• How to install and configure samba on RHEL 8 / CentOS 8


     

    Samba provides server and client software to allow file sharing between Linux and Windows machines. Installing and configuring it on RHEL 8 / CentOS 8, is quite easy. Keep reading to learn how to share a directory with samba, and how to apply the appropriate SELinux context to it.

    In this tutorial you will learn:
    • How to install samba on RHEL8
    • How to enable and start the smb and nmb daemons
    • How to create a samba share
    • How to setup the firewall to allow samba share to be accessed
    • How to setup the correct SELinux context for samba to work correctly
    smbtree-rhel8
    Samba shares on RHEL 8 / CentOS 8

    Software Requirements and Conventions Used

    Software Requirements and Linux Command Line Conventions
    CategoryRequirements, Conventions or Software Version Used
    System Red Hat Enterprise Linux 8
    Software Samba, coreutils and policycoreutils-python-utils packages
    Other Permission to run command with root privileges.
    Conventions # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
    $ - requires given linux commands to be executed as a regular non-privileged user

    Introducing Samba

    Samba, as stated in the homepage of the project, is an open source software, released under the GPL license, which allow us to share files and print services using the SMB/CIFS protocol.

    The project provides both server and client software to allow interoperation with Windows machines, representing the ideal solution in mixed environments. In this tutorial we will see how to install Samba on Red Hat Enterprise Linux 8, how to setup a samba share, how the setup the firewall to allow access to shared resources, and how to apply the appropriate SELinux context.


    SUBSCRIBE TO NEWSLETTER
    Subscribe to Linux Career NEWSLETTER and receive latest Linux news, jobs, career advice and tutorials.


    Installation

    The first thing we have to do is to install samba on our machine. The package and the needed libraries are available in the official RHEL 8 / CentOS 8 repositories, therefore we can install them just by using yum or dnf. In this version of RHEL/CentOS, the first command it's just a "link" to the second:

    $ sudo dnf install samba samba-client

    The samba-client package is not strictly needed, but the utilities provided by it can be useful. Once the packages are installed, we have to start and enable the smb and the nmb daemons at boot. The first is the daemon which takes care of performing the actual transfers and the sharing operations, while the second performs the NetBIOS name resolutions, allowing the resources to appear when browsing the network on Windows. We can now enable and start both systemd services with just one command:

    $ sudo systemctl enable --now {smb,nmb}

    Configuring the firewall

    The next step is the firewall configuration. We must open the appropriate ports, so that the samba-shared resources can be accessible from other machines. The default firewall management software onRHEL 8 / CentOS 8, is firewalld.

    Luckily for us, there is no need to open ports manually: all we have to do is to add the "samba" service to our zone. A "service" is just an abstraction which let us allow traffic through all the ports needed by a service, by referencing the service name, instead of having to setup (and remember) each port used by it. In case we want to gather information about a "service", we can run:

    $ sudo firewall-cmd --info-service samba
    samba
      ports: 137/udp 138/udp 139/tcp 445/tcp
      protocols:
      source-ports:
      modules: netbios-ns
      destination:
    

    From the output of the command we see that the service will allow traffic through ports 173/udp, 138/udp, 139/tcp and 445/tcp. To permanently add the service to the default zone, we can run:

    $ sudo firewall-cmd --permanent --add-service=samba

    When running the command we used the --permanent switch in order to make our change persistent. We also assumed the default zone to be in use. If we wanted to specify another zone for the action to be applied on, we would have used the --zone option, and provided the zone name as argument (e.g. --zone=external). Since our change is set to be permanent, in order for it to become effective, we must reload the firewall configuration:

    $ sudo firewall-cmd --reload


    We can verify that the "samba" service is now part of our zone, by running:

    $ sudo firewall-cmd --list-services
    cockpit dhcpv6-client http samba ssh
    

    Again, if no zone is specified, the command is applied to the default zone.

    Configuring a shared directory accessible by guests

    Let's say we want to share a directory via samba, and we want to let free access to this directory to guest users, without them having to provide a password. To obtain the desired result, we must make some changes to the /etc/samba/smb.conf file, and add a "stanza" for our share. Open the file with your favorite editor, and in the [global] section, add the highlighted text:

    [global]
            workgroup = SAMBA
            security = user
    
            passdb backend = tdbsam
    
            printing = cups
            printcap name = cups
            load printers = yes
            cups options = raw
            map to guest = bad user
    

    The map to guest = bad user instruction, will map login attempts with bad usernames to the default guest user, which, by default is nobody. This is needed to allow anonymous access without having to provide a password.

    After this change, we must append a new stanza dedicated to our share at the end of the file. We will name the shared resource "linuxconfig":

    [linuxconfig]
            path = /mnt/shared
            guest only = yes
    

    With the above setup we declared that we want to share the content of the /mnt/shared directory, without the need of user authentication. This setup is obviously risky, and is here reported only as an example: in a real world scenario, you may want to at least deny write access to guests (you can do it by adding the writeable = no instruction). To make the changes effective, we must restart the daemons:



    $ sudo systemctl restart {smb,nmb}

    Configure a share accessible only by registered users

    To protect access to a resource with a login prompt, when samba is running as a standalone server, we must add an existing user to the samba database. The credentials of this user will be necessary to access the shared directory. For security reasons, it's a good practice to create a dedicated user for the task, omitting the creation of his home directory, and assigning him a fake shell:

    sudo adduser -M sambauser -s /sbin/nologin

    The -M option passed to the command is the short form for --no-create-home, which is quite self-explanatory; the -s option, instead, let us specify a shell, in this case an invalid one on purpose: /sbin/nologin. At this point the user doesn't even need to have a password set on our system.

    Once the user is created, we need to add it to the samba database: we can perform the operation by using the smbpasswd command:

    $ sudo smbpasswd -a sambauser
    New SMB password:
    Retype new SMB password:
    Added user sambauser.
    

    After running the command, we are prompted to assign a password for the user, and also to confirm it: this password will only be valid in the samba context, doesn't have anything to do with the user account on our system. To restrict the share we previously created, we have to make a little change in the dedicated section:

    [linuxconfig]
            path = /mnt/shared
            guest ok = no
    

    We can verify that our setup is valid, by using the testparm command:


    SUBSCRIBE TO NEWSLETTER
    Subscribe to Linux Career NEWSLETTER and receive latest Linux news, jobs, career advice and tutorials.


    $ testparm
    Load smb config files from /etc/samba/smb.conf
    rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
    Processing section "[homes]"
    Processing section "[printers]"
    Processing section "[print$]"
    Processing section "[linuxconfig]"
    Loaded services file OK.
    Server role: ROLE_STANDALONE
    

    Again, we must restart the smb and nmb daemons for our changes to be effective. The shared directory will now be accessible only after providing the correct credentials.

    Setup SELinux for samba

    SELinux is often saw like a complication, and disabled right away. This is not necessary: we only must learn how to configure it, and take advantage of the enhancement in security it provides. In order for our samba share to work when SELinux is in "enforcing" mode, we must assign the appropriate context to our shared directory and files:

    $ sudo chcon -R -t samba_share_t /mnt/shared

    In the example above, we used the chcon command with the -t option, to change the TYPE section of the SELinux context to samba_share_t. We also used the -R switch to make the command recursive. This change will survive a reboot, but not a relabeling of the system if a default policy exists for our directory and files, because in such case the default setup would be re-applied.

    If we want our change to survive a relabeling event, we must add our rule to the policy. We can do this by using the semanage command:

    $ sudo semanage fcontext -a -t samba_share_t "/mnt/shared(/.*)?"

    Since we used the (/.*)? regex, the rule will be applied to all the content of the "shared" directory, and to the directory itself. We can verify that our rule has been added to the policy by listing the labels in use on our system:

    $ sudo semanage fcontext -l | grep /mnt/shared
    /mnt/shared(/.*)?                                  all files          system_u:object_r:samba_share_t:s0
    

    We should now have a working samba setup. To further tweak samba configuration we may need to also manipulate SELinux booleans. For example, when adding existent users to samba, to let their home directories be shared, we must enable the dedicated SELinux boolean. To list all booleans related to samba, we can run:



    sudo semanage boolean -l|grep samba
    samba_create_home_dirs         (off  ,  off)  Allow samba to create home dirs
    samba_domain_controller        (off  ,  off)  Allow samba to domain controller
    samba_enable_home_dirs         (off  ,  off)  Allow samba to enable home dirs
    samba_export_all_ro            (off  ,  off)  Allow samba to export all ro
    samba_export_all_rw            (off  ,  off)  Allow samba to export all rw
    samba_load_libgfapi            (off  ,  off)  Allow samba to load libgfapi
    samba_portmapper               (off  ,  off)  Allow samba to portmapper
    samba_run_unconfined           (off  ,  off)  Allow samba to run unconfined
    samba_share_fusefs             (off  ,  off)  Allow samba to share fusefs
    samba_share_nfs                (off  ,  off)  Allow samba to share nfs
    sanlock_use_samba              (off  ,  off)  Allow sanlock to use samba
    tmpreaper_use_samba            (off  ,  off)  Allow tmpreaper to use samba
    use_samba_home_dirs            (off  ,  off)  Allow use to samba home dirs
    virt_use_samba                 (off  ,  off)  Allow virt to use samba
    

    In the output above, the second column indicates the current value of the boolean, while the third the default one (both are off, in this case). The boolean we want to activate, to enable the sharing of home directories, is samba_enable_home_dirs. We can perform the operation by using the setsebool command:

    $ sudo setsebool samba_enable_home_dirs=1

    Conclusions

    In this tutorial we saw how to install samba on a RHEL 8 / CentOS 8 system. We also saw how to share a directory, allowing access to guests or restricting it to authenticated users. We also saw how to configure the firewall in order for the share to be accessible from other machines on the network.

    Finally, we saw how to perform the needed changes in order to have a working samba setup with SELinux in "enforcing" mode. If you are interested SELinux, you can also read our article on the subject.

    tips:

    https://linuxconfig.org/install-samba-on-redhat-8

  • 相关阅读:
    XCode4.5.6,iOS6.1下测试 判断当前设备,及其联网状态等; 关于设备插上后XCode检测不出的情况的说明
    CentOS6.3上搭建expect无交互开发环境
    CentOS6.3上安装与配置nginx+php+mysql环境
    RabbitMQ的安装与配置
    linux下用python搭建简单的httpServer
    Linux下NFS的搭建与配置
    Linux下chkconfig命令介绍
    向python文件传递参数
    数据库热备份工具innobackupex的安装
    linux yum下载RPM包后再安装LAMP环境
  • 原文地址:https://www.cnblogs.com/WLCYSYS/p/12706418.html
Copyright © 2020-2023  润新知