[Announce] Samba 4.8.0rc4 Available for Download

Karolin Seeger kseeger at samba.org
Thu Mar 1 20:26:33 UTC 2018

Release Announcements

This is the fourth release candidate of Samba 4.8.  This is *not*
intended for production environments and is designed for testing
purposes only.  Please report any defects via the Samba bug reporting
system at https://bugzilla.samba.org/.

Samba 4.8 will be the next version of the Samba suite.


New GUID Index mode in sam.ldb for the AD DC

Users who upgrade a Samba AD DC in-place will experience a short delay
in the first startup of Samba while the sam.ldb is re-indexed.

Unlike in previous releases a transparent downgrade is not possible.
If you wish to downgrade such a DB to a Samba 4.7 or earlier version,
please run the source4/scripting/bin/sambaundoguididx script first.

smbclient reparse point symlink parameters reversed

See the more detailed description below.

Changed trusted domains listing with wbinfo -m --verbose

See the more detailed description below.


New GUID Index mode in sam.ldb for the AD DC

The new layout used for sam.ldb is GUID, rather than DN oriented.
This provides Samba's Active Directory Domain Controller with a faster
database, particularly at larger scale.

The underlying DB is still TDB, simply the choice of key has changed.

The new mode is not optional, so no configuration is required.  Older
Samba versions cannot read the new database (see the upgrade
note above).

KDC GPO application

Adds Group Policy support for the Samba kdc. Applies password policies
(minimum/maximum password age, minimum password length, and password
complexity) and kerberos policies (user/service ticket lifetime and
renew lifetime).

Adds the samba_gpoupdate script for applying and unapplying
policy. Can be applied automatically by setting

 'apply group policies = yes'.

Time Machine Support with vfs_fruit

Samba can be configured as a Time Machine target for Apple Mac devices
through the vfs_fruit module. When enabling a share for Time Machine
support the relevant Avahi records to support discovery will be published
for installations that have been built against the Avahi client library.

Shares can be designated as a Time Machine share with the following setting:

  'fruit:time machine = yes'

Support for lower casing the MDNS Name

Allows the server name that is advertised through MDNS to be set to the
hostname rather than the Samba NETBIOS name. This allows an administrator
to make Samba registered MDNS records match the case of the hostname
rather than being in all capitals.

This can be set with the following settings:

  'mdns name = mdns'

Encrypted secrets

Attributes deemed to be sensitive are now encrypted on disk. The sensitive
values are currently:

This encryption is enabled by default on a new provision or join, it
can be disabled at provision or join time with the new option

However, an in-place upgrade will not encrypt the database.

Once encrypted, it is not possible to do an in-place downgrade (eg to
4.7) of the database. To obtain an unencrypted copy of the database a
new DC join should be performed, specifying the '--plaintext-secrets'

The key file "encrypted_secrets.key" is created in the same directory
as the database and should NEVER be disclosed.  It is included by the
samba_backup script.

Active Directory replication visualisation

To work out what is happening in a replication graph, it is sometimes
helpful to use visualisations. We introduce a samba-tool subcommand to
write Graphviz dot output and generate text-based heatmaps of the
distance in hops between DCs.

There are two subcommands, two graphical modes, and (roughly) two modes of
operation with respect to the location of authority.

`samba-tool visualize ntdsconn` looks at NTDS Connections.
`samba-tool visualize reps` looks at repsTo and repsFrom objects.

In '--distance' mode (default), the distances between DCs are shown in
a matrix in the terminal. With '--color=yes', this is depicted as a
heatmap. With '--utf8' it is a lttle prettier.

In '--dot' mode, Graphviz dot output is generated. When viewed using
dot or xdot, this shows the network as a graph with DCs as vertices
and connections edges. Certain types of degenerate edges are shown in
different colours or line-styles.

smbclient reparse point symlink parameters reversed

A bug in smbclient caused the 'symlink' command to reverse the
meaning of the new name and link target parameters when creating a
reparse point symlink against a Windows server. As this is a
little used feature the ordering of these parameters has been
reversed to match the parameter ordering of the UNIX extensions
'symlink' command. The usage message for this command has also
been improved to remove confusion.

Winbind changes

The dependency to global list of trusted domains within
the winbindd processes has been reduced a lot.

The construction of that global list is not reliable and often
incomplete in complex trust setups. In most situations the list is not needed
any more for winbindd to operate correctly. E.g. for plain file serving via SMB
using a simple idmap setup with autorid, tdb or ad. However some more complex
setups require the list, e.g. if you specify idmap backends for specific
domains. Some pam_winbind setups may also require the global list.

If you have a setup that doesn't require the global list, you should set
"winbind scan trusted domains = no".

Improved support for trusted domains (as AD DC)

The support for trusted domains/forests has improved a lot.

External domain trusts, as well a transitive forest trusts,
are supported in both directions (inbound and outbound)
for Kerberos and NTLM authentication now.

The LSA LookupNames and LookupSids implementations
support resolving names and sids from trusts domains/forest
now. This is important in order to allow Samba based
domain members to make use of the trust.

However there are currently still a few limitations:

- It's not possible to add users/groups of a trusted domain
  into domain groups. So group memberships are not expanded
  on trust boundaries.
  See https://bugzilla.samba.org/show_bug.cgi?id=13300
- Both sides of the trust need to fully trust each other!
- No SID filtering rules are applied at all!
- This means DCs of domain A can grant domain admin rights
  in domain B.
- Selective (CROSS_ORIGANIZATION) authentication is
  not supported. It's possible to create such a trust,
  but the KDC and winbindd ignore them.

Changed trusted domains listing with wbinfo -m --verbose

The trust properties printed by wbinfo -m --verbose have been changed to
correctly reflect the view of the system where wbinfo is executed.

The trust type field in particular can show additional values that correctly
reflect the type of the trust: "Local" for the local SAM and BUILTIN,
"Workstation" for a workstation trust to the primary domain, "RWDC" for the SAM
on a AD DC, "RODC" for the SAM on a read-only DC, "PDC" for the SAM on a
NT4-style DC, "Forest" for a AD forest trust and "External" for quarantined,
external or NT4-style trusts.

Indirect trusts are shown as "Routed" including the routing domain.

Example, on a AD DC (SDOM1):

Domain Name DNS Domain          Trust Type  Transitive  In   Out
BUILTIN                         Local
SDOM1       sdom1.site          RWDC
WDOM3       wdom3.site          Forest      Yes         No   Yes
WDOM2       wdom2.site          Forest      Yes         Yes  Yes
SUBDOM31    subdom31.wdom3.site Routed (via WDOM3)
SUBDOM21    subdom21.wdom2.site Routed (via WDOM2)

Same setup, on a member of WDOM2:

Domain Name DNS Domain          Trust Type  Transitive  In   Out
BUILTIN                         Local
TITAN                           Local
WDOM2       wdom2.site          Workstation Yes         No   Yes
WDOM1       wdom1.site          Routed (via WDOM2)
WDOM3       wdom3.site          Routed (via WDOM2)
SUBDOM21    subdom21.wdom2.site Routed (via WDOM2)
SDOM1       sdom1.site          Routed (via WDOM2)
SUBDOM11    subdom11.wdom1.site Routed (via WDOM2)

The list of trusts may be incomplete and additional domains may appear as
"Routed" if a user of an unknown domain is successfully authenticated.

VirusFilter VFS module

This new module integrates with Sophos, F-Secure and ClamAV anti-virus
software to provide scanning and filtering of files on a Samba share.


'net serverid' commands removed

The two commands 'net serverid list' and 'net serverid wipe' have been
removed, because the file serverid.tdb is not used anymore.

'net serverid list' can be replaced by listing all files in the
subdirectory "msg.lock" of Samba's "lock directory". The unique id
listed by 'net serverid list' is stored in every process' lockfile in

'net serverid wipe' is not necessary anymore. It was meant primarily
for clustered environments, where the serverid.tdb file was not
properly cleaned up after single node crashes. Nowadays smbd and
winbind take care of cleaning up the msg.lock and msg.sock directories

NT4-style replication based net commands removed

The following commands and sub-commands have been removed from the
"net" utility:

net rpc samdump
net rpc vampire ldif

Also, replicating from a real NT4 domain with "net rpc vampire" and
"net rpc vampire keytab" has been removed.

The NT4-based commands were accidentally broken in 2013, and nobody
noticed the breakage. So instead of fixing them including tests (which
would have meant writing a server for the protocols, which we don't
have) we decided to remove them.

For the same reason, the "samsync", "samdeltas" and "database_redo"
commands have been removed from rpcclient.

"net rpc vampire keytab" from Active Directory domains continues to be

vfs_aio_linux module removed

The current Linux kernel aio does not match what Samba would
do. Shipping code that uses it leads people to false
assumptions. Samba implements async I/O based on threads by default,
there is no special module required to see benefits of read and write
request being sent do the disk in parallel.

smb.conf changes

  Parameter Name                     Description             Default
  --------------                     -----------             -------
  apply group policies               New                     no
  auth methods                       Removed
  binddns dir                        New
  client schannel                    Default changed/        yes
  gpo update command                 New
  ldap ssl ads                       Deprecated
  map untrusted to domain            Removed
  oplock contention limit            Removed
  prefork children                   New                     1
  mdns name                          New                   netbios
  fruit:time machine                 New                   false
  profile acls                       Removed
  use spnego                         Removed
  server schannel                    Default changed/        yes
  unicode                            Deprecated
  winbind scan trusted domains       New                     yes
  winbind trusted domains only       Removed


o  Ralph Boehme <slow at samba.org>
   * BUG 13287: Fix numerous trust related bugs in winbindd and s4 LSA RPC
   * BUG 13296: vfs_fruit: Use off_t, not size_t for TM size calculations.

o  Alexander Bokovoy <ab at samba.org>
   * BUG 13304: mit-kdb: Support MIT Kerberos 1.16 KDB API changes.

o  Günther Deschner <gd at samba.org>
   * BUG 13277: build: Fix libceph-common detection.

o  Poornima G <pgurusid at redhat.com>
   * BUG 13297: vfs_glusterfs: Fix the wrong pointer being sent in

o  Volker Lendecke <vl at samba.org>
   * BUG 13305: vfs_fileid: Fix the 32-bit build.

o  Stefan Metzmacher <metze at samba.org>
   * BUG 13206: Unable to authenticate with an empty string domain ''.
   * BUG 13276: configure aborts without libnettle/gnutls.
   * BUG 13278: winbindd (on an AD DC) should only use netlogon/lsa against
     trusted domains.
   * BUG 13287: Fix numerous trust related bugs in winbindd and s4 LSA RPC
   * BUG 13290: A disconnecting winbind client can cause a problem in 
     the winbind parent child communication.
   * BUG 13291: tevent: version 0.9.36.
   * BUG 13292: winbind requests could get stuck in the queue of a busy child,
     while later requests could get served fine by other children.
   * BUG 13293: Minimize the lifetime of winbindd_cli_state->{pw,gr}ent_state.
   * BUG 13294: Avoid using fstrcpy(domain->dcname,...) on a char *.
   * BUG 13295: winbind parent should find the dc of a foreign domain via the
     primary domain.
   * BUG 13299: Disable support for CROSS_ORGANIZATION domains.
   * BUG 13306: ldb: version 1.3.2.

o  Sachin Prabhu <sprabhu at redhat.com>
   * BUG 13303: vfs_glusterfs: Add fallocate support for vfs_glusterfs.

o  Garming Sam <garming at catalyst.net.nz>
   * BUG 13031: subnet: Avoid a segfault when renaming subnet objects.
   * BUG 13269: RODC may skip objects during replication due to naming


o  Trever L. Adams <trever.adams at gmail.com>
   * BUG 13246: Backport Samba VirusFilter.

o  Ralph Boehme <slow at samba.org>
   * BUG 13228: dbcheck: Add support for restoring missing forward links.

o  Günther Deschner <gd at samba.org>
   * BUG 13221: python: fix the build with python3.

o  Stefan Metzmacher <metze at samba.org>
   * BUG 13228: dbcheck: Add support for restoring missing forward links.


o  Günther Deschner <gd at samba.org>
   * BUG 13227: packaging: Fix default systemd-dir path.
   * BUG 13238: build: Deal with recent glibc sunrpc header removal.

o  Stefan Metzmacher <metze at samba.org>
   * BUG 13228: repl_meta_data: fix linked attribute corruption on databases
     with unsorted links on expunge.

o  Christof Schmitt <cs at samba.org>
   * BUG 13217: s3/smbd: Remove file system sharemode before calling unlink.

o  Andreas Schneider <asn at samba.org>
   * BUG 13209: Small improvements in winbindd for the resource cleanup in error
   * BUG 13238: Make Samba work with tirpc and libnsl2.



Reporting bugs & Development Discussion

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the Samba 4.1 and newer product in the project's Bugzilla
database (https://bugzilla.samba.org/).

== Our Code, Our Bugs, Our Responsibility.
== The Samba Team

Download Details

The uncompressed tarballs and patch files have been signed
using GnuPG (ID 6F33915B6568B7EA).  The source code can be downloaded


The release notes are available online at:


Our Code, Our Bugs, Our Responsibility.

                        The Samba Team
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 163 bytes
Desc: not available
URL: <http://lists.samba.org/pipermail/samba-announce/attachments/20180301/fd119e82/signature.sig>

More information about the samba-announce mailing list