HOME
SEARCH
BLOG
SCRIPTS
CONTACT
SEARCH
SEARCH
Disclaimer:
Authors have full rights over their works. Reproduction of any part of the content is prohibited without prior authorization.
×
BOOK FOUNDATIONS OF CENTOS LINUX
DOWNLOAD
SUMMARY
Items Found:
551
Chapter 1: Installation 1
Chapter 2: BASH 31
Chapter 3: Client/Host Configuration 55
Chapter 4: Data Storage Management 71
Chapter 5: User Management 87
Chapter 6: X Window System 105
Chapter 7: Package Management 133
Chapter 8: Basic Linux Security 153
Chapter 10: Network Security 203
Chapter 11: Network Services 227
Chapter 12: Open Source Databases 261
Chapter 13: Linux Web Services 289
Chapter 14: File Sharing Services 313
Chapter 15: Linux Mail Servers 335
Chapter 16: Directory Services 373
Chapter 17: The Linux Kernel 415
Chapter 18: Linux Virtualization 435
Chapter 19: Linux Troubleshooting 457
Index 471
Introduction
Chapter 1: Installation 1
Preinstallation Steps 1
Installation 3
Troubleshooting 29
Summary 30
Chapter 2: BASH 31
Working with the Command-Line Interface 31
Identifying the Working User 32
The Linux Filesystem 33
Directory Management 35
Listing the contents of a Directory 36
Traversing Directories 39
Absolute and Relative Paths 39
Creating Directories 40
Renaming and Moving Files 40
Deleting Directories and Files 41
Creating and Viewing Text Files 42
Viewing the contents of a File 44
Text Processing 45
Standard I/O Devices 46
Redirection 47
Piping 47
Getting Help 48
Environment Variables 51
Creating and Running Your Own Script 52
Summary 54
Chapter 3: Client/Host Configuration 55
The Boot Process 55
The Boot Loader 55
vi
Kernel, Init, and Runlevels 60
Services 62
Keyboard Settings 63
Language Settings 64
Date and Time Settings 65
Network Settings 67
Graphics Settings 68
Printer Settings 69
Summary 70
Chapter 4: Data Storage Management 71
Provisioning a New Hard Drive 71
Partitioning a Disk Using RAID 77
Understanding RAID Types and Levels 78
RAID 0 78
RAID 1 78
RAID 5 79
Checking on RAID 81
Partitioning with LVM 81
Understanding How LVM Works 82
Volume Groups 83
Physical Volumes 83
Logical Volumes 84
Making Sure Your Volumes Work 85
Finding More Information on LVM 85
Summary 85
Chapter 5: User Management 87
Managing Users and Groups with the Graphical Interface 87
Adding a User 87
Changing User Properties 89
Deleting a User 91
Adding a Group 91
Changing Group Properties 92
Deleting a Group 93
User Management on the Command Line 93
Adding a User 94
Changing User Properties 94
Deleting a User 95
Adding a Group 96
Changing Group Properties 96
Deleting a Group 96
Implementing Disk Quotas 98
Enabling User and Group Quotas on a Filesystem 99
Setting Up the Quota Files 99
vii
Setting Up Quotas 100
Setting Grace Periods 101
Managing Quotas for Groups 101
Enabling Quotas 101
Reporting on Quotas 101
Setting Resource Limits 102
Summary 103
Chapter 6: X Window System 105
X.Org 106
xorg.conf 106
The Keyboard Section 107
The Device Section 108
The Screen Section 108
The ServerLayout Section 110
Making a New xorg.conf File 111
The GNOME Desktop 111
Top Panel 112
Applications 113
Places 115
System 117
Customizing Menus 118
Launchers 120
Separator, Update, Clock, and Sound Applet 121
Bottom Panel 121
XDMCP Remote Connections 122
GDM Configuration 123
Reloading Options with gdmflexiserver 125
Using XDMCP with GDM 125
Requesting an X Session with XDMCP 126
XDMCP with X Query 126
XDMCP with Xnest 128
X with SSH 130
Summary 131
Chapter 7: Package Management 133
RPM 133
The RPM Filename Convention 134
The rpm Command 135
Installing a Package 135
Signed Packages 136
Importing Keys 136
Verifying Packages 137
Adding More Output 137
Package Dependencies 138
Upgrading a Package 139
Removing a Package 140
Querying a Package 141
Information and File contents of a Package 141
Source RPMs 142
The Spec File 143
The rpmbuild Command 144
Building a Binary Package from a Source Package 144
YUM 145
Installing Packages with YUM 146
Removing Packages with YUM 146
Updating Packages with YUM 147
Searching Packages with YUM 148
Adding Sources for YUM 148
Creating Repositories for YUM 150
Summary 151
Chapter 8: Basic Linux Security 153
System Logger 153
Using syslog.conf 154
Selectors 155
Actions 157
Detecting Intruders with the System Logger 158
Automating Tasks with cron 160
Using crontab 161
Using cron.allow and cron.deny 161
Working with the crontab File 161
The crontab Task 161
Browsing Available Tasks 163
Removing Tasks 163
Pluggable Authentication Modules 163
Understanding PAM Rules and Configuration Files 165
servicename 166
Management Groups 167
Control 167
modulepath 168
Testing PAM 168
Testing pam_time.so with crond 169
Finding Other PAM Modules 170
Summary 170
Chapter 9: Advanced Security 171
Using Digital Certificates 171
Creating Certificates 172
Deploying Certificates 176
ix
Configuration Files 176
Intermediate Certificates 178
Certificate File Formats 178
Signing Your Own Certificates 179
Go Wild 181
Intrusion Detection 181
Monitoring the filesystem with RPM 182
Monitoring the Filesystem with AIDE 185
Monitoring the Network with Netfilter 188
Security Enhanced Linux 191
Why Use SELinux 192
Enabling and Disabling SELinux 192
SELinux Policy 193
Drilling Down on Context 194
Booleans 196
Access Vectors 199
Interactive Users 200
Summary 201
Chapter 10: Network Security 203
The Firewall 203
A Basic Firewall 203
An Advanced Firewall 207
How netfilter Works 207
Viewing the Current Firewall 209
Building netfilter Rules 211
Using CentOS as a Router 216
Using netfilter for IP Masquerading 217
Handling Complex Protocols with netfilter 218
tcp_wrappers 218
Centralized Logging 222
Configuring the Server to Receive Logs 225
Configuring the Client to Send Logs 225
Summary 226
Chapter 11: Network Services 227
OpenSSH 227
The OpenSSH Configuration File 227
Connecting to the OpenSSH Server 228
Copying Files Securely with scp 229
OpenSSH Keys 229
OpenSSH Fingerprints 230
Getting the Fingerprint Value 230
The known_hosts File 231
Making Your Own Keys 231
x
The DHCP Server 231
Setting Up the DHCP Server 232
The DHCP Configuration File 233
Assigning Fixed Addresses 234
Organizing with Groups 235
The NTP Server 236
Client-Server Mode 238
Symmetric Active/Passive Mode 238
Broadcast Mode 239
ntpq 240
DNS 240
Name Servers and Zones 242
Name Resolution 242
BIND Utilities 243
rndc-confgen 243
rndc 243
named 243
BIND Configuration Files 243
The contents of rndc.conf 245
The contents of named.conf 246
Caching DNS 246
The hints File 246
dig 247
nslookup 248
Configuring a Caching DNS 248
Configuring a Forwarder 251
Configuring a Slave DNS 251
Configuring a Master DNS 252
Reverse Lookup 255
The Squid Web Caching Server 256
Installing Squid 256
The Squid Main Configuration File 256
The visible_hostname directive 256
The cache_dir directive 257
ACLs and ACL-operators 258
Adding ACLs and ACL-operators 258
How ACL-operators Work 259
Talking to Squid Peers 259
More Squid 260
Summary 260
Chapter 12: Open Source Databases 261
ACID 261
MySQL 262
Setting Up MySQL 263
xi
Running the MySQL Server 264
MySQL Users 264
MySQL Monitor 264
Securing the MySQL Root User 265
Creating a Database 266
Removing a Database 267
Adding a User 267
Removing a User 267
Granting Privileges 268
Removing Privileges 269
Getting a List of Available Databases 269
Creating Database Backups 269
Restoring Databases Using Backups 270
Restoring the toys Database 271
Customizing the MySQL Server Configuration 271
PostgreSQL 272
Setting up PostgreSQL 272
Starting PostgreSQL 273
PostgreSQL Interactive Terminal 273
Using the Interactive Terminal 273
PostgreSQL Roles 274
Creating a Role 274
Removing a User 275
Creating a Database 275
Dropping a Database 275
PostgreSQL Privileges 275
Granting Privileges to Objects 276
Revoking Privileges on Objects 276
Changing Role Attributes 277
Getting the List of Databases 277
Creating Database Backups 278
Restoring a Database 278
Configuring PostgreSQL 279
pg_hba.conf 279
CRUD and Databases 280
Creating 281
Verifying the Newly Created Tables 282
Viewing the Structures of the Tables 283
Adding Entries to the Table 283
Reading 284
Updating 285
Dropping Entries from a Table 286
Summary 287
Chapter 13: Linux Web Services 289
The Role of a Web Server 289
Apache Web Server 290
Setting Up Apache 290
Testing Apache 290
Apache Server Directories 291
The Apache Configuration File 293
Apache Configuration File Sections 293
Commonly Used Directives 294
Section 1: Global Environment 294
Section 2: Main Server Configuration 295
Distributed Configuration Files 297
DirectoryIndex 298
Alias 298
ScriptAlias 298
Creating Another Document and cgi-bin Directory 299
Virtual Hosts 302
IP-Based and Name-Based Virtual Hosting 303
The VirtualHost Directive 304
Configuring Name-Based Virtual Hosting 304
Adding PHP to Apache 308
Secure Apache with SSL 309
Securing with OpenSSL 310
Startup Without a Passphrase 311
Summary 312
Chapter 14: File Sharing Services 313
Very Secure FTP Daemon 313
Configuring vsftpd 313
vsftpd.conf 313
ftpusers 314
user_list 314
Testing vsftpd 314
NFS 315
Configuring NFS 316
Sharing a Directory Using NFS 317
Sharing Directories Using NFS Daemons 318
Mounting a Shared Directory As the Client 318
Unmounting a Shared Directory as the Client 319
Using exportfs 319
Mounting Shared Directories at Boot Time 320
Setting Up a Samba Server 321
Installing Samba 322
Configuring Samba 322
lmhosts 322
smbusers 322
smb.conf 323
Configuring Stand-Alone Server Options 323
server string 323
netbios name 324
passdb backend 324
Adding a Samba User 324
Testing the Samba Stand-Alone Server 325
Adding Shares 326
Sharing a Printer 328
Preparing the Printer to Pass Print Data in Raw Form 329
Configuring Samba to Share a Printer 332
Installing the Samba Printer to the Windows Client 333
Summary 334
Chapter 15: Linux Mail Servers 335
Basic Email Concepts 335
The Mail User Agent 336
Mail Transfer Agent 336
Mail Delivery Agent 337
POP3 and IMAP 337
Sendmail 338
Sending Email with Sendmail 339
Checking Mail with the mail Command 339
sendmail.mc 342
sendmail.cf 344
The Sendmail Administrative Configuration Files 345
local-host-names 345
aliases 345
access 346
The trusted-users File 348
The virtusertable File 348
mailertable 349
Postfix 349
Installing Postfix 350
Switching MTAs 350
Sending Email with Postfix 351
The Postfix Main Configuration File 351
Postfix Administrative Configuration Files 354
access 354
aliases 355
virtual 356
transport 356
generic 356
canonical 357
relocated 357
Mail Servers and DNS 358
Dovecot 359
Installing Dovecot 359
The dovecot.conf Configuration File 359
Configuration Options 360
protocols 360
ssl_cert_file 360
ssl_key_file 360
ssl_key_password 361
mail_location 361
Configuring Dovecot for Maildir 361
Configuring an Email Client to Send and Receive Email Using IMAP 362
Checking the IMAP Maildir contents 366
Receiving Email with POP3 367
Checking the POP3 Maildir contents 369
Dovecot and OpenSSL 370
Using Evolution with OpenSSL 370
Troubleshooting Tactics 372
Summary 372
Chapter 16: Directory Services 373
The Need for Unified Authentication 373
Network Information System 375
Setting up NIS 375
The NIS Server 375
Creating Your First Domain 376
ypserv.conf 377
The NIS Client 378
Binding to an NIS Domain 379
yp.conf 379
nsswitch.conf 379
Testing the Setup 380
Maps 381
NIS Utilities 382
ypwhich 382
ypcat 383
ypmatch 383
yppasswd 383
NIS with NFS 384
Using NIS with NFS 384
OpenLDAP 385
Setting up OpenLDAP 385
slapd 386
ldap.conf 386
slapd.conf 386
Modules 387
Schemas 388
Your First Database 390
Using the my-domain.com database 391
LDIF Format 392
Starting OpenLDAP 393
Adding Entries with ldapadd 393
Searching Entries with ldapsearch 396
Changing Entries with ldapmodify 397
Removing Entries Using ldapdelete 398
Creating a Backup 399
OpenLDAP and Samba 399
Installing Perl Modules 400
nss_ldap 402
The nss_ldap Configuration File 403
ldap.secret 404
nsswitch.conf 404
OpenLDAP 405
OpenLDAP Client Configuration File 405
Samba 406
Smbldap-tools 408
smbldap.conf 408
smbldap_bind.conf 408
Installing and Configuring smbldap-tools 409
Joining the DCTOYS Domain Controller 411
Testing the Samba and OpenLDAP Setup 412
Troubleshooting Tactics 413
Pitfall #1: Cannot log into the domain controller 413
Pitfall #2: Cannot start the Samba server properly because only the nmbd process is running 413
Summary 413
Chapter 17: The Linux Kernel 415
History of the Linux Kernel 415
Types of Linux Kernels 415
Kernel Modules 417
Loading Kernel Modules 418
insmod 418
modprobe 418
modprobe.conf 419
Unloading Kernel Modules 421
rmmod 421
modprobe 422
blacklist 422
When to Recompile the Kernel 422
Getting a New Linux Kernel 423
Preparing to Configure the New Linux Kernel 423
Ways to Configure the Kernel Sources 424
Configuring the Kernel with the Command Line 424
Configuring the Kernel Graphically 426
Configuring the Kernel with menuconfig 428
Preparing for Kernel Compilation 430
Building the Kernel 431
Building the Kernel Modules 432
Making the Boot Loader Initialized RAM Disk 432
Adding the New Kernel into the GRUB Boot Loader 432
Your Turn 434
Summary 434
Chapter 18: Linux Virtualization 435
Understanding Virtualization 435
Deciding to Use Virtualization 436
Xen 437
Exploring Virtualization Technologies 437
Full Virtualization 437
Hardware-Assisted Virtualization 437
Operating System Virtualization 437
Paravirtualization 438
Hardware Requirements 439
Installing Xen 440
The xend Daemon 441
The xend Configuration Files 441
xend-config.sxp 441
xend-pci-permissive.sxp and xend-pci-quirks.sxp 442
qemu-ifup 442
The xend Network Configuration Scripts Directory 443
Checking Dom-0 443
Making a Guest with virt-install 444
Preparing the Installation Media 446
Using the virt-install Command 446
Understanding the Guest Configuration File 448
Xen Guest Example Configuration Files 450
Connecting to a Guest 450
Using xm 450
Using virt-viewer 451
Using vncviewer 452
Shutting Down a Guest 453
Starting a Guest 453
Cloning a Guest 453
Cleaning Up 454
Summary 455
Chapter 19: Linux Troubleshooting 457
The CentOS Rescue Environment 457
Exploring the Rescue Environment 460
Troubleshooting Checklist 461
Changed the Root Password 461
Bootloader Was Overwritten 462
You’re Experimenting with the Files in /etc 463
Skipping /mnt/sysimage 463
Finding the Affected System’s Root (/) Directory 464
Mounting Logical Volumes 464
Mounting Logical Volumes 465
Single-User Mode 466
Booting into Single-User Mode 466
My New Kernel Is Stuck! 467
Creating the Required Device Files 468
Summary 469
Index 471