glenda.party
term% ls -F
term% pwd
$home/manuals/9front/4/cifs
term% cat index.txt
CIFS(4)                    Kernel Interfaces Manual                    CIFS(4)



NAME
       cifs - Microsoft⢠Windows network filesystem client

SYNOPSIS
       cifs  [  -bDiv  ]  [  -d debug ] [ -a auth-method ] [ -s srvname ] [ -n
       called-name ] [ -k keyparam ] [ -m mntpnt ] [ -t dfs-timeout ]  host  [
       share ...  ]

DESCRIPTION
       Cifs  translates between Microsoft's file-sharing protocol (a.k.a. CIFS
       or SMB) and 9P, allowing Plan9 clients to mount file systems (shares or
       trees in MS terminology) published by such servers.

       The  root of the mounted directory contains one subdirectory per share,
       and a few virtual files give  additional  information.   The  arguments
       are:

       -a auth-method
              Cifs  authenticates  using  ntlmv2  by  default, but alternative
              strategies may be selected  using  this  option.   Cifs  eschews
              cleartext  authentication,  however  it  may be enabled with the
              auth method.  The list of currently-supported methods is printed
              if no method name is supplied.

              Windows  server  2003  requires  the  ntlmv2  method by default,
              though it can be configured to be more flexible.

       -b     Enable file ownership resolution in  stat(2)  calls.   This  re‐
              quires  an  open and close per file and thus will slow cifs con‐
              siderably; its use is not recommended.

       -d debug
              followed by non-whitespace separated list of debug options debug
              writes  specific  debug  output to file descriptor 2. See source
              for more information.

       -D     9P request debug.

       -i     By default cifs attempts to enforce case significance  file  and
              directory  names, though objects which differ only in their case
              still cannot co-exist in the same directory. The -i option  dis‐
              ables this behaveiour.

       -k keyparam
              lists  extra  parameters  which will be passed to factotum(4) to
              select a specific key.  The remote servers's  domain  is  always
              included  in  the keyspec, under the assumption that all servers
              in a Windows domain share an authentication  domain;  thus  cifs
              expects keys in factotum of the form:

                     key proto=pass dom=THEIR-DOMAIN service=cifs
                          user=MY-USERNAME !password=XYZZY

       -m mntpnt
              set  the  mount  point for the remote filesystem; the default is
              /n/host.

       -n called-name
              The CIFS protocol requires clients to know the NetBios  name  of
              the  server they are attaching to, the Icalled-name.  If this is
              not specified on the command line,  cifs  attempts  to  discover
              this  name  from  the remote server.  If this fails it will then
              try host, and finally it will try the name

       -s srvname
              post the service as /srv/srvname.

       -t dfs-timeout
              sets the timeout in for DFS redirections - it defaults to 100ms.
              This  is  a  reasonable  minimum,  it  should  have a value just
              greater than the RTT to the most distant server being accessed.

       host   The address of the remote server to connect to.

       share  A list of share names to attach on the remote server; if none is
              given,  cifs  will attempt to attach all shares published by the
              remote host.

   Synthetic Files
       Several synthetic files appear in the root of the mounted filesystem:

       Shares Contains a list of the currently attached  shares,  with  fields
              giving  the share name, the share type, disk free space / capac‐
              ity, and a descriptive comment from the server.

       Connection
              Contains the username used for authentication,  server's  called
              name,  server's  domain,  server's OS, the time slip between the
              local host and the server, the Maximum Transfer Unit  (MTU)  the
              server  requested,  and  optionally a flag indicating only guest
              access has been granted.  The second line contains a list of ca‐
              pabilities  offered by the server which is mainly of use for de‐
              bugging cifs.

       Users  Each line contains a user's name, the user's full  name,  and  a
              descriptive comment.

       Groups Each  line  gives a group's name, and a list of the names of the
              users who are members of that group.

       Sessions
              Lists the users authenticated, the client machine's NetBios name
              or  IP  address,  the time since the connection was established,
              and the time for which the connection has been idle.

       Domains
              One line per domain giving the domain  name  and  a  descriptive
              comment.

       Workstations
              One  line  per  domain  giving the domain name and a descriptive
              comment, the version number of the OS it is running, and  comma-
              separated list of flags giving the features of that OS.

       Dfsroot
              Lists  the  top level DFS domains and the servers that provision
              them.

       Dfscache
              Contents of the DFS referal cache, giving the path  prefix,  the
              expiry time (or -1 for never), the measured RTT to the server in
              milliseconds, the server proximity  (0  is  local),  the  server
              name, and the share name on that server.

COMPATIBILITY
       Cifs  has been tested against aquarela, cifsd(8), Windows 95, NT4.0sp6,
       Windows server 2003, Windows server 2003, WinXP pro, Samba  2.0  (Pluto
       VideoSpace), and Samba 3.0.

       Windows  Vista  require  a  hotfix  (registry change) to support NTLMv2
       without GSSAPI, see  http://support.microsoft.com/kb/957441.   Alterna‐
       tively  the  -a option can be used to force cifs to use one of the less
       secure authentication mechnisms.

       Windows 7 has dropped support for RAP, which is used  to  generate  the
       synthetic  files  offered  by  cifs.  RAP is also used to enumerate the
       shares offered by the remote host so remote share names must always  be
       specified on the command line.

       The  NetApp Filer was supported by earlier releases, however recent at‐
       tempts to mount one have failed. Should a server  be  available  it  is
       likely that this could be easily fixed.

SOURCE
       /sys/src/cmd/cifs

SEE ALSO
       factotum(4), cifsd(8)

BUGS
       DFS  support  is  unfinished,  it  will  not  follow referals that span
       servers.

       Kerberos authentication is not supported.

       NetBios name resolution is not supported, though it is now rarely used.

HISTORY
       Cifs first appeared in Plan 9 from Bell Labs. It was updated to the au‐
       thor's latest revision for 9front (January, 2012).



                                                                       CIFS(4)