HostedDB - Dedicated UNIX Servers

Securing-Optimizing-RH-Linux-1_2_4
Comments and suggestions concerning this book should be mailed to gmourani@videotron.ca © Copyright 1999-2000 Gerhard Mourani and Open Network Architecture ® 4 Contents Introduction   9 Audience...................................................................................................................................................................9 These installation instructions assume................................................................................................................9 About products mentioned in this book................................................................................................................9 Obtaining the book and example configuration files..........................................................................................9 A note about the copyright...................................................................................................................................10 Acknowledgments .................................................................................................................................................11 GPG Public Key for Gerhard Mourani................................................................................................................11 Part I  Installation-Related Reference   12 Chapter 1  Introduction to Linux13 What is Linux? .......................................................................................................................................................14 Some good reasons to use Linux.......................................................................................................................14 Let's dispel some of the fear, uncertainty, and doubt about Linux................................................................14 Chapter 2  Installation of your Linux Server 16 Linux Installation 17 Know your Hardware!...........................................................................................................................................17 Creating the Boot Disk and Booting...................................................................................................................17 Installation Class and Method (Install Type).....................................................................................................18 Disk Setup (Disk Druid)........................................................................................................................................18 Components to Install (Package Group Selection)..........................................................................................23 Individual Package Selection..............................................................................................................................23 How to use RPM Commands ..............................................................................................................................27 Starting and stopping daem on services ............................................................................................................28 Software that must be uninstalled after installation of the Server .................................................................28 Software that must be installed after installation of the Server......................................................................31 Installed programs on your Server .....................................................................................................................33 Put some colors on your terminal .......................................................................................................................35 Update of the latest software’s ............................................................................................................................35 Part II  Security and optimization-Related Reference36 Chapter 3  General System Security37 Linux General Security 38 Chapter 4  General System Optimization 62 Linux General Optimization 63 Chapter 5  Configuring and Building a secure, optimized Kernels 76 Linux Kernel 77 Making an emergency boot floppy......................................................................................................................78 Securing the kernel ...............................................................................................................................................80 kernel configuration...............................................................................................................................................81 Installing the new kernel.......................................................................................................................................87 Delete program, file and lines related to modules............................................................................................89 Making a new rescue floppy................................................................................................................................90 Making a emergency boot floppy disk................................................................................................................90 Update your “/dev” entries ...................................................................................................................................91 Part III  Networking-Related Reference92