Red Hat Linux 9 Red Hat Linux Customization Guide Red Hat Linux 9: Red Hat Linux Customization Guide Copyright © 2003 by Red Hat, Inc. Red Hat, Inc. 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA rhl-cg(EN)-9-Print-RHI (2003-02-20T01:08) Copyright © 2003 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. Red Hat, Red Hat Network, the Red Hat "Shadow Man" logo, RPM, Maximum RPM, the RPM logo, Linux Library, PowerTools, Linux Undercover, RHmember, RHmember More, Rough Cuts, Rawhide and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Motif and UNIX are registered trademarks of The Open Group. Intel and Pentium are a registered trademarks of Intel Corporation. Itanium and Celeron are trademarks of Intel Corporation. AMD, AMD Athlon, AMD Duron, and AMD K6 are trademarks of Advanced Micro Devices, Inc. Netscape is a registered trademark of Netscape Communications Corporation in the United States and other countries. Windows is a registered trademark of Microsoft Corporation. SSH and Secure Shell are trademarks of SSH Communications Security, Inc. FireWire is a trademark of Apple Computer Corporation. All other trademarks and copyrights referred to are the property of their respective owners. The GPG fingerprint of the security@redhat.com key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E Table of Contents Introduction i 1. Changes to This Manual i 2. Document Conventions ii 3. More to Come v 3.1. Send in Your Feedback v 4. Sign Up for Support v I. File Systems i 1. The ext3 File System 1 1.1. Features of ext3 1 1.2. Creating an ext3 File System 1 1.3. Converting to an ext3 File System 2 1.4. Reverting to an ext2 File System 2 2. Swap Space 5 2.1. What is Swap Space? 5 2.2. Adding Swap Space 5 2.3. Removing Swap Space 6 2.4. Moving Swap Space 7 3. Redundant Array of Independent Disks (RAID) 9 3.1. What is RAID? 9 3.2. Who Should Use RAID? 9 3.3. Hardware RAID versus Software RAID 9 3.4. RAID Levels and Linear Support 10 4. Logical Volume Manager (LVM) 13 5. Managing Disk Storage 15 5.1. Viewing the Partition Table 16 5.2. Creating a Partition 16 5.3. Removing a Partition 18 5.4. Resizing a Partition 19 6. Implementing Disk Quotas 21 6.1. Configuring Disk Quotas 21 6.2. Managing Disk Quotas 24 6.3. Additional Resources 25 II. Installation-Related Information 27 7. Kickstart Installations 29 7.1. What are Kickstart Installations? 29 7.2. How Do You Perform a Kickstart Installation? 29 7.3. Creating the Kickstart File 29 7.4. Kickstart Options 30 7.5. Package Selection 44 7.6. Pre-installation Script 45 7.7. Post-installation Script 47 7.8. Making the Kickstart File Available 48 7.9. Making the Installation Tree Available 49 7.10. Starting a Kickstart Installation 49 8. Kickstart Configurator 53 8.1. Basic Configuration 53 8.2. Installation Method 54 8.3. Boot Loader Options 55 8.4. Partition Information 56 8.5. Network Configuration 59 8.6. Authentication 60 8.7. Firewall Configuration 61 8.8. X Configuration 62 8.9. Package Selection 65 8.10. Pre-Installation Script 65 8.11. Post-Installation Script 66 8.12. Saving the File 68 9. Basic System Recovery 69 9.1. Common Problems 69 9.2. Booting into Rescue Mode 69 9.3. Booting into Single-User Mode 71 9.4. Booting into Emergency Mode 72 10. Software RAID Configuration 73 11. LVM Configuration 77 III. Network-Related Configuration 81 12. Network Configuration 83 12.1. Overview 84 12.2. Establishing an Ethernet Connection 84 12.3. Establishing an ISDN Connection 85 12.4. Establishing a Modem Connection 87 12.5. Establishing an xDSL Connection 88 12.6. Establishing a Token Ring Connection 90 12.7. Establishing a CIPE Connection 91 12.8. Establishing a Wireless Connection 92 12.9. Managing DNS Settings 94 12.10. Managing Hosts 95 12.11. Activating Devices 96 12.12. Working with Profiles 96 12.13. Device Aliases 98 13. Basic Firewall Configuration 101 13.1. Security Level Configuration Tool 101 13.2. GNOME Lokkit 104 13.3. Activating the iptables Service 107 14. Controlling Access to Services 109 14.1. Runlevels 109 14.2. TCP Wrappers 110 14.3. Services Configuration Tool 111 14.4. ntsysv 112 14.5. chkconfig 112 14.6. Additional Resources 113 15. OpenSSH 115 15.1. Why Use OpenSSH? 115 15.2. Configuring an OpenSSH Server 115 15.3. Configuring an OpenSSH Client 115 15.4. Additional Resources 120 16. Network File System (NFS) 121 16.1. Why Use NFS? 121 16.2. Mounting NFS File Systems 121 16.3. Exporting NFS File Systems 122 16.4. Additional Resources 126 17. Samba 127 17.1. Why Use Samba? 127 17.2. Configuring a Samba Server 127 17.3. Connecting to a Samba Share 132 17.4. Additional Resources 134 18. Dynamic Host Configuration Protocol (DHCP) 135 18.1. Why Use DHCP? 135 18.2. Configuring a DHCP Server 135 18.3. Configuring a DHCP Client 139 18.4. Additional Resources 140 19. Apache HTTP Server Configuration 141 19.1. Basic Settings 141 19.2. Default Settings 143 19.3. Virtual Hosts Settings 148 19.4. Server Settings 151 19.5. Performance Tuning 152 19.6. Saving Your Settings 153 19.7. Additional Resources 153 20. Apache HTTP Secure Server Configuration 155 20.1. Introduction 155 20.2. An Overview of Security-Related Packages 155 20.3. An Overview of Certificates and Security 157 20.4. Using Pre-Existing Keys and Certificates 157 20.5. Types of Certificates 158 20.6. Generating a Key 159 20.7. Generating a Certificate Request to Send to a CA 161 20.8. Creating a Self-Signed Certificate 162 20.9. Testing The Certificate 163 20.10. Accessing The Server 163 20.11. Additional Resources 164 21. BIND Configuration 165 21.1. Adding a Forward Master Zone 165 21.2. Adding a Reverse Master Zone 167 21.3. Adding a Slave Zone 169 22. Authentication Configuration 171 22.1. User Information 171 22.2. Authentication 172 22.3. Command Line Version 174 23. Mail Transport Agent (MTA) Configuration 177 IV. System Configuration 179 24. Console Access 181 24.1. Disabling Shutdown Via Ctrl-Alt-Del 181 24.2. Disabling Console Program Access 181 24.3. Disabling All Console Access 182 24.4. Defining the Console 182 24.5. Making Files Accessible From the Console 182 24.6. Enabling Console Access for Other Applications 183 24.7. The floppy Group 184 25. User and Group Configuration 185 25.1. Adding a New User 185 25.2. Modifying User Properties 186 25.3. Adding a New Group 187 25.4. Modifying Group Properties 187 25.5. Command Line Configuration 188 25.6. Explaining the Process 191 26. Gathering System Information 193 26.1. System Processes 193 26.2. Memory Usage 195 26.3. File Systems 196 26.4. Hardware 197 26.5. Additional Resources 199 27. Printer Configuration 201 27.1. Adding a Local Printer 202 27.2. Adding an IPP Printer 204 27.3. Adding a Remote UNIX (LPD) Printer 205 27.4. Adding a Samba (SMB) Printer 206 27.5. Adding a Novell NetWare (NCP) Printer 207 27.6. Adding a JetDirect Printer 208 27.7. Selecting the Printer Model and Finishing 209 27.8. Printing a Test Page 210 27.9. Modifying Existing Printers 211 27.10. Saving the Configuration File 213 27.11. Command Line Configuration 214 27.12. Managing Print Jobs 215 27.13. Sharing a Printer 217 27.14. Switching Print Systems 220 27.15. Additional Resources 220 28. Automated Tasks 223 28.1. Cron 223 28.2. Anacron 225 28.3. At and Batch 226 28.4. Additional Resources 228 29. Log Files 229 29.1. Locating Log Files 229 29.2. Viewing Log Files 229 29.3. Examining Log Files 230 30. Upgrading the Kernel 231 30.1. The 2.4 Kernel 231 30.2. Preparing to Upgrade 231 30.3. Downloading the Upgraded Kernel 232 30.4. Performing the Upgrade 233 30.5. Verifying the Initial RAM Disk Image 234 30.6. Verifying the Boot Loader 234 31. Kernel Modules 237 31.1. Kernel Module Utilities 237 31.2. Additional Resources 239 V. Package Management 241 32. Package Management with RPM 243 32.1. RPM Design Goals 243 32.2. Using RPM 244 32.3. Checking a Package’s Signature 249 32.4. Impressing Your Friends with RPM 250 32.5. Additional Resources 252 33. Package Management Tool 253 33.1. Installing Packages 253 33.2. Removing Packages 255 34. Red Hat Network 257 VI. Appendixes 261 A. Building a Custom Kernel 263 A.1. Preparing to Build 263 A.2. Building the Kernel 263 A.3. Building a Monolithic Kernel 266 A.4. Additional Resources 266 B. Getting Started with Gnu Privacy Guard 267 B.1. Configuration File 267 B.2. Warning Messages 268 B.3. Generating a Keypair 268 B.4. Generating a Revocation Certificate 270 B.5. Exporting your Public Key 271 B.6. Importing a Public Key 273 B.7. What Are Digital Signatures? 273 B.8. Additional Resources 274 Index 275 Colophon 285 Introduction Welcome to the Red Hat Linux Customization Guide. The Red Hat Linux Customization Guide contains information on how to customize your Red Hat Linux system to fit your needs. If you are looking for a step-by-step, task-oriented guide for configur- ing and customizing your system, this is the manual for you. This manual discusses many intermediate topics such as the following: • Setting up a network interface card (NIC) • Performing a Kickstart installation • Configuring Samba shares • Managing your software with RPM • Determining information about your system • Upgrading your kernel This manual is divided into the following main categories: • Installation-Related Reference • Network-Related Reference • System Configuration • Package Management This guide assumes you have a basic understanding of your Red Hat Linux system. If you need reference material which covers more basic issues such as configuring your desktop or playing audio CD-ROMs, please refer to the Red Hat Linux Getting Started Guide. If you need more advanced documentation such as an overview of the Red Hat Linux filesystem, please refer to the Red Hat Linux Reference Guide. HTML and PDF versions of the Red Hat Linux manuals are available on the Documentation CD and online at http://www.redhat.com/docs/. Note Although this manual reflects the most current information possible, you should read the Red Hat Linux Release Notes for information that may not have been available prior to our documentation being finalized. They can be found on the Red Hat Linux CD #1 and online at: http://www.redhat.com/docs/manuals/linux 1. Changes to This Manual This manual has been expanded to include new features in Red Hat Linux 9 as well as topics requested by our readers. Significant changes to this manual include: Implementing Disk Quotas This new chapter explains how to configure and manage disk quotas. ii Introduction Authentication Configuration This new chapter explains how to use the Authentication Configuration Tool. User Configuration This chapter has been expanded to include the command line utilities for managing users and groups as well as an explanation of what happens when a new user is added to the system. Samba This chapter has been expanded to include the new Samba Server Configuration Tool. Printer Configuration This chapter has been rewritten for the new Printer Configuration Tool interface, the new GNOME Print Manager, and the new drag and drop printer icon on the panel. Kickstart The kickstart options have been updated to include a new option in Red Hat Linux 9, and the Kickstart Configurator chapter has been updated to include a few new features. Network Configuration This chapter has been updated for the latest Network Administration Tool interface and fea- tures. Time and Date Configuration This chapter has moved to the Red Hat Linux Getting Started Guide. 2. Document Conventions When you read this manual, you will see that certain words are represented in different fonts, type- faces, sizes, and weights. This highlighting is systematic; different words are represented in the same style to indicate their inclusion in a specific category. The types of words that are represented this way include the following: command Linux commands (and other operating system commands, when used) are represented this way. This style should indicate to you that you can type the word or phrase on the command line and press [Enter] to invoke a command. Sometimes a command contains words that would be displayed in a different style on their own (such as filenames). In these cases, they are considered to be part of the command, so the entire phrase will be displayed as a command. For example: Use the cat testfile command to view the contents of a file, named testfile, in the current working directory. filename Filenames, directory names, paths, and RPM package names are represented this way. This style should indicate that a particular file or directory exists by that name on your Red Hat Linux system. Examples: The .bashrc file in your home directory contains bash shell definitions and aliases for your own use. The /etc/fstab file contains information about different system devices and filesystems. Install the webalizer RPM if you want to use a Web server log file analysis program. [...]... have no data you need to save 3 More to Come The Red Hat Linux Customization Guide is part of Red Hat’s growing commitment to provide useful and timely support to Red Hat Linux users As new tools and applications are released, this guide will be expanded to include them 3.1 Send in Your Feedback If you spot a typo in the Red Hat Linux Customization Guide, or if you have thought of a way to make this manual... fresh installation of Red Hat Linux 9, the default file system assigned to the system’s Linux partitions is ext3 If you upgrade from a version of Red Hat Linux that uses ext2 partitions, the installation program allows you to convert these partitions to ext3 partitions without losing data See the appendix titled Upgrading Your Current System in the Red Hat Linux Installation Guide for details The following... your system Go to http://rhn .redhat. com for more details • Under the Brim: The Red Hat E-Newsletter — Every month, get the latest news and product information directly from Red Hat To sign up, go to http://www .redhat. com/apps/activate/ You will find your Product ID on a black, red, and white card in your Red Hat Linux box To read more about technical support for Red Hat Linux, refer to the Getting Technical... red, and white card in your Red Hat Linux box To read more about technical support for Red Hat Linux, refer to the Getting Technical Support Appendix in the Red Hat Linux Installation Guide Good luck, and thank you for choosing Red Hat Linux! The Red Hat Documentation Team vi Introduction I File Systems File system refers to the files and directories stored on a computer A file system can have different... partition or not used LVM support must be compiled into the kernel The default kernel for Red Hat Linux 9 is compiled with LVM support To learn how to configure LVM during the Red Hat Linux installation process, refer to Chapter 11 LVM Configuration Chapter 5 Managing Disk Storage After you have installed your Red Hat Linux system, you may want to view the existing partition table, change the size of the partitions,... better, we would love to hear from you! Please submit a report in Bugzilla (http://bugzilla .redhat. com/bugzilla/) against the component rhl-cg Be sure to mention the manual’s identifier: rhl-cg(EN)-9-Print-RHI (2003-02-20T01:08) By mentioning this manual’s identifier, we will know exactly which version of the guide you have If you have a suggestion for improving the documentation, try to be as specific... partitions and are running Red Hat Linux 9, you can skip the partitioning and formating sections below and go directly to Section 1.3 Converting to an ext3 File System 2 Chapter 1 The ext3 File System 1.2 Creating an ext3 File System After installation, it is sometimes necessary to create a new ext3 file system For example, if you add a new disk drive to a Red Hat Linux system, you may want to partition... CPUs, Software RAID performance can excel against Hardware RAID The MD driver in the Linux kernel is an example of a RAID solution that is completely hardware independent The performance of a software-based array is dependent on the server CPU performance and load For information on configuring Software RAID in the Red Hat Linux installation program, refer to the Chapter 10 Software RAID Configuration For... some of the surrounding text so we can find it easily 4 Sign Up for Support If you have an edition of Red Hat Linux 9, please remember to sign up for the benefits you are entitled to as a Red Hat customer You will be entitled to any or all of the following benefits, depending upon the Red Hat Linux product you purchased: • Red Hat support — Get help with your installation questions from Red Hat, Inc.’s... partitions, one extended partition, and multiple logical partitions within the extended For an overview of disk partitions, refer to the appendix An Introduction to Disk Partitions in the Red Hat Linux Installation Guide For example, to create a primary partition with an ext3 file system from 1024 megabytes until 2048 megabytes on a hard drive type the following command: mkpart primary ext3 1024 2048 Tip . Red Hat Linux 9 Red Hat Linux Customization Guide Red Hat Linux 9: Red Hat Linux Customization Guide Copyright © 2003 by Red Hat, Inc. Red Hat, Inc. 1801. Script 66 8.12. Saving the File 68 9. Basic System Recovery 69 9.1. Common Problems 69 9.2. Booting into Rescue Mode 69 9.3. Booting into Single-User Mode 71 9. 4. Booting into Emergency Mode 72 10 Explaining the Process 191 26. Gathering System Information 193 26.1. System Processes 193 26.2. Memory Usage 195 26.3. File Systems 196 26.4. Hardware 197 26.5. Additional Resources 199 27. Printer Configuration