Red Hat Linux 7.3

The Official Red Hat Linux Reference Guide

ISBN: N/A
Table of Contents
Introduction
Finding Appropriate Documentation
Documentation For First-Time Linux Users
For the More Experienced
Documentation for Linux Gurus
Document Conventions
Using the Mouse
Copying and Pasting Text With X
More to Come
We Need Feedback!
Sign Up for Support
I. System Reference
1. File System Structure
Why Share a Common Structure?
Overview of File System Hierarchy Standard (FHS)
Special File Locations
2. The /proc File System
A Virtual File System
Top-Level Files in /proc
Directories in /proc
Using sysctl
Additional Resources
3. Boot Process, Init, and Shutdown
Introduction
Behind the Scenes of the Boot Process
Sysconfig Information
Init Runlevels
Running Programs at Boot Time
Shutting Down
Differences in the Boot Process of Other Architectures
4. GRUB
Defining GRUB
Terminology
Interfaces
Commands
The Menu Configuration File
Additional Resources
5. The ext3 File System
Features of ext3
Creating an ext3 File System
Converting to an ext3 File System
Reverting to an ext2 File System
6. Users and Groups
Tools for User and Group Administration
Standard Users
Standard Groups
User Private Groups
Shadow Utilities
7. X Servers and Clients
The Power of X
The XFree86 Server
Desktop Environments and Window Managers
Runlevels
Fonts
Additional Resources
II. Security Reference
8. Pluggable Authentication Modules (PAM)
Advantages of PAM
PAM Configuration Files
PAM Modules
PAM Module Control Flags
PAM Module Paths
PAM Module Arguments
Sample PAM Configuration Files
PAM and Device Ownership
Additional Resources
9. TCP Wrappers and xinetd
Purpose of TCP Wrappers
Host-Based Access Control Lists
Access Control Using xinetd
Additional Resources
10. SSH Protocol
Introduction
Event Sequence of an SSH Connection
Layers of SSH Security
OpenSSH Configuration Files
More Than a Secure Shell
Requiring SSH for Remote Connections
11. Kerberos
Advantages of Kerberos
Kerberos Disadvantages
Kerberos Terminology
How Kerberos Works
Kerberos and PAM
Configuring a Kerberos 5 Server
Configuring a Kerberos 5 Client
Additional Resources
12. Installing and Configuring Tripwire
How to Use Tripwire
Installation Instructions
File Locations
Tripwire Components
Modifying the Policy File
Selecting Passphrases
Initializing the Database
Running an Integrity Check
Printing Reports
Updating the Database after an Integrity Check
Updating the Policy File
Tripwire and Email
Additional Resources
III. Network Services Reference
13. Network Scripts
Interface Configuration Files
Interface Control Scripts
Network Functions
14. Firewalling with iptables
Packet Filtering
Differences between iptables and ipchains
Options Used in iptables Commands
Storing iptables Information
Additional Resources
15. Apache
Default Modules
Starting and Stopping httpd
Configuration Directives in httpd.conf
Adding Modules to Your Server
Using Virtual Hosts
Additional Resources
16. Email
Protocols
Email Program Classifications
Sendmail
Fetchmail
Procmail
Security
Additional Resources
17. Berkeley Internet Name Domain (BIND)
Introduction to DNS and BIND
BIND Configuration Files
Using rndc
BIND Advanced Features
Common Mistakes to Avoid
Additional Resources
18. Network File System (NFS)
Methodology
NFS Server Configuration Files
NFS Client Configuration Files
Securing NFS
Additional Resources
19. Lightweight Directory Access Protocol (LDAP)
What is LDAP?
Pros and Cons of LDAP
Uses for LDAP
LDAP Terminology
OpenLDAP 2.0 Enhancements
OpenLDAP Files
OpenLDAP Daemons and Utilities
Modules for Adding Extra Functionality to LDAP
OpenLDAP Setup Overview
Configuring Your System to Authenticate Using OpenLDAP
Additional Resources
IV. Appendixes
A. General Parameters and Modules
Specifying Module Parameters
CD-ROM Module Parameters
SCSI parameters
Ethernet Parameters
Index