Red Hat Enterprise Linux 3
Reference Guide
Copyright
© 2003 by Red Hat, Inc.
ISBN: N/A
Table of Contents
Introduction
1.
Changes To This Manual
2.
Finding Appropriate Documentation
2.1.
Documentation For First-Time Linux Users
2.2.
For the More Experienced
2.3.
Documentation for Linux Gurus
3.
Document Conventions
4.
Using the Mouse
5.
Copying and Pasting Text With X
6.
More to Come
6.1.
We Need Feedback!
7.
Sign Up for Support
I.
System Reference
1.
Boot Process, Init, and Shutdown
1.1.
The Boot Process
1.2.
A Detailed Look at the Boot Process
1.3.
Running Additional Programs at Boot Time
1.4.
SysV Init Runlevels
1.5.
Shutting Down
2.
Boot Loaders
2.1.
Boot Loaders and System Architecture
2.2.
GRUB
2.3.
Installing GRUB
2.4.
GRUB Terminology
2.5.
GRUB Interfaces
2.6.
GRUB Commands
2.7.
GRUB Menu Configuration File
2.8.
LILO
2.9.
The LILO Configuration File
2.10.
Changing Runlevels at Boot Time
2.11.
Additional Resources
3.
File System Structure
3.1.
Why Share a Common Structure?
3.2.
Overview of File System Hierarchy Standard (FHS)
3.3.
Special File Locations Under Red Hat Enterprise Linux
4.
The
sysconfig
Directory
4.1.
Files in the
/etc/sysconfig/
Directory
4.2.
Directories in the
/etc/sysconfig/
Directory
4.3.
Additional Resources
5.
The
proc
File System
5.1.
A Virtual File System
5.2.
Top-level Files within the
proc
File System
5.3.
Directories within
/proc/
5.4.
Using the
sysctl
Command
5.5.
Additional Resources
6.
Users and Groups
6.1.
User and Group Management Tools
6.2.
Standard Users
6.3.
Standard Groups
6.4.
User Private Groups
6.5.
Shadow Passwords
6.6.
Additional Resources
7.
The X Window System
7.1.
XFree86
7.2.
Desktop Environments and Window Managers
7.3.
XFree86 Server Configuration Files
7.4.
Fonts
7.5.
Runlevels and XFree86
7.6.
Additional Resources
II.
Network Services Reference
8.
Network Interfaces
8.1.
Network Configuration Files
8.2.
Interface Configuration Files
8.3.
Interface Control Scripts
8.4.
Network Function Files
8.5.
Additional Resources
9.
Network File System (NFS)
9.1.
How It Works
9.2.
Starting and Stopping NFS
9.3.
NFS Server Configuration
9.4.
NFS Client Configuration Files
9.5.
Securing NFS
9.6.
Additional Resources
10.
Apache HTTP Server
10.1.
Apache HTTP Server 2.0
10.2.
Migrating Apache HTTP Server 1.3 Configuration Files
10.3.
After Installation
10.4.
Starting and Stopping
httpd
10.5.
Configuration Directives in
httpd.conf
10.6.
Default Modules
10.7.
Adding Modules
10.8.
Virtual Hosts
10.9.
Additional Resources
11.
Email
11.1.
Email Protocols
11.2.
Email Program Classifications
11.3.
Mail Transport Agents
11.4.
Mail Delivery Agents
11.5.
Mail User Agents
11.6.
Additional Resources
12.
Berkeley Internet Name Domain (BIND)
12.1.
Introduction to DNS
12.2.
/etc/named.conf
12.3.
Zone Files
12.4.
Using
rndc
12.5.
Advanced Features of BIND
12.6.
Common Mistakes to Avoid
12.7.
Additional Resources
13.
Lightweight Directory Access Protocol (LDAP)
13.1.
Why Use LDAP?
13.2.
LDAP Terminology
13.3.
OpenLDAP Daemons and Utilities
13.4.
OpenLDAP Configuration Files
13.5.
The
/etc/openldap/schema/
Directory
13.6.
OpenLDAP Setup Overview
13.7.
Configuring a System to Authenticate Using OpenLDAP
13.8.
Migrating Directories from Earlier Releases
13.9.
Additional Resources
14.
FTP
14.1.
The File Transport Protocol
14.2.
FTP Servers
14.3.
Files Installed with
vsftpd
14.4.
Starting and Stopping
vsftpd
14.5.
vsftpd
Configuration Options
14.6.
Additional Resources
III.
Security Reference
15.
Pluggable Authentication Modules (PAM)
15.1.
Advantages of PAM
15.2.
PAM Configuration Files
15.3.
PAM Configuration File Format
15.4.
Sample PAM Configuration Files
15.5.
Creating PAM Modules
15.6.
PAM and Administrative Credential Caching
15.7.
PAM and Device Ownership
15.8.
Additional Resources
16.
TCP Wrappers and
xinetd
16.1.
TCP Wrappers
16.2.
TCP Wrappers Configuration Files
16.3.
xinetd
16.4.
xinetd
Configuration Files
16.5.
Additional Resources
17.
iptables
17.1.
Packet Filtering
17.2.
Differences between
iptables
and
ipchains
17.3.
Options Used within
iptables
Commands
17.4.
Saving
iptables
Rules
17.5.
iptables
Control Scripts
17.6.
ip6tables
and IPv6
17.7.
Additional Resources
18.
Kerberos
18.1.
What is Kerberos?
18.2.
Kerberos Terminology
18.3.
How Kerberos Works
18.4.
Kerberos and PAM
18.5.
Configuring a Kerberos 5 Server
18.6.
Configuring a Kerberos 5 Client
18.7.
Additional Resources
19.
SSH Protocol
19.1.
Features of SSH
19.2.
SSH Protocol Versions
19.3.
Event Sequence of an SSH Connection
19.4.
OpenSSH Configuration Files
19.5.
More Than a Secure Shell
19.6.
Requiring SSH for Remote Connections
19.7.
Additional Resources
IV.
Appendixes
A.
General Parameters and Modules
A.1.
Specifying Module Parameters
A.2.
SCSI parameters
A.3.
Ethernet Parameters
Index
Colophon
Next
Introduction