Technical Standard Protocols for X/Open PC Interworking: SMB, Version 2

Technical Standard Protocols for X/Open PC Interworking: SMB, Version 2

Technical Standard Protocols for X/Open PC Interworking: SMB, Version 2 NICAL H S C T A E N T D A R D [This page intentionally left blank] X/Open CAE Specification Protocols for X/Open PC Interworking: SMB, Version 2 X/Open Company Ltd. September 1992, X/Open Company Limited All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owners. X/Open CAE Specification Protocols for X/Open PC Interworking: SMB, Version 2 ISBN: 1 872630 45 6 X/Open Document Number: C209 Published by X/Open Company Ltd., U.K. Any comments relating to the material contained in this document may be submitted to X/Open at: X/Open Company Limited Apex Plaza Forbury Road Reading Berkshire, RG1 1AX United Kingdom or by Electronic Mail to: [email protected] ii X/Open CAE Specification (1992) Contents Chapter 1 Introduction.................................................................................................. 1 1.1 Why Republish............................................................................................... 1 1.2 This Document ............................................................................................... 1 1.3 Overview of Document Layout.................................................................. 2 Chapter 2 SMB File-sharing Service Model .................................................... 3 2.1 SMB Protocol Principles ............................................................................... 4 2.2 Security Overview......................................................................................... 5 2.2.1 Share-level Security Mode ........................................................................ 5 2.2.2 User-level Security Mode.......................................................................... 5 Chapter 3 SMB Protocol Conventions................................................................. 7 3.1 Summary of SMBs ......................................................................................... 7 3.2 SMB Environment Definitions .................................................................... 10 3.3 Share-level and User-level Security Modes.............................................. 12 3.3.1 Share-level Security Mode ........................................................................ 12 3.3.2 User-level Security Mode with Extended Protocols............................ 12 3.3.3 User-level Security with Core Protocol.................................................. 13 3.4 Connection Protocols .................................................................................... 14 3.5 Naming ............................................................................................................ 15 3.5.1 Resource Names ......................................................................................... 15 3.5.2 NetBIOS Names .......................................................................................... 15 3.5.3 Uniform Naming Convention.................................................................. 16 3.5.4 Canonical Pathnames................................................................................. 16 3.5.5 Long Names................................................................................................. 16 3.6 Wildcards ........................................................................................................ 17 3.7 File Paradigm.................................................................................................. 17 3.7.1 Regular Files ................................................................................................ 18 3.7.2 Open Modes................................................................................................. 18 3.7.3 Write Behaviour .......................................................................................... 19 3.8 Locking Conventions .................................................................................... 20 3.8.1 Byte Locking ................................................................................................ 20 3.8.2 Opportunistic Locking............................................................................... 20 3.9 Chaining of Extended SMB Requests ........................................................ 22 3.10 Exception and Error Handling.................................................................... 24 3.10.1 Disorderly LMX Session Dissolution...................................................... 24 3.10.2 Errors and Error Handling........................................................................ 24 3.11 Timeouts.......................................................................................................... 25 3.12 Downward-compatibility Support ............................................................ 25 Protocols for X/Open PC Interworking: SMB, Version 2 iii Contents Chapter 4 LMX Considerations ............................................................................... 27 4.1 LMX Username Mapping............................................................................. 27 4.2 LMX Filename Mapping .............................................................................. 28 4.3 LMX File Mapping......................................................................................... 30 4.3.1 SMB File Attributes .................................................................................... 30 4.3.2 CAE File Access Permissions ................................................................... 30 4.3.3 File System Issues ....................................................................................... 30 4.3.4 CAE Special Files ........................................................................................ 31 4.3.5 Deleting or Renaming a File ..................................................................... 31 4.3.6 Long Filenames ........................................................................................... 31 4.3.7 Extended Attributes ................................................................................... 31 4.4 LMX File Locking........................................................................................... 33 4.4.1 Interlocking Behaviour.............................................................................. 33 4.4.2 Locking Timeouts ....................................................................................... 34 4.4.3 Read-only Locks.......................................................................................... 34 4.5 LMX Server Caching ..................................................................................... 35 4.6 LMX Print Spooling....................................................................................... 35 4.7 SMB Error Codes............................................................................................ 35 4.8 Security Policy ................................................................................................ 36 4.9 Negotiated Dialect......................................................................................... 36 4.10 Network Issues............................................................................................... 36 Chapter 5 Data Objects and Constants............................................................... 37 5.1 SMB Format..................................................................................................... 37 5.2 SMB Command Codes.................................................................................. 40 5.3 Data Objects .................................................................................................... 43 5.3.1 Time Fields................................................................................................... 43 5.3.2 Date Fields.................................................................................................... 43 5.3.3 File Attributes Fields.................................................................................. 43 5.3.4 Buffers ........................................................................................................... 44 5.3.5 File-sharing Control ................................................................................... 44 5.3.6 Resource Types............................................................................................ 45 5.3.7 Access Modes .............................................................................................. 46 5.3.8 Open Function............................................................................................. 46 5.3.9 Resource Names, Pathnames, Filenames and Network Pathnames.........46 5.3.10 File Identifiers.............................................................................................. 47 5.4 SMB Dialects ................................................................................................... 48 5.5 Timeouts.......................................................................................................... 48 5.6 SMB Error Codes............................................................................................ 49 5.6.1 SMB Error Class Mappings....................................................................... 49 5.6.2 Error Codes for the SUCCESS Class ......................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    534 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us