Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd

Total Page:16

File Type:pdf, Size:1020Kb

Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd. and members of the Ubuntu Documentation Project3 Abstract Welcome to the Ubuntu Server Guide! It contains information on how to install and configure various server applications on your Ubuntu system to fit your needs. It is a step-by-step, task-oriented guide for configuring and customizing your system. Credits and License This document is maintained by the Ubuntu documentation team (https://wiki.ubuntu.com/DocumentationTeam). For a list of contributors, see the contributors page1 This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. A copy of the license is available here: Creative Commons ShareAlike License2. 3 https://launchpad.net/~ubuntu-core-doc 1 ../../libs/C/contributors.xml 2 /usr/share/ubuntu-docs/libs/C/ccbysa.xml Table of Contents 1. Introduction ........................................................................................................................... 1 1. Support .......................................................................................................................... 2 2. Installation ............................................................................................................................. 3 1. Preparing to Install ......................................................................................................... 4 2. Installing from CD ......................................................................................................... 6 3. Upgrading ...................................................................................................................... 9 4. Advanced Installation ................................................................................................... 10 3. Package Management ........................................................................................................... 17 1. Introduction ................................................................................................................. 18 2. dpkg ............................................................................................................................ 19 3. Apt-Get ........................................................................................................................ 20 4. Aptitude ....................................................................................................................... 22 5. Automatic Updates ....................................................................................................... 24 6. Configuration ............................................................................................................... 26 7. References ................................................................................................................... 28 4. Networking .......................................................................................................................... 29 1. Network Configuration ................................................................................................. 30 2. TCP/IP ......................................................................................................................... 38 3. Dynamic Host Configuration Protocol (DHCP) .............................................................. 42 4. Time Synchronisation with NTP ................................................................................... 45 5. Remote Administration ......................................................................................................... 47 1. OpenSSH Server .......................................................................................................... 48 2. eBox ............................................................................................................................ 51 6. Network Authentication ........................................................................................................ 54 1. OpenLDAP Server ....................................................................................................... 55 2. Samba and LDAP ........................................................................................................ 74 3. Kerberos ...................................................................................................................... 79 4. Kerberos and LDAP ..................................................................................................... 86 7. Domain Name Service (DNS) ............................................................................................... 92 1. Installation ................................................................................................................... 93 2. Configuration ............................................................................................................... 94 3. Troubleshooting ........................................................................................................... 99 4. References ................................................................................................................. 103 8. Security ............................................................................................................................. 104 1. User Management ....................................................................................................... 105 2. Console Security ........................................................................................................ 111 3. Firewall ...................................................................................................................... 112 4. AppArmor .................................................................................................................. 119 5. Certificates ................................................................................................................. 123 6. eCryptfs ..................................................................................................................... 128 iii Ubuntu Server Guide 9. Monitoring ......................................................................................................................... 130 1. Overview ................................................................................................................... 131 2. Nagios ....................................................................................................................... 132 3. Munin ........................................................................................................................ 136 10. Web Servers ..................................................................................................................... 138 1. HTTPD - Apache2 Web Server ................................................................................... 139 2. PHP5 - Scripting Language ......................................................................................... 146 3. Squid - Proxy Server .................................................................................................. 148 4. Ruby on Rails ............................................................................................................ 150 5. Apache Tomcat .......................................................................................................... 152 11. Databases ......................................................................................................................... 156 1. MySQL ...................................................................................................................... 157 2. PostgreSQL ................................................................................................................ 159 12. LAMP Applications .......................................................................................................... 161 1. Overview ................................................................................................................... 162 2. Moin Moin ................................................................................................................. 163 3. MediaWiki ................................................................................................................. 165 4. phpMyAdmin ............................................................................................................. 167 13. File Servers ...................................................................................................................... 169 1. FTP Server ................................................................................................................. 170 2. Network File System (NFS) ........................................................................................ 174 3. CUPS - Print Server ................................................................................................... 176 14. Email Services .................................................................................................................. 179 1. Postfix ......................................................................................................................
Recommended publications
  • Naemonbox Manual Documentation Release 0.0.7
    NaemonBox Manual Documentation Release 0.0.7 NaemonBox Team September 16, 2016 Contents 1 Introduction 3 1.1 Target audience..............................................3 1.2 Prerequisite................................................3 2 About Naemonbox 5 2.1 Project..................................................5 2.2 Features..................................................6 3 Installation Guide 7 3.1 System requirements...........................................7 3.2 Recommended system requirements...................................7 3.3 Client Operating Systems........................................7 3.4 Openvz VPS installation.........................................8 3.5 GNU/Linux Debian 7 (or later) Installation...............................8 3.6 Installing Naemonbox..........................................8 4 Getting Started 9 4.1 Step one.................................................9 4.2 Step two................................................. 10 4.3 Step three................................................. 10 4.4 Step four................................................. 10 5 Configuring Naemon 11 5.1 Introduction............................................... 11 5.2 Actions.................................................. 11 5.3 Hosts Definition............................................. 12 5.4 Services.................................................. 13 5.5 Commands................................................ 14 5.6 Time periods............................................... 15 5.7 Contacts................................................
    [Show full text]
  • Desynched Channels on Ircnet
    Desynched channels on IRCnet Michael Hansen and Jeroen F. J. Laros [email protected] October 29, 2018 Abstract In this paper we describe what a desynchronised channel on IRC is. We give procedures on how to create such a channel and how to remove desyn- chronisation. We explain which types of desynchronisation there are, what properties desynchronised channels have, and which properties can be ex- ploited. 1 Introduction IRC [1] is one of the oldest digital communication protocols on the internet [2]. This protocol is a form of synchronous conferencing which is mainly used for its one-to-many communication capabilities. Although its popularity has somewhat diminished since the introduction of instant messaging applications [3] like the MSN messenger [4], it is still widely used. In this paper, we first give some background information about IRC in Sec- tion 2. In Section 3 we elaborate on the phenomenon of desynched channels and in Section 4 we describe how to place a boundary, Section 5 covers the occurrence of fake modes and Section 6 describes how to remove a desync. In Section 7, we give some examples of possible uses of fake modes and we conclude in Section 8. arXiv:0811.3140v1 [cs.NI] 19 Nov 2008 2 Background An IRC network consists of multiple servers connected to each other, there are no cycles in this network, so the topology of this network is an undirected tree (acyclic graph). An IRC network also has clients connected to its servers, and messages are relayed from server to server to transfer a message from one client to another.
    [Show full text]
  • STEM Subjects Face the Haptic Generation: the Ischolar Tesis
    STEM Subjects Face the Haptic Generation: The iScholar Tesis doctoral Nuria Llobregat Gómez Director Dr. D. Luis Manuel Sánchez Ruiz Valencia, noviembre 2019 A mi Madre, a mi Padre (†), a mis Yayos (†), y a mi Hija, sin cuya existencia esto no hubiese podido suceder. Contents Abstract. English Version Resumen. Spanish Version Resum. Valencian Version Acknowledgements Introduction_____________________________________________________________________ 7 Outsight ____________________________________________________________________________________ 13 Insight ______________________________________________________________________________________14 Statement of the Research Questions __________________________________________________________ 15 Dissertation Structure ________________________________________________________________________16 SECTION A. State of the Art. The Drivers ____________________________________________ 19 Chapter 1: Haptic Device Irruption 1.1 Science or Fiction? Some Historical Facts ______________________________________________ 25 1.2 The Irruptive Perspective ___________________________________________________________ 29 1.2.1 i_Learn & i_Different ____________________________________________________________________ 29 1.2.2 Corporate Discourse and Education ________________________________________________________ 31 1.2.3 Size & Portability Impact _________________________________________________________________ 33 First Devices _____________________________________________________________________________ 33 Pro Models
    [Show full text]
  • Campus Networking Best Practices Session 5: Wireless
    Campus Networking Best Practices Session 5: Wireless LAN Hervey Allen Dale Smith NSRC & University of Oregon University of Oregon & NSRC [email protected] [email protected] Wireless LAN • Provide wireless network across your campus that has the following characteristics: – Authentication – only allow your users – Roaming – allow users to start up in one section of your network, then move to another location – Runs on your campus network Firewall/ Border Traffic Shaper Router Wireless REN switch Authentication Core Gateway Router Core Servers Network Access Control (NAC) Enterprise Identity Management • Processes and Documentation of users. – Now you must deal with this. – What to use as the back-end user store? • LDAP • Active Directory • Kerberos • Other? – Will this play nice with future use? • email, student/staff information, resource access, ... Identity Management Cont. • An example of such a project can be seen here: – http://ccadmin.uoregon.edu/idm/ • This is a retrofit on to an already retrofitted system. • Learn from others and try to avoid this situation if possible. A Wireless Captive Portal The Wireless Captive Portal • Previous example was very simple. • A Captive Portal is your chance to: – Explain your Acceptable Use Policies – Decide if you must authenticate, or – Allow users on your network and monitor for problems instead (alternate solution). – Anything else? Branding? What's Happening? • remember our initial network diagrams...? • Do you think our hotel built their own solution? • Probably not... Commercial Solutions • Aruba http://www.arubanetworks.com/ • Bradford Networks – http://www.bradfordnetworks.com/ • Cisco NAC Appliance (Clean Access) – http://www.cisco.com/en/US/products/ps6128/ • Cisco Wireless LAN Controllers – http://www.cisco.com/en/US/products/hw/wireless/ • Enterasys http://www.enterasys.com/ • Vernier http://www.verniernetworks.com Open Source Solutions • CoovaChilli (morphed from Chillispot) – http://coova.org/wiki/index.php/CoovaChilli – Uses RADIUS for access and accounting.
    [Show full text]
  • Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA
    heck What the #%!@ is wrong ^ with my server?!? Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA 1 Agenda • Intro to Monitoring • Internet protocols 101 • • Nagios SMTP • IMAP • Install/Config • HTTP • Usage • Custom plugins • Packet sniffing for dummies • Intro to Troubleshooting • Tools • telnet, openssl • grep, sed • ps, lsof, netstat 2 MONITORING 3 Automated Monitoring Workflow 4 Monitoring Packages: Open Source • • Pandora FMS • Opsview Core • Naemon • • • • • • Captialware ServerStatus • Core • Sensu All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 5 Monitoring Packages: Commercial • Nagios XI • Groundwork • PRTG network monitor • CopperEgg • WhatsUp Gold • PRTG network monitor • op5 (Naemon) All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 6 Why Automatic Service Monitoring? • Spot small problems before they become big ones • Learn about outages before your users do • Checklist when restoring from a power outage • Gives you better problem reports than users • Problems you might never spot otherwise • Failed HDDs in RAIDs • Full /var partitions • Logs not rotating • System temperature rising 7 Why Automatic Service Monitoring? • Capacity planning • Performance data can generate graphs of utilization • RAM, Disk, etc. • Availability reports - CAUTION • Easy to generate -- even easier to generate wrong • Make sure your configurations actually catch problems • Will also include problems with Nagios itself :( • If you’re going to quote your availability numbers (SLAs, etc.) make sure you understand what you’re actually monitoring.
    [Show full text]
  • Iptables with Shorewall!
    Iptables with shorewall! Table of Contents 1. Install swarmlab-sec (Home PC) . 1 2. shorewall . 1 2.1. Installation . 2 3. Basic Two-Interface Firewall. 2 4. Shorewall Concepts . 3 4.1. zones — Shorewall zone declaration file . 3 4.2. interfaces — Shorewall interfaces file. 4 4.3. policy — Shorewall policy file . 4 4.4. rules — Shorewall rules file . 4 4.5. Compile then Execute . 4 5. Three-Interface Firewall. 5 5.1. zones . 6 5.2. interfaces . 6 5.3. policy . 7 5.4. rules . 7 5.5. masq - Shorewall Masquerade/SNAT definition file . 7 5.6. snat — Shorewall SNAT/Masquerade definition file . 8 5.7. Compile and Execute . 8 1. Install swarmlab-sec (Home PC) HowTo: See http://docs.swarmlab.io/lab/sec/sec.adoc.html NOTE Assuming you’re already logged in 2. shorewall Shorewall is an open source firewall tool for Linux that builds upon the Netfilter (iptables/ipchains) system built into the Linux kernel, making it easier to manage more complex configuration schemes by providing a higher level of abstraction for describing rules using text files. More: wikipedia 1 NOTE Our docker instances have only one nic to add more nic’s: create netowrk frist docker network create --driver=bridge --subnet=192.168.0.0/16 net1 docker network create --driver=bridge --subnet=192.168.0.0/16 net2 docker network create --driver=bridge --subnet=192.168.0.0/16 net3 then connect network to container connect network created to container docker network connect net1 master docker network connect net1 worker1 docker network connect net2 master docker network connect net2 worker2 now let’s look at the following image 2.1.
    [Show full text]
  • Test-Beds and Guidelines for Securing Iot Products and for Secure Set-Up Production Environments
    IoT4CPS – Trustworthy IoT for CPS FFG - ICT of the Future Project No. 863129 Deliverable D7.4 Test-beds and guidelines for securing IoT products and for secure set-up production environments The IoT4CPS Consortium: AIT – Austrian Institute of Technology GmbH AVL – AVL List GmbH DUK – Donau-Universit t Krems I!AT – In"neon Technologies Austria AG #KU – JK Universit t Lin$ / Institute for &ervasive 'om(uting #) – Joanneum )esearch !orschungsgesellschaft mbH *+KIA – No,ia -olutions an. Net/or,s 0sterreich GmbH *1& – *1& -emicon.uctors Austria GmbH -2A – -2A )esearch GmbH -)!G – -al$burg )esearch !orschungsgesellschaft -''H – -oft/are 'om(etence 'enter Hagenberg GmbH -AG0 – -iemens AG 0sterreich TTTech – TTTech 'om(utertechni, AG IAIK – TU Gra$ / Institute for A((lie. Information &rocessing an. 'ommunications ITI – TU Gra$ / Institute for Technical Informatics TU3 – TU 3ien / Institute of 'om(uter 4ngineering 1*4T – 1-Net -ervices GmbH © Copyright 2020, the Members of the IoT4CPS Consortium !or more information on this .ocument or the IoT5'&- (ro6ect, (lease contact8 9ario Drobics7 AIT Austrian Institute of Technology7 mario:.robics@ait:ac:at IoT4C&- – <=>?@A Test-be.s an. guidelines for securing IoT (ro.ucts an. for secure set-up (ro.uction environments Dissemination level8 &U2LI' Document Control Title8 Test-be.s an. gui.elines for securing IoT (ro.ucts an. for secure set-u( (ro.uction environments Ty(e8 &ublic 4.itorBsC8 Katharina Kloiber 4-mail8 ,,;D-net:at AuthorBsC8 Katharina Kloiber, Ni,olaus DEr,, -ilvio -tern )evie/erBsC8 -te(hanie von )E.en, Violeta Dam6anovic, Leo Ha((-2otler Doc ID8 DF:5 Amendment History Version Date Author Description/Comments VG:? ?>:G?:@G@G -ilvio -tern Technology Analysis VG:@ ?G:G>:@G@G -ilvio -tern &ossible )esearch !iel.s for the -2I--ystem VG:> >?:G<:@G@G Katharina Kloiber Initial version (re(are.
    [Show full text]
  • Engineering at Johns Hopkins University! We Look Forward to Meeting You When You Arrive on Campus for Orientation
    Eng in eering 1 01 2019-2020 p rogr am p lanni ng gui de for fi rst-y ear e ngi neering s tudents Welcome to the Whiting School of Engineering at Johns Hopkins University! We look forward to meeting you when you arrive on campus for orientation. In the meantime, we have prepared the First-Year Academic Guide and Engineering 101 to get you started. The Academic Guide includes information for all first-year students at Hopkins, while Engineering 101 is directed specifically to engineering students. Engineering 101 contains information about all of the majors in the School of Engineering, including recommended first semester class schedules. You’ll also find out about some opportunities to join student groups. We hope that these materials help you learn about the Hopkins community and the options available to you. Again, welcome to Hopkins and we’ll see you in August! Linda Moulton, Denise Shipley, Lashell Silver, Eric Simmons, Janet Weise, and Betty Zee Johns Hopkins University Whiting School of Engineering Office of Academic Affairs—Engineering Advising Wyman Park Building Suite N125 3400 N. Charles Street Baltimore, MD 21218-2681 410-516-7395 [email protected] https://engineering.jhu.edu/advising/ Nondiscrimination Statement The Johns Hopkins University is committed to equal opportunity and providing a safe and non- discriminatory educational and working environment for its students, trainees, faculty, staff, post-doctoral fellows, residents, and other members of the University community. To that end, the university seeks to provide community members with an environment that is free from discrimination and harassment on the basis of sex, gender, marital status, pregnancy, race, color, ethnicity, national origin, age, disability, religion, sexual orientation, gender identity or expression, veteran status or other legally protected characteristic.
    [Show full text]
  • Linux Versions
    Linux Versions The Linux "product" is provided in a large number of different versions, known as "distributions," each of which retains the core kernel and GNU tools. Additionally, a variety of common tools (such as KDE, Apache, and Samba) are backed with a collection of additions and service options that meet a particular market niche. Red Hat holds the largest Linux installed base in the US, Novell SUSE Linux in Europe, and TurboLinux (based in Japan) in Asia-Pacific. Mainstream distributions--i.e. commercial applications fully supported by their vendor—have typical license and maintenance fees, just as any other commercial software applications would, while community supported distributions tend to be free to users. Table below lists the best-known Linux distributors, as well as companies that support multiple versions of Linux versions developed by others. Distributor Product Distribution Type Debian Debian GNU/Linux 5.0.0 Free Gentoo Gentoo Linux 2008 Free Mandriva 1. Mandrive Linux One 2009 Commercial 2. Mandriva Linux PowerPack 3. Mandriva Flash (mobile USB Key) 4. Mandriva Corporate Server 4 5. Mandriva Corporate Desktop 6. Mandriva Directory Server 7. Mandriva Pulse 2 (tools) 8. Linbox Rescue Server (backup/restore system) Novell SUSE 1. SUSE Linux Enterprise Server 11 Commercial Linux 2. SUSE Linux Enterprise Desktop 11 3. SUSE Linux Enterprise High Page 1 of 4 Linux Versions Availability Extension 4. SUSE Linux Enterprise Mono Extension 5. SUSE Linux Enterprise Server for System z 6. SUSE Linux Enterprise Real Time Extension 7. SUSE Linux Enterprise Server Priority Support for 8. SAP Applications 9. SUSE Linux Enterprise Point of Service 10.
    [Show full text]
  • Emotions and Performance in Virtual Worlds
    EMOTIONSANDPERFORMANCEINVIRTUAL WORLDS An Empirical Study in the Presence of Missing Data Inauguraldissertation zur Erlangung des Doktorgrades der Wirtschafts- und Sozialwissenschaftlichen Fakultät der Universität zu Köln 2015 vorgelegt von Diplom-Informatikerin Sabrina Schiele aus Duisburg Referent: Prof. Dr. Detlef Schoder Koreferent: Prof. Dr. Claudia Loebbecke Datum der Promotion: 27.11.2015 EMOTIONSANDPERFORMANCEINVIRTUALWORLDS sabrina schiele Department of Information Systems and Information Management Faculty of Management, Economics and Social Sciences University of Cologne Sabrina Schiele: Emotions and Performance in Virtual Worlds, An Em- pirical Study in the Presence of Missing Data, 2015 To Gregor, who supported all of my decisions and always found the right words to keep me going in times of despair. ABSTRACT In this work, we first investigate characteristics of virtual worlds and de- termine important situational variables concerning virtual world usage. Moreover, we develop a model which relates individual differences of vir- tual world users, namely emotional and cognitive abilities, experiences with virtual worlds as a child, and the level of cognitive absorption per- ceived during virtual world use, to the users’ individual performance in virtual worlds. We further test our model with observed data from 4,048 study participants. Our results suggest that cognitive ability, childhood media experience, and cognitive absorption influence multiple facets of emotional capabilities, which in turn have a varyingly strong effect on virtual world performance among different groups. Notably, in the present study, the effect of emotional capabilities on performance was stronger for users which prefer virtual worlds that have more emotional content and require more social and strategic skills, particularly related to human behavior.
    [Show full text]
  • 4PSA Integrator 3.5.0 for Plesk 8.2.0 and Newer Versions User's Guide
    4PSA Integrator 3.5.0 for Plesk 8.2.0 and newer versions User's Guide For more information about 4PSA Integrator, check: http://www.4psa.com Copyright © 2011 Rack-Soft. 4PSA is a registered trademark of Rack-Soft, Inc. User's Guide Manual Version 77015.19 at 2011/02/14 17:48:20 For suggestions regarding this manual contact: [email protected] Copyright © 2011 Rack-Soft. 4PSA is a registered trademark of Rack-Soft, Inc. All rights reserved. Distribution of this work or derivative of this work is prohibited unless prior written permission is obtained from the copyright holder. Plesk is a Registered Trademark of Parallels, Inc. Linux is a Registered Trademark of Linus Torvalds. RedHat is a Registered Trademark of Red Hat Software, Inc. FreeBSD is a Registered Trademark of FreeBSD, Inc. All other trademarks and copyrights are property of their respective owners. Table of Contents Preface ................................................................................................. 5 Who Should Read This Guide ....................................................................... 5 Chapter 1. The Administrator Module ....................................................... 6 1. Manage Tools for Domains ...................................................................... 7 Tools for a Domain ................................................................................ 7 Installing Tools on a Server ..................................................................... 8 Installation Report ..............................................................................
    [Show full text]
  • Anexaminationofthebenefitsofus
    An Examination 1 Running head: AN EXAMINATION OF THE BENEFITS OF USING OPEN SOURCE An Examination of the Benefits of Using Open Source Software in Schools Charles E. Craig, Jr. Tennessee Tech University July 21, 2011 An Examination 2 Abstract This research is an examination of ways that open source software can bring educational value and significant cost savings to K-12 schools. Existing case studies and other research are examined. Particular attention is given to K-12 schools which have implemented the free and open source Linux operating system to replace Microsoft Windows on older computers, as well as schools which have replaced Microsoft Office with OpenOffice. An Examination 3 Table of Contents Abstract …………………………………………………………………………………………2 List of Tables/Figures ………………………………………………………………………….. 4 Chapter I. Introduction …………………………………………………………………………..5 Chapter II. Methodology ………………………………………………………………………...8 Chapter III. A Comparison and Contrast of Proprietary Software and Open Source Software …9 Chapter IV. Educational Benefits of Open Source Software …………………………………..12 Chapter V. Cost Benefits of Open Source Software ……………………………………….…..29 Chapter VI. Summary, Conclusions, Recommendations …………...………………………….33 References ……………………………………………………………………………………...38 An Examination 4 List of Tables/Figures TABLES: Table 1. A Comparison of RAM and CPU Usage in Various Linux Desktop Environments and Window Managers …………………………………………………………………...….14 FIGURES: Figure 1. The Ubuntu Linux desktop……………………………………………………………13 Figure 2. A screenshot of the LibreOffice Writer word processor running in Linux……………17 Figure 3. A screenshot of the Kalzium periodic table software ..……………………………….18 Figure 4. Kanagram ……………………………………………………………………………..19 Figure 5. KGeography ………………………………………………………………………..…20 Figure 6. The KStars desktop planetarium ………………………………………………..…….21 Figure 7. The TuxMath interactive educational game …………………………………………..22 Figure 8. TuxPaint ……………………………………………………………………………....23 Figure 9. Peppermint OS Two running on an eight year old Dell desktop ……………………..35 Figure 10.
    [Show full text]