Red Hat Linux 9

Red Hat Linux Reference Guide

ISBN: N/A
Table of Contents
Introduction
1. Changes To This Manual
2. Finding Appropriate Documentation
2.1. Documentation For First-Time Linux Users
2.2. For the More Experienced
2.3. Documentation for Linux Gurus
3. Document Conventions
4. Using the Mouse
5. Copying and Pasting Text With X
6. More to Come
6.1. We Need Feedback!
7. Sign Up for Support
I. System Reference
1. Boot Process, Init, and Shutdown
1.1. The Boot Process
1.2. A Detailed Look at the Boot Process
1.3. Running Additional Programs at Boot Time
1.4. SysV Init Runlevels
1.5. Shutting Down
2. Boot Loaders
2.1. Boot Loaders and System Architecture
2.2. GRUB
2.3. Installing GRUB
2.4. GRUB Terminology
2.5. GRUB Interfaces
2.6. GRUB Commands
2.7. GRUB Menu Configuration File
2.8. LILO
2.9. Options in /etc/lilo.conf
2.10. Changing Runlevels at Boot Time
2.11. Additional Resources
3. File System Structure
3.1. Why Share a Common Structure?
3.2. Overview of File System Hierarchy Standard (FHS)
3.3. Special File Locations
4. The sysconfig Directory
4.1. Files in the /etc/sysconfig/ Directory
4.2. Directories in the /etc/sysconfig/ Directory
4.3. Additional Resources
5. The proc File System
5.1. A Virtual File System
5.2. Top-level Files in the proc File System
5.3. Directories in /proc/
5.4. Using the sysctl Command
5.5. Additional Resources
6. Users and Groups
6.1. User and Group Management Tools
6.2. Standard Users
6.3. Standard Groups
6.4. User Private Groups
6.5. Shadow Passwords
7. The X Window System
7.1. XFree86
7.2. Desktop Environments and Window Managers
7.3. XFree86 Server Configuration Files
7.4. Fonts
7.5. Runlevels and XFree86
7.6. Additional Resources
II. Network Services Reference
8. Network Interfaces
8.1. Network Configuration Files
8.2. Interface Configuration Files
8.3. Interface Control Scripts
8.4. Network Function Files
8.5. Additional Resources
9. Network File System (NFS)
9.1. Methodology
9.2. NFS Server Configuration Files
9.3. NFS Client Configuration Files
9.4. Securing NFS
9.5. Additional Resources
10. Apache HTTP Server
10.1. Apache HTTP Server 2.0
10.2. Migrating Apache HTTP Server 1.3 Configuration Files
10.3. After Installation
10.4. Starting and Stopping httpd
10.5. Configuration Directives in httpd.conf
10.6. Default Modules
10.7. Adding Modules
10.8. Virtual Hosts
10.9. Additional Resources
11. Email
11.1. Email Protocols
11.2. Email Program Classifications
11.3. Mail Transport Agents
11.4. Mail Delivery Agents
11.5. Mail User Agents
11.6. Additional Resources
12. Berkeley Internet Name Domain (BIND)
12.1. Introduction to DNS
12.2. /etc/named.conf
12.3. Zone Files
12.4. Using rndc
12.5. Advanced Features of BIND
12.6. Common Mistakes to Avoid
12.7. Additional Resources
13. Lightweight Directory Access Protocol (LDAP)
13.1. Why Use LDAP?
13.2. LDAP Terminology
13.3. OpenLDAP Daemons and Utilities
13.4. OpenLDAP Configuration Files
13.5. The /etc/openldap/schema/ Directory
13.6. OpenLDAP Setup Overview
13.7. Configuring Your System to Authenticate Using OpenLDAP
13.8. Upgrading to OpenLDAP Version 2.0
13.9. Additional Resources
III. Security Reference
14. Pluggable Authentication Modules (PAM)
14.1. Advantages of PAM
14.2. PAM Configuration Files
14.3. PAM Configuration File Format
14.4. Sample PAM Configuration Files
14.5. Creating PAM Modules
14.6. PAM and Device Ownership
14.7. Additional Resources
15. TCP Wrappers and xinetd
15.1. TCP Wrappers
15.2. TCP Wrappers Configuration Files
15.3. xinetd
15.4. xinetd Configuration Files
15.5. Additional Resources
16. iptables
16.1. Packet Filtering
16.2. Differences between iptables and ipchains
16.3. Options Used in iptables Commands
16.4. Storing iptables Information
16.5. Additional Resources
17. Kerberos
17.1. Advantages of Kerberos
17.2. Kerberos Terminology
17.3. How Kerberos Works
17.4. Kerberos and PAM
17.5. Configuring a Kerberos 5 Server
17.6. Configuring a Kerberos 5 Client
17.7. Additional Resources
18. SSH Protocol
18.1. Features of SSH
18.2. SSH Protocol Versions
18.3. Event Sequence of an SSH Connection
18.4. OpenSSH Configuration Files
18.5. More Than a Secure Shell
18.6. Requiring SSH for Remote Connections
19. Tripwire
19.1. How to Use Tripwire
19.2. Installing the Tripwire RPM
19.3. Customizing Tripwire
19.4. Initialize the Tripwire Database
19.5. Running an Integrity Check
19.6. Examining Tripwire Reports
19.7. Updating the Tripwire Database
19.8. Updating the Tripwire Policy File
19.9. Updating the Tripwire Configuration File
19.10. Tripwire File Location Reference
19.11. Additional Resources
IV. Appendixes
A. General Parameters and Modules
A.1. Specifying Module Parameters
A.2. CD-ROM Module Parameters
A.3. SCSI parameters
A.4. Ethernet Parameters
Index
Colophon