1RPCCLIENT(1)                     User Commands                    RPCCLIENT(1)
2
3
4

NAME

6       rpcclient - tool for executing client side MS-RPC functions
7

SYNOPSIS

9       rpcclient [-c|--command=COMMANDS] [-I|--dest-ip=IP] [-p|--port=PORT]
10        [-?|--help] [--usage] [-d|--debuglevel=DEBUGLEVEL] [--debug-stdout]
11        [--configfile=CONFIGFILE] [--option=name=value]
12        [-l|--log-basename=LOGFILEBASE] [--leak-report] [--leak-report-full]
13        [-R|--name-resolve=NAME-RESOLVE-ORDER]
14        [-O|--socket-options=SOCKETOPTIONS] [-m|--max-protocol=MAXPROTOCOL]
15        [-n|--netbiosname=NETBIOSNAME] [--netbios-scope=SCOPE]
16        [-W|--workgroup=WORKGROUP] [--realm=REALM]
17        [-U|--user=[DOMAIN/]USERNAME[%PASSWORD]] [-N|--no-pass]
18        [--password=STRING] [--pw-nt-hash] [-A|--authentication-file=FILE]
19        [-P|--machine-pass] [--simple-bind-dn=DN]
20        [--use-kerberos=desired|required|off] [--use-krb5-ccache=CCACHE]
21        [--use-winbind-ccache] [--client-protection=sign|encrypt|off]
22        [-V|--version] {BINDING-STRING|HOST}
23

DESCRIPTION

25       This tool is part of the samba(7) suite.
26
27       rpcclient is a utility initially developed to test MS-RPC functionality
28       in Samba itself. It has undergone several stages of development and
29       stability. Many system administrators have now written scripts around
30       it to manage Windows NT clients from their UNIX workstation.
31

OPTIONS

33       BINDING-STRING|HOST
34           When connecting to a dcerpc service you need to specify a binding
35           string.
36
37           The format is:
38
39           TRANSPORT:host[options]
40
41           where TRANSPORT is either ncacn_np (named pipes) for SMB or
42           ncacn_ip_tcp for DCERPC over TCP/IP.
43
44           "host" is an IP or hostname or netbios name. If the binding string
45           identifies the server side of an endpoint, "host" may be an empty
46           string. See below for more details.
47
48           "options" can include a SMB pipe name if using the ncacn_np
49           transport or a TCP port number if using the ncacn_ip_tcp transport,
50           otherwise they will be auto-determined.
51
52           Examples:
53
54ncacn_ip_tcp:samba.example.com[1024]
55
56ncacn_ip_tcp:samba.example.com[sign,seal,krb5]
57
58ncacn_ip_tcp:samba.example.com[sign,spnego]
59
60ncacn_np:samba.example.com
61
62ncacn_np:samba.example.com[samr]
63
64ncacn_np:samba.example.com[samr,sign,print]
65
66ncalrpc:/path/to/unix/socket
67
68//SAMBA
69
70           The supported transports are:
71
72ncacn_np - Connect using named pipes
73
74ncacn_ip_tcp - Connect over TCP/IP
75
76ncalrpc - Connect over local RPC (unix sockets)
77
78           The supported options are:
79
80sign - Use RPC integrity authentication level
81
82seal - Enable RPC privacy (encryption) authentication
83                      level
84
85connect - Use RPC connect level authentication (auth,
86                      but no sign or seal)
87
88packet - Use RPC packet authentication level
89
90spnego - Use SPNEGO instead of NTLMSSP authentication
91
92ntlm - Use plain NTLM instead of SPNEGO or NTLMSSP
93
94krb5 - Use Kerberos instead of NTLMSSP authentication
95
96schannel - Create a schannel connection
97
98smb1 - Use SMB1 for named pipes
99
100smb2 - Use SMB2/3 for named pipes
101
102validate - Enable the NDR validator
103
104print - Enable debug output of packets
105
106padcheck - Check reply data for non-zero pad bytes
107
108bigendian - Use big endian for RPC
109
110ndr64 - Use NDR64 for RPC
111
112
113       -c|--command=<command string>
114           Execute semicolon separated commands (listed below)
115
116       -I|--dest-ip IP-address
117           IP address is the address of the server to connect to. It should be
118           specified in standard "a.b.c.d" notation.
119
120           Normally the client would attempt to locate a named SMB/CIFS server
121           by looking it up via the NetBIOS name resolution mechanism
122           described above in the name resolve order parameter above. Using
123           this parameter will force the client to assume that the server is
124           on the machine with the specified IP address and the NetBIOS name
125           component of the resource being connected to will be ignored.
126
127           There is no default for this parameter. If not supplied, it will be
128           determined automatically by the client as described above.
129
130       -p|--port port
131           This number is the TCP port number that will be used when making
132           connections to the server. The standard (well-known) TCP port
133           number for an SMB/CIFS server is 139, which is the default.
134
135       -?|--help
136           Print a summary of command line options.
137
138       --usage
139           Display brief usage message.
140
141       -d|--debuglevel=DEBUGLEVEL
142           level is an integer from 0 to 10. The default value if this
143           parameter is not specified is 1 for client applications.
144
145           The higher this value, the more detail will be logged to the log
146           files about the activities of the server. At level 0, only critical
147           errors and serious warnings will be logged. Level 1 is a reasonable
148           level for day-to-day running - it generates a small amount of
149           information about operations carried out.
150
151           Levels above 1 will generate considerable amounts of log data, and
152           should only be used when investigating a problem. Levels above 3
153           are designed for use only by developers and generate HUGE amounts
154           of log data, most of which is extremely cryptic.
155
156           Note that specifying this parameter here will override the log
157           level parameter in the /etc/samba/smb.conf file.
158
159       --debug-stdout
160           This will redirect debug output to STDOUT. By default all clients
161           are logging to STDERR.
162
163       --configfile=<configuration file>
164           The file specified contains the configuration details required by
165           the client. The information in this file can be general for client
166           and server or only provide client specific like options such as
167           client smb encrypt. See /etc/samba/smb.conf for more information.
168           The default configuration file name is determined at compile time.
169
170       --option=<name>=<value>
171           Set the smb.conf(5) option "<name>" to value "<value>" from the
172           command line. This overrides compiled-in defaults and options read
173           from the configuration file. If a name or a value includes a space,
174           wrap whole --option=name=value into quotes.
175
176       -l|--log-basename=logdirectory
177           Base directory name for log/debug files. The extension ".progname"
178           will be appended (e.g. log.smbclient, log.smbd, etc...). The log
179           file is never removed by the client.
180
181       --leak-report
182           Enable talloc leak reporting on exit.
183
184       --leak-report-full
185           Enable full talloc leak reporting on exit.
186
187       -V|--version
188           Prints the program version number.
189
190       -R|--name-resolve=NAME-RESOLVE-ORDER
191           This option is used to determine what naming services and in what
192           order to resolve host names to IP addresses. The option takes a
193           space-separated string of different name resolution options. The
194           best is to wrap the whole --name-resolve=NAME-RESOLVE-ORDER into
195           quotes.
196
197           The options are: "lmhosts", "host", "wins" and "bcast". They cause
198           names to be resolved as follows:
199
200lmhosts: Lookup an IP address in the Samba lmhosts file.
201                      If the line in lmhosts has no name type attached to the
202                      NetBIOS name (see the lmhosts(5) for details) then any
203                      name type matches for lookup.
204
205host: Do a standard host name to IP address resolution,
206                      using the system /etc/hosts, NIS, or DNS lookups. This
207                      method of name resolution is operating system dependent,
208                      for instance on IRIX or Solaris this may be controlled
209                      by the /etc/nsswitch.conf file). Note that this method
210                      is only used if the NetBIOS name type being queried is
211                      the 0x20 (server) name type, otherwise it is ignored.
212
213wins: Query a name with the IP address listed in the
214                      wins server parameter. If no WINS server has been
215                      specified this method will be ignored.
216
217bcast: Do a broadcast on each of the known local
218                      interfaces listed in the interfaces parameter. This is
219                      the least reliable of the name resolution methods as it
220                      depends on the target host being on a locally connected
221                      subnet.
222
223           If this parameter is not set then the name resolve order defined in
224           the /etc/samba/smb.conf file parameter (name resolve order) will be
225           used.
226
227           The default order is lmhosts, host, wins, bcast. Without this
228           parameter or any entry in the name resolve order parameter of the
229           /etc/samba/smb.conf file, the name resolution methods will be
230           attempted in this order.
231
232       -O|--socket-options=SOCKETOPTIONS
233           TCP socket options to set on the client socket. See the socket
234           options parameter in the /etc/samba/smb.conf manual page for the
235           list of valid options.
236
237       -m|--max-protocol=MAXPROTOCOL
238           The value of the parameter (a string) is the highest protocol level
239           that will be supported by the client.
240
241           Note that specifying this parameter here will override the client
242           max protocol parameter in the /etc/samba/smb.conf file.
243
244       -n|--netbiosname=NETBIOSNAME
245           This option allows you to override the NetBIOS name that Samba uses
246           for itself. This is identical to setting the netbios name parameter
247           in the /etc/samba/smb.conf file. However, a command line setting
248           will take precedence over settings in /etc/samba/smb.conf.
249
250       --netbios-scope=SCOPE
251           This specifies a NetBIOS scope that nmblookup will use to
252           communicate with when generating NetBIOS names. For details on the
253           use of NetBIOS scopes, see rfc1001.txt and rfc1002.txt. NetBIOS
254           scopes are very rarely used, only set this parameter if you are the
255           system administrator in charge of all the NetBIOS systems you
256           communicate with.
257
258       -W|--workgroup=WORKGROUP
259           Set the SMB domain of the username. This overrides the default
260           domain which is the domain defined in smb.conf. If the domain
261           specified is the same as the servers NetBIOS name, it causes the
262           client to log on using the servers local SAM (as opposed to the
263           Domain SAM).
264
265           Note that specifying this parameter here will override the
266           workgroup parameter in the /etc/samba/smb.conf file.
267
268       -r|--realm=REALM
269           Set the realm for the domain.
270
271           Note that specifying this parameter here will override the realm
272           parameter in the /etc/samba/smb.conf file.
273
274       -U|--user=[DOMAIN\]USERNAME[%PASSWORD]
275           Sets the SMB username or username and password.
276
277           If %PASSWORD is not specified, the user will be prompted. The
278           client will first check the USER environment variable (which is
279           also permitted to also contain the password separated by a %), then
280           the LOGNAME variable (which is not permitted to contain a password)
281           and if either exists, the value is used. If these environmental
282           variables are not found, the username found in a Kerberos
283           Credentials cache may be used.
284
285           A third option is to use a credentials file which contains the
286           plaintext of the username and password. This option is mainly
287           provided for scripts where the admin does not wish to pass the
288           credentials on the command line or via environment variables. If
289           this method is used, make certain that the permissions on the file
290           restrict access from unwanted users. See the -A for more details.
291
292           Be cautious about including passwords in scripts or passing
293           user-supplied values onto the command line. For security it is
294           better to let the Samba client tool ask for the password if needed,
295           or obtain the password once with kinit.
296
297           While Samba will attempt to scrub the password from the process
298           title (as seen in ps), this is after startup and so is subject to a
299           race.
300
301       -N|--no-pass
302           If specified, this parameter suppresses the normal password prompt
303           from the client to the user. This is useful when accessing a
304           service that does not require a password.
305
306           Unless a password is specified on the command line or this
307           parameter is specified, the client will request a password.
308
309           If a password is specified on the command line and this option is
310           also defined the password on the command line will be silently
311           ignored and no password will be used.
312
313       --password
314           Specify the password on the commandline.
315
316           Be cautious about including passwords in scripts or passing
317           user-supplied values onto the command line. For security it is
318           better to let the Samba client tool ask for the password if needed,
319           or obtain the password once with kinit.
320
321           If --password is not specified, the tool will check the PASSWD
322           environment variable, followed by PASSWD_FD which is expected to
323           contain an open file descriptor (FD) number.
324
325           Finally it will check PASSWD_FILE (containing a file path to be
326           opened). The file should only contain the password. Make certain
327           that the permissions on the file restrict access from unwanted
328           users!
329
330           While Samba will attempt to scrub the password from the process
331           title (as seen in ps), this is after startup and so is subject to a
332           race.
333
334       --pw-nt-hash
335           The supplied password is the NT hash.
336
337       -A|--authentication-file=filename
338           This option allows you to specify a file from which to read the
339           username and password used in the connection. The format of the
340           file is:
341
342                                   username = <value>
343                                   password = <value>
344                                   domain   = <value>
345
346
347           Make certain that the permissions on the file restrict access from
348           unwanted users!
349
350       -P|--machine-pass
351           Use stored machine account password.
352
353       --simple-bind-dn=DN
354           DN to use for a simple bind.
355
356       --use-kerberos=desired|required|off
357           This parameter determines whether Samba client tools will try to
358           authenticate using Kerberos. For Kerberos authentication you need
359           to use dns names instead of IP addresses when connecting to a
360           service.
361
362           Note that specifying this parameter here will override the client
363           use kerberos parameter in the /etc/samba/smb.conf file.
364
365       --use-krb5-ccache=CCACHE
366           Specifies the credential cache location for Kerberos
367           authentication.
368
369           This will set --use-kerberos=required too.
370
371       --use-winbind-ccache
372           Try to use the credential cache by winbind.
373
374       --client-protection=sign|encrypt|off
375           Sets the connection protection the client tool should use.
376
377           Note that specifying this parameter here will override the client
378           protection parameter in the /etc/samba/smb.conf file.
379
380           In case you need more fine grained control you can use:
381           --option=clientsmbencrypt=OPTION, --option=clientipcsigning=OPTION,
382           --option=clientsigning=OPTION.
383

COMMANDS

385   LSARPC
386       lsaquery
387           Query info policy
388
389       lookupsids
390           Convert SIDs to names
391
392       lookupsids3
393           Convert SIDs to names
394
395       lookupsids_level
396           Convert SIDs to names
397
398       lookupnames
399           Convert names to SIDs
400
401       lookupnames4
402           Convert names to SIDs
403
404       lookupnames_level
405           Convert names to SIDs
406
407       enumtrust
408           Enumerate trusted domains
409
410       enumprivs
411           Enumerate privileges
412
413       getdispname
414           Get the privilege name
415
416       lsaenumsid
417           Enumerate the LSA SIDS
418
419       lsacreateaccount
420           Create a new lsa account
421
422       lsaenumprivsaccount
423           Enumerate the privileges of an SID
424
425       lsaenumacctrights
426           Enumerate the rights of an SID
427
428       lsaaddpriv
429           Assign a privilege to a SID
430
431       lsadelpriv
432           Revoke a privilege from a SID
433
434       lsaaddacctrights
435           Add rights to an account
436
437       lsaremoveacctrights
438           Remove rights from an account
439
440       lsalookupprivvalue
441           Get a privilege value given its name
442
443       lsaquerysecobj
444           Query LSA security object
445
446       lsaquerytrustdominfo
447           Query LSA trusted domains info (given a SID)
448
449       lsaquerytrustdominfobyname
450           Query LSA trusted domains info (given a name), only works for
451           Windows > 2k
452
453       lsaquerytrustdominfobysid
454           Query LSA trusted domains info (given a SID)
455
456       lsasettrustdominfo
457           Set LSA trusted domain info
458
459       getusername
460           Get username
461
462       createsecret
463           Create Secret
464
465       deletesecret
466           Delete Secret
467
468       querysecret
469           Query Secret
470
471       setsecret
472           Set Secret
473
474       retrieveprivatedata
475           Retrieve Private Data
476
477       storeprivatedata
478           Store Private Data
479
480       createtrustdom
481           Create Trusted Domain
482
483       deletetrustdom
484           Delete Trusted Domain
485
486   LSARPC-DS
487       dsroledominfo
488           Get Primary Domain Information
489
490   DFS
491       dfsversion
492           Query DFS support
493
494       dfsadd
495           Add a DFS share
496
497       dfsremove
498           Remove a DFS share
499
500       dfsgetinfo
501           Query DFS share info
502
503       dfsenum
504           Enumerate dfs shares
505
506       dfsenumex
507           Enumerate dfs shares
508
509   SHUTDOWN
510       shutdowninit
511           syntax: shutdown [-m message]
512
513       shutdownabort
514           syntax: shutdownabort
515
516   SRVSVC
517       srvinfo
518           Server query info
519
520       netshareenum
521           Enumerate shares
522
523       netshareenumall
524           Enumerate all shares
525
526       netsharegetinfo
527           Get Share Info
528
529       netsharesetinfo
530           Set Share Info
531
532       netsharesetdfsflags
533           Set DFS flags
534
535       netfileenum
536           Enumerate open files
537
538       netremotetod
539           Fetch remote time of day
540
541       netnamevalidate
542           Validate sharename
543
544       netfilegetsec
545           Get File security
546
547       netsessdel
548           Delete Session
549
550       netsessenum
551           Enumerate Sessions
552
553       netdiskenum
554           Enumerate Disks
555
556       netconnenum
557           Enumerate Connections
558
559       netshareadd
560           Add share
561
562       netsharedel
563           Delete share
564
565   SAMR
566       queryuser
567           Query user info
568
569       querygroup
570           Query group info
571
572       queryusergroups
573           Query user groups
574
575       queryuseraliases
576           Query user aliases
577
578       querygroupmem
579           Query group membership
580
581       queryaliasmem
582           Query alias membership
583
584       queryaliasinfo
585           Query alias info
586
587       deletealias
588           Delete an alias
589
590       querydispinfo
591           Query display info
592
593       querydispinfo2
594           Query display info
595
596       querydispinfo3
597           Query display info
598
599       querydominfo
600           Query domain info
601
602       enumdomusers
603           Enumerate domain users
604
605       enumdomgroups
606           Enumerate domain groups
607
608       enumalsgroups
609           Enumerate alias groups
610
611       enumdomains
612           Enumerate domains
613
614       createdomuser
615           Create domain user
616
617       createdomgroup
618           Create domain group
619
620       createdomalias
621           Create domain alias
622
623       samlookupnames
624           Look up names
625
626       samlookuprids
627           Look up names
628
629       deletedomgroup
630           Delete domain group
631
632       deletedomuser
633           Delete domain user
634
635       samquerysecobj
636           Query SAMR security object
637
638       getdompwinfo
639           Retrieve domain password info
640
641       getusrdompwinfo
642           Retrieve user domain password info
643
644       lookupdomain
645           Lookup Domain Name
646
647       chgpasswd
648           Change user password
649
650       chgpasswd2
651           Change user password
652
653       chgpasswd3
654           Change user password (RC4 encrypted)
655
656       chgpasswd4
657           Change user password (AES encrypted)
658
659       getdispinfoidx
660           Get Display Information Index
661
662       setuserinfo
663           Set user info
664
665       setuserinfo2
666           Set user info2
667
668   SPOOLSS
669       adddriver <arch> <config> [<version>]
670           Execute an AddPrinterDriver() RPC to install the printer driver
671           information on the server. Note that the driver files should
672           already exist in the directory returned by getdriverdir. Possible
673           values for arch are the same as those for the getdriverdir command.
674           The config parameter is defined as follows:
675
676               Long Driver Name:\
677               Driver File Name:\
678               Data File Name:\
679               Config File Name:\
680               Help File Name:\
681               Language Monitor Name:\
682               Default Data Type:\
683               Comma Separated list of Files
684
685           Any empty fields should be enter as the string "NULL".
686
687           Samba does not need to support the concept of Print Monitors since
688           these only apply to local printers whose driver can make use of a
689           bi-directional link for communication. This field should be "NULL".
690           On a remote NT print server, the Print Monitor for a driver must
691           already be installed prior to adding the driver or else the RPC
692           will fail.
693
694           The version parameter lets you specify the printer driver version
695           number. If omitted, the default driver version for the specified
696           architecture will be used. This option can be used to upload
697           Windows 2000 (version 3) printer drivers.
698
699       addprinter <printername> <sharename> <drivername> <port>
700           Add a printer on the remote server. This printer will be
701           automatically shared. Be aware that the printer driver must already
702           be installed on the server (see adddriver) and the portmust be a
703           valid port name (see enumports.
704
705       deldriver <driver>
706           Delete the specified printer driver for all architectures. This
707           does not delete the actual driver files from the server, only the
708           entry from the server's list of drivers.
709
710       deldriverex <driver> [architecture] [version] [flags]
711           Delete the specified printer driver and optionally files associated
712           with the driver. You can limit this action to a specific
713           architecture and a specific version. If no architecture is given,
714           all driver files of that driver will be deleted.  flags correspond
715           to numeric DPD_* values, i.e. a value of 3 requests
716           (DPD_DELETE_UNUSED_FILES | DPD_DELETE_SPECIFIC_VERSION).
717
718       enumdata
719           Enumerate all printer setting data stored on the server. On Windows
720           NT clients, these values are stored in the registry, while Samba
721           servers store them in the printers TDB. This command corresponds to
722           the MS Platform SDK GetPrinterData() function (* This command is
723           currently unimplemented).
724
725       enumdataex
726           Enumerate printer data for a key
727
728       enumkey
729           Enumerate printer keys
730
731       enumjobs <printer>
732           List the jobs and status of a given printer. This command
733           corresponds to the MS Platform SDK EnumJobs() function
734
735       getjob
736           Get print job
737
738       setjob
739           Set print job
740
741       enumports [level]
742           Executes an EnumPorts() call using the specified info level.
743           Currently only info levels 1 and 2 are supported.
744
745       enumdrivers [level]
746           Execute an EnumPrinterDrivers() call. This lists the various
747           installed printer drivers for all architectures. Refer to the MS
748           Platform SDK documentation for more details of the various flags
749           and calling options. Currently supported info levels are 1, 2, and
750           3.
751
752       enumprinters [level]
753           Execute an EnumPrinters() call. This lists the various installed
754           and share printers. Refer to the MS Platform SDK documentation for
755           more details of the various flags and calling options. Currently
756           supported info levels are 1, 2 and 5.
757
758       getdata <printername> <valuename;>
759           Retrieve the data for a given printer setting. See the enumdata
760           command for more information. This command corresponds to the
761           GetPrinterData() MS Platform SDK function.
762
763       getdataex
764           Get printer driver data with keyname
765
766       getdriver <printername>
767           Retrieve the printer driver information (such as driver file,
768           config file, dependent files, etc...) for the given printer. This
769           command corresponds to the GetPrinterDriver() MS Platform SDK
770           function. Currently info level 1, 2, and 3 are supported.
771
772       getdriverdir <arch>
773           Execute a GetPrinterDriverDirectory() RPC to retrieve the SMB share
774           name and subdirectory for storing printer driver files for a given
775           architecture. Possible values for arch are "Windows 4.0" (for
776           Windows 95/98), "Windows NT x86", "Windows NT PowerPC", "Windows
777           Alpha_AXP", and "Windows NT R4000".
778
779       getdriverpackagepath
780           Get print driver package download directory
781
782       getprinter <printername>
783           Retrieve the current printer information. This command corresponds
784           to the GetPrinter() MS Platform SDK function.
785
786       openprinter <printername>
787           Execute an OpenPrinterEx() and ClosePrinter() RPC against a given
788           printer.
789
790       openprinter_ex <printername>
791           Open printer handle
792
793       setdriver <printername> <drivername>
794           Execute a SetPrinter() command to update the printer driver
795           associated with an installed printer. The printer driver must
796           already be correctly installed on the print server.
797
798           See also the enumprinters and enumdrivers commands for obtaining a
799           list of of installed printers and drivers.
800
801       getprintprocdir
802           Get print processor directory
803
804       addform
805           Add form
806
807       setform
808           Set form
809
810       getform
811           Get form
812
813       deleteform
814           Delete form
815
816       enumforms
817           Enumerate form
818
819       setprinter
820           Set printer comment
821
822       setprinterdata
823           Set REG_SZ printer data
824
825       setprintername <printername> <newprintername>
826           Set printer name
827
828       rffpcnex
829           Rffpcnex test
830
831       printercmp
832           Printer comparison test
833
834       enumprocs
835           Enumerate Print Processors
836
837       enumprocdatatypes
838           Enumerate Print Processor Data Types
839
840       enummonitors
841           Enumerate Print Monitors
842
843       createprinteric
844           Create Printer IC
845
846       playgdiscriptonprinteric
847           Create Printer IC
848
849       getcoreprinterdrivers
850           Get CorePrinterDriver
851
852       enumpermachineconnections
853           Enumerate Per Machine Connections
854
855       addpermachineconnection
856           Add Per Machine Connection
857
858       delpermachineconnection
859           Delete Per Machine Connection
860
861   NETLOGON
862       logonctrl2
863           Logon Control 2
864
865       getanydcname
866           Get trusted DC name
867
868       getdcname
869           Get trusted PDC name
870
871       dsr_getdcname
872           Get trusted DC name
873
874       dsr_getdcnameex
875           Get trusted DC name
876
877       dsr_getdcnameex2
878           Get trusted DC name
879
880       dsr_getsitename
881           Get sitename
882
883       dsr_getforesttrustinfo
884           Get Forest Trust Info
885
886       logonctrl
887           Logon Control
888
889       samlogon
890           Sam Logon
891
892       change_trust_pw
893           Change Trust Account Password
894
895       gettrustrid
896           Get trust rid
897
898       dsr_enumtrustdom
899           Enumerate trusted domains
900
901       dsenumdomtrusts
902           Enumerate all trusted domains in an AD forest
903
904       deregisterdnsrecords
905           Deregister DNS records
906
907       netrenumtrusteddomains
908           Enumerate trusted domains
909
910       netrenumtrusteddomainsex
911           Enumerate trusted domains
912
913       getdcsitecoverage
914           Get the Site-Coverage from a DC
915
916       capabilities
917           Return Capabilities
918
919       logongetdomaininfo
920           Return LogonGetDomainInfo
921
922   FSRVP
923       fss_is_path_sup
924           Check whether a share supports shadow-copy
925
926       fss_get_sup_version
927           Get supported FSRVP version from server
928
929       fss_create_expose
930           Request shadow-copy creation and exposure
931
932       fss_delete
933           Request shadow-copy share deletion
934
935       fss_has_shadow_copy
936           Check for an associated share shadow-copy
937
938       fss_get_mapping
939           Get shadow-copy share mapping information
940
941       fss_recovery_complete
942           Flag read-write snapshot as recovery complete,
943
944   CLUSAPI
945       clusapi_open_cluster
946           Open cluster
947
948       clusapi_get_cluster_name
949           Get cluster name
950
951       clusapi_get_cluster_version
952           Get cluster version
953
954       clusapi_get_quorum_resource
955           Get quorum resource
956
957       clusapi_create_enum
958           Create enum query
959
960       clusapi_create_enumex
961           Create enumex query
962
963       clusapi_open_resource
964           Open cluster resource
965
966       clusapi_online_resource
967           Set cluster resource online
968
969       clusapi_offline_resource
970           Set cluster resource offline
971
972       clusapi_get_resource_state
973           Get cluster resource state
974
975       clusapi_get_cluster_version2
976           Get cluster version2
977
978       clusapi_pause_node
979           Pause cluster node
980
981       clusapi_resume_node
982           Resume cluster node
983
984   DRSUAPI
985       dscracknames
986           Crack Name
987
988       dsgetdcinfo
989           Get Domain Controller Info
990
991       dsgetncchanges
992           Get NC Changes
993
994       dswriteaccountspn
995           Write Account SPN
996
997   ECHO
998       echoaddone
999           Add one to a number
1000
1001       echodata
1002           Echo data
1003
1004       sinkdata
1005           Sink data
1006
1007       sourcedata
1008           Source data
1009
1010   EPMAPPER
1011       epmmap
1012           Map a binding
1013
1014       epmlookup
1015           Lookup bindings
1016
1017   EVENTLOG
1018       eventlog_readlog
1019           Read Eventlog
1020
1021       eventlog_numrecord
1022           Get number of records
1023
1024       eventlog_oldestrecord
1025           Get oldest record
1026
1027       eventlog_reportevent
1028           Report event
1029
1030       eventlog_reporteventsource
1031           Report event and source
1032
1033       eventlog_registerevsource
1034           Register event source
1035
1036       eventlog_backuplog
1037           Backup Eventlog File
1038
1039       eventlog_loginfo
1040           Get Eventlog Information
1041
1042   IRemoteWinspool
1043       winspool_AsyncOpenPrinter
1044           Open printer handle
1045
1046       winspool_AsyncCorePrinterDriverInstalled
1047           Query Core Printer Driver Installed
1048
1049   NTSVCS
1050       ntsvcs_getversion
1051           Query NTSVCS version
1052
1053       ntsvcs_validatedevinst
1054           Query NTSVCS device instance
1055
1056       ntsvcs_hwprofflags
1057           Query NTSVCS HW prof flags
1058
1059       ntsvcs_hwprofinfo
1060           Query NTSVCS HW prof info
1061
1062       ntsvcs_getdevregprop
1063           Query NTSVCS device registry property
1064
1065       ntsvcs_getdevlistsize
1066           Query NTSVCS device list size
1067
1068       ntsvcs_getdevlist
1069           Query NTSVCS device list
1070
1071   MDSSVC
1072       fetch_properties
1073           Fetch connection properties
1074
1075       fetch_attributes
1076           Fetch attributes for a CNID
1077
1078   WINREG
1079       winreg_enumkey
1080           Enumerate Keys
1081
1082       querymultiplevalues
1083           Query multiple values
1084
1085       querymultiplevalues2
1086           Query multiple values
1087
1088   WITNESS
1089       GetInterfaceList
1090           List the interfaces to which witness client connections can be made
1091
1092       Register
1093           Register for resource state change notifications of a NetName and
1094           IPAddress
1095
1096       UnRegister
1097           Unregister for notifications from the server
1098
1099       AsyncNotify
1100           Request notification of registered resource changes from the server
1101
1102       RegisterEx
1103           Register for resource state change notifications of a NetName,
1104           ShareName and multiple IPAddresses
1105
1106   WKSSVC
1107       wkssvc_wkstagetinfo
1108           Query WKSSVC Workstation Information
1109
1110       wkssvc_getjoininformation
1111           Query WKSSVC Join Information
1112
1113       wkssvc_messagebuffersend
1114           Send WKSSVC message
1115
1116       wkssvc_enumeratecomputernames
1117           Enumerate WKSSVC computer names
1118
1119       wkssvc_enumerateusers
1120           Enumerate WKSSVC users
1121
1122   GENERAL OPTIONS
1123       help
1124           Get help on commands
1125
1126       ?
1127           Get help on commands
1128
1129       debuglevel
1130           Set debug level
1131
1132       debug
1133           Set debug level
1134
1135       list
1136           List available commands on pipe
1137
1138       exit
1139           Exit program
1140
1141       quit
1142           Exit program
1143
1144       sign
1145           Force RPC pipe connections to be signed
1146
1147       seal
1148           Force RPC pipe connections to be sealed
1149
1150       packet
1151           Force RPC pipe connections with packet authentication level
1152
1153       schannel
1154           Force RPC pipe connections to be sealed with 'schannel'. Force RPC
1155           pipe connections to be sealed with 'schannel'. Assumes valid
1156           machine account to this domain controller.
1157
1158       schannelsign
1159           Force RPC pipe connections to be signed (not sealed) with
1160           'schannel'. Assumes valid machine account to this domain
1161           controller.
1162
1163       timeout
1164           Set timeout (in milliseconds) for RPC operations
1165
1166       transport
1167           Choose ncacn transport for RPC operations
1168
1169       none
1170           Force RPC pipe connections to have no special properties
1171

BUGS

1173       rpcclient is designed as a developer testing tool and may not be robust
1174       in certain areas (such as command line parsing). It has been known to
1175       generate a core dump upon failures when invalid parameters where passed
1176       to the interpreter.
1177
1178       From Luke Leighton's original rpcclient man page:
1179
1180       WARNING!  The MSRPC over SMB code has been developed from examining
1181       Network traces. No documentation is available from the original
1182       creators (Microsoft) on how MSRPC over SMB works, or how the individual
1183       MSRPC services work. Microsoft's implementation of these services has
1184       been demonstrated (and reported) to be... a bit flaky in places.
1185
1186       The development of Samba's implementation is also a bit rough, and as
1187       more of the services are understood, it can even result in versions of
1188       smbd(8) and rpcclient(1) that are incompatible for some commands or
1189       services. Additionally, the developers are sending reports to
1190       Microsoft, and problems found or reported to Microsoft are fixed in
1191       Service Packs, which may result in incompatibilities.
1192

VERSION

1194       This man page is part of version 4.19.3 of the Samba suite.
1195

AUTHOR

1197       The original Samba software and related utilities were created by
1198       Andrew Tridgell. Samba is now developed by the Samba Team as an Open
1199       Source project similar to the way the Linux kernel is developed.
1200
1201       The original rpcclient man page was written by Matthew Geddes, Luke
1202       Kenneth Casson Leighton, and rewritten by Gerald Carter. The conversion
1203       to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to
1204       DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.
1205
1206
1207
1208Samba 4.19.3                      11/27/2023                      RPCCLIENT(1)
Impressum