The errata list is a list of errors and their corrections that were found after the product was released.
The following errata were submitted by our customers and have not yet been approved or disproved by the author or editor. They solely represent the opinion of the customer.
Version |
Location |
Description |
Submitted by |
Date submitted |
Printed |
Page Online
There is an error in your online version of 'Using Samba'. 'Figure 5.1 |
Multiple subnets with Samba servers' has wrong IP-addresses for the
workstations in the 192.168.222 subnet:
192.168.221.130 should be 192.168.222.130 and
192.168.221.140 should be 192.168.222.140
(?) Appendix F, "Sample Configuration File", entire chapter;
This is on safari.oreilly.com.
If a code fragment (fixed width type) immediately follows a normal Roman paragr
aph, and the first line of code is supposed to be indented, it isn't. Instead
it is flush left. The problem lines are:
comment = Samba ver. %v
guest ok = no
path = /u/programs
(?) Appendix F, "Sample Configuration File", fourth code fragment;
"deamon" should be "daemon" here:
# who is NOT allowed to connect to ANY service
invalid users = @wheel, mail, deamon, adt
This is on safari.oreilly.com.
(?) Appendix F, "Sample Configuration File", 4th code fragment;
Typo: "privilages" should be "privileges".
This is in the online edition on safari.oreilly.com.
|
Anonymous |
|
Printed |
Page 2
The output of the 'grep' command ought to be on separate lines |
|
Anonymous |
|
Printed |
Page 4
In Figure 1-1, phoenix is shown running Win98. |
In Figure 1-2, phoenix is shown running Linux.
|
Anonymous |
|
Printed |
Page 5
In Figure 1-3, the status bar displayed reads "3 object(s)", but |
there are only two shown.
|
Anonymous |
|
Printed |
Page 5
Password-protection is done when sharing the drive, |
not when mapping it.
The Example UNC "\HYDRA
etwork" is a mixture of roman (capitals)
and italic (lower case) text. This looks somewhat odd.
The conventions listed on p.xiii seem to imply that this should
all be in italics, though this is not particularly clear.
|
Anonymous |
|
Printed |
Page 6
Saying that browsers "typically" use forward slashes is confusing. |
This is how a URL is formally defined.
A browser that accepts backward slashes is doing so purely for
user convenience (which is fair enough), but this shouldn't be
implied as having any formal standing.
|
Anonymous |
|
Printed |
Page 7
In Figure 1-6 on page 7, the status bar |
reads "4 object(s)", but the window shows only 3.
|
Anonymous |
|
Printed |
Page 10
The fourth paragraph refers to "this document" (singular), but |
this is referring back to RFCs 1001/2 - two documents (i.e. plural).
|
Anonymous |
|
Printed |
Page 11
The two approaches to name registration listed at the top of the |
page appear in the opposite order in the accompanying diagram
(Figure 1-8).
The following equivalent descriptions and figure for name
resolution use the same order as Fig 1-8 (as does much of the
rest of this discussion). It would probably be sensible to
reverse the order of these first two approaches.
|
Anonymous |
|
Printed |
Page 14
The rules for an acceptable name state that it "may not begin |
with an asterisk", but asterisk is not in the list of acceptable
characters at all.
|
Anonymous |
|
Printed |
Page 15
The description of resource types (at the bottom of p14) leads |
into an example of the output of NBTSTAT, where "type" has a
different meaning.
This distinction isn't made particularly clear.
|
Anonymous |
|
Printed |
Page 16
The continuation header line does not actually appear in the |
output of NBTSTAT, as implied. It would be preferable if this
title was put in a different typeface, to make this clear.
Alternatively, simply omit the word "continued".
The description of __MSBROWSE__ refers to "master browsers",
which is a concept which won't be described until p21 or so.
Is it necessary to mention this explicitly at this stage?
The description of name registration implies that names must
be unique, but it is not clear whether this uniqueness should
extend across different groups. Can you have two machines
with the same name, if they are in different groups?
|
Anonymous |
|
Printed |
Page 17
The second paragraph refers to a "full-duplex" connection, |
with no further explanation. This is a term that may well
be unfamiliar to many experience network people, unless they
have had experience with low-level networking or telecomms.
This whole paragraph is rather less clearly explained
than I would expect from an O'Reilly book.
|
Anonymous |
|
Printed |
Page 18
The final paragraph refers to "domain controller (logon server)". |
Are these two terms synonymous?
|
Anonymous |
|
Printed |
Page 20
Section 1.4.1.2 'Primary and backup domain controllers' - second |
paragraph;
(Reading HTML version of the book that comes with 9781565924499-2.0.7)
In section 1.4.1.2, the second sentence of the second paragraph reads:
"This is not accidental since the concept of Windows domains did not evolve
until Windows NT 3.5 was introduced..."
This is incorrect. Domains were first introduced with Microsoft LAN Manager
2.0 as I recall. This was in the days of OS/2 1.2, long before the first
version of Windows NT was released.
|
Anonymous |
|
Printed |
Page 20
The initial description of the primary domain controller refers |
to it as being "currently active", implying that backup domain
controllers are not. The final sentence then implies that any
domain controller (including BSCs) can be used to authenticate
users. This appears to contradict the initial description.
The third paragraph refers to "other PDC responsibilities"
in contrast to authentication. However, this is the only
responsibility that has been described so far. What other
PDC responsibilities are there?
|
Anonymous |
|
Printed |
Page 21
The fifth paragraph talks about a "Windows workgroup subnet". |
This is the first time that "subnet" has been mentioned.
It either needs a word of explanation, or else to be skimmed
over until this is covered more fully on p24.
|
Anonymous |
|
Printed |
Page 22-23
The description of the algorithm for the number of backup |
browsers seems overly complex. It seems to be simply one
backup browser for every 32 NT, or 16 Windows 9x workstations
(or part thereof).
What are the implications of a having mixture of NT and 9x
systems in the same workgroup? Are these two calculations
done independently, or does a 9x system count as equivalent to
2 NT systems?
|
Anonymous |
|
Printed |
Page 24
Again, the concept of a "subnet" seems to be taken for granted. |
This may be reasonable, but it might be worth adding a word
of explanation.
Presumably "subnet" is intended to also cover distinct IP
networks, as well as IP subnets? (Since the examples in
Figure 1-14 are different networks, rather than subnets).
|
Anonymous |
|
Printed |
Page 25
Figure 1-14 labels one of the systems as a "WINS server". |
Given that this figure is reference from the previous page
(where "WINS" has not yet been covered), and is not referred
to during the description of WINS, is this label necessary.
Either refer to a NBNS, primary name server, or similar
generic term, or don't bother labelling it at all.
The second sentence of the WINS desription seems to state
that all machines *must* be called "fred"! OK, it's clear
what this actually means, but the wording could be improved.
|
Anonymous |
|
Printed |
Page 26
How does the distinction between primary and secondary WINS |
servers relate to the preceding discussion of multiple WINS
servers? Can you have multiple primary WINS servers?
The description of Samba states that it "cannot properly
synchronize its data", but the table implies that it can
act as Primary Domain Controller. Surely it needs to
be able to synchronize with NT backup controllers to do this?
Table 1-6 refers to "Samba 2.1 or higher recommended".
But Samba 2.1 isn't out yet!
This apparent contradiction isn't properly explained
until much later (p186)
|
Anonymous |
|
Printed |
Page 27
The third sentence begins: |
"smdb handles all notifications..."
This should read "smbd", not "smdb".
|
Anonymous |
|
Printed |
Page 29
The third line should read "... not complete IN Samba 2.0". |
(i.e. the second "is" should be "in").
|
Anonymous |
|
Printed |
Page 36
Pluggable Authentication Modules are not unique to Linux systems |
(which is the impression given here).
The description of '--with-mmap' refers to "fast locking".
This is presumably a misprint for "file locking".
|
Anonymous |
|
Printed |
Page 38
The tee command shown does not attempt to catch standard error. |
This may mean that important errors are not saved in the log file.
A better command would be
./configure 2>&1 | tee mylog
|
Anonymous |
|
Printed |
Page 39
The first paragraph of explanation (following the example output) |
starts "If you encounter *problems* ... if *it* is easily fixable".
There's a mismatch between plural and singular here.
Describing compilation problems as "almost always easy to overcome"
strikes me as naively optimistic!
|
Anonymous |
|
Printed |
Page 40
The description about saving the old version (at the start of the |
page) is not particularly clear.
|
Anonymous |
|
Printed |
Page 41
The fourth field of the inetd.conf entry - "nowait.400" would be |
more commonly specified as simply "nowait". The limit on maximum
number of servers is not available on many Unix systems.
|
Anonymous |
|
Printed |
Page 41
Header Final Installation Steps |
The changes to /etc/services and /etc/inetd.conf will not work on RedHat
7.0 Linux. RedHat has gone to xinetd and this has a different format.
Please include the necessary information to use this with RH's xinetd
|
Anonymous |
|
Printed |
Page 41
2.4 A basic SAMBA configuration file |
(page 41 in french edition !)
The problem is online too :
----------------------
[global]
workgroup = SIMPLE
[test]
comment = For testing only, please
path = /export/9781565924499/test
read only = no
guest ok = yes
----------------------
In the first example given, the authors set "guest ok = 1", but "map to
guest" is not set, so it has its default value : Never.
Further more, map to guest doesn't appear in the list in the end (appendix C).
|
Anonymous |
|
Printed |
Page 42
The owl comment appears to refer to "access[ing] shares into Samba's |
encrypted database", which doesn't make sense. This isn't what is
meant, but this sentence could be re-phrased to avoid this confusion.
|
Anonymous |
|
Printed |
Page 43-44
Figure 2-2 doesn't show all the fields mentioned, and does show |
some fields that aren't described in the text. This is confusing.
The field values (SIMPLE, USER, etc) mentioned in the text should
probably be in constant width font (according to the conventions in
the introduction), and it might be helpful to have the field names
distinguished in some way as well.
How do you get from Figure 2-3 to Figure 2-4? Is selecting the
name from the list sufficient, or do you also need to press the
"Choose Share" button?
|
Anonymous |
|
Printed |
Page 45
What is the operation of the various "Set Default" buttons? |
Is this significant here, or can they be ignored?
|
Anonymous |
|
Printed |
Page 46
The line "path = /export/9781565924499/test" in the example conf file |
is not aligned correctly with the rest of the file.
|
Anonymous |
|
Printed |
Page 47
In the third line of the block of code at the bottom of the page, |
There should be a space after the "." in the line that reads
"./etc/rc.d/init.d/functions".
|
Anonymous |
|
Printed |
Page 47
In the "if" statement, there needs to be a space between |
|
Anonymous |
|
Printed |
Page 48
Inetd is described as "listen[ing] on TCP ports" only. In fact, |
it also listens on UDP ports as well (including 'netbios-ns').
Line 5 this paragraph: "listens in place*S* of all the others".
|
Anonymous |
|
Printed |
Page 52-53
The sentence crossing this page boundary - "After confirming..." |
is not particularly clear. It might be easier to understand if
the existing username/password case was described separately.
|
Anonymous |
|
Printed |
Page 53
The last line of the second paragraph talks about "Password |
encryption [being] improved between Win9x and Win2000".
Where does NT 4.0 fit in?
The second paragraph of "Setting up the Network" talks about
"see[ing] ... a network device ... bound to [a] protocol".
It's not clear how you can "see" this binding (unless you have
multiple devices). What you "see" is two apparently separate
things - a device and a protocol. The binding is implicit.
There is also no description of what binding means anyway,
in contrast with the NT equivalent on p71.
|
Anonymous |
|
Printed |
Page 54
The last paragraph talks about "selecting the protocol TCP/IP |
from manufacturer Microsoft". In fact, you have to select the
manufacturer first, so these should be mentioned in the opposite
order.
|
Anonymous |
|
Printed |
Page 55
Figure 3-6 would be clearer if "Protocol" was highlighted |
The "arrow" mentioned in the penultimate paragraph actually
refers to the binding (mentioned two pages earlier), but this is
not made explicit, either here or at the beginning of the section.
|
Anonymous |
|
Printed |
Page 56
Figure 3-9 uses a different example IP address from the accompanying |
text on the next page.
The figure is also titled incorrectly (with an extraneous 'S').
|
Anonymous |
|
Printed |
Page 58
It's not clear that you actually need to enter the DNS server |
address in the box that's shown empty in Figure 3-10.
The name "client" is a poor choice, and probably ought to match
the name used in the accompanying text ("hobbes"). This also
applies to the following figures 3-13 and 3-14.
The 'Domain' and the 'Domain Suffix Search Order' ought to match.
|
Anonymous |
|
Printed |
Page 59
The address given for the WINS server in Figure 3-11 is that being |
used for the local machine in the preceding description.
The paragraph at the top of this page talks about entering NT WINS
servers as well as the example Samba server. The turkey comment
lower down says that mixing them does not work.
Which is correct?
|
Anonymous |
|
Printed |
Page 60
The Windows drive (second line) would normally be referred to |
simply as "C:" - without the additional backslash.
C: refers to the root directory on that drive.
|
Anonymous |
|
Printed |
Page 61
The second paragraph talks about setting the workgroup to be the |
same as that in the Samba configuration file "as well" as the example
"SIMPLE" (end of the second sentence, line 3). This implies a
system can be in more than one workgroup.
It would probably be better to say "instead" here.
|
Anonymous |
|
Printed |
Page 62
The Samba server set up in Chapter 2 was called "Hydra", not "Server" |
(Figure 3-14).
This also only set up a single share "test" - would the "lp" share
be visible by default (Figure 3-15) ? The same question arises with
reference to Figure 3-27 on p73.
|
Anonymous |
|
Printed |
Page 62
The last paragraph is attempting to deal with the problem of servers |
not appearing in the browse list immediately, which leads to users
(and sometimes new admins :-) ) to believe that 9781565924499 is not properly
configured. If the server is not so listed, it advises a test by
which a UNC can be tried out, involving using Windows Explorer to map
a network drive, the success of which means the server /is/ properly
configured.
This test is too complex, unnecessary, and potentially problematical.
A UNC of a server missing from the browse list can be tested far more
easily with clicking Start, then Run, entering the full UNC
(\server est) and hitting OK. A working server will instantly
return an open window on that share.
The original solution would stand for wfwg, WinNt < v4 and Win3.x.
However the context of the chapter is on configuring Win95/98/NT4.
The original solution is problematic in that it may well leave an
open network drive permanently mapped on the test machine.
This simplification would also apply to the NT4 explanation on page 73.
|
Anonymous |
|
Printed |
Page 63-73
A number of the descriptions in the NT section are _almost_ |
the same as the equivalent Win9x versions, but phrased slightly
differently in niggling little ways. Ideally, the two phrases
should be made consistent, taking the better of each.
I particularly noticed the descriptions for DNS (p57/68),
WINS (p59/70) and hosts (p60/71) as well as the description of
bindings (p71) which was not really properly explained in the
Win9x case (p60).
|
Anonymous |
|
Printed |
Page 66
In figure 3-20, highlight "Workstation" to match the text. |
|
Anonymous |
|
Printed |
Page 67
Win9x needed to set four of the option tabs, not three. |
The text description re-uses the IP address previously used for
the Win9x box (and doesn't match Figure 3-22 on the next anyway).
The owl comment refers to 192.168.x.x being "reserved for ... LANs".
The important thing about these addresses is that they are
reserved for *private* LANS, those not connected to the Internet.
|
Anonymous |
|
Printed |
Page 68
The description of DNS starts talking about "we", rather than "you". |
This is inconsistent with most of rest of the book.
|
Anonymous |
|
Printed |
Page 69
Figure 3-23 has a different domain from that implied in the text, |
and the DNS servers don't match the text either.
A similar comment holds for the WINS server in figure 3-24 (over).
|
Anonymous |
|
Printed |
Page 70
End of first sentence on page.; 5/00 printing |
(before the NETBIOS name) -> (the NETBIOS name)
|
Anonymous |
|
Printed |
Page 70
first paragraph after figure 3-24, third sentence |
5/00 printing:
wins service = yes => wins support = yes
|
Anonymous |
|
Printed |
Page 71-72
The text description under "Bindings" instructs the reader to click |
on all the + buttons in the tree, but Figure 3-25 has only opened
one level, and there are still three + buttons shown.
|
Anonymous |
|
Printed |
Page 72
Figure 3-26 displays "Client" and "Server" rather than "Artish" |
and "Hydra" (as with Figure 3-14 on p62)
|
Anonymous |
|
Printed |
Page 72
second sentence of last paragraph |
5/00 printing:
the test and the default => the test directory and the default
"test" should be in italics the same as the last paragraph on page 61, describing
confiiguration of Windows 95/98 machines.
|
Anonymous |
|
Printed |
Page 72
Last sentence on page |
5/00 printing:
Last sentence on page:
For more information ...
should be removed. It refers to a warning in a previous
section which isn't there.
|
Anonymous |
|
Printed |
Page 73
The troubleshooting description refers directly to "The Fault Tree" |
in Chapter 9. The Win9x equivalent referred simply to Chapter 9
as a whole.
|
Anonymous |
|
Printed |
Page 73
fourth line of second last paragraph |
5/00 printing:
\server emp => \server est
|
Anonymous |
|
Printed |
Page 74
The description of unused header fields feels to be too much detail, |
too quickly. This information would probably be better coming after
the header table, and the null TID could easily be left until the
example walkthrough.
|
Anonymous |
|
Printed |
Page 75
The first entry in Table 3-1 is confusing. Where does 0xFF fit in? |
The description of the Command Contents is unclear. The text implies
that each command is different, but the table entries seem to be
general (and aren't really explained properly).
This could do with some re-working.
|
Anonymous |
|
Printed |
Page 76
The last sentence of the SMB variations section talks about |
"LAN Manager 0.12". Presumably this means "NT LAN Manager 1.0"
a.k.a. ID string "NT LM 0.12".
It would be better not to mix the version numbers in this way.
|
Anonymous |
|
Printed |
Page 77
In the second sentence, "Wndows" should be changed to "Windows". |
|
Anonymous |
|
Printed |
Page 78
The description of establishing a virtual connection talks about |
a "bidirectional virtual channel". This jargon probably needs to
be explained, or phrased more simply.
The negotiation talks about setting the TID to 0, in contrast with
p74, where it said that a null TID had the value 0xFFFF.
|
Anonymous |
|
Printed |
Page 80
The second command is given as SMBtconX - does this trailing X |
mean that this command also has yet another command piggybacked
onto it? Presumably not, but that's the impression given by the
initial description of the 'X' suffix immediately before.
|
Anonymous |
|
Printed |
Page 81
The second sentence of the section "Making Connection to a Resource" |
is more specific than previous descriptions. They started with the
general case, and then described a specific example.
This starts with the specific type, and *then* widens out.
|
Anonymous |
|
Printed |
Page 82
The first paragraph talks about "this chapter", but it's actually |
referring to the next few chapters in the book (as in the following
paragraph).
|
Anonymous |
|
Printed |
Page 84
The section on whitespace says that this is ignored between the |
name and value, but significant within the value. Is *trailing*
whitespace significant or not? (This is worth mentioning explicitly)
The description of multiple valued options is not clear.
How does this differ from the preceding example (which also had
multiple tokens, but only one value) ?
|
Anonymous |
|
Printed |
Page 85
Are trailing spaces significant in a continuation line? |
I.e. does the backslash have to be the last character in the line,
or simply the last non-blank character?
(This is a common source of difficult-to-track down faults, so
I hope it's the latter - but definitely worth mentioning if not!)
|
Anonymous |
|
Printed |
Page 87
The penultimate paragraph says that (in the absence of an included |
file) Samba "won't do anything at all".
This is ambiguous - does it mean that Samba will stop working,
or silently ignore the include line? Needs clarification.
|
Anonymous |
|
Printed |
Page 88
In the 4th paragraph, the text repeatedly refers to the [global] |
|
Anonymous |
|
Printed |
Page 88
The paragraph under Special Sections includes the phrase "each and |
every configuration option*s*" - this should be singular.
There should perhaps also be an "immediately" somewhere in here.
Hopefully the reader will understand all the options eventually!
The third sentence of the next paragraph includes "other sections
can list ... in their section". This repetition feels wrong, as
if a section somehow 'includes' itself. I suggest you simply
drop the phrase "in their section", which retains the same meaning.
|
Anonymous |
|
Printed |
Page 89
The first paragraph talks about the [test] share, until the last |
line when it suddenly refers to the [pub] share.
|
Anonymous |
|
Printed |
Page 91
A boolean isn't simply an enumerated type with two values, since |
there are a number of different representations of these values.
The first line in the next paragrpah includes the horrible phrase
"start off easy" - ugh! This may be valid American English, but
not over this side of the pond. <shudder>
How about "start off gently" or "start off easily" ?
The description of the 'config file' option refers to the variables
"above" - where this means four pages before. Contrast this with
the back reference on the next page, which talks about "earlier".
Also, are all the variables valid here, or not ? Certainly in
the include option, the useable range is limited. How about here?
Both this and the next section should really talk about "taking
advantage of *some* *of* the variables", if they're not all available.
|
Anonymous |
|
Printed |
Page 93
The section on Server Configuration is inconsistent in its use |
of capitalisation. Both the NetBIOS name and the workgroup are
upper case in the config file, and the workgroup is in the text
that follows. But the NetBIOS name is given as "hydra" instead.
|
Anonymous |
|
Printed |
Page 95
The final paragraph of the description of netbios name talks about |
using this to relocate services from a dead or retired machine.
This is actually an example of standard practise in the Unix DNS
world, where the accepted naming convention is to try and "hide"
the real server name, and use generic service names as much as
possible.
A mail server would typically be referred to as "mail", even
though its actual name would probably be something else. Similarly
the web server would usually be "www", etc. The netbios name
could easily be used to offer the same sort of "server independent
service name".
|
Anonymous |
|
Printed |
Page 95
Last line on page of 05/00 pressing |
Change:
(%h) -> (%L)
to match example shown two pages earlier
|
Anonymous |
|
Printed |
Page 98
You present an example smb.conf entry for a share called 'network'. |
The path in the example is /export/9781565924499/network. However, the next
sentence says, "And the contents of the directory /usr/local/network
....". It should say /export/9781565924499/network as the subsequent ls -la
command shows.
|
Anonymous |
|
Printed |
Page 102
3rd line from bottom |
"134.213.233.100" should be "134.213.233.110"
|
Anonymous |
|
Printed |
Page 104
7th bullet, Line 1 |
the word "more" should be removed.
|
Anonymous |
|
Printed |
Page 105
The description of interfaces refers to "optionally" specifying the |
CIDR format. This implies this is done as well as the netmask format
shown previously. This would be better described as "alternatively".
The owl description talks about "this option", which is ambiguous.
Does it mean the whole interface option, or just this use of netmasks?
|
Anonymous |
|
Printed |
Page 106
The owl says that you need to specify 'localhost' in the interfaces |
list, but this wasn't done in the example on p101.
How does the 'socket address' option differ from 'bind interfaces'?
This distinction isn't particularly clear.
|
Anonymous |
|
Printed |
Page 107
near page bottom |
The exclude IP is listed as "192.168.10.255" rather than "192.168.10.". Using the
address as shown would only affect the listed ip address rather than the whole subnet.
|
Anonymous |
|
Printed |
Page 108
How verbose is the example log? Is this brief output, or verbose? |
|
Anonymous |
|
Printed |
Page 109
The first paragraph talks about the "logging options that we've |
seen so far", but we haven't seen any yet!
|
Anonymous |
|
Printed |
Page 110
Line 1 |
This line states the files are created with a ".old" extension, with reference
to the max log size option. However, the table on page 111 indicates that a
".bak" extension is used. Which is it?
|
Anonymous |
|
Printed |
Page 110
The relationship between the syslog option value, and the logging |
level itself is very unobvious. (I'd call this a flaw in the Samba
design). This needs to be made much clearer in the description.
You shouldn't let the fact that this book has been "officially
adopted" by the Samba team, muzzle you from criticising Samba
where this seems appropriate.
Does the debug timestamp option affect syslog log entries?
|
Anonymous |
|
Printed |
Page 111
The description of the default value for the log file is not clear. |
Rather than talk about your setup, it would be better to talk in
more general terms, stress the fact this is set as part of configuring
Samba, and perhaps mention what the default default would be.
|
Anonymous |
|
Printed |
Page 112
The heading for "debug timestamp" has an extraneous semicolon. |
The format of the timestamp here differs from the example on p108.
|
Anonymous |
|
Printed |
Page 113
The description of syslog assumes throughout that this value is |
lower than the 'log level' option. What is the effect of having
syslog set higher than the file logging?
The first paragraph of the "syslog" option ends by mentioning the
"syslog only" option, followed immediately by "For example". But
the example that follows has nothing to do with "syslog only",
and is just showing the normal settings.
Given that this option is about to be described later on the same
page, is there any point in even mentioning it here?
The first sentence of the description of "syslog only" ends with
a subclause that contains no verb.
"the system logger only" makes no sense!
|
Anonymous |
|
Printed |
Page 113
last paragraph |
"ection" should be "section"
|
Anonymous |
|
Printed |
Page 114
The "net view" command is described as listing the servers on the |
network. But the example output includes both 'chimaera' and
'phoenix', which were introduced as network clients earlier (p93).
|
Anonymous |
|
Printed |
Page 115
Is it possible to emphasise the example config lines that have |
been added or changed? I believe this is occasionally done on
some later examples, but it isn't carried through consistently.
It doesn't match the conventions introduced at the start of the
book, but is extremely useful in following the descriptions.
|
Anonymous |
|
Printed |
Page 117-118
In an election, are all the roles listed in Table 5-2 relevant, |
(as implied by the table title) or just the role "Preferred Master
Browser" (as implied by step 3) ?
In step 6, it talks about the "runner up" (singular) becoming a
backup browser, but the initial description in Chapter 1 implied
that there could be a number of backup browsers. How is this
handled in this election mechanism?
|
Anonymous |
|
Printed |
Page 119
The second paragraph refers to the "preferred master browser bit". |
Is this the same as the "preferred master browser *role*" covered
on the previous page ?
If not, then I don't think you have mentioned Samba setting this
before (in contrast to the claim made here).
|
Anonymous |
|
Printed |
Page 120
The first rule for multiple subnet domains states that a domain |
master browser removes the need for a local master browser.
But figure 1-14 showed one machine acting as both domain and
local master browser (which seems more logical). Which is right?
|
Anonymous |
|
Printed |
Page 121
Is the discussion of the 'remote browser synch' option (the last |
paragraph) a continuation of the preceding sentence (starting
"In addition..."), or a separate alternative to 'remote announce'.
It feels a bit of both, and hence reads rather strangely.
|
Anonymous |
|
Printed |
Page 121
In Figure 5-1, the addresses of the two workstations in subnet |
192.168.222 should read 192.168.222.nnn instead of 192.168.221.nnn.
|
Anonymous |
|
Printed |
Page 122
The function description for 'domain master' in Table 5-3 is odd. |
Why "main browser master" rather than "domain master browser" ?
|
Anonymous |
|
Printed |
Page 123
"announce version" section, Line 3 |
"options" should be "option"
|
Anonymous |
|
Printed |
Page 124
The description of 'browse list' option starts by saying that |
you shouldn't need to change this, and then tells you how to!
Most similar "hands off" option descriptions tend to *finish*
by saying this shouldn't be changed.
The description of 'auto services' recommends against using this
for printers, but never really explains why not.
|
Anonymous |
|
Printed |
Page 125
The second sentence of 'local master' includes the phrase "take |
place in elections" - this should read "take PART in elections".
If this is set to 'no', will Samba not take part in elections
at all, or take part, but ensure that it loses?
|
Anonymous |
|
Printed |
Page 128
The section on "Hiding and Vetoing Files" has reverted to what |
"we" want rather than than what "you" want.
|
Anonymous |
|
Printed |
Page 129
The first line talks about entries "begin, end *or* be[ing] separated" |
by a slash. Since this is talking about multiple entries within the
one option, "separated" is redundent, but each entry needs to begin
*and* end with a slash.
Figure 5-3 shows a hidden file 'hello.java', which was not listed
in the previous figure at all.
The penultimate paragraph starts by talking about the effect of this
option in general. The second sentence, starting "By doing so"
suddenly switches to the particular example used.
|
Anonymous |
|
Printed |
Page 131
The first (full) sentence talks about "set[ting] the follow symlinks |
option" - i.e. implying setting it to true. In fact, it needs to
be set to false to get the described behaviour (as in the example).
It would be less ambiguous to "use the follow symlinks option".
In Figure 5-5, surely 'hello.txt' should have the text document icon.
|
Anonymous |
|
Printed |
Page 132
The discussion of wide links seems to jump in very quickly. A word |
or two of introduction would be useful, as well as an explanation
of some of the possible dangers of using this.
|
Anonymous |
|
Printed |
Page 133
How does the 'unix realname' option handle the common internal |
structure of the GCOS field? Will it return the whole of this
field, or just the text up to the first comma?
The description of 'follow symlinks' was only a page or two back,
so it seems unnecessary to say "discussed in greater detail earlier".
|
Anonymous |
|
Printed |
Page 134
"hide files" section, Line 8 |
"Questions marks" should be "Question marks"
|
Anonymous |
|
Printed |
Page 134
The descriptions of 'getwd cache' and 'wide links' would be more |
natural if they came in the opposite order, so wide links follows
directly on from follow symlinks.
getwd cache is particularly slow if wide links is set - why?
wide links "includes any files or directories at the other end".
What is this meant to mean? It is not at all clear.
hide dot files "doesn't *necessarily* guarantee" that the client
cannot view them? It doesn't guarantee this at all! (any more than
hide files does). The word "necessarily" implies that it may
guarantee this in some circumstances, which is not true.
|
Anonymous |
|
Printed |
Page 135
Line 9 |
"Questions marks" should be "Question marks"
|
Anonymous |
|
Printed |
Page 135
Another possible type of special file that 'veto files' could be |
used to protect is anything required for correct use of the
Unix system (if the user has direct access to this).
The description in this paragraph implies that the Windows users
are distinct from the Mac users. It is quite possible (as in this
department) that a single user could use Windows, Mac and Unix systems
interchangeably, and use Samba to keep the same filestore visible
across all three systems.
The paragraph under "File Permissions" implies that Unix was designed
as a networked operating system. This is wrong - Unix dates from 1970
or so, but wasn't networked until the mid-to-late '70s.
'DOS' in this discussion is presumably intended to include Windows 9x
|
Anonymous |
|
Printed |
Page 138
The description of creation masks says that this "help[s] to define |
the permissions a file [has when] it is created" and then goes on to
say that umask "control[s] what permission a file .. does *not* have".
While this is strictly correct, it feels like a misprint, particularly
since the Samba option works in a different (more obvious?) way.
Either it needs a word of explanation, or rephrasing to avoid the 'not'.
For files accessed from Windows, you can disable various attribute bits
"as well" - as well as what?
The numeric forms 744 and 755 need an explanation of what this means.
|
Anonymous |
|
Printed |
Page 139
force user and group actually set the user/group "ownership" rather |
than the attributes (i.e. the permissions just discussed).
The fourth paragraph talks about "some other user on a single-user
machine". This simply doesn't make sense - inherently!
|
Anonymous |
|
Printed |
Page 140
The three 'map' options in Table 5-5 come at the beginning. In the |
accompanying descriptions, they're last.
Recommending a mask of 644 (under create mask) implies that attribute
bits are not available to the client. While this is vaguely referred
to in the next sentence, this could be made clearer.
The default for create mask is 744 in the table, and 755 in the text.
|
Anonymous |
|
Printed |
Page 141
Why recommend global read access to files, but not directories |
(implying that other users can't access the files anyway).
A directory mask of 750 is only sensible if the group mechanism is
actively being used. Otherwise everyone is likely to be in the same
group (when 750 is equivalent to 755) or in separate groups (when
you might as well be safe and set 700).
Presumably force create mode can be used to force world permissions,
as well as group ones?
The owl comment presumes that the original data file had group
write access in the first place. Otherwise, editing a (private)
file would give the rest of the group write access to it.
|
Anonymous |
|
Printed |
Page 142
Unix backup programs ('map archive') typically keep a list of when |
backups were done, but not necessarily what files were backed up.
|
Anonymous |
|
Printed |
Page 143
The phrase "allowing many more case-sensitive characters" (under |
Name Mangling) is accurate, but unclear. It appears to be extending
the list of characters that are case-sensitive, rather than being
two separate characteristics - longer names and case-sensitive names.
The bullet point at the bottom of the page talks about "up to the
first five alphanumeric characters", which is clumsy and unclear.
|
Anonymous |
|
Printed |
Page 144
The first bullet point on this list is essentially the same as |
the previous one, so why repeat the same (clumsy) description?
The phrase "to the 8.3 filename" in the third bullet point is
unnecessary, and could easily be omitted.
|
Anonymous |
|
Printed |
Page 146
The descriptions of the first two options in Table 5-7 use |
inconsistent phrasing - "keep the case" vs "preserve case".
The description of "mangling char" in this table isn't meaningful.
The textual description of "default case" starts by saying that
this is the default case that will be used. The next sentence then
says that "lower" will use mixed case.
|
Anonymous |
|
Printed |
Page 147
The description of 'preserve case' talks about "set this option |
to yes" (which is the default anyway), and then "leave this option
to [sic] its default".
The descriptions of mangled names and mangle case (over the page)
are in the opposite order from Table 5-7.
|
Anonymous |
|
Printed |
Page 148
Does 'mangle case' use the same algorithm as described earlier |
for long names?
The 'mangled map' option specifies a mapping that can be used
"before or even in place" of the standard mangling. How are
these two possibilities distinguished?
|
Anonymous |
|
Printed |
Page 149
The description of locks says that the second process will |
"receive an error ... and wait until the lock is released".
It's also possible for the second process to simply fail.
Is "byte-range locking" (end of the first sentence of the second
paragraph) partof standard DOS/NT locking, or a Samba addition?
Is it supported on all Samba systems, or just those where the
underlying architecture supports it natively?
The second paragraph of the discussion of opportunistic locking
talks about "the interrupting process [being] granted an oplock
break". Is this actually visible to this second process, or does
the break happen transparently behind the scenes?
|
Anonymous |
|
Printed |
Page 152
I found the whole description of share locks (p151) and following |
much less clear than I'd expect from the rest of the book.
Maybe I was just tired, but this didn't seem to click.
|
Anonymous |
|
Printed |
Page 153-4
If Samba can automatically detect kernel oplocks (p154), why is |
there a need for an option to enable or disable them?
|
Anonymous |
|
Printed |
Page 154
Table 5.4 vs Section 5.2.3.4 |
Table 5.4 shows for option 'getwd cache' the default value of YES.
Section 5.2.3.4 states "Setting this option to YES can significantly
increase the time it takes to resove the working directory. ... You
should normally not need to alter this option."
Is this correct? Why would I prefer to use the option that "can
significantly increase time"?
|
Anonymous |
|
Printed |
Page 155
The first paragraph under "Users and Groups" talks about NT 4.0 |
Workstation SP3, implying that later service packs are not affected.
In fact the comments should refer to "SP3 or higher".
|
Anonymous |
|
Printed |
Page 156
The new addition to the example configuration file at the top of the |
page is shown in bold type. This is a useful way to indicate changes,
but this is the first time it has been used, and it was not indicated
in the list of conventions in the Preface.
It would be worth carrying this idea through the rest of the book.
The last sentence in the first paragraph refers to "difference [in]
access rights [to] files" - it is unclear precisely what is meant.
The next paragraph talks about "the Unix user that Samba uses to
represent the client" - how is this user determined?
|
Anonymous |
|
Printed |
Page 157
The end of the "Users and Groups" section implies that chmod command |
in the example of setting up the shared directory, has the same effect
as the "directory mode" option. These actually refer to different
levels (the "home directory" and subdirectories of this respectively).
The modes 0660 and 0770 assume a shared GID to be at all sensible.
How is the GID of the connection determined?
The config fragment under "[homes]" uses the option 'browsable'.
While this is valid, all previous examples use the form 'browseable'.
|
Anonymous |
|
Printed |
Page 159
The config fragment at the top of the page includes the option |
'auto services', which is not relevant to the topics being covered.
The description of 'admin users' refers to NIS netgroups. Is this
only supported for this option, or can NIS netgroups be used with
other options (such as 'valid users' on p156)?
Having described this option, the advice is then given not to use
it. Why not, if root access is what is required for that situation?
The options 'read list' and 'write list' refer to lists of users.
Can these options be used with group names (as with the other
options that list users that have just been described) ?
|
Anonymous |
|
Printed |
Page 160
The only suggestion that is made for a guest user is the 'ftp' |
account. Why not offer the possibility of creating a special account
for this purpose? (Also on p162)
Table 6-1 lists the various access control options, but omits
'guest ok'. Granted, this has been covered in Table 4-4 (p97)
but is still relevant to this discussion. At the very least, a
reference back to this earlier description would be sensible.
|
Anonymous |
|
Printed |
Page 161
The third sentence under 'admin users' refers to "the default group |
of the admin user". Does this mean the admin user on the Unix side
(presumably root), or the user making the connection?
|
Anonymous |
|
Printed |
Page 162
In the second paragraph, first sentence |
Change:
"This option specifies the name of account ..."
to:
"This option specifies the name of AN account ...".
|
Anonymous |
|
Printed |
Page 162
The discussion of username map seems to imply that the only reason |
for needing this would be length limitations on the Unix side. This
option could also be used to cope with different names on the two
systems due to historical reasons (e.g. administration differences)
In the third sentence of this section, the last clause is unnecessary.
Having said that Unix usernames may be limited in length, it would
be clearer to simply say "... mapping a free-form client username to
a Unix username".
In protecting access to the map file, it it sufficient to ensure that
the file is not writeable to normal users. Making the file owned by
root (while possibly sensible) is not strictly necessary.
|
Anonymous |
|
Printed |
Page 163
The group mapping puts the @ sign before the *NT* group name. This |
is not mentioned explicitly, but has to be inferred from the example.
The last paragraph of the user map description is unclear.
The fact that the 'username level' option will try *permutations*
of the username is tacked on to the end of the description, almost as
an afterthought. This ought to be made more prominent.
|
Anonymous |
|
Printed |
Page 165
First paragraph - "one password may grant read-only access, .. another |
.. read-write access, and so on". What other options are there?
Second paragraph - does NT support share-level security?
The second sentence of the second paragraph reads rather oddly
(enabling share-level security twice), and the following sentence
feels like a separate step rather than the continuation of this task.
The third paragraph seems to imply that you can only share a whole
drive - I believe it is possible to share a particular folder.
A figure for this second step would be be useful.
|
Anonymous |
|
Printed |
Page 166
Step 4 of the authentication list seems to imply that Samba will |
allow access to a share, if the password belongs to *any* valid user.
I hope I misunderstand this, as the implications for password cracking
are horrendous!
The last sentence of this step is somewhat odd - it would be more
natural to phrase this in the reverse sense. How does failure under
4 interact with step 5? This is not clear.
The last paragraph talks about "each of the users in its own list".
How is this list determined? The same comment holds for the "internal
list" referred to on the next page.
|
Anonymous |
|
Printed |
Page 167
The options in Table 6-4 would be more meaningful the other way round. |
|
Anonymous |
|
Printed |
Page 168
The first (full) paragraph refers to "re-enter[ing] a password again". |
As opposed to re-entering it for the first time, perhaps? <grin>
The 'revalidate' option is not explained for another 20+ pages.
|
Anonymous |
|
Printed |
Page 169
The password servers are given as 'PHOENIX120' and 'HYDRA134', but |
the names used previously are simply 'PHOENIX' and 'HYDRA'.
If a server rejects the password, "the connection will ... fail".
Does this mean that access will be denied (regardless of guest access
settings), or simply that the authentication has failed?
|
Anonymous |
|
Printed |
Page 170
The last sentence of the third bullet point states "It can not keep |
a connection [open]... ". Surely it could, but "*does* not"?
|
Anonymous |
|
Printed |
Page 171
There is no "domain logins" 9781565924499 command. |
It should probably be "domain logons".
|
Anonymous |
|
Printed |
Page 171
The line "domain logins" has no meaning. However, one reader submitted |
anerror report stating that this should be "domain logons," which is
even worse. Domain logons will make 9781565924499 entirely unable to
authenticate passwords from the windows NT domain!
|
Anonymous |
|
Printed |
Page 173
In the config fragment, is the 'smb passwd file' option necessary? |
This would appear to be the default location anyway.
In the second paragraph under "Disabling encrypted password", it
talks about installing two files on each system. Are both files
needed in each case - or is it simply the appropriate one for the
particular O/S?
|
Anonymous |
|
Printed |
Page 174
The first paragraph says that "plaintext-equivalent passwords .. are |
broadcast across the network". Are these sent via a network broadcast,
or sent directly to the authentication server?
Figure 6-3 shows a trailing colon at the end of the line. If this
is necessary, then mention the fact (and that following fields are
ignored). Otherwise it would be clearer to omit it.
|
Anonymous |
|
Printed |
Page 174
In the third paragraph, the location of the smbpasswd file |
is specified as /usr/local/9781565924499/private. On page 183, at the
bottom of the page, we learn that many Red Hat distributions put
the smbpasswd file in /etc. It would be helpful to have this
information about Red Hat earlier.
|
Anonymous |
|
Printed |
Page 175
The Last Change Time description includes "*amount* of seconds". Ugh! |
|
Anonymous |
|
Printed |
Page 176
The example entry to be added by hand includes a line break in the |
account flags field. This makes it impossible to tell how many
spaces should be included. It would be worth mentioning this
explicitly here.
Is it necessary to specify the username with the smbpasswd command?
Since this seems to work in the same way as the traditional Unix
passwd command, it would be clearer to invoke it with no arguments.
|
Anonymous |
|
Printed |
Page 177
The password chat script checks for the prompt "old password". But |
since the password command is run as root, the old password won't
be asked for (as implied just above).
|
Anonymous |
|
Printed |
Page 178
The sentence starting on the third line should read "*If* Samba ..." |
|
Anonymous |
|
Printed |
Page 179
The new version of the password chat setting at the top of the page |
will only match the RedHat style conversation, not the traditional
form. But the first line says that "this will *also* handle ..."
Is there any way to specify alternatives?
The next couple of lines talk about using the debug option to "set
up a new chat script". This is somewhat confusing.
The last line in this section talks about making "password
synchronization a thing of the past". Is this really what is meant?
|
Anonymous |
|
Printed |
Page 181
The discussion of 'unix password sync' refers to "the plaintext |
password of the user". Is this is the old password or the new one?
If this refers to the old password (as implied by the footnote),
then what are the implications of setting the 'encrypted passwords'
option? Will setting the Unix password still work?
These two descriptions appear in the opposite order to Table 6-8
The penultimate paragraph talks about a client "connect[ing] *to*
a non-encrypted password".
|
Anonymous |
|
Printed |
Page 181, 186
On page 181, in the second line from the bottom, and on |
page 186, lines 8 and 12 from the bottom, it states "entrypted
passwords" when is should be "encrypt passwords", as correctly
stated on page 181.
|
Anonymous |
|
Printed |
Page 182
The description of password level should indicate the security |
implications for a non-zero setting, as well as the performance hit.
Is this setting relevant if encrypted passwords are being used?
|
Anonymous |
|
Printed |
Page 183
The description of 'null passwords' implies that Unix system users |
(such as bin) necessarily have null Unix passwords. This is not
inevitably the case.
|
Anonymous |
|
Printed |
Page 186
The description of the two versions of Windows handling stop rather |
abruptly after the respective config fragments.
In the turkey comment, it mentions that Samba 2.1 is available via
CVS. Is this a "release-candidate" version of 2.1, or alpha code?
The Windows NT section refers to "a few more steps" - but there is
only one step described (setting encryped passwords) before the end
of the section. The discussion of trust accounts reads as a
completely separate section.
|
Anonymous |
|
Printed |
Page 187
The mechanism for setting up trust accounts feels very non-scalable |
if there are a large number of clients.
The fourth paragraph says that the resource ID "cannot conflict"
with other resource IDs. Clearly it could - but it "*must* not".
|
Anonymous |
|
Printed |
Page 188
The first line mentions "raising up" a dialog - an unusual phrase. |
The last paragraph talks about just entering a password. Is it not
necessary to enter a username as well?
|
Anonymous |
|
Printed |
Page 190
Having joined the domain, does the system reboot automatically? |
|
Anonymous |
|
Printed |
Page 191
The discussion on this page talks about "domain groups" until the |
owl comment, which mentions "local groups". Are these synonymous?
|
Anonymous |
|
Printed |
Page 192
The end of 'local group map' says "This option will work with |
Windows NT clients only" - this phrasing feels rather clumsy.
The "more information" reference to the NT Nutshell book
effectively duplicates the owl comment at the bottom of the page.
|
Anonymous |
|
Printed |
Page 193
The third paragraph talks about the "base" of a share. This isn't |
a term that has been used before - previous discussions have simply
talked about the share directory.
The penultimate paragraph recommends using DOS/Windows to create
logon scripts. It would also be possible to use a modern Unix editor
(like 'vim') and explicitly setting the text mode to DOS style.
|
Anonymous |
|
Printed |
Page 194
Roaming profiles are described as being supported by Windows 95 |
and NT (in the first sentence), but this doesn't mention Windows 98
(which is then included in Figure 6-6).
The only use for roaming profiles suggested is to synchronise
between a desktop and a portable. Another situation where this
could be useful would be a "hotdesking" environment, or a lab of
identical systems.
|
Anonymous |
|
Printed |
Page 195
The discussion of the example logon path configuration fragment |
was not particularly clear. In particular, it is never explicitly
stated that this should be a UNC, rather than a Unix path.
Is the share name 'profile' in the second config fragment fixed,
or does this refer to the path element of the UNC from the previous
fragment?
The create and directory modes given are "owner only", but the
Unix listing of an example profile include group write access.
What (Unix) ownership and permissions should be set for the root
directory of the profile share, and the per-user subdirectories?
|
Anonymous |
|
Printed |
Page 196
Is it possible to combine mandatory and normal profiles? |
What happens if there is both a user.dat and user.man file?
|
Anonymous |
|
Printed |
Page 197
at the Logon Path paragraph you'll see |
"This option providers a location for roaming profiles..." etc.
Now, there are two options that are close together:
logon path =
and
logon home =
They are both for roaming profiles, but the logon path = is the
location where profiles for NT Clients will be stored, and if you
do not specify logon home (then the default is the user's homedir)
Windows '9x clients will create their profile in the users home
directory.
So in order to store Windows '9x roaming profiles somewhere else
other than the user's home directory you'll have to specify logon
home = (and if you have both NT and '9X clients, you have to specify
both logon home and logon path)
|
Anonymous |
|
Printed |
Page 197
The description of the 'logon script' option repeats the |
requirement about line endings in the first and last sentences.
This only needs to be stated once - probably dropping "with
lines ending in carriage return/line feed" from the first line.
The 'logon path' option again omits to state that this is a UNC
name (though this is mentioned in Table 6-10).
The obvious choice of drive letter for a user's home directory would
surely be H: (for 'Home')
|
Anonymous |
|
Printed |
Page 198
The default of Z: (in the first paragraph) is a "safe" choice - this |
isn't necessarily the same as a "good" choice.
The description of the first function in Table 6-11 starts
"Sets a command..." - all the others start "Sets a Unix command".
These should ideally be consistent.
|
Anonymous |
|
Printed |
Page 199
?} section 6.6.4.2 |
I don't know if the following is an error but it looks suspicios:
preexec = echo "%u connected to %S from %m (%I)" >>/tmp/.log
|
/|
I would have expected
preexec = echo "%u connected to %S from %m (%I)" >>/tmp/.log
or
preexec = echo "%u connected to %S from %m (%I)" >>/tmp/.log
Which is correct??
|
Anonymous |
|
Printed |
Page 199
Logging connections from within the 'preexec' option requires |
global write access to the log file, which might leave it open
to corruption or tampering. What is the advantage of doing this
here, rather than in the root preexec section?
The two user exec options discard any output. Do the two root
exec options work similarly? If so, it would be worth saying so.
Is the %u variable set for the root exec options as well?
The obvious role for 'root postexec' would be undoing whatever
was set up by 'root preexec' (such as unmounting the CD-ROM).
|
Anonymous |
|
Printed |
Page 200
Table 6-12 introduces "some of the other" config options for |
setting up users. This feels rather arbitrary and incomplete.
Since these two options both specifically refer to NIS, why
not introduce the table in these terms - perhaps using the
paragraph that currently follows the table?
The references to 'server' in this discussion are unclear,
since these can refer to processes or machines. The details
of who is talking to who is somewhat confusing.
|
Anonymous |
|
Printed |
Page 201
The first paragraph covers both an overview of the two topics, and |
a more detailed description of the first topic. This could perhaps
be split into two paragraphs.
The second paragraph says that this chapter will "introduce WINS".
But WINS has already been mentioned in Chapter 1. This coverage
implied that the WINS server offers more than simply IP addresses.
The third paragraph talks about "effortlessly" sending print jobs.
Given the amount of work needed to set up printing in the first place,
this is perhaps a bit tactless. A better description would perhaps
be "transparently"
|
Anonymous |
|
Printed |
Page 202
The description of how printing works goes into a great deal of detail, |
much of which is probably not strictly necessary to know.
|
Anonymous |
|
Printed |
Page 203
The second paragraph of the "Minimal Printing Setup" refers to the |
'right side' of the option. Previously this has been described as
the 'value' of this option.
The example print command for the System V case sets the printer
explicitly (using "-d%p"), as will the config fragment on p206
("-P%p"), but the config fragment earlier on the page left this implicit.
|
Anonymous |
|
Printed |
Page 204
The second paragraph states "Samba will not reject a document |
being sent to a busy printer". Good! That's the whole point
of printer queues.
The pause/resume facilities are only available if the underlying
operating system supports them. This is not made explicit here.
|
Anonymous |
|
Printed |
Page 206
The third paragraph talks about having a "[printers] share for *each* |
of the system printers" - this seems misleading since there is only
one such share listed in the configuration file.
The 'testparm' command in the example at the bottom of the page should
be in bold type, according to the conventions listed in the Preface.
|
Anonymous |
|
Printed |
Page 207
The value for 'min print space' in the output of testparms does not |
match the value set in the previous config fragment.
The line 'lppause command' is not indented correctly.
The second paragraph talks about changing the guest account "as
mentioned before" - I'm not quite sure where this is referring to.
It could do with being a more precise reference.
|
Anonymous |
|
Printed |
Page 208
Figure 7-2 is essentially a duplication of Figure 7-1. The reference |
in the text appears to indicate the screen dump labelled Figure 7-3.
The "real" Figure 7-3 appears to be missing.
The last sentence of the penultimate paragraph recommends to "keep
using" existing printer drivers. Is this the same as the option to
"reuse" the driver mentioned just above?
|
Anonymous |
|
Printed |
Page 210
The last sentence of the second paragraph under Automatically Setting |
Up Printer Drivers mentions skipping the Manufacturer dialog - is this
the only bit of the Add Printer Wizard dialog that is skippable?
|
Anonymous |
|
Printed |
Page 211
The command at the bottom of the page creates a new printer definition |
and puts this in the file 'printers.def'. It would be safer to
*append* this definition - otherwise any existing definitions
would be lost.
|
Anonymous |
|
Printed |
Page 212
In the list of files to be copied, one of the files is present in a |
subfolder. Presumably this structure needs to be retained on the Unix
side? If so, it would be worth emphasising this.
|
Anonymous |
|
Printed |
Page 213
|
The text reads:
"If Samba asks you to delete unneeded files, do so."
It should read:
"If Windows asks you to delete unneeded files, do so."
It's not Samba that checks if the Windows machine has printer
drivers left that are not being used on the box; windows does that by
itself.
|
Anonymous |
|
Printed |
Page 213
The value of the printer driver location is described as the pathname |
of the PRINTER$ share - is this a UNC-style name, or a file path?
The second path states "If Samba asks you to delete unneeded files,
do so". How are such file identified? Will Samba offer to delete
these, or list which files are candidates for deletion?
|
Anonymous |
|
Printed |
Page 214
The penultimate line talks about "the Canon printer", but there are two |
Canon printers shown in Figure 7-7.
|
Anonymous |
|
Printed |
Page 215
In the printcap file at the bottom of the page, the spool directory |
listed in the 'sd' field has a different name to the printer name.
This might work, but is unconventional, and not particularly clear.
The comment against 'sh' is misspelled - "suppress" not "surpress".
The same error is present on p223.
|
Anonymous |
|
Printed |
Page 216
The end of the BSD description talks about "resetting the Samba server |
machine". Does the machine have to be rebooted, or is it sufficient
to restart the servers?
The second line of the System V description starts "to get obtain ...."
The lpadmin command command refers to the option '-i./smbprint.sysv'
This will only work if given from the correct directory.
|
Anonymous |
|
Printed |
Page 218
I'd like to report a little mistake on page 218 of Using Samba. |
Chapter 7: Printing and Name resolution.
You'll see a table showing printing types, well.. below that there is
a line 'The value for this optio.n will be .....'
The '.' does not belong there :)
|
Anonymous |
|
Printed |
Page 219
BSD lists printers in /etc/printcap. Nothing is said about how the |
list of printers is stored under System V.
The config fragment listed under 'printable' uses a new share name
that's never appeared before (and isn't used again).
The 'printer driver file' option gives the location for Windows 95/98
driver files. What about Windows NT - is this handled the same way?
|
Anonymous |
|
Printed |
Page 221
In Table 7-4, the column under 'BSD, etc' makes reference to 'SYSV', |
which is covered in a different column.
|
Anonymous |
|
Printed |
Page 222
The possibility of a "dummy" printcap file for SysV-based systems |
would be more appropriately covered on the following page, under
the 'printcap name' description. This paragraph refers to using
"an appropriate lpstat command" - would it be possible to provide
some examples.
Why is the printcap file footnoted here, but not on p215?
|
Anonymous |
|
Printed |
Page 223
Is the printcap option applied overall, or just for that share? |
|
Anonymous |
|
Printed |
Page 224
LMHOSTS is "the only one you've probably not encountered before". |
I think this means that it's the only one you haven't described so far.
|
Anonymous |
|
Printed |
Page 225
The primary domain controller is indicated by the resource type <1B> |
after "the name" - this presumably means the domain name, rather than
the server name, but this is not made clear.
Can you combine names (with the same IP address) on the same line?
The last paragraph describes use of the 'wins proxy' option. Does this
refer to name resolution from witin the Samba software itself, or
requests from other clients?
|
Anonymous |
|
Printed |
Page 226
The options 'wins support=yes' and 'wins server' are described as being |
mutually exclusive. What happens if both are specified? Which wins?
The description on p228 says that Samba will "flag an error", but still
does not make clear what happens.
The last paragraph starts "Finally", as did the previous sentence.
The distinction between 'dns proxy' and the 'name resolve order'
options hosts setting is unclear.
|
Anonymous |
|
Printed |
Page 228
The description of 'wins proxy' mentions relaying requests |
"from itself" to another server. How does this differ from the
'wins server' role?
|
Anonymous |
|
Printed |
Page 233
The third sentence under Magic Scripts reads "Some users and their |
programs rely .... for their programs to function".
Duplication of "their programs".
A magic script ought to work with Windows CR/LF line endings, if each
line also ends with a semicolon character, which marks the end of a
shell command.
|
Anonymous |
|
Printed |
Page 234
The description of code pages implies that it is primarily used for |
mapping lowercase to uppercase, but Table 8-4 feels to be more a
character set. This distinction is confusing to those not familiar
with Windows character handling.
I'm surprised that the default code page is 850 (Western European)
rather than 437 (United States). Is this standard, or an internal
Samba configuration?
|
Anonymous |
|
Printed |
Page 235
The config fragment under 'character set' specifies the code page |
explicitly, even though it is the default 850.
Is this necessary, or just done for clarity?
|
Anonymous |
|
Printed |
Page 236
The last two entries in Table 8-6 misspell "hexadecimal" as |
|
Anonymous |
|
Printed |
Page 238
The example command used to illustrate the 'message command' option |
assumes that the server is running X11 on the console. This is often
not the case for a server, so it would be sensible to mention this.
What is meant by "unique variables" in the introduction to Table 8-8 ?
A reference to the "standard variables" would be useful.
The section on Recently Added Options states that these are "not
entirely supported". What on earth does this mean?
|
Anonymous |
|
Printed |
Page 241
The last paragraph of the description of deadtime says that this |
option "will work" - I should think so! What this appears to mean
is that it will not cause undue disruption to the user.
The command at the bottom of the page is specific to the BSD form of df.
This is not mentioned here, and the only indication of this fact is
over the page, where the System V equivalent is mentioned. If the
reader doesn't turn the page here, this will be missed.
The BSD version also uses a bare command name, while the System V
version gives the full path to the command. Why the inconsistency?
|
Anonymous |
|
Printed |
Page 244
The code fragment under 'panic action' is missing a double quote. |
The description of 'set directory' refers to the VMS command as
'setdir' (one word) in contrast to the entry in Table 8-10
("set dir" - two words).
|
Anonymous |
|
Printed |
Page 245
The description of smbtar refers to "modem", rather than "modern PCs". |
How is it possible to use a CD-ROM to back up a system ? They're read
only! Presumably this means using a CD writer, but it reads oddly.
|
Anonymous |
|
Printed |
Page 246
The second paragraph refers to using smbtar to back up "user data [kept] |
on your Samba system". Surely data on the Samba server would be
backed up using standard Unix backup tools (e.g. dump, etc) ?
In Figure 8-2, highlight "File and printer sharing".
|
Anonymous |
|
Printed |
Page 247
The first paragraph feels rushed and unclear. |
The third paragraph refers to sharing the disk "with the tape server".
Marking a disk for sharing doesn't appear to specify acceptable hosts
to share with. It simply offers the disk for sharing generally.
The "second step" mentioned on the last line is ambiguous. Does it
refer to the second numbered step on p246, or the second step of
sharing the disk?
|
Anonymous |
|
Printed |
Page 248-9
Figures 8-4 and 8-5 are identical. It would make more sense if these |
figures referred to a folder on a disk that wasn't already shared.
Given that only one of the invocations of smbtar requires write access,
it would be sensible for Figures 8-4/8-5 to share the folder Read-Only.
Full sharing has security implications, and if this isn't necessary,
why risk it?
|
Anonymous |
|
Printed |
Page 250
The list of things to check does not match the order in which things |
are introduced in this chapter. Steps 2, 3 and 4 are discussed in
reverse order. Steps 6 and 7 are also covered in the opposite order,
and there is no mention here of the Samba mailing lists (see p292)
|
Anonymous |
|
Printed |
Page 251
The last sentence of the first (full) paragraph starts |
"Substitition variables that allow...." - delete 'that'.
|
Anonymous |
|
Printed |
Page 252
The dump at log level 3 claims to cover the same material as the level |
2 version, and is just truncated. It should therefore start with the
"Got SIGHUP" message, and include the various share section handling.
In fact, it appears to be detailing a small portion from within the
middle of the level 2 operations. This is not stated clearly anywhere.
|
Anonymous |
|
Printed |
Page 255
The tcpdump program used here is the Samba-enhanced version, |
but this is only mentioned at the end of the description.
|
Anonymous |
|
Printed |
Page 256
The explanatory text 'Outer frame of SMB packet' is mixed in |
with the packet dump, rather than being off to the right.
The explanatory text 'Beginning of a reply to a request' wraps.
The explanation of the command-line options at the bottom of
the page is in a different order to the way they were used.
|
Anonymous |
|
Printed |
Page 258
The first line talks about "add[ing] TCP software", etc. |
This is slightly misleading, as the TCP software will be installed
already. What is probably meant is "testing of" TCP software, etc.
The output of "ping 127.0.0.1" includes references to "localhost".
In practise, pinging a numeric address typically does not perform
the reverse lookup, so only the numeric address would be shown.
The layout of this example does not seem to match the standard
Linux ping command, which looks like this:
64 bytes from 127.0.0.1: icmp_seq=0 ttl=64 time=0.1 ms
(This is RedHat 5.1, and the ping command is in the RPM 'netkit-base').
|
Anonymous |
|
Printed |
Page 259
The second paragraph under "Testing the network hardware with ping" |
says to "repeat it for the client". This is ambiguous - do you
ping the client's IP address from the client, or the server's IP
address from the client. The first is what is meant, but this could
be read either way.
The last paragraph says to ping the server (by name) from the client.
An intermediate test that has been omitted is to ping the server
by IP address from the client. This would show network connectivity,
without relying on the name service.
|
Anonymous |
|
Printed |
Page 260
The screen shot in Figure 9-1 does not include the expansion of |
the server name to the full form, as described underneath (point 2).
The IP address show does not match that in the text (point 3).
Should the command 'arp -a' be given on the client, or the server?
If on the server, it is also possible to ask for the ARP entry
of a particular machine, using 'arp hostname'.
|
Anonymous |
|
Printed |
Page 261
A single "(incomplete)" ARP entry probably indicate a problem with |
that one remote machine. A problem with lack of connectivity is
likely to result in multiple "(incomplete)" entries.
This form of entry appears to be specific to Unix systems.
Our Windows boxes do not display entries for non-responding systems.
The address 192.168.236.86 is an IP address, not an Ethernet address.
If the ARP address is obtained via a proxy response, then it would
be quite normal for the ping to fail if the remote machine is turned
off. This would *not* indicate "an intermittent or ARP problem"
as stated in the second dash-point.
A possibility omitted from the case 'a' at the bottom of the page
is that the routing on the local system is wrongly configured.
|
Anonymous |
|
Printed |
Page 262
The sixth bullet points says that "ICMP (and UDP) are designed to |
drop .. packets". This makes it sound inevitable, and desirable!
The last paragraph talks about "multiple names for an Ethernet address"
Does this mean Ethernet address, or IP address?
|
Anonymous |
|
Printed |
Page 263
The first paragraph under Troubleshooting TCP assumes that the ping |
testing will have tested UDP services. This is not correct if name
resolution is done locally.
The second bullet point assumes that all Unix systems allow FTP and
telnet connections. This is not necessarily true - particularly for
servers, which may (ought!) to provide a minimal set of services
to improve their security. Restricting FTP and telnet to a limited
set of machines is one such approach.
|
Anonymous |
|
Printed |
Page 264
The "long" option in the paragraph under 'Looking for daemon processes' |
is in constant width font. This isn't actually the name of an option,
so ought to be in normal type.
|
Anonymous |
|
Printed |
Page 265
The 'state' in the output of the netstat command is folded onto the |
next line. This makes it difficult to read.
The example output includes the state 'LISTEN', but the following
text talks about the state 'LISTENING'
The fifth sentence of the third paragraph starts "If both of the
lines *is* missing....".
The penultimate sentence talks about "our" daemons. Does this mean
the daemons at the authors' site, or those started manually?
|
Anonymous |
|
Printed |
Page 267
The list of messages produced by testparm seems to include both |
informational messages, and warnings or errors. It's not always
clear which of these can be ignored, and which are likely to affect
the correct operation of the system, and need fixing.
|
Anonymous |
|
Printed |
Page 268
The second part of the first paragraph mentions the "Allow/Deny |
connection..." message. The word 'account_name' should probably
be in a different font to distinguish it, and the next two words
"to service" are also part of the message, so should be within the
double quotes.
The output of smbclient at the bottom of the page, supposedly
invoked using the guest user, includes "User=[davecb]".
|
Anonymous |
|
Printed |
Page 268
3rd paragraph |
"browseble = no"
browseble is a typo for browsable.
>From the file 9781565924499/var/log.smbd
Unknown parameter encountered: "browseble"
[2001/04/20 11:25:05, 0] param/loadparm.c:lp_do_parameter(2549)
Ignoring unknown parameter "browseble"
~
|
Anonymous |
|
Printed |
Page 269
The example output at the top of the page does not line up properly. |
The penultimate bullet point refers to "%U" rather than "U%"
|
Anonymous |
|
Printed |
Page 270
The second paragraph talks about supplying your Unix password to |
the Password prompt, but this was not shown on the earlier example.
The phrasing of the error given in this paragraph is fairly specific,
and will not be the same for all of the possible problems listed.
|
Anonymous |
|
Printed |
Page 271
Under the heading 'Testing connections with NET USE', the command |
given only has a single leading backslash. Surely there should be two?
There's a similar error in the last paragraph of the next page.
The screen shot on the next page uses the command 'net use g:'
rather than 'net use *'
|
Anonymous |
|
Printed |
Page 273
The second owl comment concludes by saying that unencrypted passwords |
are acceptable on a local network. This assumes that this local
network is regarded as secure.
The bullet point following states that Samba will try a password
"once with it in uppercase and once in lower case". This implies
that a password will never be tested in the form received.
The is also an inconsistency in whether "case" should be a
separate word or not.
|
Anonymous |
|
Printed |
Page 274
The owl comment could usefully refer back to the earlier discussion |
of protocol binding.
Figures 9-2 and 9-3 show different contents of the TEMP directory.
|
Anonymous |
|
Printed |
Page 275
The fifth dash-point implies encrypted passwords will inevitably |
fail. This is only a problem if the Samba server is not set
up to handle encrypted passwords.
|
Anonymous |
|
Printed |
Page 276
The end of the first (full) paragraph implies that browsing needs |
broadcast capability. The first chapter seemed to imply that the
use of master browser systems could avoid this requireent.
The implication that "normal = reliable" is probably unwarrented.
Use of the descriptions "reliable" and "unreliable" is somewhat
confusing anyway. I don't think this has been common terminology
so far, so it seems unnecessary to start using it now.
The example output on this page has some minor indent problems.
|
Anonymous |
|
Printed |
Page 277
The phrase "didn't get /tmp" in the second bullet point is a bit vague. |
The third dash-point mentions "OS/2 or Windows for Workgroup clients".
Given that this testing is being done with 'smbclient', what relevance
do OS/2 or WfW clients have?
|
Anonymous |
|
Printed |
Page 278
The second bullet point ends "where the problem is first analyzed." |
This refers to the past, so should read "... *was* first analyzed".
The penultimate bullet states that the "-B option takes a broadcast
address", but the preceding paragraph said to use the server name.
The third sentence of the last bullet is missing a word - "If so, it
may not BE claiming names...".
The word "configuration" is misspelled in the penultimate sentence.
The double negative in the last sentence makes it hard to follow.
|
Anonymous |
|
Printed |
Page 279
The first line is missing a "the" before "-B option". |
It should also probably read "*with* the client's name".
The client name in the "nmblookup" command should be in italics
to agree with the "nmblookup" command on the previous page.
(or the previous page should use bold fixed width instead)
The "any failures" at the end of the line following this bullet
point would appear to include the problems mentioned there.
It should probably refer to "any other failures"
The last line of the page appears to be corrupted.
|
Anonymous |
|
Printed |
Page 280
The section 'Browsing the server from the client' is the first |
time in the whole book that "File Manager" has been mentioned.
The view of the server in Figures 9-4 and 9-5 are inconsistent.
The last couple of lines refer to "looking too soon". Too soon
after what? After logging in? Booting the system?
|
Anonymous |
|
Printed |
Page 281
Would a server with no shares marked as browseable generate an |
error, or simply appear empty?
The first paragraph under "Other Things that Fail" implies that
*all* problems are either solved or new to the authors. The section
then proceeds to outline other known problems, which haven't already
been solved, in contrast to this claim.
The last sentence under "Not logging on" suggests "shutting down
and logging in again". It's extremely difficult to log into a
system that has been shut down!
How about "restarting the system and logging in again".
|
Anonymous |
|
Printed |
Page 282
The first bullet point talks about trying WINS, then DNS. |
The description of WINS given earlier implied that the WINS server
would try DNS anyway.
The third bullet point talks about "the SMB client program" using
something different. Does this refer to the previous bullet points?
If so, this is not immediately apparent.
In the sentence following this list, the suggestions made conflict
with the information just given. If this list is simply the default
settings, then this needs to be made explicit.
The presence of a /etc/resolv.conf file (paragraph 3) does not
necessarily imply that DNS is being actually used. This may depend on
other settings, such as the /etc/nsswitch.conf file mentioned later.
|
Anonymous |
|
Printed |
Page 284
In the command "nslookup name", should this name be the long form |
or the short form? This is only addressed in the third dash-point.
If any of the name servers are active, the nslookup command should
work (though you may need to wait for the earlier ones to time out).
Does the "these lines" in the last sentence refer to the workgroup
lines, or the server lines, or both?
|
Anonymous |
|
Printed |
Page 285
The owl comment could usefully refer back to where NETBIOS name |
types was first described.
The "name" parameter in the ypmatch commands should be in italics.
|
Anonymous |
|
Printed |
Page 286
In the first bullet point, the line that sets the domain name is |
described as starting with "default" (line 2) and "domain" (line 5).
Which is correct?
The command under NIS should have "hostname" in italics, as with NIS+.
The following comment implies that this should be the short form. Yes?
If the short form works under DNS but the long form doesn't, the
obvious error is that the domain is set wrongly.
|
Anonymous |
|
Printed |
Page 288-9
Subnet masks do not need to fall on byte boundaries - it is quite |
possible to have a subnet mask of 255.255.252.0, for example.
This possibility is not recognised at all.
|
Anonymous |
|
Printed |
Page 290
The second paragraph, covering connecting to the Internet, talks |
about "getting a real network". This should read "getting a real
network address" - an isolated network is still a "real network"!
|
Anonymous |
|
Printed |
Page 321
This page refers to RAID level 1 as striping, which is false. |
Striping is RAID level0, RAID level 1 is mirroring.
|
Anonymous |
|
Printed |
Page 334
The printing in question is that of the first edition, Jan 2000. |
First: on the third line, it says that the cpu throughput is
16000. I believe it should only be 6,000, as it is in the rest of the
entries.
Second: in the same table, The Actual Throughput on the last line,
which is "Use Dual 100 Mbps ethernet", is listed as 11,200, while I
think the bottleneck at the CPU should restrict it to 6,000.
|
Anonymous |
|
Printed |
Page 360
In the 9th-10th paragraph, the "-P" option for smbd is listed twice. |
Both listings are identical.
|
Anonymous |
|
Printed |
Page 377
In the second line, which reads "net network number", the "t" in |
the word "net" is in the wrong font: it doesn't match the "ne".
This is only the case in the physical book, the html version
doesn't have this issue (didn't check the pdf version).
|
Anonymous |
|
Printed |
Page 378
I want to make a clarification to chapter E in your SAMBA book. |
It mentions downloading Samba with CVS and to be honest, the whole
stuff is not written very well.
The company Cyclic Software does not exist anymore, although their
Web Site is adopted through a community effort and actually
maintained by SourceGear, the company which bought Cyclic Software.
CVS was written on top of RCS and has needed an installed RCS,
but this is NOT required anymore since Version 1.10.X of CVS.
You only have to install CVS on your machine and a lot of Linux
distributions and *BSD systems has already installed a proper version.
Once you have connected to the Samba CVS server, you must first
log in. But to log in you have to send a password, which you do
not mention at all. The right password is cvs.
Since the Samba CVS distribution is really big, you should at
least mention that one could use the option -z3 to compress the
data stream. It would be nice if you could correct these issues.
|
Anonymous |
|
Printed |
Page 380
In the seventh content line from the top, "daemon" is misspelled |
in the example file as "deamon".
|
Anonymous |
|
Printed |
Page 389
Index section 'H', first column of page. |
Index entry "hort preserve case option, 147" should read "short preserve
case option, 147" (and thus be located in index section 'S').
This obviously makes it difficult to look up this specific name mangling
option in the index.
|
Anonymous |
|
Printed |
Page 399
In reference to the colophon: The African ground hornbill |
(Bucorvus Cafer) has a WATTLE, not a "waddle". Ducks waddle when
they walk, as do very pregnant human females. Turkeys, chickens
and hornbills, among others, have wattles.
|
Anonymous |
|