Foreword |
|
xxvi | |
Foreword to the Second Edition |
|
xxvii | |
Foreword to the First Edition |
|
xxix | |
Preface |
|
xxxi | |
Acknowledgments |
|
xxxiv | |
BASIC ADMINISTRATION |
|
|
|
1 | (11) |
|
|
2 | (1) |
|
The sordid history of UNIX |
|
|
2 | (1) |
|
|
3 | (1) |
|
Notation and typographical conventions |
|
|
4 | (1) |
|
System-specific information |
|
|
5 | (1) |
|
|
5 | (3) |
|
Organization of the man pages |
|
|
6 | (1) |
|
|
7 | (1) |
|
Essential tasks of the system administrator |
|
|
8 | (1) |
|
Adding and removing users |
|
|
8 | (1) |
|
Adding and removing hardware |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
Maintaining local documentation |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
How to find files on the Internet |
|
|
9 | (1) |
|
System administration under duress |
|
|
10 | (1) |
|
System Administration Personality Syndrome |
|
|
10 | (1) |
|
|
11 | (1) |
|
Booting and Shutting Down |
|
|
12 | (25) |
|
|
12 | (4) |
|
Automatic and manual booting |
|
|
13 | (1) |
|
Steps in the boot process |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
Operator intervention (manual boot only) |
|
|
15 | (1) |
|
Execution of startup scripts |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (6) |
|
How a PC is different from proprietary hardware |
|
|
17 | (1) |
|
|
17 | (1) |
|
LILO: the Linux boot loader |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
LILO multiboot configuration |
|
|
21 | (1) |
|
FreeBSD multiboot configuration |
|
|
22 | (1) |
|
Booting in single-user mode |
|
|
22 | (2) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (9) |
|
SystemV-style startup scripts |
|
|
25 | (3) |
|
|
28 | (1) |
|
|
28 | (2) |
|
|
30 | (2) |
|
|
32 | (1) |
|
Rebooting and shutting down |
|
|
33 | (4) |
|
|
34 | (1) |
|
shutdown: the genteel way to halt the system |
|
|
34 | (1) |
|
halt: a simpler way to shut down |
|
|
35 | (1) |
|
reboot: quick and dirty restart |
|
|
35 | (1) |
|
Sending init a TERM signal |
|
|
36 | (1) |
|
telinit: change init's run level |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (8) |
|
Ownership of files and processes |
|
|
37 | (2) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (4) |
|
su: substitute user identity |
|
|
41 | (1) |
|
|
41 | (3) |
|
|
44 | (1) |
|
daeman: owner of unprivileged system software |
|
|
44 | (1) |
|
bin: owner of the system commands |
|
|
44 | (1) |
|
sys: owner of the kernel and memory images |
|
|
44 | (1) |
|
nobody: the generic NFS user |
|
|
44 | (1) |
|
|
45 | (15) |
|
|
45 | (2) |
|
|
46 | (1) |
|
|
46 | (1) |
|
UID and EUID: real and effective user ID |
|
|
46 | (1) |
|
GID and EGID: real and effective group ID |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
The life cycle of a process |
|
|
47 | (1) |
|
|
48 | (3) |
|
|
51 | (1) |
|
|
51 | (1) |
|
nice and renice: influence sheduling priority |
|
|
52 | (1) |
|
|
53 | (4) |
|
top: monitor processes even better |
|
|
57 | (1) |
|
|
57 | (3) |
|
|
60 | (16) |
|
|
61 | (1) |
|
Mounting and unmounting filesystems |
|
|
62 | (2) |
|
The organization of the file tree |
|
|
64 | (2) |
|
|
66 | (3) |
|
|
66 | (1) |
|
|
66 | (1) |
|
Character and block device files |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (7) |
|
The setuid and setgid bits |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (2) |
|
|
73 | (1) |
|
chmod: change permissions |
|
|
73 | (1) |
|
chown and chgrp: change ownerships |
|
|
74 | (1) |
|
umask: assign default permissions |
|
|
75 | (1) |
|
|
76 | (17) |
|
|
76 | (5) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
The FreeBSD/etc/master.passwd file |
|
|
81 | (1) |
|
The FreeBSD/etc/login.conf file |
|
|
82 | (1) |
|
The Solaris and Red Hat/etc/shadow file |
|
|
82 | (2) |
|
|
84 | (1) |
|
|
85 | (5) |
|
Editing the passwd and shadow files |
|
|
86 | (1) |
|
Setting an initial password |
|
|
86 | (1) |
|
Creating the user's home directory |
|
|
87 | (1) |
|
Copying in the default startup files |
|
|
87 | (1) |
|
Setting the user's mail home |
|
|
88 | (1) |
|
Editing the/etc/group file |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
Vendor-supplied account management utilities |
|
|
91 | (2) |
|
|
93 | (25) |
|
|
93 | (4) |
|
|
97 | (4) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
The Yost standard for RJ-45 wiring |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
Software configuration for serial devices |
|
|
103 | (1) |
|
Configuration of hardwired terminals |
|
|
104 | (6) |
|
|
105 | (1) |
|
The/etc/ttys and/etc/ttytab files |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
Terminal support: the termcap and terminfo databases |
|
|
109 | (1) |
|
Special characters and the terminal driver |
|
|
110 | (1) |
|
stty: set terminal options |
|
|
111 | (1) |
|
tset: set options automatically |
|
|
112 | (1) |
|
How to unwedge a terminal |
|
|
112 | (1) |
|
|
113 | (2) |
|
Modulation, error correction, and data compression protocols |
|
|
113 | (1) |
|
Dial-out configuration:/etc/phones and/etc/remote |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (2) |
|
|
116 | (1) |
|
USB: the Universal Serial Bus |
|
|
117 | (1) |
|
|
118 | (39) |
|
|
118 | (8) |
|
|
120 | (4) |
|
|
124 | (2) |
|
Which is better, SCSI or IDE? |
|
|
126 | (1) |
|
|
126 | (2) |
|
An overview of the disk installation procedure |
|
|
128 | (8) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
Labeling and partitioning the disk |
|
|
130 | (1) |
|
Establishing logical volumes |
|
|
131 | (1) |
|
Creating UNIX filesystems |
|
|
132 | (1) |
|
Setting up automatic mounting |
|
|
133 | (3) |
|
|
136 | (1) |
|
fsck: check and repair filesystems |
|
|
136 | (2) |
|
|
138 | (19) |
|
|
139 | (4) |
|
|
143 | (5) |
|
Adding a disk to Red Hat Linux |
|
|
148 | (5) |
|
|
153 | (4) |
|
|
157 | (7) |
|
|
157 | (1) |
|
The format of crontab files |
|
|
158 | (2) |
|
|
160 | (1) |
|
Some common uses for cron |
|
|
160 | (2) |
|
|
161 | (1) |
|
Network distribution of configuration files |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (2) |
|
|
164 | (40) |
|
|
165 | (4) |
|
Perform all dumps from one machine |
|
|
165 | (1) |
|
|
165 | (1) |
|
Pick a reasonable backup interval |
|
|
166 | (1) |
|
Choose filesystems carefully |
|
|
166 | (1) |
|
Make daily dumps fit on one tape |
|
|
166 | (1) |
|
Make filesystems smaller than your dump device |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
Limit activity during dumps |
|
|
167 | (1) |
|
|
168 | (1) |
|
Develop a tape life cycle |
|
|
169 | (1) |
|
Design your data for backups |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
169 | (6) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
DAT (4mm) cartridge tapes |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
Jukeboxes, stackers, and tape libraries |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
Setting up an incremental backup regime |
|
|
175 | (5) |
|
|
176 | (3) |
|
|
179 | (1) |
|
|
180 | (4) |
|
Restoring individual files |
|
|
180 | (2) |
|
Restoring entire filesystems |
|
|
182 | (2) |
|
Dumping and restoring for upgrades |
|
|
184 | (1) |
|
Using other archiving programs |
|
|
184 | (2) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
volcopy: dupulicate filesystems |
|
|
186 | (1) |
|
Using multiple files on a single tape |
|
|
186 | (1) |
|
|
187 | (15) |
|
The architecture of Amanda |
|
|
188 | (1) |
|
|
188 | (2) |
|
|
190 | (5) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (4) |
|
File restoration from an Amanda backup |
|
|
200 | (1) |
|
Alternatives to Amanda: other open source backup packages |
|
|
201 | (1) |
|
Commercial backup products |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (20) |
|
|
204 | (3) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
Syslog: the system event logger |
|
|
210 | (12) |
|
|
211 | (2) |
|
Red Hat enhancements to syslog |
|
|
213 | (1) |
|
FreeBSD enhancements to syslog |
|
|
214 | (1) |
|
|
215 | (2) |
|
|
217 | (1) |
|
Designing a logging scheme for your site |
|
|
218 | (1) |
|
Software that uses syslog |
|
|
218 | (1) |
|
|
219 | (1) |
|
Using syslog from programs |
|
|
220 | (2) |
|
Condensing log files to useful information |
|
|
222 | (2) |
|
|
224 | (37) |
|
|
225 | (1) |
|
Why configure the kernel? |
|
|
226 | (1) |
|
Confiruging a Solaris kernel |
|
|
226 | (3) |
|
|
227 | (1) |
|
Configuring the kernel with/etc/system |
|
|
228 | (1) |
|
An example/etc/system file |
|
|
228 | (1) |
|
Debugging a Solaris configuration |
|
|
229 | (1) |
|
|
229 | (2) |
|
Configuring a Linux kernel |
|
|
231 | (2) |
|
Building the Linux kernel binary |
|
|
232 | (1) |
|
Tuning your Linux configuration |
|
|
233 | (1) |
|
Building a FreeBSD kernel |
|
|
233 | (4) |
|
The master recipe for building a kernel |
|
|
234 | (1) |
|
Audit the system's hardware |
|
|
235 | (1) |
|
Create a configuration file in SYS/i386/conf |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
Creating a BSD configuration file |
|
|
237 | (9) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (2) |
|
The pseudo-device keyword |
|
|
242 | (1) |
|
A sample FreeBSD configuration file |
|
|
243 | (1) |
|
Tuning the FreeBSD kernel |
|
|
244 | (2) |
|
|
246 | (6) |
|
|
247 | (1) |
|
Adding a Solaris device driver |
|
|
248 | (1) |
|
Adding a Linux device driver |
|
|
249 | (2) |
|
Adding a FreeBSD device driver |
|
|
251 | (1) |
|
|
252 | (1) |
|
Naming conventions for devices |
|
|
252 | (1) |
|
|
253 | (4) |
|
Loadable kernel modules on Solaris |
|
|
253 | (1) |
|
Loadable kernel modules in Linux |
|
|
254 | (2) |
|
Loadable kernel modules in FreeBSD |
|
|
256 | (1) |
|
|
257 | (4) |
NETWORKING |
|
|
|
261 | (81) |
|
|
262 | (3) |
|
|
262 | (1) |
|
How the Internet is managed today |
|
|
263 | (1) |
|
Network standards and documentation |
|
|
263 | (2) |
|
|
265 | (1) |
|
Packets and encapsulation |
|
|
266 | (5) |
|
|
267 | (2) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
IP addresses: the gory details |
|
|
271 | (12) |
|
|
272 | (1) |
|
|
272 | (3) |
|
|
275 | (1) |
|
CIDR: Classless Inter-Domain Routing |
|
|
276 | (2) |
|
|
278 | (1) |
|
Private addresses and NAT |
|
|
279 | (2) |
|
|
281 | (2) |
|
|
283 | (2) |
|
|
283 | (2) |
|
|
285 | (1) |
|
ARP: The address resolution protocol |
|
|
285 | (2) |
|
DHCP: the Dynamic Host Configuration Protocol |
|
|
287 | (4) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
289 | (2) |
|
PPP: the Point-to-Point Protocol |
|
|
291 | (4) |
|
Addressing PPP performance issues |
|
|
292 | (1) |
|
Connecting to a network with PPP |
|
|
293 | (1) |
|
Making your host speak PPP |
|
|
293 | (1) |
|
|
293 | (1) |
|
Finding a host to talk to |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
295 | (3) |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
Broadcast pings and other forms of directed broadcast |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
297 | (1) |
|
Addition of machines to a network |
|
|
298 | (8) |
|
Assigning hostnames and IP addresses |
|
|
298 | (2) |
|
ifconfig: configure network interfaces |
|
|
300 | (2) |
|
route: configure static routes |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
304 | (2) |
|
Vendor-specific network configuration |
|
|
306 | (1) |
|
Solaris network configuration |
|
|
307 | (8) |
|
Basic network configuration for Solaris |
|
|
307 | (2) |
|
Configuration examples for Solaris |
|
|
309 | (1) |
|
DHCP configuration for Solaris |
|
|
310 | (1) |
|
Dynamic reconfiguration and tuning for Solaris |
|
|
311 | (2) |
|
Security, firewalls, filtering, and NAT for Solaris |
|
|
313 | (1) |
|
PPP configuration for Solaris |
|
|
314 | (1) |
|
Networking quicks for Solaris |
|
|
315 | (1) |
|
HP-UX network configuration |
|
|
315 | (7) |
|
Basic network configuration for HP-UX |
|
|
315 | (2) |
|
Configuration examples for HP-UX |
|
|
317 | (1) |
|
DHCP configuration for HP-UX |
|
|
318 | (1) |
|
Dynamic reconfiguration and tuning for HP-UX |
|
|
319 | (1) |
|
Security, firewalls, filtering, and NAT for HP-UX |
|
|
320 | (1) |
|
PPP configuration for HP-UX |
|
|
321 | (1) |
|
Networking quirks for HP-UX |
|
|
322 | (1) |
|
Network configuration for Red Hat |
|
|
322 | (8) |
|
Basic network configuration for Red Hat |
|
|
322 | (1) |
|
Configuration examples for Red Hat |
|
|
323 | (1) |
|
DHCP configuration for Red Hat |
|
|
324 | (1) |
|
Dynamic reconfiguration and tuning for Red Hat |
|
|
325 | (1) |
|
Security, firewalls, filters, and NAT for Red Hat |
|
|
326 | (3) |
|
PPP configuration for Red Hat |
|
|
329 | (1) |
|
Networking quirks for Red Hat |
|
|
329 | (1) |
|
Network configuration for FreeBSD |
|
|
330 | (10) |
|
Basic network configuration for FreeBSD |
|
|
330 | (1) |
|
Configuration examples for FreeBSD |
|
|
331 | (1) |
|
DHCP configuration for FreeBSD |
|
|
332 | (1) |
|
Dynamic reconfiguration and tuning for FreeBSD |
|
|
333 | (1) |
|
Security, firewalls, filters, and NAT for FreeBSD |
|
|
333 | (4) |
|
PPP configuration for FreeBSD |
|
|
337 | (3) |
|
Networking quirks for FreeBSD |
|
|
340 | (1) |
|
|
340 | (2) |
|
|
342 | (30) |
|
Packet forwarding: a closer look |
|
|
343 | (2) |
|
Routing daemons and routing protocols |
|
|
345 | (4) |
|
Distance-vector protocols |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
Interior and exterior protocols |
|
|
348 | (1) |
|
|
349 | (2) |
|
RIP: Routing Information Protocol |
|
|
349 | (1) |
|
RIP-2: Routing Information Protocol, version 2 |
|
|
349 | (1) |
|
OSPF: Open Shortest Path First |
|
|
350 | (1) |
|
IGRP and EIGRP: Interior Gateway Routing Protocol |
|
|
350 | (1) |
|
IS-IS: the ISO ``standard'' |
|
|
351 | (1) |
|
MOSPF, DVMRP, and PIM: multicast routing protocols |
|
|
351 | (1) |
|
Router Discovery Protocol |
|
|
351 | (1) |
|
routed: RIP yourself a new hole |
|
|
351 | (1) |
|
gated: a better routing daemon |
|
|
352 | (14) |
|
gated startup and control |
|
|
353 | (1) |
|
|
353 | (1) |
|
The gated configuration file |
|
|
354 | (1) |
|
Option configuration statements |
|
|
355 | (1) |
|
Network interface definitions |
|
|
356 | (1) |
|
Other miscellaneous definitions |
|
|
357 | (1) |
|
Protocol configuration for RIP |
|
|
358 | (2) |
|
Some preliminary background on OSPF |
|
|
360 | (1) |
|
Protocol configuration for OSPF |
|
|
361 | (2) |
|
Protocol configuration for ICMP redirects |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
A complete gated configuration example |
|
|
364 | (2) |
|
|
366 | (1) |
|
Routing strategy selection criteria |
|
|
367 | (1) |
|
|
368 | (3) |
|
|
371 | (1) |
|
|
372 | (20) |
|
|
372 | (1) |
|
|
373 | (7) |
|
|
373 | (2) |
|
|
375 | (1) |
|
|
375 | (2) |
|
Connecting and expanding Ethernets |
|
|
377 | (3) |
|
FDDI: the disappointing and expensive LAN |
|
|
380 | (1) |
|
ATM: the promised (but sorely defeated) LAN |
|
|
381 | (1) |
|
Frame relay: the sacrificial WAN |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
Where is the network going? |
|
|
384 | (1) |
|
Network testing and debugging |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (2) |
|
Network architecture vs. building architecture |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
Maintenance and documentation |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (96) |
|
DNS for the impatient: adding a new machine |
|
|
392 | (2) |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
396 | (1) |
|
|
397 | (5) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
Registering a second-level domain name |
|
|
401 | (1) |
|
Creating your own subdomains |
|
|
401 | (1) |
|
|
402 | (5) |
|
|
402 | (1) |
|
Finding out what version you have |
|
|
403 | (1) |
|
|
404 | (1) |
|
named: the BIND name server |
|
|
404 | (1) |
|
Authoritative and caching-only servers |
|
|
404 | (2) |
|
Recursive and nonrecursive servers |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
407 | (3) |
|
|
407 | (2) |
|
|
409 | (1) |
|
The extended DNS protocol |
|
|
410 | (1) |
|
|
410 | (4) |
|
|
411 | (2) |
|
|
413 | (1) |
|
Impact on the rest of the system |
|
|
414 | (1) |
|
BIND server configuration |
|
|
414 | (15) |
|
|
414 | (1) |
|
|
415 | (1) |
|
|
415 | (2) |
|
|
417 | (1) |
|
|
417 | (5) |
|
|
422 | (1) |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
424 | (3) |
|
|
427 | (1) |
|
The trusted-keys statement |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
428 | (1) |
|
BIND configuration examples |
|
|
429 | (7) |
|
|
429 | (2) |
|
|
431 | (3) |
|
|
434 | (2) |
|
|
436 | (21) |
|
|
436 | (2) |
|
|
438 | (2) |
|
|
440 | (1) |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
443 | (2) |
|
|
445 | (1) |
|
|
445 | (2) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
451 | (2) |
|
|
453 | (2) |
|
|
455 | (1) |
|
Glue records: links between zones |
|
|
455 | (2) |
|
|
457 | (3) |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
460 | (9) |
|
Access control lists revisited |
|
|
460 | (2) |
|
|
462 | (1) |
|
Secure server-to-server communication with TSIG and TKEY |
|
|
462 | (2) |
|
|
464 | (4) |
|
|
468 | (1) |
|
|
469 | (10) |
|
|
469 | (4) |
|
|
473 | (1) |
|
|
473 | (2) |
|
Debugging with nslookup, dig, and host |
|
|
475 | (3) |
|
|
478 | (1) |
|
|
479 | (2) |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
481 | (1) |
|
DNS for systems not on the Internet |
|
|
481 | (1) |
|
|
481 | (4) |
|
|
481 | (1) |
|
|
482 | (2) |
|
Specifics for Red Hat Linux |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (3) |
|
Mailing lists and newsgroups |
|
|
486 | (1) |
|
Books and other documentation |
|
|
486 | (1) |
|
|
486 | (1) |
|
|
486 | (2) |
|
|
488 | (25) |
|
General information about NFS |
|
|
488 | (5) |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
Root access and the nobody account |
|
|
491 | (1) |
|
Cookies and stateless mounting |
|
|
491 | (1) |
|
Naming conventions for shared filesystems |
|
|
492 | (1) |
|
|
492 | (1) |
|
|
493 | (7) |
|
The share command and dfstab file (Solaris) |
|
|
494 | (1) |
|
The exportfs command and the exports file (HP-UX, Red Hat, FreeBSD) |
|
|
495 | (4) |
|
|
499 | (1) |
|
|
500 | (3) |
|
biod and nfsiod: provide client-side caching |
|
|
501 | (1) |
|
Mounting remote filesystems |
|
|
501 | (1) |
|
|
502 | (1) |
|
nfsstat: dump NFS statistics |
|
|
503 | (1) |
|
Dedicated NFS file servers |
|
|
503 | (1) |
|
|
504 | (1) |
|
automount: the original automounter |
|
|
505 | (4) |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
Replicated filesystems using automount |
|
|
508 | (1) |
|
|
508 | (1) |
|
Specifics for Red Hat Linux |
|
|
509 | (1) |
|
amd: a more sophisticated automounter |
|
|
509 | (3) |
|
|
510 | (1) |
|
|
511 | (1) |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
513 | (22) |
|
|
514 | (1) |
|
|
515 | (6) |
|
|
515 | (3) |
|
rsync: push files more securely |
|
|
518 | (1) |
|
|
519 | (2) |
|
NIS: the Network Information Service |
|
|
521 | (9) |
|
|
522 | (1) |
|
Prioritizing sources of administrative information |
|
|
523 | (1) |
|
Advantages and disadvantages of NIS |
|
|
524 | (1) |
|
|
525 | (2) |
|
|
527 | (2) |
|
|
529 | (1) |
|
|
530 | (2) |
|
LDAP: the Lightweight Directory Access Protocol |
|
|
532 | (3) |
|
LDAP documentation and specifications |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
535 | (90) |
|
|
537 | (4) |
|
|
538 | (1) |
|
|
539 | (1) |
|
|
540 | (1) |
|
|
540 | (1) |
|
|
540 | (1) |
|
|
540 | (1) |
|
The anatomy of a mail message |
|
|
541 | (5) |
|
|
542 | (1) |
|
|
543 | (3) |
|
|
546 | (4) |
|
|
547 | (2) |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
550 | (12) |
|
Getting mailing lists from files |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (2) |
|
|
555 | (2) |
|
The hashed alias database |
|
|
557 | (1) |
|
Mailing lists and list wrangling software |
|
|
557 | (3) |
|
LDAP: the Lightweight Directory Access Protocol |
|
|
560 | (2) |
|
sendmail: ringmaster of the electronic mail circus |
|
|
562 | (8) |
|
|
563 | (1) |
|
Vendor-supplied versions of sendmail |
|
|
564 | (1) |
|
|
565 | (1) |
|
|
566 | (1) |
|
|
566 | (2) |
|
|
568 | (2) |
|
|
570 | (3) |
|
Using the m4 preprocessor |
|
|
570 | (2) |
|
The sendmail configuration pieces |
|
|
572 | (1) |
|
Building a configuration file from a sample .mc file |
|
|
572 | (1) |
|
Basic sendmail configuration primitives |
|
|
573 | (4) |
|
|
574 | (1) |
|
|
574 | (2) |
|
|
576 | (1) |
|
|
576 | (1) |
|
Fancier sendmail configuration primitives |
|
|
577 | (11) |
|
|
577 | (1) |
|
|
578 | (1) |
|
|
578 | (1) |
|
The always_add_domain feature |
|
|
578 | (1) |
|
|
579 | (1) |
|
|
579 | (1) |
|
|
580 | (1) |
|
The genericstable feature |
|
|
581 | (1) |
|
The virtusertable feature |
|
|
581 | (1) |
|
|
582 | (1) |
|
Masquerading and the MASQUERADE_AS macro |
|
|
583 | (1) |
|
The MAIL_HUB and SMART_HOST macros |
|
|
584 | (1) |
|
|
585 | (1) |
|
|
585 | (1) |
|
The local_lmtp and smrsh features |
|
|
586 | (1) |
|
The local_procmail feature |
|
|
587 | (1) |
|
|
587 | (1) |
|
|
587 | (1) |
|
Configuration file examples |
|
|
588 | (7) |
|
A computer science student's home machine |
|
|
590 | (1) |
|
A small but sendmail-clueful company |
|
|
591 | (3) |
|
Another master/client example |
|
|
594 | (1) |
|
Spam-related features in sendmail |
|
|
595 | (12) |
|
|
597 | (2) |
|
|
599 | (2) |
|
Blacklisting users or sites |
|
|
601 | (1) |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
604 | (3) |
|
|
607 | (7) |
|
|
608 | (1) |
|
|
609 | (1) |
|
Safe mail to files and programs |
|
|
610 | (1) |
|
|
610 | (1) |
|
Running a chrooted sendmail (for the truly paranoid) |
|
|
611 | (1) |
|
Denial of service attacks |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
613 | (1) |
|
SASL: the Simple Authentication and Security Layer |
|
|
614 | (1) |
|
sendmail statistics, testing, and debugging |
|
|
614 | (4) |
|
|
615 | (1) |
|
|
615 | (2) |
|
|
617 | (1) |
|
|
617 | (1) |
|
|
618 | (5) |
|
|
618 | (1) |
|
|
619 | (2) |
|
|
621 | (1) |
|
|
622 | (1) |
|
|
623 | (2) |
|
Network Management and Debugging |
|
|
625 | (26) |
|
Troubleshooting a network |
|
|
626 | (1) |
|
ping: check to see if a host is alive |
|
|
627 | (2) |
|
traceroute: trace IP packets |
|
|
629 | (2) |
|
netstat: get tons o' network statistics |
|
|
631 | (5) |
|
Monitoring the status of network connections |
|
|
632 | (1) |
|
Inspecting interface configuration information |
|
|
633 | (1) |
|
Examining the routing table |
|
|
634 | (1) |
|
Viewing operational statistics for various network protocols |
|
|
635 | (1) |
|
|
636 | (3) |
|
snoop: Solaris's packet sniffer |
|
|
637 | (1) |
|
nettl: HP-UX's packet sniffer |
|
|
638 | (1) |
|
tcpdump: king of sniffers |
|
|
638 | (1) |
|
Network management protocols |
|
|
639 | (1) |
|
SNMP: the Simple Network Management Protocol |
|
|
640 | (2) |
|
|
640 | (1) |
|
|
641 | (1) |
|
RMON: remote monitoring MIB |
|
|
642 | (1) |
|
|
642 | (4) |
|
|
643 | (1) |
|
|
643 | (2) |
|
|
645 | (1) |
|
Network management applications |
|
|
646 | (3) |
|
|
646 | (1) |
|
MRTG: the Multi-Router Traffic Grapher |
|
|
647 | (1) |
|
NOCOL: Network Operation Center On-Line |
|
|
648 | (1) |
|
Commercial management platforms |
|
|
648 | (1) |
|
|
649 | (2) |
|
|
651 | (33) |
|
Seven common-sense rules of security |
|
|
652 | (1) |
|
How security is compromised |
|
|
653 | (2) |
|
Security problems in the/etc/passwd file |
|
|
655 | (3) |
|
Password checking and selection |
|
|
655 | (1) |
|
|
656 | (1) |
|
Group logins and shared logins |
|
|
657 | (1) |
|
|
657 | (1) |
|
|
657 | (1) |
|
|
657 | (1) |
|
|
658 | (1) |
|
Important file permissions |
|
|
659 | (1) |
|
Miscellaneous security issues |
|
|
660 | (3) |
|
|
660 | (1) |
|
|
660 | (1) |
|
/etc/hosts.equiv and ∼/.rhosts |
|
|
660 | (1) |
|
|
661 | (1) |
|
|
661 | (1) |
|
|
661 | (1) |
|
|
662 | (1) |
|
|
662 | (1) |
|
|
662 | (1) |
|
|
662 | (1) |
|
|
663 | (6) |
|
|
663 | (2) |
|
SAINT: check networked systems for vulnerabilities |
|
|
665 | (1) |
|
Nessus: next generation network scanner |
|
|
665 | (1) |
|
crack: find insecure passwords |
|
|
666 | (1) |
|
tcpd: protect Internet services |
|
|
666 | (1) |
|
COPS: audit system security |
|
|
667 | (1) |
|
tripwire: monitor changes to system files |
|
|
668 | (1) |
|
|
669 | (1) |
|
Cryptographic security tools |
|
|
669 | (6) |
|
Kerberos: a unified approach to network security |
|
|
670 | (1) |
|
|
671 | (1) |
|
|
672 | (2) |
|
SRP: Secure Remote Password |
|
|
674 | (1) |
|
OPIE: One-time Passwords in Everything |
|
|
674 | (1) |
|
|
675 | (3) |
|
Packet-filtering firewalls |
|
|
675 | (1) |
|
How services are filtered |
|
|
675 | (1) |
|
|
676 | (1) |
|
Stateful inspection firewalls |
|
|
677 | (1) |
|
Firewalls: how safe are they? |
|
|
677 | (1) |
|
Sources of security information |
|
|
678 | (2) |
|
CERT: a registered service mark of Carnegie Mellon University |
|
|
678 | (1) |
|
SecurityFocus.com and the BugTraq mailing list |
|
|
678 | (1) |
|
SANS: the System Administration, Networking, and Security Institute |
|
|
679 | (1) |
|
Vendor-specific security resources |
|
|
679 | (1) |
|
Other mailing lists and web sites |
|
|
680 | (1) |
|
What to do when your site has been attacked |
|
|
680 | (2) |
|
|
682 | (2) |
|
Web Hosting and Internet Services |
|
|
684 | (19) |
|
|
684 | (1) |
|
|
685 | (3) |
|
Uniform resource locators |
|
|
686 | (1) |
|
|
687 | (1) |
|
GGI scripting: generating content on the fly |
|
|
687 | (1) |
|
|
688 | (1) |
|
|
688 | (3) |
|
|
688 | (1) |
|
Compiling and installing Apache |
|
|
689 | (1) |
|
|
690 | (1) |
|
|
690 | (1) |
|
|
691 | (3) |
|
Configuring virtual interfaces |
|
|
692 | (2) |
|
Telling Apache about a virtual interface |
|
|
694 | (1) |
|
Caching and proxy servers |
|
|
694 | (2) |
|
|
695 | (1) |
|
Anonymous FTP server setup |
|
|
696 | (2) |
|
|
698 | (5) |
|
|
698 | (1) |
|
|
699 | (1) |
|
|
700 | (3) |
BUNCH O'STUFF |
|
|
|
703 | (41) |
|
Mini-glossary of printing terms |
|
|
704 | (1) |
|
|
705 | (2) |
|
Serial and parallel printers |
|
|
705 | (1) |
|
|
706 | (1) |
|
|
706 | (1) |
|
|
707 | (12) |
|
An overview of the printing process |
|
|
707 | (1) |
|
Controlling the printing environment |
|
|
708 | (1) |
|
lpd: the BSD print spooler |
|
|
709 | (1) |
|
|
709 | (1) |
|
lpq: view the printing queue |
|
|
709 | (1) |
|
|
710 | (1) |
|
lpc: make administrative changes |
|
|
710 | (2) |
|
|
712 | (1) |
|
|
713 | (4) |
|
printcap variables for serial devices |
|
|
717 | (1) |
|
|
718 | (1) |
|
Printing to something besides a printer |
|
|
719 | (1) |
|
|
719 | (9) |
|
|
719 | (1) |
|
|
719 | (1) |
|
A brief description of Ip |
|
|
720 | (1) |
|
lpsched and lpshut: start and stop printing |
|
|
721 | (1) |
|
lpadmin: configure the printing environment |
|
|
722 | (2) |
|
lpstat: get status information |
|
|
724 | (1) |
|
cancel: remove print jobs |
|
|
725 | (1) |
|
accept and reject: control spooling |
|
|
725 | (1) |
|
enable and disable: control printing |
|
|
726 | (1) |
|
|
726 | (1) |
|
|
726 | (1) |
|
What to do when the lp system is completely hosed |
|
|
727 | (1) |
|
|
728 | (7) |
|
Adding printers to Solaris |
|
|
729 | (2) |
|
|
731 | (1) |
|
Adding printers to Red Hat Linux |
|
|
732 | (2) |
|
Adding printers to FreeBSD |
|
|
734 | (1) |
|
|
735 | (4) |
|
|
735 | (1) |
|
Obtaining and installing LPRng |
|
|
736 | (1) |
|
/etc/lpd.conf: configure lpd |
|
|
737 | (1) |
|
/etc/lpd.perms: configure access control |
|
|
737 | (1) |
|
Setting up the printcap file |
|
|
738 | (1) |
|
|
738 | (1) |
|
|
738 | (1) |
|
Debugging printing problems |
|
|
739 | (1) |
|
|
740 | (1) |
|
|
740 | (1) |
|
|
740 | (1) |
|
|
740 | (1) |
|
|
740 | (1) |
|
|
741 | (3) |
|
|
741 | (1) |
|
Use banner pages only when necessary |
|
|
741 | (1) |
|
|
741 | (1) |
|
|
741 | (1) |
|
|
742 | (1) |
|
Keep extra toner cartridges on hand |
|
|
742 | (1) |
|
|
742 | (2) |
|
Maintenance and Environment |
|
|
744 | (10) |
|
|
744 | (1) |
|
|
745 | (1) |
|
|
745 | (1) |
|
|
746 | (1) |
|
|
746 | (1) |
|
|
746 | (1) |
|
|
746 | (1) |
|
|
747 | (1) |
|
|
747 | (1) |
|
|
747 | (1) |
|
|
748 | (1) |
|
|
749 | (2) |
|
|
749 | (1) |
|
|
749 | (1) |
|
|
749 | (1) |
|
|
749 | (2) |
|
|
751 | (1) |
|
|
751 | (1) |
|
|
752 | (1) |
|
|
752 | (1) |
|
|
753 | (1) |
|
|
754 | (15) |
|
What you can do to improve performance |
|
|
755 | (1) |
|
Factors that affect performance |
|
|
756 | (1) |
|
System performance checkup |
|
|
757 | (9) |
|
|
757 | (3) |
|
|
760 | (1) |
|
|
761 | (2) |
|
|
763 | (2) |
|
|
765 | (1) |
|
procifo: display Red Hat performance data |
|
|
765 | (1) |
|
pstat: print random FreeBSD statistics |
|
|
766 | (1) |
|
Help! My system just got really slow! |
|
|
766 | (2) |
|
|
768 | (1) |
|
|
769 | (9) |
|
|
769 | (4) |
|
NFS: the Network File System |
|
|
770 | (1) |
|
CIFS: the Common Internet File System |
|
|
770 | (1) |
|
|
770 | (1) |
|
Installing and configuring Samba |
|
|
771 | (2) |
|
|
773 | (1) |
|
Secure terminal emulation with SSH |
|
|
773 | (1) |
|
|
774 | (1) |
|
|
775 | (1) |
|
|
775 | (1) |
|
|
776 | (1) |
|
Running Windows applications under UNIX |
|
|
776 | (1) |
|
|
776 | (2) |
|
|
778 | (43) |
|
|
779 | (8) |
|
|
781 | (1) |
|
|
782 | (2) |
|
Sysadmin policy agreements |
|
|
784 | (1) |
|
Policy and procedures for emergency situations |
|
|
784 | (1) |
|
|
785 | (2) |
|
|
787 | (1) |
|
|
787 | (6) |
|
|
788 | (1) |
|
|
788 | (1) |
|
|
788 | (1) |
|
|
789 | (1) |
|
|
790 | (2) |
|
|
792 | (1) |
|
Spam: unsolicited commercial email |
|
|
792 | (1) |
|
|
793 | (2) |
|
|
793 | (1) |
|
|
794 | (1) |
|
|
795 | (1) |
|
Trouble-reporting systems |
|
|
796 | (1) |
|
|
797 | (1) |
|
Hiring, firing, and training |
|
|
797 | (3) |
|
|
799 | (1) |
|
|
799 | (1) |
|
|
799 | (1) |
|
|
800 | (5) |
|
|
800 | (1) |
|
|
801 | (1) |
|
Dan, your new name is Lester |
|
|
801 | (1) |
|
|
802 | (1) |
|
|
802 | (1) |
|
|
803 | (1) |
|
|
803 | (1) |
|
|
803 | (1) |
|
|
804 | (1) |
|
Localization and upgrades |
|
|
805 | (4) |
|
Managing software across systems |
|
|
805 | (1) |
|
|
806 | (2) |
|
Useful third-party software |
|
|
808 | (1) |
|
|
809 | (2) |
|
|
811 | (1) |
|
|
812 | (1) |
|
|
813 | (1) |
|
Organizations, conferences, and other resources |
|
|
814 | (3) |
|
SAGE: the System Administrators' Guild |
|
|
815 | (1) |
|
Mailing lists and web resources |
|
|
816 | (1) |
|
|
817 | (1) |
|
|
817 | (2) |
|
|
819 | (1) |
|
|
820 | (1) |
|
|
821 | (15) |
|
init: the primordial process |
|
|
822 | (1) |
|
|
823 | (1) |
|
|
823 | (4) |
|
|
824 | (1) |
|
|
825 | (1) |
|
|
826 | (1) |
|
|
826 | (1) |
|
portmap/rpcbind: map RPC services to TCP and UDP ports |
|
|
826 | (1) |
|
|
827 | (1) |
|
|
827 | (1) |
|
|
827 | (1) |
|
The filesystem synchronization daemon |
|
|
828 | (1) |
|
|
828 | (1) |
|
lpd: manage BSD-style printing |
|
|
828 | (1) |
|
lpsched: manage ATT printing |
|
|
828 | (1) |
|
rlpademon: print from BSD to HP-UX |
|
|
828 | (1) |
|
|
828 | (1) |
|
|
828 | (1) |
|
mountd: respond to mount requests |
|
|
829 | (1) |
|
amd and automount: mount filesystems on demand |
|
|
829 | (1) |
|
lockd and statd: manage NFS locks |
|
|
829 | (1) |
|
|
829 | (1) |
|
|
829 | (1) |
|
ypbind: locate NIS servers |
|
|
829 | (1) |
|
|
830 | (1) |
|
ypxfrd: transfer NIS databases |
|
|
830 | (1) |
|
|
830 | (1) |
|
|
830 | (3) |
|
talkd: network chat service |
|
|
830 | (1) |
|
comsat: notify users of new mail |
|
|
830 | (1) |
|
sendmail: transport electronic mail |
|
|
830 | (1) |
|
snmpd: provide remote network management service |
|
|
831 | (1) |
|
rwhod: maintain remote user list |
|
|
831 | (1) |
|
ftpd: the transfer server |
|
|
831 | (1) |
|
popper: basic mailbox server |
|
|
831 | (1) |
|
imapd: deluxe mailbox server |
|
|
831 | (1) |
|
rlogind: remote login server |
|
|
831 | (1) |
|
telnetd: yet another remote login server |
|
|
832 | (1) |
|
sshd: secure remote login server |
|
|
832 | (1) |
|
rshd: remote command execution server |
|
|
832 | (1) |
|
rexecd: yet another command execution server |
|
|
832 | (1) |
|
rpc.rexd: yet a third command execution server |
|
|
832 | (1) |
|
routed: maintain routing tables |
|
|
832 | (1) |
|
gated: maintain complicated routing tables |
|
|
832 | (1) |
|
|
833 | (1) |
|
syslogd: process log messages |
|
|
833 | (1) |
|
|
833 | (1) |
|
httpd: World Wide Web server |
|
|
833 | (1) |
|
Time synchronization daemons |
|
|
833 | (1) |
|
timed: synchronize clocks |
|
|
834 | (1) |
|
xntpd: synchronize clocks even better |
|
|
834 | (1) |
|
Booting and configuration daemons |
|
|
834 | (2) |
|
|
835 | (1) |
|
tftpd: trivial file transfer server |
|
|
835 | (1) |
|
rarpd: map Ethernet addresses to IP addresses |
|
|
835 | (1) |
|
bootparamd: advanced diskless life support |
|
|
835 | (1) |
|
dchpd: dynsmic address assignment |
|
|
835 | (1) |
Colophon |
|
836 | (1) |
Index |
|
837 | |