Migrating local users to TrueNAS using NTLM hashes from smbpasswd

Problem/Justification
Migration from plain SAMBA or proprietary QNAP QTS solution without LDAP/AD but local users to TrueNAS without having to reset all existing user passwords or the need to know all plaintext passwords.

Impact
The effort to migrate to TrueNAS is reduced. Existing Server can be replaced without the need to set new passwords for each user.

User Story
Currently if a user is created in TrueNAS Web interface a UNIX- and a NTLM-Password hash is generated and saved to internal database.

In order to keep the NTLM hashes it is necessary to manually do the following:

Suggestion
My suggestion would be to make it possible to input the NTLM hash while creating a new user in the web interface. I understand that dealing with NTLM hashes may be insecure but at this step the plain text password would be entered from which the hash could be computed anyway.

So instead of generating the NTLM hash from the password please make it possible to input it directly. So the password would be used for UNIX password hash and the old hash for SAMBA.

So it would be possible to migrate to TrueNAS without any impact for the users.
Not knowing how to migrate users like that would have prevented my migration to TrueNAS entirely.

You can’t use an NT hash (unsalted md4) as a unix password hash (salted sha512). You either know the passwords on your system or you don’t. Having a mismatch between the unix password and NT hash would be incredibly confusing for end users. At the end of the day accounts for a server are local to that server. If you need them to span multiple servers you should be using a directory service such as AD or LDAP.

Thanks for the fast reply.
I know that the NT hash cannot be used as unix password hash and there will be a mismatch between this two passwords for the same account.

In my use case users would never log in the web interface of TrueNAS, they only connect using SMB.

Actually no unix password would be needed, to omit different passwords, setting ! for the password hash would be a solution.