Samba 4.0 released - The First Free Software Active Directory Compatible Server.

Release Announcements --------------------- This is is the first stable release of Samba 4.0. This release contains the best of all of Samba's technology parts, both a file server (that you can reasonably
expect to upgrade existing Samba 3.x releases to) and the AD domain controller work previously known as
'Samba4'. Major enhancements in Samba 4.0.0 include: Active Directory services ========================= Samba 4.0 supports the server-side of the Active Directory logon environment used by Windows 2000 and later,
so we can do full domain join and domain logon operations with these clients. Our Domain Controller (DC) implementation includes our own built-in LDAP server and Kerberos Key Distribution
Center (KDC) as well as the Samba3-like logon services provided over CIFS. We correctly generate the
infamous Kerberos PAC, and include it with the Kerberos tickets we issue. When running an AD DC, you only need to run 'samba' (not smbd/nmbd/winbindd), as the required services
are co-coordinated by this master binary. The tool to administer the Active Directory services is called 'samba-tool'. A short guide to setting up Samba 4 as an AD DC can be found on the wiki: http://wiki.samba.org/index.php/Samba4/HOWTO File Services ============= Samba 4.0.0 ships with two distinct file servers. We now use the file server from the Samba 3.x series 'smbd'
for all file serving by default. Samba 4.0 also ships with the 'NTVFS' file server. This file server is what was used prior to the beta2 release
of Samba 4.0, and is tuned to match the requirements of an AD domain controller. We continue to support this,
not only to provide continuity to installations that have deployed it as part of an AD DC, but also as a running
example of the NT-FSA architecture we expect to move smbd to in the longer term. For pure file server work, the binaries users would expect from that series (smbd, nmbd, winbindd, smbpasswd)
 continue to be available. DNS === As DNS is an integral part of Active Directory, we also provide two DNS solutions, a simple internal DNS server
for 'out of the box' configurations and a more elaborate BIND plugin using the BIND DLZ mechanism in versions
 9.8 and 9.9. During the provision, you can select which backend to use. With the internal backend, your DNS server is good to go.If you chose the BIND_DLZ backend, a configuration file
 will be generated for bind to make it use this plugin, as well as a file explaining how to set up bind. NTP === To provide accurate timestamps to Windows clients, we integrate with the NTP project to provide secured NTP
replies. To use you need to start ntpd and configure it with the 'restrict ... ms-sntp' and ntpsigndsocket options. Python Scripting Interface ========================== A new scripting interface has been added to Samba 4, allowing Python programs to interface to Samba's
internals, and many tools and internal workings of the DC code is now implemented in python.



================ Download Details ================ The uncompressed tarballs and patch files have been signed using GnuPG (ID 6568B7EA). The source code
can be downloaded from: http://download.samba.org/samba/ftp/stable/ The release notes are available online at: http://www.samba.org/samba/history/samba-4.0.0.html Binary packages will be made available on a volunteer basis from http://download.samba.org/samba/ftp/Binary_Packages/

'News' 카테고리의 다른 글

CentOS 6.4 Release  (0) 2013.03.10
XE 1.5.4.2 배포  (1) 2013.01.17
Samba 4.0 Release  (0) 2012.12.14
Samba 3.6.9 Release  (0) 2012.11.06
XE 1.5.3.2 배포  (1) 2012.09.17
ModSecurity extension for IIS  (0) 2012.09.04
Array



==================================================================== Release Announcements ===================== This is is the latest stable release of Samba 3.6. Major enhancements in Samba 3.6.9 include: o When setting a non-default ACL, don't forget to apply masks to SMB_ACL_USER and SMB_ACL_GROUP
entries (bug #9236). o Winbind can't fetch user or group info from AD via LDAP (bug #9147). o Fix segfault in smbd if user specified ports out for range (bug #9218). Changes since 3.6.8: -------------------- o Michael Adam * BUG 9173: Make SMB2 compound request create/delete_on_close/close work as Windows. o Jeremy Allison * BUG 8966: Fix 'net rpc share allowedusers' to work with 2008r2. * BUG 9016: Connection to outbound trusted domain goes offline. * BUG 9117: 'smbclient' can't connect to a Windows 7 server using NTLMv2. * BUG 9147: Winbind can't fetch user or group info from AD via LDAP. * BUG 9174: Empty SPNEGO packet can cause smbd to crash. * BUG 9189: SMB2 Create doesn't return correct MAX ACCESS access mask in blob. * BUG 9209: Parse of invalid SMB2 create blob can cause smbd crash. * BUG 9213: Bad ASN.1 NegTokenInit packet can cause invalid free. * BUG 9222: Signing cannot be disabled for SMB2 by design, so fix the documentation instead. * BUG 9236: When setting a non-default ACL, don't forget to apply masks to SMB_ACL_USER and
SMB_ACL_GROUP entries. o Andrew Bartlett * BUG 8788: Initialise ticket to ensure we do not invalid memory. o Ira Cooper * BUG 9173: Compound requests should continue processing. o Guenther Deschner * BUG 9177: pam_winbind: Match more return codes when wbcGetPwnam has failed. o Björn Jacke * BUG 3272: quota: Don't force the block size to 512. * BUG 8107: Add some includes for poll.h. * BUG 8146: Fix wrong test == syntax in configure. * BUG 8344: Fix --with(out)-sendfile-support option handling in autoconf. * BUG 9172: Add quota support for gfs2. o Volker Lendecke * BUG 9188: Fix crash bug in idmap_hash. * BUG 9268: Make tdb robust against improper CLEAR_IF_FIRST restart. o Luca Lorenzetto * BUG 9013: Fix crash on null pam change pw response. o Vladimir Marek * BUG 9192: Fix service control for non-internal services. o Stefan Metzmacher * BUG 9173: Make SMB2 compound request create/delete_on_close/close work as Windows. * BUG 9196: Don't take 'state->te' as indication for "was_deferred". * BUG 9209: Fix unitialized padding in smb2_create_blob_push_one(). o Matthieu Patou * BUG 9259: lib-addns: ensure that allocated buffer are pre set to 0. o Rusty Russell * BUG 9268: Make robust against shrinking tdbs. o Joachim Schmitz * BUG 8107: Fix poll replacement to become a msleep replacement. o Andreas Schneider * BUG 8632: Fix builtin forms order to match Windows again. * BUG 8769: Fix RAW printing for normal users. * BUG 9112: Increase debug level for info that the db is empty. * BUG 9154: Open printers with the right access mask. * BUG 9171: Remove non-existent option '-Y' from winbindd manpage. * BUG 9218: Fix segfault in smbd if user specified ports out for range. * BUG 9231: Fix NT_STATUS_IO_TIMEOUT during slow import of printers into registry. * BUG 9280: Add support for reloading systemd services. o Karolin Seeger * BUG 9165: Fix makerpms.sh on RHEL.

================ Download Details ================ The uncompressed tarballs and patch files have been signed using GnuPG (ID 6568B7EA).
 The source code can be downloaded from: http://download.samba.org/samba/ftp/ The release notes are available online at: http://www.samba.org/samba/ftp/history/samba-3.6.9.html Binary packages will be made available on a volunteer basis from http://download.samba.org/samba/ftp/Binary_Packages/

'News' 카테고리의 다른 글

XE 1.5.4.2 배포  (1) 2013.01.17
Samba 4.0 Release  (0) 2012.12.14
Samba 3.6.9 Release  (0) 2012.11.06
XE 1.5.3.2 배포  (1) 2012.09.17
ModSecurity extension for IIS  (0) 2012.09.04
CentOS 6.3 Release  (0) 2012.07.11
Release Announcements
=====================

This is the latest stable release of Samba 3.5.

Major enhancements in Samba 3.5.16 include:

o  Fix possible memory leaks in the Samba master process (bug #8970).
o  Fix uninitialized memory read in talloc_free().
o  Fix smbd crash with unknown user (bug #8314).



================ Download Details ================ The uncompressed tarballs and patch files have been signed using GnuPG (ID 6568B7EA). The source code can be downloaded from: http://download.samba.org/samba/ftp/stable The release notes are available online at: http://www.samba.org/samba/history/samba-3.5.16.html Binary packages will be made available on a volunteer basis from http://download.samba.org/samba/ftp/Binary_Packages/


'News' 카테고리의 다른 글

ModSecurity extension for IIS  (0) 2012.09.04
CentOS 6.3 Release  (0) 2012.07.11
Samba 3.5.16 Release  (0) 2012.07.04
XE 1.5.2 배포  (3) 2012.03.22
XpressEngine Core 1.5.1.1 배포  (2) 2011.12.30
CentOS 6.2 Release  (0) 2011.12.22

samba logo

Release Announcements
=====================

Samba 3.5.10, 3.4.14 and 3.3.16 are security releases in order to address CVE-2011-2522 
(Cross-Site Request Forgery in SWAT) and CVE-2011-2694 (Cross-Site Scripting vulnerability in SWAT). o CVE-2011-2522: The Samba Web Administration Tool (SWAT) in Samba versions 3.0.x to 3.5.9 are affected by a
cross-site request forgery. o CVE-2011-2694: The Samba Web Administration Tool (SWAT) in Samba versions 3.0.x to 3.5.9 are affected by a
cross-site scripting vulnerability. Please note that SWAT must be enabled in order for these vulnerabilities to be exploitable. By default,
SWAT is *not* enabled on a Samba install. Changes ------- * BUG 8289: SWAT contains a cross-site scripting vulnerability. * BUG 8290: CSRF vulnerability in SWAT. ================ Download Details ================ The uncompressed tarballs and patch files have been signed using GnuPG (ID 6568B7EA).
The source code can be downloaded from: http://download.samba.org/samba/ftp/stable The release notes are available online at: http://www.samba.org/samba/history/samba-3.5.10.html http://www.samba.org/samba/history/samba-3.4.14.html http://www.samba.org/samba/history/samba-3.3.16.html Binary packages will be made available on a volunteer basis from http://download.samba.org/samba/ftp/Binary_Packages/ Samba 3.6.0rc3 Available for Download Release Announcements --------------------- This is the third release candidate of Samba 3.6.0. This is *not* intended for production environments and
is designed for testing purposes only. Please report any defects via the Samba bug reporting system at
 https://bugzilla.samba.org/. Major enhancements in Samba 3.6.0 include: Changed security defaults ------------------------- Samba 3.6 has adopted a number of improved security defaults that will impact on existing users of Samba. client ntlmv2 auth = yes client use spnego principal = no send spnego principal = no .
.
.
.
.

 SMB2 support ------------ Internal Winbind passdb changes ------------------------------- Winbind has been changed to use the internal samr and lsa rpc pipe to get local user and group information instead of calling passdb functions. The reason is to use more of our infrastructure and test this infrastructure by using it. With this approach more code in Winbind is shared. New Spoolss code ----------------

ID Mapping Changes ------------------ Endpoint Mapper --------------- Internal restructuring ---------------------- SMB Traffic Analyzer -------------------- NFS quota backend on Linux -------------------------- ####### Changes ####### smb.conf changes ---------------- Parameter Name Description Default -------------- ----------- ------- async smb echo handler New No client ntlmv2 auth Changed Default Yes client use spnego principal New No ctdb locktime warn threshold New 0 idmap alloc backend Removed log writeable files on exit New No multicast dns register New Yes ncalrpc dir New send spnego principal New No smb2 max credits New 128 smb2 max read New 1048576 smb2 max trans New 1048576 smb2 max write New 1048576 username map cache time New 0 winbind max clients New 200 The variable substitutions for %i and %I no longer use IPv4 addresses mapped to IPv6, e.g.
'::ffff:192.168.0.1', if the host has IPv6 enabled. Now %i and %I contain just '192.168.0.1'. * Fix a valgrind error.

좀더 자세한 내용은 링크를 참고하세요.

Release Announcements
=====================

This is the latest stable release of Samba 3.5.

Major enhancements in Samba 3.5.9 include:

o  Sgid bit lost on folder rename (bug #7996).
o  ACL can get lost when files are being renamed (bug #7987).
o  Respect "allow trusted domains = no" in Winbind (bug #6966).


================ Download Details ================ The uncompressed tarballs and patch files have been signed using GnuPG (ID 6568B7EA). The source code can be downloaded from: http://download.samba.org/samba/ftp/stable The release notes are available online at: http://www.samba.org/samba/history/samba-3.5.9.html Binary packages will be made available on a volunteer basis from http://download.samba.org/samba/ftp/Binary_Packages/

관련 링크 : http://www.samba.org

'News' 카테고리의 다른 글

CentOS 5.7 Release  (0) 2011.09.30
CentOS 6.0 Release  (0) 2011.07.12
Samba 3.5.9 Release  (0) 2011.06.20
CentOS 5.6 Release  (0) 2011.04.09
ProFTPD 1.3.3e Release  (0) 2011.04.04
XE Core 1.4.5 배포  (4) 2011.04.01

+ Recent posts