Pubtex Output 2000.07.31:1226
Total Page:16
File Type:pdf, Size:1020Kb
Red Hat Linux 7.0 The Official Red Hat Linux Reference Guide ISBN: 1-58569-020-1 Red Hat, Inc. 2600 Meridian Parkway Durham NC 27713 US 919-547-0012 1-888-733-4281 919-547-0024 [email protected] 13588 Research Triangle Park NC 27709 © 2000 Red Hat, Inc. RefGuide(EN)-7.0-Print-RHI (2000-07-31T12:19-0400) Red Hat is a registered trademark and the Red Hat Shadow Man logo, RPM, the RPM logo, and Glint are trademarks of Red Hat, Inc. Linux is a registered trademark of Linus Torvalds. Motif and UNIX are registered trademarks of The Open Group. Alpha is a trademark of Digital Equipment Corporation. SPARC is a registered trademark of SPARC International, Inc. Products bearing the SPARC trademark are based on an architecture developed by Sun Microsystems, Inc. Netscape is a registered trademark of Netscape Communications Corporation in the United States and other countries. TrueType is a registered trademark of Apple Computer, Inc. Windows is a registered trademark of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Copyright © 2000 by Red Hat, Inc. This material may be distributed only subject to the terms and con- ditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit per- mission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. Printed in the United States, Ireland, and Japan ii Contents Red Hat Linux 7.0 Introduction ................................................................................... xi Welcome.................................................................................... xi Getting the Documentation That’s Right for You........................................ xi More to Come .............................................................................. xv Sign Up for Support........................................................................ xv Part I System-Related Reference ............................................. 17 Chapter 1 Red Hat Linux 7.0 New Features .......................... 19 1.1 Installation-related Enhancements ............................................. 19 1.2 System-Related New Features.................................................. 19 Chapter 2 System Administration .......................................... 21 2.1 Filesystem Structure ............................................................. 21 2.2 Special Red Hat File Locations ................................................. 25 2.3 Users, Groups and User-Private Groups ...................................... 26 2.4 Configuring Console Access .................................................... 30 2.5 The floppy Group ................................................................. 34 2.6 User Authentication with PAM................................................... 34 2.7 Shadow Utilities................................................................... 39 2.8 Building a Custom Kernel........................................................ 40 2.9 Sendmail .......................................................................... 46 2.10 Controlling Access to Services.................................................. 48 2.11 Anonymous FTP.................................................................. 51 2.12 NFS Configuration................................................................ 51 2.13 The Boot Process, Init, and Shutdown ......................................... 53 2.14 Rescue Mode ..................................................................... 69 Chapter 3 System Configuration............................................ 75 iii 3.1 System Configuration with linuxconf............................................ 75 3.2 System Configuration with the Control Panel.................................. 109 Chapter 4 PowerTools.............................................................. 127 4.1 PowerTools Packages............................................................ 127 Chapter 5 Package Management with RPM .......................... 131 5.1 RPM Design Goals ............................................................... 131 5.2 Using RPM ........................................................................ 133 5.3 Impressing Your Friends with RPM ............................................. 139 5.4 Other RPM Resources ........................................................... 143 Chapter 6 Gnome-RPM ............................................................ 145 6.1 Starting Gnome-RPM ............................................................ 147 6.2 The Package Display............................................................. 148 6.3 Installing New Packages......................................................... 150 6.4 Configuration...................................................................... 153 6.5 Package Manipulation............................................................ 159 Chapter 7 Lightweight Directory Access Protocol (LDAP). 167 7.1 What is LDAP?.................................................................... 167 7.2 Pros and Cons of LDAP ......................................................... 168 7.3 UsesforLDAP.................................................................... 168 7.4 LDAP Terminology................................................................ 169 7.5 OpenLDAP Files .................................................................. 169 7.6 OpenLDAP Daemons and Utilities.............................................. 171 7.7 Modules for Adding Extra Functionality to LDAP.............................. 171 7.8 LDAP How To: A Quick Overview............................................... 172 7.9 Configuring Your System to Authenticate Using OpenLDAP................. 173 7.10 LDAP Resources on the Web ................................................... 176 Chapter 8 Using Kerberos 5 on Red Hat Linux .................... 179 8.1 Why Use Kerberos? .............................................................. 179 iv 8.2 Why Not Use Kerberos? ......................................................... 179 8.3 Kerberos Terminology............................................................ 180 8.4 How Kerberos Works............................................................. 181 8.5 Setting Up a Kerberos 5 Server on Red Hat Linux 7.0 ....................... 183 8.6 Setting Up a Kerberos 5 Client on Red Hat Linux 7.0 ........................ 186 8.7 Kerberos and Pluggable Authentication Modules (PAM) ..................... 187 8.8 Sources of Information about Kerberos ........................................ 187 Chapter 9 Credit Card Verification System (CCVS) Basics 189 9.1 The Credit Card Verification Process........................................... 191 9.2 What You’ll Need to Run CCVS................................................. 192 9.3 Installing CCVS ................................................................... 195 9.4 Before You Configure CCVS .................................................... 195 9.5 Configuring CCVS................................................................ 196 9.6 Multiple Merchant Accounts ..................................................... 202 9.7 Starting CCVS .................................................................... 202 9.8 Special Language Considerations .............................................. 204 9.9 Support for CCVS ................................................................ 204 Part II Secure Web Server-Related Reference......................... 205 Chapter 10 Installing the Red Hat Linux Secure Web Server .......................................................................... 207 10.1 Introduction........................................................................ 207 10.2 Acknowledgments ................................................................ 208 10.3 Installation Overview ............................................................. 208 10.4 Choose Which Packages to Install ............................................. 210 10.5 Installing the Red Hat Linux Secure Web Server During the Installation of Red Hat Linux..................................................................... 212 10.6 Upgrading from a Previous Version of Apache ................................ 213 10.7 Upgrading from a Previous Version of Red Hat Linux ........................ 215 10.8 Installing the Secure Server After Installation of Red Hat Linux............. 217 10.9 Finding Help and Documentation ............................................... 219 v 10.10 How to Uninstall the Red Hat Linux Secure Web Server..................... 220 Chapter 11 Obtaining a Certificate for your Secure Server .. 221 11.1 Using Pre-existing Keys and Certificates ...................................... 222 11.2 A General Overview of Web Server Security .................................. 224 11.3 Types of Certificates.............................................................. 224 11.4 Deciding on a Certificate Authority ............................................. 226 11.5 Proving Your Organization’s Identity to a CA .................................. 227 11.6 Generating a Key ................................................................. 229 11.7 Generating a Certificate