Just spotted a minor typo in winbindd: s/privilage/privilege/ . The
attached patch corrects this.
David
--- winbindd.8.orig 2005-01-31 23:02:11.678460000 +0100
+++ winbindd.8 2005-01-31 23:02:46.803379000 +0100
@@ -289,8 +289,8 @@
The UNIX pipe over which clients communicate with the \fBwinbindd\fR
program\&. For security reasons, the winbind client will only attempt to
connect to the winbindd daemon if both the \fI/tmp/\&.winbindd\fR directory and
\fI/tmp/\&.winbindd/pipe\fR file are owned by root\&.
.TP
-$LOCKDIR/winbindd_privilaged/pipe
-The UNIX pipe over which 'privilaged' clients communicate with the
\fBwinbindd\fR program\&. For security reasons, access to some winbindd
functions \- like those needed by the \fBntlm_auth\fR utility \- is
restricted\&. By default, only users in the 'root' group will get this access,
however the administrator may change the group permissions on
$LOCKDIR/winbindd_privilaged to allow programs like 'squid' to use ntlm_auth\&.
Note that the winbind client will only attempt to connect to the winbindd
daemon if both the \fI$LOCKDIR/winbindd_privilaged\fR directory and
\fI$LOCKDIR/winbindd_privilaged/pipe\fR file are owned by root\&.
+$LOCKDIR/winbindd_privileged/pipe
+The UNIX pipe over which 'privileged' clients communicate with the
\fBwinbindd\fR program\&. For security reasons, access to some winbindd
functions \- like those needed by the \fBntlm_auth\fR utility \- is
restricted\&. By default, only users in the 'root' group will get this access,
however the administrator may change the group permissions on
$LOCKDIR/winbindd_privileged to allow programs like 'squid' to use ntlm_auth\&.
Note that the winbind client will only attempt to connect to the winbindd
daemon if both the \fI$LOCKDIR/winbindd_privileged\fR directory and
\fI$LOCKDIR/winbindd_privileged/pipe\fR file are owned by root\&.
.TP
/lib/libnss_winbind\&.so\&.X
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/listinfo/samba