![]() |
![]()
| ![]() |
![]()
NAMErpcclient - tool for executing client side MS-RPC functions SYNOPSISrpcclient [-c|--command=COMMANDS] [-I|--dest-ip=IP] [-p|--port=PORT] [-?|--help] [--usage] [-d|--debuglevel=DEBUGLEVEL] [--debug-stdout] [--configfile=CONFIGFILE] [--option=name=value] [-l|--log-basename=LOGFILEBASE] [--leak-report] [--leak-report-full] [-R|--name-resolve=NAME-RESOLVE-ORDER] [-O|--socket-options=SOCKETOPTIONS] [-m|--max-protocol=MAXPROTOCOL] [-n|--netbiosname=NETBIOSNAME] [--netbios-scope=SCOPE] [-W|--workgroup=WORKGROUP] [--realm=REALM] [-U|--user=[DOMAIN/]USERNAME[%PASSWORD]] [-N|--no-pass] [--password=STRING] [--pw-nt-hash] [-A|--authentication-file=FILE] [-P|--machine-pass] [--simple-bind-dn=DN] [--use-kerberos=desired|required|off] [--use-krb5-ccache=CCACHE] [--use-winbind-ccache] [--client-protection=sign|encrypt|off] [-V|--version] {BINDING-STRING|HOST} DESCRIPTIONThis tool is part of the samba(7) suite. rpcclient is a utility initially developed to test MS-RPC functionality in Samba itself. It has undergone several stages of development and stability. Many system administrators have now written scripts around it to manage Windows NT clients from their UNIX workstation. OPTIONSBINDING-STRING|HOST When connecting to a dcerpc service you need to specify a
binding string.
The format is: TRANSPORT:host[options] where TRANSPORT is either ncacn_np (named pipes) for SMB or ncacn_ip_tcp for DCERPC over TCP/IP. "host" is an IP or hostname or netbios name. If the binding string identifies the server side of an endpoint, "host" may be an empty string. See below for more details. "options" can include a SMB pipe name if using the ncacn_np transport or a TCP port number if using the ncacn_ip_tcp transport, otherwise they will be auto-determined. Examples: •ncacn_ip_tcp:samba.example.com[1024]
•ncacn_ip_tcp:samba.example.com[sign,seal,krb5]
•ncacn_ip_tcp:samba.example.com[sign,spnego]
•ncacn_np:samba.example.com
•ncacn_np:samba.example.com[samr]
•ncacn_np:samba.example.com[samr,sign,print]
•ncalrpc:/path/to/unix/socket
•//SAMBA
•ncacn_np - Connect using named pipes
•ncacn_ip_tcp - Connect over TCP/IP
•ncalrpc - Connect over local RPC (unix
sockets)
•sign - Use RPC integrity authentication
level
•seal - Enable RPC privacy (encryption)
authentication level
•connect - Use RPC connect level
authentication (auth, but no sign or seal)
•packet - Use RPC packet authentication
level
•spnego - Use SPNEGO instead of NTLMSSP
authentication
•ntlm - Use plain NTLM instead of SPNEGO or
NTLMSSP
•krb5 - Use Kerberos instead of NTLMSSP
authentication
•schannel - Create a schannel
connection
•smb1 - Use SMB1 for named pipes
•smb2 - Use SMB2/3 for named pipes
•validate - Enable the NDR validator
•print - Enable debug output of
packets
•padcheck - Check reply data for non-zero
pad bytes
•bigendian - Use big endian for RPC
•ndr64 - Use NDR64 for RPC
-c|--command=<command string> Execute semicolon separated commands (listed below)
-I|--dest-ip IP-address IP address is the address of the server to connect
to. It should be specified in standard "a.b.c.d" notation.
Normally the client would attempt to locate a named SMB/CIFS server by looking it up via the NetBIOS name resolution mechanism described above in the name resolve order parameter above. Using this parameter will force the client to assume that the server is on the machine with the specified IP address and the NetBIOS name component of the resource being connected to will be ignored. There is no default for this parameter. If not supplied, it will be determined automatically by the client as described above. -p|--port port This number is the TCP port number that will be used when
making connections to the server. The standard (well-known) TCP port number
for an SMB/CIFS server is 139, which is the default.
-?|--help Print a summary of command line options.
--usage Display brief usage message.
-d|--debuglevel=DEBUGLEVEL level is an integer from 0 to 10. The default
value if this parameter is not specified is 1 for client applications.
The higher this value, the more detail will be logged to the log files about the activities of the server. At level 0, only critical errors and serious warnings will be logged. Level 1 is a reasonable level for day-to-day running - it generates a small amount of information about operations carried out. Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic. Note that specifying this parameter here will override the log level parameter in the smb.conf file. --debug-stdout This will redirect debug output to STDOUT. By default all
clients are logging to STDERR.
--configfile=<configuration file> The file specified contains the configuration details
required by the client. The information in this file can be general for client
and server or only provide client specific like options such as client smb
encrypt. See smb.conf for more information. The default configuration file
name is determined at compile time.
--option=<name>=<value> Set the smb.conf(5) option
"<name>" to value "<value>" from the command
line. This overrides compiled-in defaults and options read from the
configuration file. If a name or a value includes a space, wrap whole
--option=name=value into quotes.
-l|--log-basename=logdirectory Base directory name for log/debug files. The extension
".progname" will be appended (e.g. log.smbclient, log.smbd,
etc...). The log file is never removed by the client.
--leak-report Enable talloc leak reporting on exit.
--leak-report-full Enable full talloc leak reporting on exit.
-V|--version Prints the program version number.
-R|--name-resolve=NAME-RESOLVE-ORDER This option is used to determine what naming services and
in what order to resolve host names to IP addresses. The option takes a
space-separated string of different name resolution options. The best ist to
wrap the whole --name-resolve=NAME-RESOLVE-ORDER into quotes.
The options are: "lmhosts", "host", "wins" and "bcast". They cause names to be resolved as follows: •lmhosts: Lookup an IP address in the Samba
lmhosts file. If the line in lmhosts has no name type attached to the NetBIOS
name (see the lmhosts(5) for details) then any name type matches for
lookup.
•host: Do a standard host name to IP
address resolution, using the system /etc/hosts, NIS, or DNS lookups. This
method of name resolution is operating system dependent, for instance on IRIX
or Solaris this may be controlled by the /etc/nsswitch.conf file). Note that
this method is only used if the NetBIOS name type being queried is the 0x20
(server) name type, otherwise it is ignored.
•wins: Query a name with the IP address
listed in the wins server parameter. If no WINS server has been
specified this method will be ignored.
•bcast: Do a broadcast on each of the known
local interfaces listed in the interfaces parameter. This is the least
reliable of the name resolution methods as it depends on the target host being
on a locally connected subnet.
The default order is lmhosts, host, wins, bcast. Without this parameter or any entry in the name resolve order parameter of the smb.conf file, the name resolution methods will be attempted in this order. -O|--socket-options=SOCKETOPTIONS TCP socket options to set on the client socket. See the
socket options parameter in the smb.conf manual page for the list of valid
options.
-m|--max-protocol=MAXPROTOCOL The value of the parameter (a string) is the highest
protocol level that will be supported by the client.
Note that specifying this parameter here will override the client max protocol parameter in the smb.conf file. -n|--netbiosname=NETBIOSNAME This option allows you to override the NetBIOS name that
Samba uses for itself. This is identical to setting the netbios name
parameter in the smb.conf file. However, a command line setting will take
precedence over settings in smb.conf.
--netbios-scope=SCOPE This specifies a NetBIOS scope that nmblookup will use to
communicate with when generating NetBIOS names. For details on the use of
NetBIOS scopes, see rfc1001.txt and rfc1002.txt. NetBIOS scopes are
very rarely used, only set this parameter if you are the system
administrator in charge of all the NetBIOS systems you communicate with.
-W|--workgroup=WORKGROUP Set the SMB domain of the username. This overrides the
default domain which is the domain defined in smb.conf. If the domain
specified is the same as the servers NetBIOS name, it causes the client to log
on using the servers local SAM (as opposed to the Domain SAM).
Note that specifying this parameter here will override the workgroup parameter in the smb.conf file. -r|--realm=REALM Set the realm for the domain.
Note that specifying this parameter here will override the realm parameter in the smb.conf file. -U|--user=[DOMAIN\]USERNAME[%PASSWORD] Sets the SMB username or username and password.
If %PASSWORD is not specified, the user will be prompted. The client will first check the USER environment variable (which is also permitted to also contain the password seperated by a %), then the LOGNAME variable (which is not permitted to contain a password) and if either exists, the value is used. If these environmental variables are not found, the username found in a Kerberos Credentials cache may be used. A third option is to use a credentials file which contains the plaintext of the username and password. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables. If this method is used, make certain that the permissions on the file restrict access from unwanted users. See the -A for more details. Be cautious about including passwords in scripts or passing user-supplied values onto the command line. For security it is better to let the Samba client tool ask for the password if needed, or obtain the password once with kinit. While Samba will attempt to scrub the password from the process title (as seen in ps), this is after startup and so is subject to a race. -N|--no-pass If specified, this parameter suppresses the normal
password prompt from the client to the user. This is useful when accessing a
service that does not require a password.
Unless a password is specified on the command line or this parameter is specified, the client will request a password. If a password is specified on the command line and this option is also defined the password on the command line will be silently ignored and no password will be used. --password Specify the password on the commandline.
Be cautious about including passwords in scripts or passing user-supplied values onto the command line. For security it is better to let the Samba client tool ask for the password if needed, or obtain the password once with kinit. If --password is not specified, the tool will check the PASSWD environment variable, followed by PASSWD_FD which is expected to contain an open file descriptor (FD) number. Finally it will check PASSWD_FILE (containing a file path to be opened). The file should only contain the password. Make certain that the permissions on the file restrict access from unwanted users! While Samba will attempt to scrub the password from the process title (as seen in ps), this is after startup and so is subject to a race. --pw-nt-hash The supplied password is the NT hash.
-A|--authentication-file=filename This option allows you to specify a file from which to
read the username and password used in the connection. The format of the file
is:
username = <value> password = <value> domain = <value> Make certain that the permissions on the file restrict access from unwanted users! -P|--machine-pass Use stored machine account password.
--simple-bind-dn=DN DN to use for a simple bind.
--use-kerberos=desired|required|off This parameter determines whether Samba client tools will
try to authenticate using Kerberos. For Kerberos authentication you need to
use dns names instead of IP addresses when connnecting to a service.
Note that specifying this parameter here will override the client use kerberos parameter in the smb.conf file. --use-krb5-ccache=CCACHE Specifies the credential cache location for Kerberos
authentication.
This will set --use-kerberos=required too. --use-winbind-ccache Try to use the credential cache by winbind.
--client-protection=sign|encrypt|off Sets the connection protection the client tool should
use.
Note that specifying this parameter here will override the client protection parameter in the smb.conf file. In case you need more fine grained control you can use: --option=clientsmbencrypt=OPTION, --option=clientipcsigning=OPTION, --option=clientsigning=OPTION. COMMANDSLSARPClsaquery Query info policy
lookupsids Convert SIDs to names
lookupsids3 Convert SIDs to names
lookupsids_level Convert SIDs to names
lookupnames Convert names to SIDs
lookupnames4 Convert names to SIDs
lookupnames_level Convert names to SIDs
enumtrust Enumerate trusted domains
enumprivs Enumerate privileges
getdispname Get the privilege name
lsaenumsid Enumerate the LSA SIDS
lsacreateaccount Create a new lsa account
lsaenumprivsaccount Enumerate the privileges of an SID
lsaenumacctrights Enumerate the rights of an SID
lsaaddpriv Assign a privilege to a SID
lsadelpriv Revoke a privilege from a SID
lsaaddacctrights Add rights to an account
lsaremoveacctrights Remove rights from an account
lsalookupprivvalue Get a privilege value given its name
lsaquerysecobj Query LSA security object
lsaquerytrustdominfo Query LSA trusted domains info (given a SID)
lsaquerytrustdominfobyname Query LSA trusted domains info (given a name), only works
for Windows > 2k
lsaquerytrustdominfobysid Query LSA trusted domains info (given a SID)
lsasettrustdominfo Set LSA trusted domain info
getusername Get username
createsecret Create Secret
deletesecret Delete Secret
querysecret Query Secret
setsecret Set Secret
retrieveprivatedata Retrieve Private Data
storeprivatedata Store Private Data
createtrustdom Create Trusted Domain
deletetrustdom Delete Trusted Domain
LSARPC-DSdsroledominfo Get Primary Domain Information
DFSdfsversion Query DFS support
dfsadd Add a DFS share
dfsremove Remove a DFS share
dfsgetinfo Query DFS share info
dfsenum Enumerate dfs shares
dfsenumex Enumerate dfs shares
SHUTDOWNshutdowninit syntax: shutdown [-m message]
shutdownabort syntax: shutdownabort
SRVSVCsrvinfo Server query info
netshareenum Enumerate shares
netshareenumall Enumerate all shares
netsharegetinfo Get Share Info
netsharesetinfo Set Share Info
netsharesetdfsflags Set DFS flags
netfileenum Enumerate open files
netremotetod Fetch remote time of day
netnamevalidate Validate sharename
netfilegetsec Get File security
netsessdel Delete Session
netsessenum Enumerate Sessions
netdiskenum Enumerate Disks
netconnenum Enumerate Connections
netshareadd Add share
netsharedel Delete share
SAMRqueryuser Query user info
querygroup Query group info
queryusergroups Query user groups
queryuseraliases Query user aliases
querygroupmem Query group membership
queryaliasmem Query alias membership
queryaliasinfo Query alias info
deletealias Delete an alias
querydispinfo Query display info
querydispinfo2 Query display info
querydispinfo3 Query display info
querydominfo Query domain info
enumdomusers Enumerate domain users
enumdomgroups Enumerate domain groups
enumalsgroups Enumerate alias groups
enumdomains Enumerate domains
createdomuser Create domain user
createdomgroup Create domain group
createdomalias Create domain alias
samlookupnames Look up names
samlookuprids Look up names
deletedomgroup Delete domain group
deletedomuser Delete domain user
samquerysecobj Query SAMR security object
getdompwinfo Retrieve domain password info
getusrdompwinfo Retrieve user domain password info
lookupdomain Lookup Domain Name
chgpasswd Change user password
chgpasswd2 Change user password
chgpasswd3 Change user password
getdispinfoidx Get Display Information Index
setuserinfo Set user info
setuserinfo2 Set user info2
SPOOLSSadddriver <arch> <config> [<version>] Execute an AddPrinterDriver() RPC to install the printer
driver information on the server. Note that the driver files should already
exist in the directory returned by getdriverdir. Possible values for
arch are the same as those for the getdriverdir command. The
config parameter is defined as follows:
Long Driver Name:\ Driver File Name:\ Data File Name:\ Config File Name:\ Help File Name:\ Language Monitor Name:\ Default Data Type:\ Comma Separated list of Files Any empty fields should be enter as the string "NULL". Samba does not need to support the concept of Print Monitors since these only apply to local printers whose driver can make use of a bi-directional link for communication. This field should be "NULL". On a remote NT print server, the Print Monitor for a driver must already be installed prior to adding the driver or else the RPC will fail. The version parameter lets you specify the printer driver version number. If omitted, the default driver version for the specified architecture will be used. This option can be used to upload Windows 2000 (version 3) printer drivers. addprinter <printername> <sharename> <drivername> <port> Add a printer on the remote server. This printer will be
automatically shared. Be aware that the printer driver must already be
installed on the server (see adddriver) and the portmust be a valid
port name (see enumports.
deldriver <driver> Delete the specified printer driver for all
architectures. This does not delete the actual driver files from the server,
only the entry from the server's list of drivers.
deldriverex <driver> [architecture] [version] [flags] Delete the specified printer driver and optionally files
associated with the driver. You can limit this action to a specific
architecture and a specific version. If no architecture is given, all driver
files of that driver will be deleted. flags correspond to numeric DPD_*
values, i.e. a value of 3 requests (DPD_DELETE_UNUSED_FILES |
DPD_DELETE_SPECIFIC_VERSION).
enumdata Enumerate all printer setting data stored on the server.
On Windows NT clients, these values are stored in the registry, while Samba
servers store them in the printers TDB. This command corresponds to the MS
Platform SDK GetPrinterData() function (* This command is currently
unimplemented).
enumdataex Enumerate printer data for a key
enumkey Enumerate printer keys
enumjobs <printer> List the jobs and status of a given printer. This command
corresponds to the MS Platform SDK EnumJobs() function
getjob Get print job
setjob Set print job
enumports [level] Executes an EnumPorts() call using the specified info
level. Currently only info levels 1 and 2 are supported.
enumdrivers [level] Execute an EnumPrinterDrivers() call. This lists the
various installed printer drivers for all architectures. Refer to the MS
Platform SDK documentation for more details of the various flags and calling
options. Currently supported info levels are 1, 2, and 3.
enumprinters [level] Execute an EnumPrinters() call. This lists the various
installed and share printers. Refer to the MS Platform SDK documentation for
more details of the various flags and calling options. Currently supported
info levels are 1, 2 and 5.
getdata <printername> <valuename;> Retrieve the data for a given printer setting. See the
enumdata command for more information. This command corresponds to the
GetPrinterData() MS Platform SDK function.
getdataex Get printer driver data with keyname
getdriver <printername> Retrieve the printer driver information (such as driver
file, config file, dependent files, etc...) for the given printer. This
command corresponds to the GetPrinterDriver() MS Platform SDK function.
Currently info level 1, 2, and 3 are supported.
getdriverdir <arch> Execute a GetPrinterDriverDirectory() RPC to retrieve the
SMB share name and subdirectory for storing printer driver files for a given
architecture. Possible values for arch are "Windows 4.0" (for
Windows 95/98), "Windows NT x86", "Windows NT PowerPC",
"Windows Alpha_AXP", and "Windows NT R4000".
getdriverpackagepath Get print driver package download directory
getprinter <printername> Retrieve the current printer information. This command
corresponds to the GetPrinter() MS Platform SDK function.
openprinter <printername> Execute an OpenPrinterEx() and ClosePrinter() RPC against
a given printer.
openprinter_ex <printername> Open printer handle
setdriver <printername> <drivername> Execute a SetPrinter() command to update the printer
driver associated with an installed printer. The printer driver must already
be correctly installed on the print server.
See also the enumprinters and enumdrivers commands for obtaining a list of of installed printers and drivers. getprintprocdir Get print processor directory
addform Add form
setform Set form
getform Get form
deleteform Delete form
enumforms Enumerate form
setprinter Set printer comment
setprinterdata Set REG_SZ printer data
setprintername <printername> <newprintername> Set printer name
rffpcnex Rffpcnex test
printercmp Printer comparison test
enumprocs Enumerate Print Processors
enumprocdatatypes Enumerate Print Processor Data Types
enummonitors Enumerate Print Monitors
createprinteric Create Printer IC
playgdiscriptonprinteric Create Printer IC
getcoreprinterdrivers Get CorePrinterDriver
enumpermachineconnections Enumerate Per Machine Connections
addpermachineconnection Add Per Machine Connection
delpermachineconnection Delete Per Machine Connection
NETLOGONlogonctrl2 Logon Control 2
getanydcname Get trusted DC name
getdcname Get trusted PDC name
dsr_getdcname Get trusted DC name
dsr_getdcnameex Get trusted DC name
dsr_getdcnameex2 Get trusted DC name
dsr_getsitename Get sitename
dsr_getforesttrustinfo Get Forest Trust Info
logonctrl Logon Control
samlogon Sam Logon
change_trust_pw Change Trust Account Password
gettrustrid Get trust rid
dsr_enumtrustdom Enumerate trusted domains
dsenumdomtrusts Enumerate all trusted domains in an AD forest
deregisterdnsrecords Deregister DNS records
netrenumtrusteddomains Enumerate trusted domains
netrenumtrusteddomainsex Enumerate trusted domains
getdcsitecoverage Get the Site-Coverage from a DC
capabilities Return Capabilities
logongetdomaininfo Return LogonGetDomainInfo
FSRVPfss_is_path_sup Check whether a share supports shadow-copy
fss_get_sup_version Get supported FSRVP version from server
fss_create_expose Request shadow-copy creation and exposure
fss_delete Request shadow-copy share deletion
fss_has_shadow_copy Check for an associated share shadow-copy
fss_get_mapping Get shadow-copy share mapping information
fss_recovery_complete Flag read-write snapshot as recovery complete,
CLUSAPIclusapi_open_cluster Open cluster
clusapi_get_cluster_name Get cluster name
clusapi_get_cluster_version Get cluster version
clusapi_get_quorum_resource Get quorum resource
clusapi_create_enum Create enum query
clusapi_create_enumex Create enumex query
clusapi_open_resource Open cluster resource
clusapi_online_resource Set cluster resource online
clusapi_offline_resource Set cluster resource offline
clusapi_get_resource_state Get cluster resource state
clusapi_get_cluster_version2 Get cluster version2
clusapi_pause_node Pause cluster node
clusapi_resume_node Resume cluster node
DRSUAPIdscracknames Crack Name
dsgetdcinfo Get Domain Controller Info
dsgetncchanges Get NC Changes
dswriteaccountspn Write Account SPN
ECHOechoaddone Add one to a number
echodata Echo data
sinkdata Sink data
sourcedata Source data
EPMAPPERepmmap Map a binding
epmlookup Lookup bindings
EVENTLOGeventlog_readlog Read Eventlog
eventlog_numrecord Get number of records
eventlog_oldestrecord Get oldest record
eventlog_reportevent Report event
eventlog_reporteventsource Report event and source
eventlog_registerevsource Register event source
eventlog_backuplog Backup Eventlog File
eventlog_loginfo Get Eventlog Information
IRemoteWinspoolwinspool_AsyncOpenPrinter Open printer handle
winspool_AsyncCorePrinterDriverInstalled Query Core Printer Driver Installed
NTSVCSntsvcs_getversion Query NTSVCS version
ntsvcs_validatedevinst Query NTSVCS device instance
ntsvcs_hwprofflags Query NTSVCS HW prof flags
ntsvcs_hwprofinfo Query NTSVCS HW prof info
ntsvcs_getdevregprop Query NTSVCS device registry property
ntsvcs_getdevlistsize Query NTSVCS device list size
ntsvcs_getdevlist Query NTSVCS device list
MDSSVCfetch_properties Fetch connection properties
fetch_attributes Fetch attributes for a CNID
WINREGwinreg_enumkey Enumerate Keys
querymultiplevalues Query multiple values
querymultiplevalues2 Query multiple values
WITNESSGetInterfaceList List the interfaces to which witness client connections
can be made
Register Register for resource state change notifications of a
NetName and IPAddress
UnRegister Unregister for notifications from the server
AsyncNotify Request notification of registered resource changes from
the server
RegisterEx Register for resource state change notifications of a
NetName, ShareName and multiple IPAddresses
WKSSVCwkssvc_wkstagetinfo Query WKSSVC Workstation Information
wkssvc_getjoininformation Query WKSSVC Join Information
wkssvc_messagebuffersend Send WKSSVC message
wkssvc_enumeratecomputernames Enumerate WKSSVC computer names
wkssvc_enumerateusers Enumerate WKSSVC users
GENERAL OPTIONShelp Get help on commands
? Get help on commands
debuglevel Set debug level
debug Set debug level
list List available commands on pipe
exit Exit program
quit Exit program
sign Force RPC pipe connections to be signed
seal Force RPC pipe connections to be sealed
packet Force RPC pipe connections with packet authentication
level
schannel Force RPC pipe connections to be sealed with 'schannel'.
Force RPC pipe connections to be sealed with 'schannel'. Assumes valid machine
account to this domain controller.
schannelsign Force RPC pipe connections to be signed (not sealed) with
'schannel'. Assumes valid machine account to this domain controller.
timeout Set timeout (in milliseconds) for RPC operations
transport Choose ncacn transport for RPC operations
none Force RPC pipe connections to have no special
properties
BUGSrpcclient is designed as a developer testing tool and may not be robust in certain areas (such as command line parsing). It has been known to generate a core dump upon failures when invalid parameters where passed to the interpreter. From Luke Leighton's original rpcclient man page: WARNING! The MSRPC over SMB code has been developed from examining Network traces. No documentation is available from the original creators (Microsoft) on how MSRPC over SMB works, or how the individual MSRPC services work. Microsoft's implementation of these services has been demonstrated (and reported) to be... a bit flaky in places. The development of Samba's implementation is also a bit rough, and as more of the services are understood, it can even result in versions of smbd(8) and rpcclient(1) that are incompatible for some commands or services. Additionally, the developers are sending reports to Microsoft, and problems found or reported to Microsoft are fixed in Service Packs, which may result in incompatibilities. VERSIONThis man page is part of version 4.16.4 of the Samba suite. AUTHORThe original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. The original rpcclient man page was written by Matthew Geddes, Luke Kenneth Casson Leighton, and rewritten by Gerald Carter. The conversion to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.
|