Red Hat Linux 7.2

The Official Red Hat Linux Reference Guide

Red Hat, Inc.
2600 Meridian Parkway
Durham, NC 27713
USA
Phone: +1 919 547 0012
Phone: 888 733 4281
Fax: +1 919 547 0024
PO Box 13588
Research Triangle Park, NC 27709
USA

ISBN: N/A
Table of Contents
Introduction
Finding Appropriate Documentation
Documentation For First-Time Linux Users
For the More Experienced
Documentation for Linux Gurus
Document Conventions
Using the Mouse
Copying and Pasting Text With X
More to Come
We Need Feedback!
Sign Up for Support
I. System Reference
1. Filesystem Structure
Why Share a Common Structure?
Overview of Filesystem Hierarchy Standard (FHS)
Special Red Hat Linux File Locations
2. Users and Groups
Tools for User and Group Administration
Standard Users
Standard Groups
User Private Groups
Shadow Utilities
3. Boot Process, Init, and Shutdown
Introduction
Behind the Scenes of the Boot Process
Sysconfig Information
Init Runlevels
Running Programs at Boot Time
Shutting Down
Differences in the Boot Process of Other Architectures
4. The /proc Filesystem
A Virtual Filesystem
Top-Level Files in /proc
Directories in /proc
Using sysctl
Additional Resources
5. GRUB
Defining GRUB
Terminology
Interfaces
Commands
The Menu Configuration File
Additional Resources
6. X Servers and Clients
The Power of X
The XFree86 Server
Desktop Environments and Window Managers
Runlevels
Fonts
Additional Resources
II. Security Reference
7. Pluggable Authentication Modules (PAM)
Advantages of PAM
PAM Configuration Files
Shadow Passwords
Using rlogin, rsh, and rexec with PAM
Additional Resources
8. Using Kerberos 5 on Red Hat Linux
Why Use Kerberos?
Why Not Use Kerberos?
Kerberos Terminology
How Kerberos Works
Kerberos and PAM
Additional Resources
9. TCP Wrappers and xinetd
Purpose of TCP Wrappers
Host-Based Access Control Lists
Access Control Using xinetd
Additional Resources
10. SSH Protocol
Introduction
Event Sequence of an SSH Connection
Layers of SSH Security
OpenSSH Configuration Files
More Than a Secure Shell
Requiring SSH for Remote Connections
11. Installing and Configuring Tripwire
How to Use Tripwire
Installation Instructions
File Locations
Tripwire Components
Modifying the Policy File
Selecting Passphrases
Initializing the Database
Running an Integrity Check
Printing Reports
Updating the Database after an Integrity Check
Updating the Policy File
Tripwire and Email
Additional Resources
III. Network Services Reference
12. Network Scripts
Interface Configuration Files
Interface Control Scripts
Network Functions
13. Apache
Default Modules
Starting and Stopping httpd
Configuration Directives in httpd.conf
Adding Modules to Your Server
Using Virtual Hosts
Additional Resources
14. Berkeley Internet Name Domain (BIND)
Introduction to DNS and BIND
BIND Configuration Files
Using rndc
BIND Advanced Features
Common Mistakes to Avoid
Additional Resources
15. Lightweight Directory Access Protocol (LDAP)
What is LDAP?
Pros and Cons of LDAP
Uses for LDAP
LDAP Terminology
OpenLDAP 2.0 Enhancements
OpenLDAP Files
OpenLDAP Daemons and Utilities
Modules for Adding Extra Functionality to LDAP
LDAP How To: A Quick Overview
Configuring Your System to Authenticate Using OpenLDAP
Additional Resources
16. Email
Protocols
Different Types of Email Programs
Sendmail
Fetchmail
Procmail
Security
Additional Resources
17. Network File System (NFS)
Methodology
NFS Server Configuration Files
NFS Client Configuration Files
Securing NFS
Additional Resources
18. Firewalling with iptables
Packet Filtering
Differences between iptables and ipchains
Options Used in iptables Commands
Storing iptables Information
Additional Resources
IV. Appendixes
A. General Parameters and Modules
Specifying Module Parameters
CD-ROM Module Parameters
SCSI parameters
Ethernet parameters
Index