Top Banner

of 436

linux-sysadmin-commands

Apr 14, 2018

Download

Documents

Ishmo Kueed
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/30/2019 linux-sysadmin-commands

    1/435

  • 7/30/2019 linux-sysadmin-commands

    2/435

    David Jones and Bruce Jamieson (15/10/98) Page 2

    ForwardThis text is the third of a series of books which have been written for the CQU

    subject 85321, Systems Administration. This is the first version which CQU

    has printed and distributed to students and also is the first version which hasconcentrated solely on Linux. More information about the unit 85321 is

    available on the unit Web site, http://infocom.cqu.edu.au/85321/

    The following is a bit of personal blurb from each of the authors of this text.

    David Jones

    Writing a book, even one as rough around the edges as this one, is a difficult,

    frustrating, complex and lengthy task. During the creation of this book a

    number of people helped me keep my sanity while others contributed to the

    book itself. The people who kept me sane are too many to mention. Thecontributors include Bruce Jamieson, who wrote a number of the chapters and

    offered useful and thoughtfull insights, and Elizabeth Tansley and Kylie Jones

    who helped proof the book. As you should be able to tell by now neither

    Elizabeth or Kylie proofed this forward.

    One thing to come out of writing this text is a reinforcement of my hatred of

    Microsoft software, in particular Word for Windows.

    Bruce Jamieson

    It is traditional for the forward to contain thank-yous and pearls of wisdom. It

    is because of this that people don't read forwards. However, in keeping with

    tradition, I will do both.

    Thanks to Tabby, my cat, who has been consistently neurotic since I started

    working on this project, mainly due to my weekend absences disrupting her

    feeding times. Thanks also to the guppies whose lives were lost supplementing

    the aforementioned cat's diet over this period.

    I'd like to make one serious comment: when I began working with UNIX, I

    hated it. The reason why I hated it was that I didn't understand it. Its obscure

    complexities and (for the want of a better word) "different ness" initially made ithard to learn and understand. It is for the same reasons that I now love

    working with UNIX systems - I hope this material will inspire you to feel the

    same way.

  • 7/30/2019 linux-sysadmin-commands

    3/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 3

    Table of Contents

    FORWARD.......................................................................................................................................2

    DAVID JONES ..................................................................................................................................2

    BRUCE JAMIESON ............................................................................................................................2

    TABLE OF CONTENTS .................................................................................................................3

    CHAPTER 1 THE WHAT, WHY AND HOW OF SYS ADMIN................................................16

    INTRODUCTION .............................................................................................................................16

    WHAT SYSTEMS ADMINISTRATORS DO...........................................................................................16

    USERS ..........................................................................................................................................17

    HARDWARE/SOFTWARE .................................................................................................................18

    SUPPORT.......................................................................................................................................18

    WHAT SYSTEMS ADMINISTRATORS NEED TO KNOW ........................................................................19

    WHY UNIX? ................................................................................................................................ 20

    UNIX PAST, PRESENT AND FUTURE ................................................................................................20LINUX ..........................................................................................................................................21

    SOME MORE SYS ADMIN THEORY ...................................................................................................21

    DAILY OPERATIONS .......................................................................................................................21

    AUTOMATE, AUTOMATE AND AUTOMATE .......................................................................................22

    SYSTEM MONITORING....................................................................................................................22

    HARDWARE AND SOFTWARE ..........................................................................................................23

    EVALUATION ................................................................................................................................24

    PURCHASE ....................................................................................................................................24

    INSTALLATION..............................................................................................................................24

    HARDWARE ..................................................................................................................................24

    ADMINISTRATION AND PLANNING ..................................................................................................25

    DOCUMENTATION .........................................................................................................................26

    POLICY.........................................................................................................................................28

    PENALTIES....................................................................................................................................28

    TYPES OF POLICY ..........................................................................................................................29

    CREATING POLICY.........................................................................................................................29

    CODE OF ETHICS............................................................................................................................29

    SAGE-AU CODE OF ETHICS...........................................................................................................29

    SAGE-AU CODE OF ETHICS...........................................................................................................30

    PEOPLE SKILLS ..............................................................................................................................31

    COMMUNICATING WITH USERS ......................................................................................................31

    HOW NOT TO COMMUNICATE WITH USERS.......................................................................................34

    CONCLUSIONS...............................................................................................................................35

    CHAPTER 2 INFORMATION SOURCES.................................................................................. 36INTRODUCTION .............................................................................................................................36

    PROFESSIONAL ORGANISATIONS.....................................................................................................36

    OTHER ORGANISATIONS ................................................................................................................37

    THE SAGE GROUPS ......................................................................................................................37

    THE ACS......................................................................................................................................37

    UNIX USER GROUPS .....................................................................................................................37

    USEFUL BOOKS AND MAGAZINES ....................................................................................................38

    BIBLIOGRAPHIES...........................................................................................................................38

    MAGAZINES ..................................................................................................................................39

    INTERNET RESOURCES ...................................................................................................................39

    HOW TO USE THE INTERNET ...........................................................................................................39

    SOFTWARE ON THE INTERNET ........................................................................................................39DISCUSSION FORUMS .....................................................................................................................40

    USENET NEWS ...............................................................................................................................40

  • 7/30/2019 linux-sysadmin-commands

    4/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 4

    USEFUL NEWSGROUPS....................................................................................................................40

    MAILING LISTS..............................................................................................................................41

    OTHER DISCUSSION FORUMS .........................................................................................................41

    INFORMATION...............................................................................................................................41

    WORLD-WIDE WEB ......................................................................................................................41

    ANONYMOUS FTP.........................................................................................................................42

    INTERNET BASED LINUX RESOURCES ..............................................................................................42THE LINUX DOCUMENTATION PROJECT..........................................................................................42

    REDHAT .......................................................................................................................................42

    CONCLUSIONS...............................................................................................................................43

    REVIEW QUESTIONS ......................................................................................................................43

    CHAPTER 3 USING UNIX............................................................................................................44

    INTRODUCTION .............................................................................................................................44

    INTRODUCTORY UNIX..................................................................................................................44

    UNIX COMMANDS ARE PROGRAMS ................................................................................................45

    VI ................................................................................................................................................45

    AN INTRODUCTION TO VI ..............................................................................................................45

    UNIX COMMANDS ........................................................................................................................46PHILOSOPHY OF UNIX COMMANDS................................................................................................46

    UNIX COMMAND FORMAT.............................................................................................................46

    A COMMAND FOR EVERYTHING ......................................................................................................47

    ONLINE HELP ................................................................................................................................48

    USING THE MANUAL PAGES ............................................................................................................48

    IS THERE A MAN PAGE FOR... ..........................................................................................................48

    MAN PAGE FORMAT........................................................................................................................49

    SOME UNIX COMMANDS...............................................................................................................49

    IDENTIFICATION COMMANDS .........................................................................................................50

    SIMPLE COMMANDS.......................................................................................................................51

    FILTERS........................................................................................................................................51

    UNIQ .............................................................................................................................................53

    TR ................................................................................................................................................53

    CUT...............................................................................................................................................54

    PASTE ...........................................................................................................................................54

    GREP .............................................................................................................................................55

    WC ................................................................................................................................................55

    GETTING MORE OUT OF FILTERS .....................................................................................................56

    CONCLUSIONS...............................................................................................................................56

    CHAPTER 4 THE FILE HIERARCHY.......................................................................................57

    INTRODUCTION .............................................................................................................................57

    WHY?...........................................................................................................................................57

    THE IMPORTANT SECTIONS ............................................................................................................58

    THE ROOT OF THE PROBLEM...........................................................................................................58

    HOMES FOR USERS.........................................................................................................................59

    EVERY USER NEEDS A HOME...........................................................................................................59

    OTHER HOMES?.............................................................................................................................60

    /USR AND/VAR.............................................................................................................................60

    AND THE DIFFERENCE IS... .............................................................................................................60

    /USR/LOCAL .................................................................................................................................61

    LIB, INCLUDE AND SRC...................................................................................................................62

    /VAR/SPOOL .................................................................................................................................62

    X WINDOWS.................................................................................................................................63

    BINS.............................................................................................................................................63

    WHICH BIN?..................................................................................................................................63

    /BIN ............................................................................................................................................64/SBIN...........................................................................................................................................64

  • 7/30/2019 linux-sysadmin-commands

    5/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 5

    /USR/BIN.....................................................................................................................................65

    /USR/LOCAL/BIN .........................................................................................................................65

    CONFIGURATION FILES, LOGS AND OTHER BITS!..............................................................................65

    ETC ETC ETC. ................................................................................................................................65

    LOGS............................................................................................................................................66

    /PROC...........................................................................................................................................66

    /DEV ............................................................................................................................................66CONCLUSION ................................................................................................................................66

    FUTURE STANDARDS .....................................................................................................................66

    REVIEW QUESTIONS ......................................................................................................................67

    4.1 ...............................................................................................................................................67

    4.2 ...............................................................................................................................................67

    4.3 ...............................................................................................................................................67

    CHAPTER 5 PROCESSES AND FILES.......................................................................................68

    INTRODUCTION .............................................................................................................................68

    MULTIPLE USERS...........................................................................................................................68

    IDENTIFYING USERS.......................................................................................................................68

    USERS AND GROUPS.......................................................................................................................69NAMES AND NUMBERS ...................................................................................................................69

    ID ................................................................................................................................................69

    COMMANDS AND PROCESSES..........................................................................................................70

    WHERE ARE THE COMMANDS?........................................................................................................70

    WHICH ...........................................................................................................................................70

    WHEN IS A COMMAND NOT A COMMAND? .......................................................................................70

    CONTROLLING PROCESSES .............................................................................................................71

    PROCESS ATTRIBUTES....................................................................................................................71

    PARENT PROCESSES .......................................................................................................................71

    PROCESS UID AND GID ................................................................................................................72

    REAL UID AND GID......................................................................................................................72

    EFFECTIVE UID AND GID..............................................................................................................72FILES............................................................................................................................................73

    FILE TYPES ...................................................................................................................................73

    TYPES OF NORMAL FILES................................................................................................................73

    FILE ATTRIBUTES ..........................................................................................................................74

    VIEWING FILE ATTRIBUTES ............................................................................................................74

    FILE PROTECTION..........................................................................................................................76

    FILE OPERATIONS ..........................................................................................................................76

    USERS, GROUPS AND OTHERS .........................................................................................................77

    THREE SETS OF FILE PERMISSIONS...................................................................................................77

    SPECIAL PERMISSIONS....................................................................................................................78

    CHANGING PASSWORDS .................................................................................................................79

    NUMERIC PERMISSIONS..................................................................................................................80

    SYMBOLIC TO NUMERIC .................................................................................................................81EXERCISES....................................................................................................................................81

    CHANGING FILE PERMISSIONS ........................................................................................................82

    CHANGING PERMISSIONS ...............................................................................................................82

    CHANGING OWNERS ......................................................................................................................83

    CHANGING GROUPS .......................................................................................................................83

    THE COMMANDS ...........................................................................................................................84

    DEFAULT PERMISSIONS ..................................................................................................................85

    FILE PERMISSIONS AND DIRECTORIES..............................................................................................86

    FOR EXAMPLE ...............................................................................................................................86

    WHAT HAPPENS IF? .......................................................................................................................88

    LINKS ...........................................................................................................................................88

    SEARCHING THE FILE HIERARCHY...................................................................................................89THE FIND COMMAND .....................................................................................................................89

  • 7/30/2019 linux-sysadmin-commands

    6/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 6

    EXERCISES....................................................................................................................................93

    PERFORMING COMMANDS ON MANY FILES.......................................................................................94

    FIND AND-EXEC ...........................................................................................................................94

    FIND AND BACK QUOTES ................................................................................................................95

    FIND AND XARGS ............................................................................................................................95

    CONCLUSION ................................................................................................................................96

    REVIEW QUESTIONS ......................................................................................................................97

    CHAPTER 6 THE SHELL ...........................................................................................................99

    INTRODUCTION .............................................................................................................................99

    EXECUTING COMMANDS................................................................................................................99

    DIFFERENT SHELLS......................................................................................................................100

    STARTING A SHELL ......................................................................................................................100

    PARSING THE COMMAND LINE ......................................................................................................101

    THE COMMAND LINE...................................................................................................................102

    ARGUMENTS ...............................................................................................................................102

    ONE COMMAND TO A LINE............................................................................................................103

    COMMANDS IN THE BACKGROUND................................................................................................104

    FILENAME SUBSTITUTION ............................................................................................................104EXERCISES..................................................................................................................................106

    REMOVING SPECIAL MEANING ......................................................................................................106

    INPUT/OUTPUT REDIRECTION .......................................................................................................108

    HOW IT WORKS ...........................................................................................................................108

    FILE DESCRIPTORS.......................................................................................................................109

    STANDARD FILE DESCRIPTORS......................................................................................................109

    CHANGING DIRECTION.................................................................................................................109

    USING STANDARD I/O..................................................................................................................110

    FILTERS......................................................................................................................................110

    I/O REDIRECTION EXAMPLES........................................................................................................111

    REDIRECTING STANDARD ERROR..................................................................................................111

    EVALUATING FROM LEFT TO RIGHT ..............................................................................................112

    EVERYTHING IS A FILE .................................................................................................................113

    TTY.............................................................................................................................................113

    DEVICE FILES ..............................................................................................................................114

    REDIRECTING I/O TO DEVICE FILES ..............................................................................................114

    SHELL VARIABLES .......................................................................................................................115

    ENVIRONMENT CONTROL.............................................................................................................115

    THE SET COMMAND .....................................................................................................................116

    USING SHELL VARIABLES .............................................................................................................116

    ASSIGNING A VALUE ....................................................................................................................116

    ACCESSING A VARIABLE'S VALUE .................................................................................................116

    UNINITIALISED VARIABLES ..........................................................................................................117

    RESETTING A VARIABLE...............................................................................................................117

    THE READONLY COMMAND ............................................................................................................117THE UNSET COMMAND .................................................................................................................117

    ARITHMETIC ...............................................................................................................................118

    THE EXPR COMMAND ...................................................................................................................118

    VALID VARIABLE NAMES..............................................................................................................119

    {} ..............................................................................................................................................119

    ENVIRONMENT CONTROL.............................................................................................................119

    PS1ANDPS2.............................................................................................................................120

    BASH EXTENSIONS........................................................................................................................120

    VARIABLES AND SUB-SHELLS .......................................................................................................120

    FOR EXAMPLE .............................................................................................................................121

    EXPORT .......................................................................................................................................121

    LOCAL VARIABLES ......................................................................................................................121ADVANCED VARIABLE SUBSTITUTION ...........................................................................................122

  • 7/30/2019 linux-sysadmin-commands

    7/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 7

    EVALUATION ORDER ...................................................................................................................123

    WHY ORDER IS IMPORTANT..........................................................................................................123

    THE ORDER.................................................................................................................................123

    THE EVAL COMMAND ...................................................................................................................124

    DOING IT TWICE ..........................................................................................................................124

    CONCLUSION ..............................................................................................................................124

    REVIEW QUESTIONS ....................................................................................................................125

    CHAPTER 7 TEXT MANIPULATION ..................................................................................... 127

    INTRODUCTION ...........................................................................................................................127

    REGULAR EXPRESSIONS ...............................................................................................................127

    RES VERSUS FILENAME SUBSTITUTION..........................................................................................128

    HOW THEY WORK........................................................................................................................129

    EXTENSIONS TO REGULAR EXPRESSIONS .......................................................................................129

    EXAMPLES ..................................................................................................................................130

    EXERCISES..................................................................................................................................130

    TAGGING ....................................................................................................................................131

    FOR EXAMPLE .............................................................................................................................131

    EXERCISES..................................................................................................................................132EX, ED, SED AND VI ...................................................................................................................132

    SO???.........................................................................................................................................132

    WHY USE ED?..............................................................................................................................132

    ED COMMANDS ............................................................................................................................133

    FOR EXAMPLE .............................................................................................................................135

    THE SED COMMAND .....................................................................................................................136

    SED COMMAND FORMAT ...............................................................................................................136

    CONCLUSIONS.............................................................................................................................137

    REVIEW QUESTIONS ....................................................................................................................138

    CHAPTER 8 SHELL PROGRAMMING....................................................................................140

    INTRODUCTION ...........................................................................................................................140SHELL PROGRAMMING - WHY?................................................................................................... 140

    SHELL PROGRAMMING - WHAT?................................................................................................. 140

    SHELL PROGRAMMING - HOW?................................................................................................... 141

    THE BASICS ................................................................................................................................141

    A BASIC PROGRAM .....................................................................................................................141

    AN EXPLANATION OF THE PROGRAM ............................................................................................143

    ALL YOU EVER WANTED TO KNOW ABOUT VARIABLES................................................................144

    WHY?.........................................................................................................................................145

    PREDEFINED VARIABLES .............................................................................................................145

    PARAMETERS - SPECIAL SHELL VARIABLES ..................................................................................146

    ONLY NINE PARAMETERS? .......................................................................................................... 148

    EXERCISE ...................................................................................................................................148

    THE DIFFERENCE BETWEEN $* AND$@........................................................................................149THE BASICS OF INPUT/OUTPUT (IO) ..............................................................................................149

    AND NOW FOR THE HARD BITS .....................................................................................................151

    SCENARIO...................................................................................................................................151

    IF ... THEN ... MAYBE?..................................................................................................................152

    TESTING TESTING... .................................................................................................................... 154

    EXPRESSIONS, EXPRESSIONS!.......................................................................................................155

    EXERCISE ...................................................................................................................................156

    ALL ABOUT CASE.........................................................................................................................156

    LOOPS AND REPEATED ACTION COMMANDS .................................................................................157

    WHILE .........................................................................................................................................158

    FOR.............................................................................................................................................159

    UNTIL .........................................................................................................................................160BREAKAND CONTINUE...................................................................................................................161

  • 7/30/2019 linux-sysadmin-commands

    8/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 8

    REDIRECTION..............................................................................................................................162

    NOW FOR THE REALLY HARD BITS ................................................................................................162

    FUNCTIONAL FUNCTIONS.............................................................................................................162

    LOCAL .........................................................................................................................................163

    THE RETURN TRIP.........................................................................................................................164

    RECURSION: (SEE "RECURSION")..................................................................................................164

    WAIT'ING AND TRAP'ING ...............................................................................................................165BUGS AND DEBUGGING ...............................................................................................................169

    METHOD 1 - SET .........................................................................................................................169

    METHOD 2 - ECHO .......................................................................................................................170

    VERY COMMON MISTAKES ..........................................................................................................170

    AND NOW FOR THE REALLY REALLY HARD BITS.............................................................................170

    WRITING GOOD SHELL PROGRAMS................................................................................................170

    EVAL THE WONDERFUL! ...............................................................................................................172

    STEP-BY-STEP.............................................................................................................................174

    THE PROBLEM .............................................................................................................................174

    SOLVING THE PROBLEM ...............................................................................................................176

    THE FINAL PROGRAM - A LISTING .................................................................................................184

    FINAL NOTES ..............................................................................................................................186REVIEW QUESTIONS ....................................................................................................................187

    SOURCE OF SCANIT......................................................................................................................188

    CHAPTER 9 USERS.................................................................................................................... 191

    INTRODUCTION ...........................................................................................................................191

    WHAT IS A UNIX ACCOUNT?.......................................................................................................191

    LOGIN NAMES .............................................................................................................................191

    PASSWORDS................................................................................................................................193

    THE UID .................................................................................................................................... 194

    HOME DIRECTORIES.....................................................................................................................194

    LOGIN SHELL ..............................................................................................................................195

    DOT FILES...................................................................................................................................195SKELETON DIRECTORIES ..............................................................................................................196

    THE MAIL FILE ............................................................................................................................196

    MAIL ALIASES .............................................................................................................................197

    ACCOUNT CONFIGURATION FILES .................................................................................................198

    /ETC/PASSWD .............................................................................................................................199

    EVERYONE CAN READ /ETC/PASSWD ............................................................................................199

    THIS IS A PROBLEM ......................................................................................................................199

    PASSWORD MATCHING.................................................................................................................200

    THE SOLUTION ............................................................................................................................200

    SHADOW FILE FORMAT ................................................................................................................200

    GROUPS......................................................................................................................................201

    /ETC/GROUP ...............................................................................................................................201

    SPECIAL ACCOUNTS.....................................................................................................................202

    ROOT ...........................................................................................................................................202

    RESTRICTED ACTIONS..................................................................................................................202

    BE CAREFUL................................................................................................................................203

    THE MECHANICS .........................................................................................................................203

    OTHER CONSIDERATIONS.............................................................................................................203

    PRE-REQUISITE INFORMATION .....................................................................................................203

    ADDING AN /ETC/PASSWD ENTRY ................................................................................................204

    THE INITIAL PASSWORD ...............................................................................................................204

    /ETC/GROUP ENTRY ....................................................................................................................204

    THE HOME DIRECTORY ................................................................................................................205

    THE STARTUP FILES .....................................................................................................................205

    SETTING UP MAIL ........................................................................................................................205TESTING AN ACCOUNT .................................................................................................................206

  • 7/30/2019 linux-sysadmin-commands

    9/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 9

    INFORM THE USER .......................................................................................................................207

    REMOVING AN ACCOUNT .............................................................................................................208

    DISABLING AN ACCOUNT .............................................................................................................208

    THE GOALS OF ACCOUNT CREATION............................................................................................209

    MAKING IT SIMPLE ......................................................................................................................209

    USERADD .....................................................................................................................................209

    USERDEL AND USERMOD.................................................................................................................210GRAPHICAL TOOLS......................................................................................................................210

    AUTOMATION .............................................................................................................................211

    GATHERING THE INFORMATION....................................................................................................212

    POLICY.......................................................................................................................................212

    CREATING THE ACCOUNTS ...........................................................................................................212

    ADDITIONAL STEPS .....................................................................................................................213

    CHANGING PASSWORDS WITHOUT INTERACTION ...........................................................................213

    DELEGATION ..............................................................................................................................213

    ALLOCATING ROOT PRIVILEGE.....................................................................................................214

    SUDO ...........................................................................................................................................214

    SUDO ADVANTAGES......................................................................................................................215

    EXERCISES..................................................................................................................................215CONCLUSIONS.............................................................................................................................216

    REVIEW QUESTIONS ....................................................................................................................216

    CHAPTER 10 MANAGING FILE SYSTEMS............................................................................218

    INTRODUCTION ...........................................................................................................................218

    WHAT?.......................................................................................................................................218

    WHY?.........................................................................................................................................218

    A SCENARIO ...............................................................................................................................219

    DEVICES - GATEWAYS TO THE KERNEL .........................................................................................219

    A DEVICE IS... ............................................................................................................................. 219

    DEVICE FILES ARE... ....................................................................................................................219

    DEVICE DRIVERS ARE...................................................................................................................219

    /DEV ..........................................................................................................................................220

    PHYSICAL CHARACTERISTICS OF DEVICE FILES ..............................................................................222

    MAJOR AND MINOR DEVICE NUMBERS ARE... ................................................................................. 222

    WHY USE DEVICE FILES?..............................................................................................................223

    CREATING DEVICE FILES ..............................................................................................................223

    THE USE AND ABUSE OF DEVICE FILES ...........................................................................................224

    DEVICES, PARTITIONS AND FILE SYSTEMS ....................................................................................226

    DEVICE FILES AND PARTITIONS.....................................................................................................226

    PARTITIONS AND FILE SYSTEMS....................................................................................................227

    PARTITIONS AND BLOCKS ............................................................................................................228

    USING THE PARTITIONS................................................................................................................228

    THE VIRTUAL FILE SYSTEM.........................................................................................................229

    DIVIDING UP THE FILE HIERARCHY - WHY?....................................................................................230SCENARIO UPDATE......................................................................................................................231

    THE LINUX NATIVE FILE SYSTEM - EXT2......................................................................................231

    OVERVIEW..................................................................................................................................231

    I-NODES .....................................................................................................................................231

    PHYSICAL STRUCTURE AND FEATURES .........................................................................................233

    CREATING FILE SYSTEMS .............................................................................................................234

    MKFS ..........................................................................................................................................234

    SCENARIO UPDATE......................................................................................................................234

    MOUNTING AND UN-MOUNTING PARTITIONS AND DEVICES ..........................................................235

    MOUNT ......................................................................................................................................235

    MOUNTING WITH THE /ETC/FSTAB FILE .......................................................................................236

    SCENARIO UPDATE......................................................................................................................237FILE OPERATIONS .......................................................................................................................238

  • 7/30/2019 linux-sysadmin-commands

    10/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 10

    CREATING A FILE.........................................................................................................................238

    LINKING FILES.............................................................................................................................238

    LN ..............................................................................................................................................239

    CHECKING THE FILE SYSTEM ........................................................................................................240

    WHY ME?...................................................................................................................................240

    WHAT TO DO ..............................................................................................................................240

    FSCK...........................................................................................................................................241USING FSCK................................................................................................................................241

    WHAT CAUSED THE PROBLEM?.....................................................................................................241

    CONCLUSION ..............................................................................................................................242

    REVIEW QUESTIONS.....................................................................................................................242

    CHAPTER 11 BACKUPS........................................................................................................... 244

    INTRODUCTION ...........................................................................................................................244

    IT ISN'T JUST USERS WHO ACCIDENTALLY DELETE FILES .................................................................244

    CHARACTERISTICS OF A GOOD BACKUP STRATEGY ........................................................................244

    EASE OF USE ...............................................................................................................................245

    TIME EFFICIENCY ........................................................................................................................245

    EASE OF RESTORING FILES ...........................................................................................................245ABILITY TO VERIFY BACKUPS .......................................................................................................246

    TOLERANCE OF FAULTY MEDIA ....................................................................................................246

    PORTABILTY TO A RANGE OF PLATFORMS .....................................................................................247

    CONSIDERATIONS FOR A BACKUP STRATEGY .................................................................................247

    THE COMPONENTS OF BACKUPS....................................................................................................247

    SCHEDULER ................................................................................................................................248

    TRANSPORT ................................................................................................................................248

    MEDIA........................................................................................................................................249

    COMMANDS ................................................................................................................................249

    DUMP AND RESTORE ......................................................................................................................250

    USING DUMP AND RESTORE WITHOUT A TAPE ..................................................................................252

    OUR PRACTICE FILE SYSTEM.........................................................................................................252DOING A LEVEL 0 DUMP...............................................................................................................253

    RESTORING THE BACKUP .............................................................................................................253

    ALTERNATIVE.............................................................................................................................254

    THE TAR COMMAND .....................................................................................................................254

    THE DD COMMAND.......................................................................................................................256

    THE MT COMMAND.......................................................................................................................257

    COMPRESSION PROGRAMS............................................................................................................258

    GZIP ...........................................................................................................................................259

    CONCLUSIONS.............................................................................................................................259

    REVIEW QUESTIONS.....................................................................................................................259

    CHAPTER 12 STARTUP AND SHUTDOWN........................................................................... 261

    INTRODUCTION ...........................................................................................................................261

    A BOOTING OVERVIEW ................................................................................................................261

    FINDING THE KERNEL..................................................................................................................262

    ROM..........................................................................................................................................262

    THE BOOTSTRAP PROGRAM ..........................................................................................................262

    BOOTING ON A PC.......................................................................................................................263

    ON THE FLOPPY...........................................................................................................................263

    MAKING A BOOT DISK..................................................................................................................263

    USING A BOOT LOADER ................................................................................................................264

    STARTING THE KERNEL................................................................................................................264

    KERNEL BOOT MESSAGES.............................................................................................................265

    STARTING THE PROCESSES ...........................................................................................................266

    RUN LEVELS................................................................................................................................266/ETC/INITTAB ...........................................................................................................................267

  • 7/30/2019 linux-sysadmin-commands

    11/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 11

    SYSTEM CONFIGURATION ............................................................................................................270

    TERMINAL LOGINS ......................................................................................................................271

    STARTUP SCRIPTS........................................................................................................................271

    THE LINUX PROCESS ...................................................................................................................272

    WHY WON'T IT BOOT? ................................................................................................................. 274

    SOLUTIONS.................................................................................................................................274

    BOOT AND ROOT DISKS................................................................................................................274MAKING A BOOT AND ROOT DISK..................................................................................................275

    USING BOOT AND ROOT ...............................................................................................................276

    SOLUTIONS TO HARDWARE PROBLEMS..........................................................................................277

    DAMAGED FILE SYSTEMS .............................................................................................................277

    IMPROPERLY CONFIGURED KERNELS.............................................................................................277

    SHUTTING DOWN ........................................................................................................................278

    REASONS SHUTTING DOWN..........................................................................................................278

    BEING NICE TO THE USERS ...........................................................................................................279

    COMMANDS TO SHUTDOWN .........................................................................................................279

    SHUTDOWN....................................................................................................................................280

    WHAT HAPPENS............................................................................................................................280

    THE OTHER COMMANDS...............................................................................................................281CONCLUSIONS.............................................................................................................................281

    REVIEW QUESTIONS ....................................................................................................................281

    CHAPTER 13 KERNEL ............................................................................................................. 282

    THE BIT OF THE NUT THAT YOU EAT?............................................................................................282

    WHY?.........................................................................................................................................282

    HOW?.........................................................................................................................................283

    THE LIFELESS IMAGE ...................................................................................................................283

    KERNEL GIZZARDS ......................................................................................................................284

    THE FIRST INCISION .....................................................................................................................285

    MAKING THE HEART BEAT... ........................................................................................................286

    MODULES ...................................................................................................................................287

    THE /PROC FILE SYSTEM ..............................................................................................................288

    REALLY, WHY BOTHER? .............................................................................................................. 289

    CONCLUSIONS.............................................................................................................................302

    REVIEW QUESTIONS ....................................................................................................................302

    CHAPTER 14 OBSERVATION, AUTOMATION AND LOGGING .......................................303

    INTRODUCTION ...........................................................................................................................303

    AUTOMATION AND CRON ..............................................................................................................303

    COMPONENTS OF CRON.................................................................................................................303

    CRONTAB FORMAT ........................................................................................................................304

    CREATING CRONTAB FILES ............................................................................................................305

    WHAT'S GOING ON ......................................................................................................................306

    DF ..............................................................................................................................................306

    DU ..............................................................................................................................................307

    SYSTEM STATUS .........................................................................................................................307

    WHAT'S HAPPENED?....................................................................................................................311

    LOGGING AND ACCOUNTING ........................................................................................................311

    MANAGING LOG AND ACCOUNTING FILES......................................................................................311

    CENTRALISE ...............................................................................................................................311

    LOGGING ....................................................................................................................................312

    SYSLOG .......................................................................................................................................312

    ACCOUNTING..............................................................................................................................316

    LOGIN ACCOUNTING....................................................................................................................316

    LAST ...........................................................................................................................................316

    AC ..............................................................................................................................................316PROCESS ACCOUNTING ................................................................................................................317

  • 7/30/2019 linux-sysadmin-commands

    12/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 12

    SO WHAT? ..................................................................................................................................318

    CONCLUSIONS.............................................................................................................................318

    REVIEW QUESTIONS ....................................................................................................................319

    CHAPTER 15 NETWORKS: THE CONNECTION .................................................................321

    INTRODUCTION ...........................................................................................................................321

    RELATED MATERIAL ...................................................................................................................322NETWORK HARDWARE ................................................................................................................322

    NETWORK DEVICES .....................................................................................................................323

    ETHERNET ..................................................................................................................................325

    CONVERTING HARDWARE ADDRESSES TO INTERNET ADDRESSES ....................................................325

    SLIP, PPP AND POINT TO POINT...................................................................................................327

    KERNEL SUPPORT FOR NETWORKING ............................................................................................327

    TCP/IP BASICS...........................................................................................................................329

    HOSTNAMES ...............................................................................................................................329

    HOSTNAME....................................................................................................................................330

    QUALIFIED NAMES.......................................................................................................................331

    IP/INTERNET ADDRESSES ............................................................................................................331

    THE INTERNET IS A NETWORK OF NETWORKS ................................................................................333EXERCISES..................................................................................................................................336

    NAME RESOLUTION .....................................................................................................................337

    ROUTING ....................................................................................................................................340

    EXERCISES..................................................................................................................................341

    MAKING THE CONNECTION ..........................................................................................................341

    CONFIGURING THE DEVICE/INTERFACE .........................................................................................341

    CONFIGURING THE NAME RESOLVER.............................................................................................342

    CONFIGURING ROUTING...............................................................................................................344

    STARTUP FILES............................................................................................................................347

    NETWORK MANAGEMENT TOOLS ..............................................................................................347

    REDHAT GUI NETWORKING TOOLS.............................................................................................348

    NSLOOKUP....................................................................................................................................348

    NETSTAT .....................................................................................................................................349

    TRACEROUTE ................................................................................................................................349

    CONCLUSIONS.............................................................................................................................351

    REVIEW QUESTIONS ....................................................................................................................351

    CHAPTER 16 NETWORK APPLICATIONS ...........................................................................354

    INTRODUCTION ...........................................................................................................................354

    HOW IT ALL WORKS .....................................................................................................................354

    PORTS ........................................................................................................................................355

    RESERVED PORTS ........................................................................................................................355

    LOOK AT PORTS, NETSTAT ............................................................................................................356

    NETWORK SERVERS.....................................................................................................................357

    HOW NETWORK SERVERS START...................................................................................................357/ETC/INETD.CONF .....................................................................................................................358

    HOW IT WORKS ...........................................................................................................................358

    EXERCISES..................................................................................................................................359

    NETWORK CLIENTS .....................................................................................................................359

    THE TELNET CLIENT.....................................................................................................................359

    NETWORK PROTOCOLS ................................................................................................................360

    REQUEST FOR COMMENT (RFCS)..................................................................................................360

    TEXT BASED PROTOCOLS .............................................................................................................360

    HOW IT WORKS ...........................................................................................................................361

    EXERCISES..................................................................................................................................362

    SECURITY ...................................................................................................................................362

    TCPWRAPPERS/TCPD ..................................................................................................................362THE DIFFERENCE .........................................................................................................................363

  • 7/30/2019 linux-sysadmin-commands

    13/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 13

    WHAT'S AN INTRANET? ............................................................................................................... 365SERVICES ON AN INTRANET .........................................................................................................365FILE AND PRINT SHARING.............................................................................................................365SAMBA .......................................................................................................................................366EXERCISES..................................................................................................................................368EMAIL ........................................................................................................................................368

    EMAIL COMPONENTS ...................................................................................................................368EMAIL PROTOCOLS .....................................................................................................................369EXERCISES..................................................................................................................................371WORLD-WIDE WEB ....................................................................................................................371CONCLUSIONS.............................................................................................................................371REVIEW QUESTIONS ....................................................................................................................372

  • 7/30/2019 linux-sysadmin-commands

    14/435

    85321, Systems Administration Table of Contents

    David Jones and Bruce Jamieson (15/10/98) Page 14

    CHAPTER 17 SECURITY..........................................................................................................374

    INTRODUCTION ...........................................................................................................................374WHY HAVE SECURITY? ................................................................................................................ 375BEFORE YOU START .....................................................................................................................376SECURITY VERSUS CONVENIENCE .................................................................................................376

    A SECURITY POLICY ....................................................................................................................376AUSCERT POLICY DEVELOPMENT .............................................................................................377EVALUATING SECURITY ..............................................................................................................377TYPES OF SECURITY THREATS ......................................................................................................377PHYSICAL THREATS.....................................................................................................................377LOGICAL THREATS ......................................................................................................................378HOW TO BREAK IN .......................................................................................................................378SOCIAL ENGINEERING..................................................................................................................379BREAKING INTO A SYSTEM ...........................................................................................................379INFORMATION ABOUT CRACKING..................................................................................................380PROBLEMS..................................................................................................................................380PASSWORDS................................................................................................................................380PROBLEMS WITH /ETC/PASSWD....................................................................................................381

    SEARCH PATHS............................................................................................................................382FULL PATH NAMES.......................................................................................................................383THE FILE SYSTEM ........................................................................................................................384NETWORKS.................................................................................................................................385TOOLS TO EVALUATE SECURITY ..................................................................................................386PROBLEMS WITH THE TOOLS?.......................................................................................................386COPS.........................................................................................................................................386CRACK .......................................................................................................................................387SATAN........................................................................................................................................387REMEDY AND IMPLEMENT ...........................................................................................................388IMPROVING PASSWORD SECURITY.................................................................................................388USER EDUCATION........................................................................................................................388

    SHADOW PASSWORDS ..................................................................................................................389PROACTIVE PASSWD .....................................................................................................................389

    PASSWORD GENERATORS .............................................................................................................389PASSWORD AGING .......................................................................................................................390PASSWORD CRACKING .................................................................................................................390ONE-TIME PASSWORDS ................................................................................................................390HOW TO REMEMBER THEM ...........................................................................................................391SOLUTIONS TO PACKET SNIFFING..................................................................................................391FILE PERMISSIONS .......................................................................................................................392PROGRAMS TO CHECK..................................................................................................................393TRIPWIRE ...................................................................................................................................393DISK QUOTAS................................................