-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathman_page_ndmb.conf.txt
173 lines (127 loc) · 6.66 KB
/
man_page_ndmb.conf.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
####################################################
## Copied from macOS Monterey 12.0.1 on 11.7.2021 ##
####################################################
NSMB.CONF(5) File Formats Manual NSMB.CONF(5)
NAME
nsmb.conf – configuration file for SMB requests
DESCRIPTION
The nsmb.conf file contains information about the computers and shares or
mount points for the SMB network protocol.
The configuration hierarchy is made up of several sections, each section
containing a few or several lines of parameters and their assigned values.
Each of these sections must begin with a section name enclosed within
square brackets, similar to:
[section_name]
The end of each section is marked by either the start of a new section, or
by the abrupt ending of the file, commonly referred to as the EOF. Each
section may contain zero or more parameters such as:
[section_name]
key=value
where key represents a parameter name, and value would be the parameter's
assigned value.
The SMB library uses the following information for section names:
A) [default]
B) [SERVER]
C) [SERVER:SHARE]
Possible keywords may include:
Keyword Section Default Comment
A B C Values
addr - + - DNS name or IP address of server
nbtimeout + + - 1s Timeout for resolvinga NetBIOS name
minauth + + - NTLMv2 Minimum authentication level allowed
port445 + + - both How to use SMB TCP/UDP ports
streams + + + yes Use NTFS Streams if server supported
soft + + + no Force all mounts to be soft
notify_off + + + no Turn off using notifications
kloglevel + - - 0 Turn on smb kernel logging
protocol_vers_map + - - 7 Bitmap of SMB Versions that are enabled
signing_required + - - no Turn on smb client signing
signing_req_vers + - - 6 Bitmap of SMB Versions that have signing required
validate_neg_off + - - no Turn off using validate negotiate
max_resp_timeout + + - 30s Max time to wait for any response from server
submounts_off + + + no Turn off using submounts
dir_cache_async_cnt + + - 10 Max async queries to fill dir cache
dir_cache_max + + - 60s Max time to cache for a dir
dir_cache_min + + - 30s Min time to cache for a dir
max_dirs_cached + + - Varies Varies from 200-300 depending on RAM amount
max_cached_per_dir + + - Varies Varies from 2000-10000 depending on RAM amount
netBIOS_before_DNS + + + no Try NetBIOS resolution before DNS resolution
mc_on + - - yes Turn on SMB multichannel (allow more than one channel per session)
mc_prefer_wired + - - no Prefer wired NIC's over wireless in multichannel mode
encrypt_cipher_map + - - 15 Bitmap of SMB 3.1.1 encryption algorithms that are enabled
force_sess_encrypt + - - no Force session encryption for all mounts
force_share_encrypt + - - no Force share encryption for all mounts
The minimum authentication level can be one of:
kerberos Kerberos - NTLMv2, NTLM, LM, and plain-text password
authentication are not attempted.
ntlmv2 NTLMv2 - Kerberos authentication is attempted if a Kerberos
token can be obtained, otherwise NTLMv2 authentication is
attempted; if the server doesn't support encrypted passwords,
the authentication fails.
ntlm NTLM - Kerberos authentication is attempted if a Kerberos
token can be obtained, otherwise NTLMv2 authentication is
attempted and, if that fails, NTLMv1 authentication is
attempted, with zeroes in the LM hash; if the server doesn't
support encrypted passwords, the authentication fails.
lm LM - Kerberos authentication is attempted if a Kerberos token
can be obtained, otherwise NTLMv2 authentication is attempted
and, if that fails, NTLMv1 authentication is attempted,
including the LM hash; if the server doesn't support
encrypted passwords, the authentication fails.
none none - The same as lm except that, if the server doesn't
support encrypted passwords, plain-text passwords are used.
Required for servers that don't support extended security.
(Note: "NetBIOS" as used below means "NetBIOS over TCP/IP.")
"How to use SMB TCP/UDP ports" can be one of:
both Attempt to connect via port 445. If that is unsuccessful,
try to connect via NetBIOS.
netbios_only Do not attempt to connect via port 445.
no_netbios Attempt to connect via port 445. If that is unsuccessful,
do not try to connect via NetBIOS.
"Bitmap of SMB Versions that are enabled" can be one of:
7 == 0111
SMB 1/2/3 should be enabled
6 == 0110
SMB 2/3 should be enabled
4 == 0100
SMB 3 should be enabled
"Bitmap of SMB Versions that have signing required" can be one of:
7 Signing required for SMB 1/2/3.
6 Signing required for SMB 2/3.
4 Signing required for SMB 3.
"Bitmap of SMB 3.1.1 encryption algorithms that are enabled" can be one of:
15 == 1111
AES-256-GCM/AES-256-CCM/AES-128-GCM/AES-128-CCM should be enabled
7 == 0111
AES-256-CCM/AES-128-GCM/AES-128-CCM should be enabled
3 == 0011
AES-128-GCM/AES-128-CCM should be enabled
1 == 0001
AES-128-CCM should be enabled
FILES
/etc/nsmb.conf The global configuration file.
~/Library/Preferences/nsmb.conf
The user's configuration file, conflicts will be
overwritten by the global file.
EXAMPLES
What follows is a sample configuration file which may, or may not match
your environment:
# Configuration file for example.com
[default]
minauth=ntlmv2
streams=yes
soft=yes
notify_off=yes
[WINXP]
addr=windowsXP.apple.com
All lines which begin with the ‘#’ character are comments and will not be
parsed. The “default” section specifies that only Kerberos and NTLMv2
authentication should be attempted; NTLM authentication should not be
attempted if NTLMv2 authentication fails, and plain-text authentication
should not be attempted if the server doesn't support encrypted passwords.
SEE ALSO
smbutil(1), mount_smbfs(8)
AUTHORS
This manual page was originally written by Sergey Osokin ⟨[email protected]⟩
and Tom Rhodes ⟨[email protected]⟩.
macOS 12.0 June 30, 2003 macOS 12.0