<command>smbclient</command>
<arg choice="opt">-b <buffer size></arg>
<arg choice="opt">-d debuglevel</arg>
+ <arg choice="opt">-e</arg>
<arg choice="opt">-L <netbios name></arg>
<arg choice="opt">-U username</arg>
<arg choice="opt">-I destinationIP</arg>
<arg choice="opt">password</arg>
<arg choice="opt">-b <buffer size></arg>
<arg choice="opt">-d debuglevel</arg>
+ <arg choice="opt">-e</arg>
<arg choice="opt">-D Directory</arg>
<arg choice="opt">-U username</arg>
<arg choice="opt">-W workgroup</arg>
</para></listitem>
</varlistentry>
+ <varlistentry>
+ <term>-e</term>
+ <listitem><para>This command line parameter requires the remote
+ server support the UNIX extensions. Request that the connection be
+ encrypted. This is new for Samba 3.2 and will only work with Samba
+ 3.2 or above servers. Negotiates SMB encryption using GSSAPI. Uses
+ the given credentials for the encryption negotiaion (either kerberos
+ or NTLMv1/v2 if given domain/username/password triple. Fails the
+ connection if encryption cannot be negotiated.
+ </para></listitem>
+ </varlistentry>
+
&popt.common.samba;
&popt.common.credentials;
&popt.common.connection;
</para></listitem>
</varlistentry>
+ <varlistentry>
+ <term>posix_encrypt <domain> <username> <password></term>
+ <listitem><para>This command depends on the server supporting the CIFS
+ UNIX extensions and will fail if the server does not. Attempt to negotiate
+ SMB encryption on this connection. If smbclient connected with kerberos
+ credentials (-k) the arguments to this command are ignored and the kerberos
+ credentials are used to negotiate GSSAPI signing and sealing instead. See
+ also the -e option to smbclient to force encryption on initial connection.
+ This command is new with Samba 3.2.
+ </para></listitem>
+ </varlistentry>
+
<varlistentry>
<term>posix_open <filename> <octal mode></term>
<listitem><para>This command depends on the server supporting the CIFS