Securing-Optimizing-RH-Linux-1_2_4
Comments and suggestions concerning this book should be mailed to gmourani@videotron.ca
© Copyright 1999-2000 Gerhard Mourani and Open Network Architecture ®
4
Contents
Introduction 9
Audience...................................................................................................................................................................9
These installation instructions assume................................................................................................................9
About products mentioned in this book................................................................................................................9
Obtaining the book and example configuration files..........................................................................................9
A note about the copyright...................................................................................................................................10
Acknowledgments .................................................................................................................................................11
GPG Public Key for Gerhard Mourani................................................................................................................11
Part I Installation-Related Reference 12
Chapter 1 Introduction to Linux13
What is Linux? .......................................................................................................................................................14
Some good reasons to use Linux.......................................................................................................................14
Let's dispel some of the fear, uncertainty, and doubt about Linux................................................................14
Chapter 2 Installation of your Linux Server 16
Linux Installation
17
Know your Hardware!...........................................................................................................................................17
Creating the Boot Disk and Booting...................................................................................................................17
Installation Class and Method (Install Type).....................................................................................................18
Disk Setup (Disk Druid)........................................................................................................................................18
Components to Install (Package Group Selection)..........................................................................................23
Individual Package Selection..............................................................................................................................23
How to use RPM Commands ..............................................................................................................................27
Starting and stopping daem on services ............................................................................................................28
Software that must be uninstalled after installation of the Server .................................................................28
Software that must be installed after installation of the Server......................................................................31
Installed programs on your Server .....................................................................................................................33
Put some colors on your terminal .......................................................................................................................35
Update of the latest softwares ............................................................................................................................35
Part II Security and optimization-Related Reference36
Chapter 3 General System Security37
Linux General Security
38
Chapter 4 General System Optimization 62
Linux General Optimization
63
Chapter 5 Configuring and Building a secure, optimized Kernels
76
Linux Kernel
77
Making an emergency boot floppy......................................................................................................................78
Securing the kernel ...............................................................................................................................................80
kernel configuration...............................................................................................................................................81
Installing the new kernel.......................................................................................................................................87
Delete program, file and lines related to modules............................................................................................89
Making a new rescue floppy................................................................................................................................90
Making a emergency boot floppy disk................................................................................................................90
Update your /dev entries ...................................................................................................................................91
Part III Networking-Related Reference92