From Bugzilla Helper: User-Agent: Mozilla/5.0 (compatible; Konqueror/3.0.0; Linux 2.4.18-0.13) Description of problem: I cant connect to the server sing samba and windows clients Version-Release number of selected component (if applicable): How reproducible: Always Steps to Reproduce: 1.setup samba 2.attempt to connect 3. Additional info:
Please provide more details. Are is this Samba acting as a server? Did this configuration work in an older version of Samba and Red Hat 7.2? Can you attach your samba configuration files?
Also if you are running Samba server, be sure that the built in "Firewall" that you configured during Skipjack installation isn't blocking those ports. Can you please post the output of "ipchains -L"?
[global] workgroup = xxx netbios name = MIDAS server string = samba Server %v encrypt passwords = Yes log file = /var/log/samba/%m.log max log size = 0 time server = Yes socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192 dns proxy = No wins support = Yes remote announce = 192.168.0.255 admin users = seth,icarus printer admin = @home hosts allow = xxx.xxx.xxx. 127. [homes] comment = Home Directories valid users = %S read only = No create mask = 0664 directory mask = 0775 [tmp] comment = Temporary file space path = /tmp read only = No guest ok = Yes [HL1440] path = /usr/spool/public guest ok = Yes printable = Yes
this is my home computer that is a file server for 2 othercomputers. this smb.conf worked with 7.2 my only other idea is maybe I have security levels too high, I dont remember what I set during the install
[root@midas root]# ipchains -L Chain input (policy ACCEPT): target prot opt source destination ports ACCEPT udp ------ 192.168.0.1 anywhere domain -> 1025:65535 ACCEPT tcp -y---- anywhere anywhere any -> smtp ACCEPT tcp -y---- anywhere anywhere any -> http ACCEPT tcp -y---- anywhere anywhere any -> ssh ACCEPT udp ------ anywhere anywhere bootps:bootpc -> bootps:bootpc ACCEPT udp ------ anywhere anywhere bootps:bootpc -> bootps:bootpc ACCEPT all ------ anywhere anywhere n/a REJECT tcp -y---- anywhere anywhere any -> 0:1023 REJECT tcp -y---- anywhere anywhere any -> nfs REJECT udp ------ anywhere anywhere any -> 0:1023 REJECT udp ------ anywhere anywhere any -> nfs REJECT tcp -y---- anywhere anywhere any -> x11:6009 REJECT tcp -y---- anywhere anywhere any -> xfs Chain forward (policy ACCEPT): Chain output (policy ACCEPT): does this help?
You're blocking the traffic in the firewall
thanks, I believe I chose the default security level. perhaps this should be changed to allow samba connections?
No, it's definitely a thing you usually do want to block when connected to the Internet.