To access the contents, click the chapter and section titles.
Solaris Advanced System Administrator's Guide, Second Edition
(Imprint: Macmillan Technical Publishing)
(Publisher: Macmillan Computer Publishing)
Author: Janice Winsor
ISBN: 1578700396
- INTRODUCTION
- ACKNOWLEDGMENTS
- PART 1Mail Services
- CHAPTER 1Understanding Mail Services
- Mail Services Terminology
- Systems in a Mail Configuration
- Relay Host
- Gateway
- Mailhost
- Mail Client
- User Agent
- Mail Transport Agent
- Mailers
- Domains
- Mail Addressing
- Route-Based Addressing
- Route-Independent Addressing
- Mailbox
- Aliases
- Uses for Alias Files
- Syntax of Aliases
- Components of Mail Services
- The Mail Services Programs
- The sendmail Program
- The sendmail Configuration File (sendmail.cf)
- The sendmail Configuration Table
- .forward Files
- An Overview of the Mail Service
- The Anatomy of the Mail Service
- How the Mail Service Works
- How sendmail Works
- Argument Processing and Address Parsing
- Message Collection
- Message Delivery
- Queuing for Retransmission
- Return to Sender
- How Mail Addressing Works
- CHAPTER 2Planning Mail Services
- Local Mail Only
- Local Mail and a uucp Connection
- One Domain, Two Networks, and a Router
- Two Domains and a Gateway
- CHAPTER 3Setting Up and Administering Mail Services
- Preparing to Set Up Mail Services
- Setting Up Mail Services
- Setting Up a Mail Server
- Setting Up a Mail Client
- Setting Up a Mailhost
- Setting Up a Relay Host
- Setting Up a Gateway
- Creating Mail Aliases
- Setting Up NIS Alias Files
- Setting Up Local Mail Alias Files
- Setting Up DNS Alias Files
- Setting Up the Postmaster Alias
- Testing Your Mail Configuration
- Administering Your Mail Configuration
- Duties of Postmaster
- The Mail Queue
- Printing the Mail Queue
- Format of Queue Files
- Forcing the Queue
- Running the Old Mail Queue
- The System Log
- Troubleshooting Your Mail Configuration
- Checking Aliases
- Testing sendmail
- Verifying Connections to Other Systems
- Other Diagnostic Information
- CHAPTER 4Customizing sendmail Configuration Files
- Overview of sendmail Functions
- Interfaces to the Outside World
- Argument Vector/Exit Status
- SMTP over Pipes
- SMTP over a TCP Connection
- How the sendmail Program Works
- Argument Processing and Address Parsing
- Message Collection
- Message Delivery
- Retransmission Queuing
- Return to Sender
- Message-Header Editing
- Configuration File
- How sendmail Is Implemented
- Mail to Files and Programs
- Message Collection
- Message Delivery
- Queued Messages
- Configuration Overview
- Macros
- Header Declarations
- Mailer Declarations
- Name-Rewriting Rules
- Option Setting
- Introducing Arguments to sendmail
- Queue Interval
- Daemon Mode
- An Alternative Configuration File
- Tuning Configuration Parameters
- Time Values
- Queue Interval
- Read Timeouts
- Message Timeouts
- Delivery Mode
- Load Limiting
- Log Level
- File Modes
- setuid
- Temporary File Modes
- Aliases Database Permissions
- The Configuration File
- Parts of the sendmail Configuration File
- A Sample sendmail Configuration File
- Configuration File Syntax
- D and L (Define Macro)
- C, F, and G (Define Classes)
- O (Set Option)
- P (Precedence Definitions)
- T (Define Trusted Users)
- H (Define Header)
- Special Header Lines
- S and R (Rewriting Rules)
- M (Define Mailer)
- Address Rewriting Rules
- Special Macros, Conditionals
- Special Classes
- The Left Side
- Right-Side Address Rewriting Rules
- Semantics of Rewriting Rulesets
- The error Mailer
- Semantics of Mailer Descriptions
- Building a New Configuration File
- Domains and Policies
- How to Proceed
- Testing the Rewriting Rules--the -bt Flag
- Command-Line Arguments
- Configuration Options
- Mailer Flags
- PART 2NIS+
- CHAPTER 5Introducing the NIS+ Environment
- Comparison of NIS and NIS+
- The NIS+ Namespace
- Components of the NIS+ Namespace
- Directory Objects
- Domain Name Syntax
- Table Objects
- NIS+ Security
- NIS+ Authentication
- Access Rights
- The NIS+ Updating Model
- NIS and NIS+ Compatibility
- The Name Service Switch
- NIS+ Administration
- AdminSuite
- NIS+ Commands
- Table Information Display
- CHAPTER 6Setting Up NIS+ Clients
- Security Considerations
- Prerequisites
- Steps for Setting Up NIS+ Client Credentials
- Steps for Setting Up an NIS+ Client
- Verification of the Setup
- Verify That the Cache Manager Is Running
- Check the Contents of the /var/nis Directory
- Verify That the NIS+ Commands Succeed
- PART 3Automounter Services
- CHAPTER 7Understanding the Automounter
- NFS Terminology
- Server and Client Systems
- Mount Points
- The Virtual File System Table
- Mount and Unmount
- The Mount Table (/etc/mnttab)
- NIS+ Terminology
- Automount Terminology
- Automounter
- Automount Maps
- The Master Map
- Indirect and Direct Maps
- Automount Maps and Mount Points
- The Default Automount Maps
- The Master Map
- The Home Directory Map
- Indirect Maps
- Direct Maps
- Syntax and Shortcuts for Map Entries
- Specifying Multiple Servers
- Specifying Multiple Servers with the Same Path
- Specifying Weighting Factors for Each Server
- Using Map Variables
- How the Automounter Works
- How to Plan for Automounting
- Recommended Automounting Policies
- Prerequisites for Using the Automounter
- Servers and the Automounter
- Clients and the Automounter
- NIS+ Maps
- CHAPTER 8Setting Up the Automounter
- Setting Up Automount Server Systems
- Setting Up Automount Client Systems
- Displaying Information about NIS+ Automount Maps
- Displaying the Format of NIS+ Automount Maps
- Displaying the Contents of NIS+ Automount Maps
- Setting Up NIS+ Automount Maps
- Setting Up the auto_home Map
- Setting Up Indirect Maps
- Setting Up a Direct Map
- Setting Up the Master Map
- Administering NIS+ Automount Maps
- Modifying NIS+ Automount Maps
- Deleting Entries from NIS+ Automount Maps
- PART 4Service Access Facility
- CHAPTER 9Understanding the Service Access Facility
- Benefits of the SAF
- The SAF Daemons
- The SAF Commands
- SAF Architecture
- The init Process
- Service Access Controller
- Port Monitors
- The ttymon Port Monitor
- The listen Port Monitor
- Service Invocations
- Port Monitor States
- Operational States
- Transitional States
- Inactive States
- The Line Control Model
- The /etc/ttydefs File
- The terminfo Database
- The tput Utility
- The stty Command
- UUCP Files
- The /etc/uucp/Dialers File
- The /etc/uucp/Devices File
- SAF Log Files
- Reference to SAF Commands, Tasks, and Options
- Quick Reference to SAF Variables
- Quick Reference to Service Access Control (sacadm)
- Quick Reference to Port Monitor Administration (pmadm)
- Admintool: Serial Ports and SAF
- Templates
- Starting Admintool: Serial Ports
- CHAPTER 10Setting Up Modems and Character Terminals
- Tools for Setting Up Modems and Character Terminals
- Using Variables in SAF Commands
- The Port Monitor Tag (pmtag)
- The Service Tag (svctag )
- The Device Path (dev-path)
- The Baud Rate and Line Discipline (ttylabel)
- Type of Modem
- Comments
- Setting Up Modems
- Hardware Carrier Detect Setting
- Modem Connection and Switch Settings
- Hayes-compatible Modem Settings
- Variables Used to Set Up Modems
- SAF Configuration for Modems
- Dial-Out Modem Service Configuration
- Modem Connection Troubleshooting
- Using Admintool: Serial Ports to Configure Modems
- Setting Up the SAF for Character Terminals
- Terminal Connection
- SAF Configuration for Character Terminals
- Terminal Connection Troubleshooting
- Using Admintool: Serial Ports to Add a Character Terminal
- Initializing Ports Without Configuring
- Removing Port Services
- CHAPTER 11Setting Up Printing Services
- What's New in Printing
- Redesign of Print Packages
- Print Protocol Adaptor
- SunSoft Print Client
- Enhanced Network Printer Support
- Print Administration Tools in the Solaris 2.6 Environment
- Choosing a Method to Manage Printers
- System Requirements for a Print Server
- Printer Configuration Information
- Printer Device Name
- Printer Name
- Printer Port
- Printer Type
- File Content Type
- Print Filters
- Universal Address for the Print Server
- Printer Description (Optional)
- Default Printer (Optional)
- Local PostScript Printer Setup
- Print Server Setup
- Adding the listen Service
- Creating the listen Services
- Specifying the Print Client Systems
- Print Client Setup
- Using the SunSoft Print Client
- Printer Configuration Resources
- Submitting Print Requests
- Summary of the SunSoft Print Client Process
- Setting Up a Print Client by Using Admintool
- Setting Up a Local Printer by Using Admintool
- Printing Problems
- No Output (Nothing Prints)
- Check the Hardware
- Check the Network
- Check the LP Print Service
- How to Check and Start the Scheduler
- How to Enable Printers and Accept Print Requests
- How to Check the Port Connection
- How to Check Printer Configurations
- How to Check for Printer Faults on the Print Server
- How to Check Printing from a Solaris 2.x Client to a Solaris 2.x Print Server
- How to Check Printing from a Solaris 2.x Client to a SunOS 4.x Print Server
- Incorrect Output
- Check the Printer Type
- Check the stty Settings
- Check the Baud Settings
- Check the Parity Setting
- Check the Tab Settings
- Check the Return Setting
- Hung LP Print Service Commands
- Idle (Hung) Printers
- Check the Print Filters
- Check Printer Faults
- Check Network Problems
- Check for Jobs Backed Up in the Local Client Queue
- Check for Jobs Backed Up in the Remote Server Queue
- Conflicting Status Messages
- PART 5Application Software
- CHAPTER 12Installing and Managing Application Software
- Overview of Installing and Managing Application Software
- Using Package Commands
- Using Admintool
- Using Installation Scripts
- User Access to Applications
- Automating Your Application Environment
- Benefits of a Standardized Application Server Setup
- Benefits of a Standardized User Environment
- Using Wrapper Technology
- Wrappers and Dot Files
- Additional Wrapper Advantages
- Wrapper Overhead and Costs
- Introduction of Wrappers into an Existing Environment
- Designing an Application Server
- Server Configuration
- User Capacity
- Compatible Services
- Disk Allocation
- File System Configuration
- File System Sharing
- Installing and Configuring Packages
- Changes to the Default Package Version
- Developing Wrappers
- Interpreter Choice
- Wrapper Directory and Naming
- Command Name Evaluation
- Environment Variables
- Platform Evaluation
- Command Path Construction
- Exec/Argument Passing
- A Basic Wrapper
- Using a Common Command Directory
- Setting User Configurations
- Mount Points
- Mounts
- Path
- Migration Considerations
- Understanding Distribution Issues
- Licensing
- CD-ROM Mounts
- Using a Local CD-ROM Drive (Solaris 2.2 and Later System Software)
- Using a Local CD-ROM Drive (Solaris 2.0 or 2.1 System Software)
- Accessing Files from a Remote CD-ROM
- How to Share CD Files from a Remote CD-ROM Drive
- How to Access Shared CD-ROM Files
- How to Unmount Shared CD-ROM Files
- CHAPTER 13Package Commands
- Package Command-Line Utilities
- Setting Up Package Configuration Files
- Setting Up the Installation Base Directory
- Installing a Package with an Alternative Admin File
- Adding Packages
- Checking the Installation of a Package
- Listing Packages
- Removing Packages
- Package System Log File
- CHAPTER 14Admintool: Software Manager
- Starting Admintool
- Installing Software
- Accessing Files from a Local CD-ROM Drive
- Customizing Installation
- Beginning Installation
- Removing Software
- CHAPTER 15Installing and Managing System Software Patches
- Patch Distribution
- Requirements to Access Sun Patches
- Accessing Patches from the Web
- Accessing Patches by ftp
- Patch Numbering
- Installing a Patch
- Removing Patches
- PART 6Introduction to Shell Programming
- CHAPTER 16Writing ShellScripts
- Basic Concepts
- Introducing Bourne, Korn, and C Shells
- Bourne Shell
- Korn Shell
- C Shell
- Understanding How Shells Process Commands
- Naming Shell Scripts
- Identifying the Shell
- Making Scripts Executable
- Storing Shell Scripts
- Writing Shell Scripts: The Process
- Variables
- Shell Variables
- Displaying Variables from a Command Line
- Setting and Displaying Shell Variables
- Unsetting Shell Variables
- Stripping Filenames
- Korn Shell Path Stripping
- C Shell Path Stripping
- Built-In Shell Variables
- Environment Variables
- Input and Output
- Standard In, Standard Out, and Standard Error
- Command-Line Input
- Shifting Command-Line Arguments
- Interactive Input
- Here Documents
- Generating Output
- The Echo and Print Commands
- Quoting
- Command Substitution
- Testing for Conditions
- if-then-else-elif
- if-else-else if-endif
- Nested if Constructs
- Multi-Branching
- Controlling the Flow
- Using for/foreach Loops
- Using while Loops
- Using Until Loops
- Breaking Loops
- Exit Status
- Mathematical Operations
- User-Defined Functions
- Debugging Shell Scripts
- Using Debugging Flags
- Understanding Shell Parsing Order
- CHAPTER 17Reference Tables and Example Scripts
- Reference Tables
- Environment Files
- First Line of Script
- Korn Shell Path Operators
- C Shell Path Modifiers
- Variables Initialized by Shell
- Shell Built-In Commands
- Bourne and Korn Shell Redirection
- C Shell Redirection Metacharacters
- C Shell $argv Notation
- Quoting
- Metacharacter Shell Syntax
- Variable Shell Syntax
- I/O Redirection and Piping
- Printing to the Screen
- Reading from the Keyboard
- Math and Calculations
- Command Substitution
- Tilde Expansion
- Alias Syntax
- History Syntax
- Function Syntax
- Programming Statement Syntax
- Test and C Shell Built-In Test
- Bourne Shell Mathematical Operators
- C Shell Mathematical Operators
- Example Scripts
- Anonymous ftp Script
- arch.sh.fctn Function
- array.sh.fctn Function
- hostname.sh.fctn Function
- osr.sh.fctn Function
- whoami.sh.fctn Function
- PART 7System Security
- CHAPTER 18Understanding System Security
- New Security Features in the Solaris 2.6 Release
- Pluggable Authentication Module (PAM)
- Executable Stacks and Security
- Disabling Programs from Using Executable Stacks
- Disabling Executable Stack Message Logging
- Overview of System Security
- Maintaining Physical Site Security
- Maintaining Login and Access Control
- Restricting Access to Data in Files
- Maintaining Network Control
- Monitoring System Use
- Setting the Correct Path
- Monitoring setuid Programs
- Installing a Firewall
- Reporting Security Problems
- File Security
- User Classes
- File Permissions
- Directory Permissions
- Octal Values for Permissions
- Default umask
- File Types
- File Administration Commands
- Displaying File Information
- Changing File Ownership
- Changing Group Ownership of a File
- Changing File Permissions
- Special File Permissions (setuid, setgid, and Sticky Bit)
- setuid Permission
- setgid Permission
- Sticky Bit
- Searching for Files with Special Permissions
- Access Control Lists (ACLs)
- ACL Commands
- ACL Permissions for Files
- ACL Permissions for Directories
- Determining If a File Has an ACL
- Setting ACL File Permissions
- Setting Permissions for a File from a Command Line
- Using an ACL Configuration File to Set Permissions
- Adding and Modifying ACL Permissions
- Deleting an ACL Entry
- Copying ACL File Permissions
- Network Security
- Firewall Systems
- Authentication and Authorization
- Monitoring Login Security Information
- Displaying a User's Login Status
- Temporarily Disabling User Logins
- Saving Failed Login Attempts
- Sharing Files
- Restricting Superuser (root) Access
- Controlling and Monitoring Superuser Access
- Restricting Superuser Logins to the Console
- Monitoring Who Is Using the su Command
- Using Privileged Ports
- Automated Security Enhancement Tool (ASET)
- CHAPTER 19Using Authentication Services
- DES Encryption
- Diffie-Hellman Authentication
- How Diffie-Hellman Authentication Works
- Generating the Public and Secret Keys
- Running the keylogin Command
- Generating the Conversion Key
- First Contact with the Server
- Decrypting the Conversation Key
- Storing Information on the Server
- Verifier Returned to the Client
- Client Authenticates the Server
- Additional Transactions
- Administering Diffie-Hellman Authentication
- Secure RPC Commands
- Restarting the Keyserver
- Setting Up NIS+ Credentials for Diffie-Hellman Authentication
- Setting Up NIS Credentials for Diffie-Hellman Authentication
- Sharing and Mounting Files with Diffie-Hellman Authentication
- Kerberos Version 4
- How Kerberos Authentication Works with NFS
- Administering Kerberos Version 4 Authentication
- Acquiring a Kerberos Ticket for Superuser on a Client
- Sharing and Mounting Files with Kerberos Authentication
- Logging In to Kerberos Service
- Listing Kerberos Tickets
- Accessing a Directory with Kerberos Authentication
- Destroying a Kerberos Ticket
- The Pluggable Authentication Module (PAM) Framework
- PAM Module Types
- Stacking Feature
- Password-Mapping Feature
- How PAM Works
- PAM Library and Modules
- PAM Configuration File
- Valid Service Names
- Control Flags
- The required Flag
- The requisite Flag
- The optional Flag
- The sufficient Flag
- Planning for PAM
- Configuring PAM
- Preventing Unauthorized Access from Remote Systems with PAM
- Initiating PAM Error Reporting
- Adding a PAM Module
- CHAPTER 20Using Automated Security Enhancement Tool (ASET)
- ASET Tasks
- ASET Master Files
- ASET Security Levels
- How ASET Tasks Work
- System Files Permissions Verification
- System Files Checks
- User/Group Checks
- System Configuration Files Check
- Environment Check
- eeprom Check
- Firewall Setup
- ASET Execution Log
- ASET Reports
- Format of Report Files
- Examining and Comparing Report Files
- ASET Master Files
- Tune Files
- The uid_aliases File
- The Checklist Files
- ASET Environment File (asetenv)
- ASET Shell Environment Variables
- PERIODIC_SCHEDULE Variable
- TASKS Variable
- UID_ALIASES Variable
- YPCHECK Variable
- CKLISTPATH_level Variable
- Running ASET
- Running ASET Interactively
- Running ASET Periodically
- Stopping Running ASET Periodically
- Collecting Reports on a Server
- Restoring System Files Modified by ASET
- ASET Error Messages
BIBLIOGRAPHY
APPENDIX A
APPENDIX B
GLOSSARY
INDEX