page 61, describing
confiiguration of Windows 95/98 machines.

Anonymous   
Printed Page 72
Last sentence on page

5/00 printing:

Last sentence on page:

For more information ...

should be removed. It refers to a warning in a previous
section which isn't there.

Anonymous   
Printed Page 73
The troubleshooting description refers directly to "The Fault Tree"

in Chapter 9. The Win9x equivalent referred simply to Chapter 9
as a whole.

Anonymous   
Printed Page 73
fourth line of second last paragraph

5/00 printing:

\server emp => \server est

Anonymous   
Printed Page 74
The description of unused header fields feels to be too much detail,

too quickly. This information would probably be better coming after
the header table, and the null TID could easily be left until the
example walkthrough.

Anonymous   
Printed Page 75
The first entry in Table 3-1 is confusing. Where does 0xFF fit in?

The description of the Command Contents is unclear. The text implies
that each command is different, but the table entries seem to be
general (and aren't really explained properly).
This could do with some re-working.

Anonymous   
Printed Page 76
The last sentence of the SMB variations section talks about

"LAN Manager 0.12". Presumably this means "NT LAN Manager 1.0"
a.k.a. ID string "NT LM 0.12".
It would be better not to mix the version numbers in this way.

Anonymous   
Printed Page 77
In the second sentence, "Wndows" should be changed to "Windows".

Anonymous   
Printed Page 78
The description of establishing a virtual connection talks about

a "bidirectional virtual channel". This jargon probably needs to
be explained, or phrased more simply.

The negotiation talks about setting the TID to 0, in contrast with
p74, where it said that a null TID had the value 0xFFFF.

Anonymous   
Printed Page 80
The second command is given as SMBtconX - does this trailing X

mean that this command also has yet another command piggybacked
onto it? Presumably not, but that's the impression given by the
initial description of the 'X' suffix immediately before.

Anonymous   
Printed Page 81
The second sentence of the section "Making Connection to a Resource"

is more specific than previous descriptions. They started with the
general case, and then described a specific example.
This starts with the specific type, and *then* widens out.

Anonymous   
Printed Page 82
The first paragraph talks about "this chapter", but it's actually

referring to the next few chapters in the book (as in the following
paragraph).

Anonymous   
Printed Page 84
The section on whitespace says that this is ignored between the

name and value, but significant within the value. Is *trailing*
whitespace significant or not? (This is worth mentioning explicitly)

The description of multiple valued options is not clear.
How does this differ from the preceding example (which also had
multiple tokens, but only one value) ?

Anonymous   
Printed Page 85
Are trailing spaces significant in a continuation line?

I.e. does the backslash have to be the last character in the line,
or simply the last non-blank character?
(This is a common source of difficult-to-track down faults, so
I hope it's the latter - but definitely worth mentioning if not!)

Anonymous   
Printed Page 87
The penultimate paragraph says that (in the absence of an included

file) Samba "won't do anything at all".
This is ambiguous - does it mean that Samba will stop working,
or silently ignore the include line? Needs clarification.

Anonymous   
Printed Page 88
In the 4th paragraph, the text repeatedly refers to the [global]

section as [globals].

Anonymous   
Printed Page 88
The paragraph under Special Sections includes the phrase "each and

every configuration option*s*" - this should be singular.
There should perhaps also be an "immediately" somewhere in here.
Hopefully the reader will understand all the options eventually!

The third sentence of the next paragraph includes "other sections
can list ... in their section". This repetition feels wrong, as
if a section somehow 'includes' itself. I suggest you simply
drop the phrase "in their section", which retains the same meaning.

Anonymous   
Printed Page 89
The first paragraph talks about the [test] share, until the last

line when it suddenly refers to the [pub] share.

Anonymous   
Printed Page 91
A boolean isn't simply an enumerated type with two values, since

there are a number of different representations of these values.

The first line in the next paragrpah includes the horrible phrase
"start off easy" - ugh! This may be valid American English, but
not over this side of the pond. <shudder>
How about "start off gently" or "start off easily" ?

The description of the 'config file' option refers to the variables
"above" - where this means four pages before. Contrast this with
the back reference on the next page, which talks about "earlier".
Also, are all the variables valid here, or not ? Certainly in
the include option, the useable range is limited. How about here?
Both this and the next section should really talk about "taking
advantage of *some* *of* the variables", if they're not all available.

Anonymous   
Printed Page 93
The section on Server Configuration is inconsistent in its use

of capitalisation. Both the NetBIOS name and the workgroup are
upper case in the config file, and the workgroup is in the text
that follows. But the NetBIOS name is given as "hydra" instead.

Anonymous   
Printed Page 95
The final paragraph of the description of netbios name talks about

using this to relocate services from a dead or retired machine.
This is actually an example of standard practise in the Unix DNS
world, where the accepted naming convention is to try and "hide"
the real server name, and use generic service names as much as
possible.
A mail server would typically be referred to as "mail", even
though its actual name would probably be something else. Similarly
the web server would usually be "www", etc. The netbios name
could easily be used to offer the same sort of "server independent
service name".

Anonymous   
Printed Page 95
Last line on page of 05/00 pressing

Change:

(%h) -> (%L)

to match example shown two pages earlier

Anonymous   
Printed Page 98
You present an example smb.conf entry for a share called 'network'.

The path in the example is /export/9781565924499/network. However, the next
sentence says, "And the contents of the directory /usr/local/network
....". It should say /export/9781565924499/network as the subsequent ls -la
command shows.

Anonymous   
Printed Page 102
3rd line from bottom

"134.213.233.100" should be "134.213.233.110"

Anonymous   
Printed Page 104
7th bullet, Line 1

the word "more" should be removed.

Anonymous   
Printed Page 105
The description of interfaces refers to "optionally" specifying the

CIDR format. This implies this is done as well as the netmask format
shown previously. This would be better described as "alternatively".

The owl description talks about "this option", which is ambiguous.
Does it mean the whole interface option, or just this use of netmasks?

Anonymous   
Printed Page 106
The owl says that you need to specify 'localhost' in the interfaces

list, but this wasn't done in the example on p101.

How does the 'socket address' option differ from 'bind interfaces'?
This distinction isn't particularly clear.

Anonymous   
Printed Page 107
near page bottom

The exclude IP is listed as "192.168.10.255" rather than "192.168.10.". Using the
address as shown would only affect the listed ip address rather than the whole subnet.

Anonymous   
Printed Page 108
How verbose is the example log? Is this brief output, or verbose?

Anonymous   
Printed Page 109
The first paragraph talks about the "logging options that we've

seen so far", but we haven't seen any yet!

Anonymous   
Printed Page 110
Line 1

This line states the files are created with a ".old" extension, with reference
to the max log size option. However, the table on page 111 indicates that a
".bak" extension is used. Which is it?

Anonymous   
Printed Page 110
The relationship between the syslog option value, and the logging

level itself is very unobvious. (I'd call this a flaw in the Samba
design). This needs to be made much clearer in the description.
You shouldn't let the fact that this book has been "officially
adopted" by the Samba team, muzzle you from criticising Samba
where this seems appropriate.

Does the debug timestamp option affect syslog log entries?

Anonymous   
Printed Page 111
The description of the default value for the log file is not clear.

Rather than talk about your setup, it would be better to talk in
more general terms, stress the fact this is set as part of configuring
Samba, and perhaps mention what the default default would be.

Anonymous   
Printed Page 112
The heading for "debug timestamp" has an extraneous semicolon.

The format of the timestamp here differs from the example on p108.

Anonymous   
Printed Page 113
The description of syslog assumes throughout that this value is

lower than the 'log level' option. What is the effect of having
syslog set higher than the file logging?

The first paragraph of the "syslog" option ends by mentioning the
"syslog only" option, followed immediately by "For example". But
the example that follows has nothing to do with "syslog only",
and is just showing the normal settings.
Given that this option is about to be described later on the same
page, is there any point in even mentioning it here?

The first sentence of the description of "syslog only" ends with
a subclause that contains no verb.
"the system logger only" makes no sense!

Anonymous   
Printed Page 113
last paragraph

"ection" should be "section"

Anonymous   
Printed Page 114
The "net view" command is described as listing the servers on the

network. But the example output includes both 'chimaera' and
'phoenix', which were introduced as network clients earlier (p93).

Anonymous   
Printed Page 115
Is it possible to emphasise the example config lines that have

been added or changed? I believe this is occasionally done on
some later examples, but it isn't carried through consistently.
It doesn't match the conventions introduced at the start of the
book, but is extremely useful in following the descriptions.

Anonymous   
Printed Page 117-118
In an election, are all the roles listed in Table 5-2 relevant,

(as implied by the table title) or just the role "Preferred Master
Browser" (as implied by step 3) ?

In step 6, it talks about the "runner up" (singular) becoming a
backup browser, but the initial description in Chapter 1 implied
that there could be a number of backup browsers. How is this
handled in this election mechanism?

Anonymous   
Printed Page 119
The second paragraph refers to the "preferred master browser bit".

Is this the same as the "preferred master browser *role*" covered
on the previous page ?
If not, then I don't think you have mentioned Samba setting this
before (in contrast to the claim made here).

Anonymous   
Printed Page 120
The first rule for multiple subnet domains states that a domain

master browser removes the need for a local master browser.
But figure 1-14 showed one machine acting as both domain and
local master browser (which seems more logical). Which is right?

Anonymous   
Printed Page 121
Is the discussion of the 'remote browser synch' option (the last

paragraph) a continuation of the preceding sentence (starting
"In addition..."), or a separate alternative to 'remote announce'.
It feels a bit of both, and hence reads rather strangely.

Anonymous   
Printed Page 121
In Figure 5-1, the addresses of the two workstations in subnet

192.168.222 should read 192.168.222.nnn instead of 192.168.221.nnn.

Anonymous   
Printed Page 122
The function description for 'domain master' in Table 5-3 is odd.

Why "main browser master" rather than "domain master browser" ?

Anonymous   
Printed Page 123
"announce version" section, Line 3

"options" should be "option"

Anonymous   
Printed Page 124
The description of 'browse list' option starts by saying that

you shouldn't need to change this, and then tells you how to!
Most similar "hands off" option descriptions tend to *finish*
by saying this shouldn't be changed.

The description of 'auto services' recommends against using this
for printers, but never really explains why not.

Anonymous   
Printed Page 125
The second sentence of 'local master' includes the phrase "take

place in elections" - this should read "take PART in elections".
If this is set to 'no', will Samba not take part in elections
at all, or take part, but ensure that it loses?

Anonymous   
Printed Page 128
The section on "Hiding and Vetoing Files" has reverted to what

"we" want rather than than what "you" want.

Anonymous   
Printed Page 129
The first line talks about entries "begin, end *or* be[ing] separated"

by a slash. Since this is talking about multiple entries within the
one option, "separated" is redundent, but each entry needs to begin
*and* end with a slash.

Figure 5-3 shows a hidden file 'hello.java', which was not listed
in the previous figure at all.

The penultimate paragraph starts by talking about the effect of this
option in general. The second sentence, starting "By doing so"
suddenly switches to the particular example used.

Anonymous   
Printed Page 131
The first (full) sentence talks about "set[ting] the follow symlinks

option" - i.e. implying setting it to true. In fact, it needs to
be set to false to get the described behaviour (as in the example).
It would be less ambiguous to "use the follow symlinks option".

In Figure 5-5, surely 'hello.txt' should have the text document icon.

Anonymous   
Printed Page 132
The discussion of wide links seems to jump in very quickly. A word

or two of introduction would be useful, as well as an explanation
of some of the possible dangers of using this.

Anonymous   
Printed Page 133
How does the 'unix realname' option handle the common internal

structure of the GCOS field? Will it return the whole of this
field, or just the text up to the first comma?

The description of 'follow symlinks' was only a page or two back,
so it seems unnecessary to say "discussed in greater detail earlier".

Anonymous   
Printed Page 134
"hide files" section, Line 8

"Questions marks" should be "Question marks"

Anonymous   
Printed Page 134
The descriptions of 'getwd cache' and 'wide links' would be more

natural if they came in the opposite order, so wide links follows
directly on from follow symlinks.

getwd cache is particularly slow if wide links is set - why?

wide links "includes any files or directories at the other end".
What is this meant to mean? It is not at all clear.

hide dot files "doesn't *necessarily* guarantee" that the client
cannot view them? It doesn't guarantee this at all! (any more than
hide files does). The word "necessarily" implies that it may
guarantee this in some circumstances, which is not true.

Anonymous   
Printed Page 135
Line 9

"Questions marks" should be "Question marks"

Anonymous   
Printed Page 135
Another possible type of special file that 'veto files' could be

used to protect is anything required for correct use of the
Unix system (if the user has direct access to this).
The description in this paragraph implies that the Windows users
are distinct from the Mac users. It is quite possible (as in this
department) that a single user could use Windows, Mac and Unix systems
interchangeably, and use Samba to keep the same filestore visible
across all three systems.

The paragraph under "File Permissions" implies that Unix was designed
as a networked operating system. This is wrong - Unix dates from 1970
or so, but wasn't networked until the mid-to-late '70s.

'DOS' in this discussion is presumably intended to include Windows 9x

Anonymous   
Printed Page 138
The description of creation masks says that this "help[s] to define

the permissions a file [has when] it is created" and then goes on to
say that umask "control[s] what permission a file .. does *not* have".
While this is strictly correct, it feels like a misprint, particularly
since the Samba option works in a different (more obvious?) way.
Either it needs a word of explanation, or rephrasing to avoid the 'not'.

For files accessed from Windows, you can disable various attribute bits
"as well" - as well as what?

The numeric forms 744 and 755 need an explanation of what this means.

Anonymous   
Printed Page 139
force user and group actually set the user/group "ownership" rather

than the attributes (i.e. the permissions just discussed).

The fourth paragraph talks about "some other user on a single-user
machine". This simply doesn't make sense - inherently!

Anonymous   
Printed Page 140
The three 'map' options in Table 5-5 come at the beginning. In the

accompanying descriptions, they're last.

Recommending a mask of 644 (under create mask) implies that attribute
bits are not available to the client. While this is vaguely referred
to in the next sentence, this could be made clearer.

The default for create mask is 744 in the table, and 755 in the text.

Anonymous   
Printed Page 141
Why recommend global read access to files, but not directories

(implying that other users can't access the files anyway).

A directory mask of 750 is only sensible if the group mechanism is
actively being used. Otherwise everyone is likely to be in the same
group (when 750 is equivalent to 755) or in separate groups (when
you might as well be safe and set 700).

Presumably force create mode can be used to force world permissions,
as well as group ones?

The owl comment presumes that the original data file had group
write access in the first place. Otherwise, editing a (private)
file would give the rest of the group write access to it.

Anonymous   
Printed Page 142
Unix backup programs ('map archive') typically keep a list of when

backups were done, but not necessarily what files were backed up.

Anonymous   
Printed Page 143
The phrase "allowing many more case-sensitive characters" (under

Name Mangling) is accurate, but unclear. It appears to be extending
the list of characters that are case-sensitive, rather than being
two separate characteristics - longer names and case-sensitive names.

The bullet point at the bottom of the page talks about "up to the
first five alphanumeric characters", which is clumsy and unclear.

Anonymous   
Printed Page 144
The first bullet point on this list is essentially the same as

the previous one, so why repeat the same (clumsy) description?

The phrase "to the 8.3 filename" in the third bullet point is
unnecessary, and could easily be omitted.

Anonymous   
Printed Page 146
The descriptions of the first two options in Table 5-7 use

inconsistent phrasing - "keep the case" vs "preserve case".

The description of "mangling char" in this table isn't meaningful.

The textual description of "default case" starts by saying that
this is the default case that will be used. The next sentence then
says that "lower" will use mixed case.

Anonymous   
Printed Page 147
The description of 'preserve case' talks about "set this option

to yes" (which is the default anyway), and then "leave this option
to [sic] its default".

The descriptions of mangled names and mangle case (over the page)
are in the opposite order from Table 5-7.

Anonymous   
Printed Page 148
Does 'mangle case' use the same algorithm as described earlier

for long names?

The 'mangled map' option specifies a mapping that can be used
"before or even in place" of the standard mangling. How are
these two possibilities distinguished?

Anonymous   
Printed Page 149
The description of locks says that the second process will

"receive an error ... and wait until the lock is released".
It's also possible for the second process to simply fail.

Is "byte-range locking" (end of the first sentence of the second
paragraph) partof standard DOS/NT locking, or a Samba addition?
Is it supported on all Samba systems, or just those where the
underlying architecture supports it natively?

The second paragraph of the discussion of opportunistic locking
talks about "the interrupting process [being] granted an oplock
break". Is this actually visible to this second process, or does
the break happen transparently behind the scenes?

Anonymous   
Printed Page 152
I found the whole description of share locks (p151) and following

much less clear than I'd expect from the rest of the book.
Maybe I was just tired, but this didn't seem to click.

Anonymous   
Printed Page 153-4
If Samba can automatically detect kernel oplocks (p154), why is

there a need for an option to enable or disable them?

Anonymous   
Printed Page 154
Table 5.4 vs Section 5.2.3.4

Table 5.4 shows for option 'getwd cache' the default value of YES.

Section 5.2.3.4 states "Setting this option to YES can significantly
increase the time it takes to resove the working directory. ... You
should normally not need to alter this option."

Is this correct? Why would I prefer to use the option that "can
significantly increase time"?

Anonymous   
Printed Page 155
The first paragraph under "Users and Groups" talks about NT 4.0

Workstation SP3, implying that later service packs are not affected.
In fact the comments should refer to "SP3 or higher".

Anonymous   
Printed Page 156
The new addition to the example configuration file at the top of the

page is shown in bold type. This is a useful way to indicate changes,
but this is the first time it has been used, and it was not indicated
in the list of conventions in the Preface.
It would be worth carrying this idea through the rest of the book.

The last sentence in the first paragraph refers to "difference [in]
access rights [to] files" - it is unclear precisely what is meant.

The next paragraph talks about "the Unix user that Samba uses to
represent the client" - how is this user determined?

Anonymous   
Printed Page 157
The end of the "Users and Groups" section implies that chmod command

in the example of setting up the shared directory, has the same effect
as the "directory mode" option. These actually refer to different
levels (the "home directory" and subdirectories of this respectively).

The modes 0660 and 0770 assume a shared GID to be at all sensible.
How is the GID of the connection determined?

The config fragment under "[homes]" uses the option 'browsable'.
While this is valid, all previous examples use the form 'browseable'.

Anonymous   
Printed Page 159
The config fragment at the top of the page includes the option

'auto services', which is not relevant to the topics being covered.

The description of 'admin users' refers to NIS netgroups. Is this
only supported for this option, or can NIS netgroups be used with
other options (such as 'valid users' on p156)?
Having described this option, the advice is then given not to use
it. Why not, if root access is what is required for that situation?

The options 'read list' and 'write list' refer to lists of users.
Can these options be used with group names (as with the other
options that list users that have just been described) ?

Anonymous   
Printed Page 160
The only suggestion that is made for a guest user is the 'ftp'

account. Why not offer the possibility of creating a special account
for this purpose? (Also on p162)

Table 6-1 lists the various access control options, but omits
'guest ok'. Granted, this has been covered in Table 4-4 (p97)
but is still relevant to this discussion. At the very least, a
reference back to this earlier description would be sensible.

Anonymous   
Printed Page 161
The third sentence under 'admin users' refers to "the default group

of the admin user". Does this mean the admin user on the Unix side
(presumably root), or the user making the connection?

Anonymous   
Printed Page 162
In the second paragraph, first sentence

Change:

"This option specifies the name of account ..."

to:

"This option specifies the name of AN account ...".

Anonymous   
Printed Page 162
The discussion of username map seems to imply that the only reason

for needing this would be length limitations on the Unix side. This
option could also be used to cope with different names on the two
systems due to historical reasons (e.g. administration differences)

In the third sentence of this section, the last clause is unnecessary.
Having said that Unix usernames may be limited in length, it would
be clearer to simply say "... mapping a free-form client username to
a Unix username".

In protecting access to the map file, it it sufficient to ensure that
the file is not writeable to normal users. Making the file owned by
root (while possibly sensible) is not strictly necessary.

Anonymous   
Printed Page 163
The group mapping puts the @ sign before the *NT* group name. This

is not mentioned explicitly, but has to be inferred from the example.

The last paragraph of the user map description is unclear.

The fact that the 'username level' option will try *permutations*
of the username is tacked on to the end of the description, almost as
an afterthought. This ought to be made more prominent.

Anonymous   
Printed Page 165
First paragraph - "one password may grant read-only access, .. another

.. read-write access, and so on". What other options are there?

Second paragraph - does NT support share-level security?

The second sentence of the second paragraph reads rather oddly
(enabling share-level security twice), and the following sentence
feels like a separate step rather than the continuation of this task.

The third paragraph seems to imply that you can only share a whole
drive - I believe it is possible to share a particular folder.

A figure for this second step would be be useful.

Anonymous   
Printed Page 166
Step 4 of the authentication list seems to imply that Samba will

allow access to a share, if the password belongs to *any* valid user.
I hope I misunderstand this, as the implications for password cracking
are horrendous!
The last sentence of this step is somewhat odd - it would be more
natural to phrase this in the reverse sense. How does failure under
4 interact with step 5? This is not clear.

The last paragraph talks about "each of the users in its own list".
How is this list determined? The same comment holds for the "internal
list" referred to on the next page.

Anonymous   
Printed Page 167
The options in Table 6-4 would be more meaningful the other way round.

Anonymous   
Printed Page 168
The first (full) paragraph refers to "re-enter[ing] a password again".

As opposed to re-entering it for the first time, perhaps? <grin>

The 'revalidate' option is not explained for another 20+ pages.

Anonymous   
Printed Page 169
The password servers are given as 'PHOENIX120' and 'HYDRA134', but

the names used previously are simply 'PHOENIX' and 'HYDRA'.

If a server rejects the password, "the connection will ... fail".
Does this mean that access will be denied (regardless of guest access
settings), or simply that the authentication has failed?

Anonymous   
Printed Page 170
The last sentence of the third bullet point states "It can not keep

a connection [open]... ". Surely it could, but "*does* not"?

Anonymous   
Printed Page 171
There is no "domain logins" 9781565924499 command.

It should probably be "domain logons".

Anonymous   
Printed Page 171
The line "domain logins" has no meaning. However, one reader submitted

anerror report stating that this should be "domain logons," which is
even worse. Domain logons will make 9781565924499 entirely unable to
authenticate passwords from the windows NT domain!

Anonymous   
Printed Page 173
In the config fragment, is the 'smb passwd file' option necessary?

This would appear to be the default location anyway.

In the second paragraph under "Disabling encrypted password", it
talks about installing two files on each system. Are both files
needed in each case - or is it simply the appropriate one for the
particular O/S?

Anonymous   
Printed Page 174
The first paragraph says that "plaintext-equivalent passwords .. are

broadcast across the network". Are these sent via a network broadcast,
or sent directly to the authentication server?

Figure 6-3 shows a trailing colon at the end of the line. If this
is necessary, then mention the fact (and that following fields are
ignored). Otherwise it would be clearer to omit it.

Anonymous   
Printed Page 174
In the third paragraph, the location of the smbpasswd file

is specified as /usr/local/9781565924499/private. On page 183, at the
bottom of the page, we learn that many Red Hat distributions put
the smbpasswd file in /etc. It would be helpful to have this
information about Red Hat earlier.

Anonymous   
Printed Page 175
The Last Change Time description includes "*amount* of seconds". Ugh!

Anonymous   
Printed Page 176
The example entry to be added by hand includes a line break in the

account flags field. This makes it impossible to tell how many
spaces should be included. It would be worth mentioning this
explicitly here.

Is it necessary to specify the username with the smbpasswd command?
Since this seems to work in the same way as the traditional Unix
passwd command, it would be clearer to invoke it with no arguments.

Anonymous   
Printed Page 177
The password chat script checks for the prompt "old password". But

since the password command is run as root, the old password won't
be asked for (as implied just above).

Anonymous   
Printed Page 178
The sentence starting on the third line should read "*If* Samba ..."

Anonymous   
Printed Page 179
The new version of the password chat setting at the top of the page

will only match the RedHat style conversation, not the traditional
form. But the first line says that "this will *also* handle ..."
Is there any way to specify alternatives?

The next couple of lines talk about using the debug option to "set
up a new chat script". This is somewhat confusing.

The last line in this section talks about making "password
synchronization a thing of the past". Is this really what is meant?

Anonymous   
Printed Page 181
The discussion of 'unix password sync' refers to "the plaintext

password of the user". Is this is the old password or the new one?
If this refers to the old password (as implied by the footnote),
then what are the implications of setting the 'encrypted passwords'
option? Will setting the Unix password still work?

These two descriptions appear in the opposite order to Table 6-8

The penultimate paragraph talks about a client "connect[ing] *to*
a non-encrypted password".

Anonymous   
Printed Page 181, 186
On page 181, in the second line from the bottom, and on

page 186, lines 8 and 12 from the bottom, it states "entrypted
passwords" when is should be "encrypt passwords", as correctly
stated on page 181.

Anonymous   
Printed Page 182
The description of password level should indicate the security

implications for a non-zero setting, as well as the performance hit.
Is this setting relevant if encrypted passwords are being used?

Anonymous   
Printed Page 183
The description of 'null passwords' implies that Unix system users

(such as bin) necessarily have null Unix passwords. This is not
inevitably the case.

Anonymous   
Printed Page 186
The description of the two versions of Windows handling stop rather

abruptly after the respective config fragments.

In the turkey comment, it mentions that Samba 2.1 is available via
CVS. Is this a "release-candidate" version of 2.1, or alpha code?

The Windows NT section refers to "a few more steps" - but there is
only one step described (setting encryped passwords) before the end
of the section. The discussion of trust accounts reads as a
completely separate section.

Anonymous   
Printed Page 187
The mechanism for setting up trust accounts feels very non-scalable

if there are a large number of clients.

The fourth paragraph says that the resource ID "cannot conflict"
with other resource IDs. Clearly it could - but it "*must* not".

Anonymous   
Printed Page 188
The first line mentions "raising up" a dialog - an unusual phrase.

The last paragraph talks about just entering a password. Is it not
necessary to enter a username as well?

Anonymous   
Printed Page 190
Having joined the domain, does the system reboot automatically?

Anonymous   
Printed Page 191
The discussion on this page talks about "domain groups" until the

owl comment, which mentions "local groups". Are these synonymous?

Anonymous   
Printed Page 192
The end of 'local group map' says "This option will work with

Windows NT clients only" - this phrasing feels rather clumsy.

The "more information" reference to the NT Nutshell book
effectively duplicates the owl comment at the bottom of the page.

Anonymous   
Printed Page 193
The third paragraph talks about the "base" of a share. This isn't

a term that has been used before - previous discussions have simply
talked about the share directory.

The penultimate paragraph recommends using DOS/Windows to create
logon scripts. It would also be possible to use a modern Unix editor
(like 'vim') and explicitly setting the text mode to DOS style.

Anonymous   
Printed Page 194
Roaming profiles are described as being supported by Windows 95

and NT (in the first sentence), but this doesn't mention Windows 98
(which is then included in Figure 6-6).

The only use for roaming profiles suggested is to synchronise
between a desktop and a portable. Another situation where this
could be useful would be a "hotdesking" environment, or a lab of
identical systems.

Anonymous   
Printed Page 195
The discussion of the example logon path configuration fragment

was not particularly clear. In particular, it is never explicitly
stated that this should be a UNC, rather than a Unix path.

Is the share name 'profile' in the second config fragment fixed,
or does this refer to the path element of the UNC from the previous
fragment?

The create and directory modes given are "owner only", but the
Unix listing of an example profile include group write access.
What (Unix) ownership and permissions should be set for the root
directory of the profile share, and the per-user subdirectories?

Anonymous   
Printed Page 196
Is it possible to combine mandatory and normal profiles?

What happens if there is both a user.dat and user.man file?

Anonymous   
Printed Page 197
at the Logon Path paragraph you'll see

"This option providers a location for roaming profiles..." etc.

Now, there are two options that are close together:

logon path =
and
logon home =

They are both for roaming profiles, but the logon path = is the
location where profiles for NT Clients will be stored, and if you
do not specify logon home (then the default is the user's homedir)
Windows '9x clients will create their profile in the users home
directory.

So in order to store Windows '9x roaming profiles somewhere else
other than the user's home directory you'll have to specify logon
home = (and if you have both NT and '9X clients, you have to specify
both logon home and logon path)

Anonymous   
Printed Page 197
The description of the 'logon script' option repeats the

requirement about line endings in the first and last sentences.
This only needs to be stated once - probably dropping "with
lines ending in carriage return/line feed" from the first line.

The 'logon path' option again omits to state that this is a UNC
name (though this is mentioned in Table 6-10).

The obvious choice of drive letter for a user's home directory would
surely be H: (for 'Home')

Anonymous   
Printed Page 198
The default of Z: (in the first paragraph) is a "safe" choice - this

isn't necessarily the same as a "good" choice.

The description of the first function in Table 6-11 starts
"Sets a command..." - all the others start "Sets a Unix command".
These should ideally be consistent.

Anonymous   
Printed Page 199
?} section 6.6.4.2

I don't know if the following is an error but it looks suspicios:

preexec = echo "%u connected to %S from %m (%I)" >>/tmp/.log
|
/|

I would have expected

preexec = echo "%u connected to %S from %m (%I)" >>/tmp/.log

or
preexec = echo "%u connected to %S from %m (%I)" >>/tmp/.log

Which is correct??

Anonymous   
Printed Page 199
Logging connections from within the 'preexec' option requires

global write access to the log file, which might leave it open
to corruption or tampering. What is the advantage of doing this
here, rather than in the root preexec section?

The two user exec options discard any output. Do the two root
exec options work similarly? If so, it would be worth saying so.

Is the %u variable set for the root exec options as well?

The obvious role for 'root postexec' would be undoing whatever
was set up by 'root preexec' (such as unmounting the CD-ROM).

Anonymous   
Printed Page 200
Table 6-12 introduces "some of the other" config options for

setting up users. This feels rather arbitrary and incomplete.
Since these two options both specifically refer to NIS, why
not introduce the table in these terms - perhaps using the
paragraph that currently follows the table?

The references to 'server' in this discussion are unclear,
since these can refer to processes or machines. The details
of who is talking to who is somewhat confusing.

Anonymous   
Printed Page 201
The first paragraph covers both an overview of the two topics, and

a more detailed description of the first topic. This could perhaps
be split into two paragraphs.

The second paragraph says that this chapter will "introduce WINS".
But WINS has already been mentioned in Chapter 1. This coverage
implied that the WINS server offers more than simply IP addresses.

The third paragraph talks about "effortlessly" sending print jobs.
Given the amount of work needed to set up printing in the first place,
this is perhaps a bit tactless. A better description would perhaps
be "transparently"

Anonymous   
Printed Page 202
The description of how printing works goes into a great deal of detail,

much of which is probably not strictly necessary to know.

Anonymous   
Printed Page 203
The second paragraph of the "Minimal Printing Setup" refers to the

'right side' of the option. Previously this has been described as
the 'value' of this option.

The example print command for the System V case sets the printer
explicitly (using "-d%p"), as will the config fragment on p206
("-P%p"), but the config fragment earlier on the page left this implicit.

Anonymous   
Printed Page 204
The second paragraph states "Samba will not reject a document

being sent to a busy printer". Good! That's the whole point
of printer queues.

The pause/resume facilities are only available if the underlying
operating system supports them. This is not made explicit here.

Anonymous   
Printed Page 206
The third paragraph talks about having a "[printers] share for *each*

of the system printers" - this seems misleading since there is only
one such share listed in the configuration file.

The 'testparm' command in the example at the bottom of the page should
be in bold type, according to the conventions listed in the Preface.

Anonymous   
Printed Page 207
The value for 'min print space' in the output of testparms does not

match the value set in the previous config fragment.

The line 'lppause command' is not indented correctly.

The second paragraph talks about changing the guest account "as
mentioned before" - I'm not quite sure where this is referring to.
It could do with being a more precise reference.

Anonymous   
Printed Page 208
Figure 7-2 is essentially a duplication of Figure 7-1. The reference

in the text appears to indicate the screen dump labelled Figure 7-3.
The "real" Figure 7-3 appears to be missing.

The last sentence of the penultimate paragraph recommends to "keep
using" existing printer drivers. Is this the same as the option to
"reuse" the driver mentioned just above?

Anonymous   
Printed Page 210
The last sentence of the second paragraph under Automatically Setting

Up Printer Drivers mentions skipping the Manufacturer dialog - is this
the only bit of the Add Printer Wizard dialog that is skippable?

Anonymous   
Printed Page 211
The command at the bottom of the page creates a new printer definition

and puts this in the file 'printers.def'. It would be safer to
*append* this definition - otherwise any existing definitions
would be lost.

Anonymous   
Printed Page 212
In the list of files to be copied, one of the files is present in a

subfolder. Presumably this structure needs to be retained on the Unix
side? If so, it would be worth emphasising this.

Anonymous   
Printed Page 213

The text reads:

"If Samba asks you to delete unneeded files, do so."

It should read:

"If Windows asks you to delete unneeded files, do so."

It's not Samba that checks if the Windows machine has printer
drivers left that are not being used on the box; windows does that by
itself.

Anonymous   
Printed Page 213
The value of the printer driver location is described as the pathname

of the PRINTER$ share - is this a UNC-style name, or a file path?

The second path states "If Samba asks you to delete unneeded files,
do so". How are such file identified? Will Samba offer to delete
these, or list which files are candidates for deletion?

Anonymous   
Printed Page 214
The penultimate line talks about "the Canon printer", but there are two

Canon printers shown in Figure 7-7.

Anonymous   
Printed Page 215
In the printcap file at the bottom of the page, the spool directory

listed in the 'sd' field has a different name to the printer name.
This might work, but is unconventional, and not particularly clear.

The comment against 'sh' is misspelled - "suppress" not "surpress".
The same error is present on p223.

Anonymous   
Printed Page 216
The end of the BSD description talks about "resetting the Samba server

machine". Does the machine have to be rebooted, or is it sufficient
to restart the servers?

The second line of the System V description starts "to get obtain ...."

The lpadmin command command refers to the option '-i./smbprint.sysv'
This will only work if given from the correct directory.

Anonymous   
Printed Page 218
I'd like to report a little mistake on page 218 of Using Samba.

Chapter 7: Printing and Name resolution.

You'll see a table showing printing types, well.. below that there is
a line 'The value for this optio.n will be .....'

The '.' does not belong there :)

Anonymous   
Printed Page 219
BSD lists printers in /etc/printcap. Nothing is said about how the

list of printers is stored under System V.

The config fragment listed under 'printable' uses a new share name
that's never appeared before (and isn't used again).

The 'printer driver file' option gives the location for Windows 95/98
driver files. What about Windows NT - is this handled the same way?

Anonymous   
Printed Page 221
In Table 7-4, the column under 'BSD, etc' makes reference to 'SYSV',

which is covered in a different column.

Anonymous   
Printed Page 222
The possibility of a "dummy" printcap file for SysV-based systems

would be more appropriately covered on the following page, under
the 'printcap name' description. This paragraph refers to using
"an appropriate lpstat command" - would it be possible to provide
some examples.

Why is the printcap file footnoted here, but not on p215?

Anonymous   
Printed Page 223
Is the printcap option applied overall, or just for that share?

Anonymous   
Printed Page 224
LMHOSTS is "the only one you've probably not encountered before".

I think this means that it's the only one you haven't described so far.

Anonymous   
Printed Page 225
The primary domain controller is indicated by the resource type <1B>

after "the name" - this presumably means the domain name, rather than
the server name, but this is not made clear.

Can you combine names (with the same IP address) on the same line?

The last paragraph describes use of the 'wins proxy' option. Does this
refer to name resolution from witin the Samba software itself, or
requests from other clients?

Anonymous   
Printed Page 226
The options 'wins support=yes' and 'wins server' are described as being

mutually exclusive. What happens if both are specified? Which wins?
The description on p228 says that Samba will "flag an error", but still
does not make clear what happens.

The last paragraph starts "Finally", as did the previous sentence.

The distinction between 'dns proxy' and the 'name resolve order'
options hosts setting is unclear.

Anonymous   
Printed Page 228
The description of 'wins proxy' mentions relaying requests

"from itself" to another server. How does this differ from the
'wins server' role?

Anonymous   
Printed Page 233
The third sentence under Magic Scripts reads "Some users and their

programs rely .... for their programs to function".
Duplication of "their programs".

A magic script ought to work with Windows CR/LF line endings, if each
line also ends with a semicolon character, which marks the end of a
shell command.

Anonymous   
Printed Page 234
The description of code pages implies that it is primarily used for

mapping lowercase to uppercase, but Table 8-4 feels to be more a
character set. This distinction is confusing to those not familiar
with Windows character handling.

I'm surprised that the default code page is 850 (Western European)
rather than 437 (United States). Is this standard, or an internal
Samba configuration?

Anonymous   
Printed Page 235
The config fragment under 'character set' specifies the code page

explicitly, even though it is the default 850.
Is this necessary, or just done for clarity?

Anonymous   
Printed Page 236
The last two entries in Table 8-6 misspell "hexadecimal" as

"hexidecimal".

Anonymous   
Printed Page 238
The example command used to illustrate the 'message command' option

assumes that the server is running X11 on the console. This is often
not the case for a server, so it would be sensible to mention this.

What is meant by "unique variables" in the introduction to Table 8-8 ?
A reference to the "standard variables" would be useful.

The section on Recently Added Options states that these are "not
entirely supported". What on earth does this mean?

Anonymous   
Printed Page 241
The last paragraph of the description of deadtime says that this

option "will work" - I should think so! What this appears to mean
is that it will not cause undue disruption to the user.

The command at the bottom of the page is specific to the BSD form of df.
This is not mentioned here, and the only indication of this fact is
over the page, where the System V equivalent is mentioned. If the
reader doesn't turn the page here, this will be missed.
The BSD version also uses a bare command name, while the System V
version gives the full path to the command. Why the inconsistency?

Anonymous   
Printed Page 244
The code fragment under 'panic action' is missing a double quote.

The description of 'set directory' refers to the VMS command as
'setdir' (one word) in contrast to the entry in Table 8-10
("set dir" - two words).

Anonymous   
Printed Page 245
The description of smbtar refers to "modem", rather than "modern PCs".

How is it possible to use a CD-ROM to back up a system ? They're read
only! Presumably this means using a CD writer, but it reads oddly.

Anonymous   
Printed Page 246
The second paragraph refers to using smbtar to back up "user data [kept]

on your Samba system". Surely data on the Samba server would be
backed up using standard Unix backup tools (e.g. dump, etc) ?

In Figure 8-2, highlight "File and printer sharing".

Anonymous   
Printed Page 247
The first paragraph feels rushed and unclear.

The third paragraph refers to sharing the disk "with the tape server".
Marking a disk for sharing doesn't appear to specify acceptable hosts
to share with. It simply offers the disk for sharing generally.

The "second step" mentioned on the last line is ambiguous. Does it
refer to the second numbered step on p246, or the second step of
sharing the disk?

Anonymous   
Printed Page 248-9
Figures 8-4 and 8-5 are identical. It would make more sense if these

figures referred to a folder on a disk that wasn't already shared.

Given that only one of the invocations of smbtar requires write access,
it would be sensible for Figures 8-4/8-5 to share the folder Read-Only.
Full sharing has security implications, and if this isn't necessary,
why risk it?

Anonymous   
Printed Page 250
The list of things to check does not match the order in which things

are introduced in this chapter. Steps 2, 3 and 4 are discussed in
reverse order. Steps 6 and 7 are also covered in the opposite order,
and there is no mention here of the Samba mailing lists (see p292)

Anonymous   
Printed Page 251
The last sentence of the first (full) paragraph starts

"Substitition variables that allow...." - delete 'that'.

Anonymous   
Printed Page 252
The dump at log level 3 claims to cover the same material as the level

2 version, and is just truncated. It should therefore start with the
"Got SIGHUP" message, and include the various share section handling.
In fact, it appears to be detailing a small portion from within the
middle of the level 2 operations. This is not stated clearly anywhere.

Anonymous   
Printed Page 255
The tcpdump program used here is the Samba-enhanced version,

but this is only mentioned at the end of the description.

Anonymous   
Printed Page 256
The explanatory text 'Outer frame of SMB packet' is mixed in

with the packet dump, rather than being off to the right.
The explanatory text 'Beginning of a reply to a request' wraps.

The explanation of the command-line options at the bottom of
the page is in a different order to the way they were used.

Anonymous   
Printed Page 258
The first line talks about "add[ing] TCP software", etc.

This is slightly misleading, as the TCP software will be installed
already. What is probably meant is "testing of" TCP software, etc.

The output of "ping 127.0.0.1" includes references to "localhost".
In practise, pinging a numeric address typically does not perform
the reverse lookup, so only the numeric address would be shown.
The layout of this example does not seem to match the standard
Linux ping command, which looks like this:
64 bytes from 127.0.0.1: icmp_seq=0 ttl=64 time=0.1 ms
(This is RedHat 5.1, and the ping command is in the RPM 'netkit-base').

Anonymous   
Printed Page 259
The second paragraph under "Testing the network hardware with ping"

says to "repeat it for the client". This is ambiguous - do you
ping the client's IP address from the client, or the server's IP
address from the client. The first is what is meant, but this could
be read either way.

The last paragraph says to ping the server (by name) from the client.
An intermediate test that has been omitted is to ping the server
by IP address from the client. This would show network connectivity,
without relying on the name service.

Anonymous   
Printed Page 260
The screen shot in Figure 9-1 does not include the expansion of

the server name to the full form, as described underneath (point 2).
The IP address show does not match that in the text (point 3).

Should the command 'arp -a' be given on the client, or the server?
If on the server, it is also possible to ask for the ARP entry
of a particular machine, using 'arp hostname'.

Anonymous   
Printed Page 261
A single "(incomplete)" ARP entry probably indicate a problem with

that one remote machine. A problem with lack of connectivity is
likely to result in multiple "(incomplete)" entries.
This form of entry appears to be specific to Unix systems.
Our Windows boxes do not display entries for non-responding systems.

The address 192.168.236.86 is an IP address, not an Ethernet address.

If the ARP address is obtained via a proxy response, then it would
be quite normal for the ping to fail if the remote machine is turned
off. This would *not* indicate "an intermittent or ARP problem"
as stated in the second dash-point.

A possibility omitted from the case 'a' at the bottom of the page
is that the routing on the local system is wrongly configured.

Anonymous   
Printed Page 262
The sixth bullet points says that "ICMP (and UDP) are designed to

drop .. packets". This makes it sound inevitable, and desirable!

The last paragraph talks about "multiple names for an Ethernet address"
Does this mean Ethernet address, or IP address?

Anonymous   
Printed Page 263
The first paragraph under Troubleshooting TCP assumes that the ping

testing will have tested UDP services. This is not correct if name
resolution is done locally.

The second bullet point assumes that all Unix systems allow FTP and
telnet connections. This is not necessarily true - particularly for
servers, which may (ought!) to provide a minimal set of services
to improve their security. Restricting FTP and telnet to a limited
set of machines is one such approach.

Anonymous   
Printed Page 264
The "long" option in the paragraph under 'Looking for daemon processes'

is in constant width font. This isn't actually the name of an option,
so ought to be in normal type.

Anonymous   
Printed Page 265
The 'state' in the output of the netstat command is folded onto the

next line. This makes it difficult to read.

The example output includes the state 'LISTEN', but the following
text talks about the state 'LISTENING'

The fifth sentence of the third paragraph starts "If both of the
lines *is* missing....".

The penultimate sentence talks about "our" daemons. Does this mean
the daemons at the authors' site, or those started manually?

Anonymous   
Printed Page 267
The list of messages produced by testparm seems to include both

informational messages, and warnings or errors. It's not always
clear which of these can be ignored, and which are likely to affect
the correct operation of the system, and need fixing.

Anonymous   
Printed Page 268
The second part of the first paragraph mentions the "Allow/Deny

connection..." message. The word 'account_name' should probably
be in a different font to distinguish it, and the next two words
"to service" are also part of the message, so should be within the
double quotes.

The output of smbclient at the bottom of the page, supposedly
invoked using the guest user, includes "User=[davecb]".

Anonymous   
Printed Page 268
3rd paragraph

"browseble = no"

browseble is a typo for browsable.

>From the file 9781565924499/var/log.smbd

Unknown parameter encountered: "browseble"
[2001/04/20 11:25:05, 0] param/loadparm.c:lp_do_parameter(2549)
Ignoring unknown parameter "browseble"
~

Anonymous   
Printed Page 269
The example output at the top of the page does not line up properly.

The penultimate bullet point refers to "%U" rather than "U%"

Anonymous   
Printed Page 270
The second paragraph talks about supplying your Unix password to

the Password prompt, but this was not shown on the earlier example.

The phrasing of the error given in this paragraph is fairly specific,
and will not be the same for all of the possible problems listed.

Anonymous   
Printed Page 271
Under the heading 'Testing connections with NET USE', the command

given only has a single leading backslash. Surely there should be two?
There's a similar error in the last paragraph of the next page.

The screen shot on the next page uses the command 'net use g:'
rather than 'net use *'

Anonymous   
Printed Page 273
The second owl comment concludes by saying that unencrypted passwords

are acceptable on a local network. This assumes that this local
network is regarded as secure.

The bullet point following states that Samba will try a password
"once with it in uppercase and once in lower case". This implies
that a password will never be tested in the form received.
The is also an inconsistency in whether "case" should be a
separate word or not.

Anonymous   
Printed Page 274
The owl comment could usefully refer back to the earlier discussion

of protocol binding.

Figures 9-2 and 9-3 show different contents of the TEMP directory.

Anonymous   
Printed Page 275
The fifth dash-point implies encrypted passwords will inevitably

fail. This is only a problem if the Samba server is not set
up to handle encrypted passwords.

Anonymous   
Printed Page 276
The end of the first (full) paragraph implies that browsing needs

broadcast capability. The first chapter seemed to imply that the
use of master browser systems could avoid this requireent.

The implication that "normal = reliable" is probably unwarrented.
Use of the descriptions "reliable" and "unreliable" is somewhat
confusing anyway. I don't think this has been common terminology
so far, so it seems unnecessary to start using it now.

The example output on this page has some minor indent problems.

Anonymous   
Printed Page 277
The phrase "didn't get /tmp" in the second bullet point is a bit vague.

The third dash-point mentions "OS/2 or Windows for Workgroup clients".
Given that this testing is being done with 'smbclient', what relevance
do OS/2 or WfW clients have?

Anonymous   
Printed Page 278
The second bullet point ends "where the problem is first analyzed."

This refers to the past, so should read "... *was* first analyzed".

The penultimate bullet states that the "-B option takes a broadcast
address", but the preceding paragraph said to use the server name.

The third sentence of the last bullet is missing a word - "If so, it
may not BE claiming names...".
The word "configuration" is misspelled in the penultimate sentence.
The double negative in the last sentence makes it hard to follow.

Anonymous   
Printed Page 279
The first line is missing a "the" before "-B option".

It should also probably read "*with* the client's name".
The client name in the "nmblookup" command should be in italics
to agree with the "nmblookup" command on the previous page.
(or the previous page should use bold fixed width instead)

The "any failures" at the end of the line following this bullet
point would appear to include the problems mentioned there.
It should probably refer to "any other failures"

The last line of the page appears to be corrupted.

Anonymous   
Printed Page 280
The section 'Browsing the server from the client' is the first

time in the whole book that "File Manager" has been mentioned.

The view of the server in Figures 9-4 and 9-5 are inconsistent.

The last couple of lines refer to "looking too soon". Too soon
after what? After logging in? Booting the system?

Anonymous   
Printed Page 281
Would a server with no shares marked as browseable generate an

error, or simply appear empty?

The first paragraph under "Other Things that Fail" implies that
*all* problems are either solved or new to the authors. The section
then proceeds to outline other known problems, which haven't already
been solved, in contrast to this claim.

The last sentence under "Not logging on" suggests "shutting down
and logging in again". It's extremely difficult to log into a
system that has been shut down!
How about "restarting the system and logging in again".

Anonymous   
Printed Page 282
The first bullet point talks about trying WINS, then DNS.

The description of WINS given earlier implied that the WINS server
would try DNS anyway.

The third bullet point talks about "the SMB client program" using
something different. Does this refer to the previous bullet points?
If so, this is not immediately apparent.

In the sentence following this list, the suggestions made conflict
with the information just given. If this list is simply the default
settings, then this needs to be made explicit.

The presence of a /etc/resolv.conf file (paragraph 3) does not
necessarily imply that DNS is being actually used. This may depend on
other settings, such as the /etc/nsswitch.conf file mentioned later.

Anonymous   
Printed Page 284
In the command "nslookup name", should this name be the long form

or the short form? This is only addressed in the third dash-point.

If any of the name servers are active, the nslookup command should
work (though you may need to wait for the earlier ones to time out).

Does the "these lines" in the last sentence refer to the workgroup
lines, or the server lines, or both?

Anonymous   
Printed Page 285
The owl comment could usefully refer back to where NETBIOS name

types was first described.

The "name" parameter in the ypmatch commands should be in italics.

Anonymous   
Printed Page 286
In the first bullet point, the line that sets the domain name is

described as starting with "default" (line 2) and "domain" (line 5).
Which is correct?

The command under NIS should have "hostname" in italics, as with NIS+.
The following comment implies that this should be the short form. Yes?

If the short form works under DNS but the long form doesn't, the
obvious error is that the domain is set wrongly.

Anonymous   
Printed Page 288-9
Subnet masks do not need to fall on byte boundaries - it is quite

possible to have a subnet mask of 255.255.252.0, for example.
This possibility is not recognised at all.

Anonymous   
Printed Page 290
The second paragraph, covering connecting to the Internet, talks

about "getting a real network". This should read "getting a real
network address" - an isolated network is still a "real network"!

Anonymous   
Printed Page 321
This page refers to RAID level 1 as striping, which is false.

Striping is RAID level0, RAID level 1 is mirroring.

Anonymous   
Printed Page 334
The printing in question is that of the first edition, Jan 2000.

First: on the third line, it says that the cpu throughput is
16000. I believe it should only be 6,000, as it is in the rest of the
entries.

Second: in the same table, The Actual Throughput on the last line,
which is "Use Dual 100 Mbps ethernet", is listed as 11,200, while I
think the bottleneck at the CPU should restrict it to 6,000.

Anonymous   
Printed Page 360
In the 9th-10th paragraph, the "-P" option for smbd is listed twice.

Both listings are identical.

Anonymous   
Printed Page 377
In the second line, which reads "net network number", the "t" in

the word "net" is in the wrong font: it doesn't match the "ne".
This is only the case in the physical book, the html version
doesn't have this issue (didn't check the pdf version).

Anonymous   
Printed Page 378
I want to make a clarification to chapter E in your SAMBA book.

It mentions downloading Samba with CVS and to be honest, the whole
stuff is not written very well.

The company Cyclic Software does not exist anymore, although their
Web Site is adopted through a community effort and actually
maintained by SourceGear, the company which bought Cyclic Software.

CVS was written on top of RCS and has needed an installed RCS,
but this is NOT required anymore since Version 1.10.X of CVS.
You only have to install CVS on your machine and a lot of Linux
distributions and *BSD systems has already installed a proper version.

Once you have connected to the Samba CVS server, you must first
log in. But to log in you have to send a password, which you do
not mention at all. The right password is cvs.

Since the Samba CVS distribution is really big, you should at
least mention that one could use the option -z3 to compress the
data stream. It would be nice if you could correct these issues.

Anonymous   
Printed Page 380
In the seventh content line from the top, "daemon" is misspelled

in the example file as "deamon".

Anonymous   
Printed Page 389
Index section 'H', first column of page.

Index entry "hort preserve case option, 147" should read "short preserve
case option, 147" (and thus be located in index section 'S').

This obviously makes it difficult to look up this specific name mangling
option in the index.

Anonymous   
Printed Page 399
In reference to the colophon: The African ground hornbill

(Bucorvus Cafer) has a WATTLE, not a "waddle". Ducks waddle when
they walk, as do very pregnant human females. Turkeys, chickens
and hornbills, among others, have wattles.

Anonymous