\. \Local Settings\Temporary Internet Files\Content

Slides:



Advertisements
Similar presentations
Operating System.
Advertisements

Basic Unix system administration
Genesis: from raw hardware to processes System booting sequence: how does a machine come into life.
Chapter 9: Understanding System Initialization The Complete Guide To Linux System Administration.
Linux can be generally divided into four major components: 1. KERNEL – OS, ultimate boss The kernel is the core program that runs programs and manages.
Using tcpdump. tcpdump is a powerful tool that allows us to sniff network packets and make some statistical analysis out of those dumps. tcpdump operates.
Race Condition Zutao Zhu 10/09/09. Outline Race Condition –Some functions –File format of /etc/passwd and /etc/shadow –Input Redirection Format-string.
Linux+ Guide to Linux Certification, Second Edition Chapter 3 Linux Installation and Usage.
Chapter 12 File Management Systems
System Startup and Shutdown
Linux+ Guide to Linux Certification, Second Edition
Linux+ Guide to Linux Certification Chapter Three Linux Installation and Usage.
Booting and boot levels
System Startup & Shutdown Objectives –to interpret the Unix startup and shutdown configuration files –to be able to create a customised run level Contents.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Agenda Administrative Issues Link of the Week This Week’s Expected Outcomes Points of interest Moving around in UNIX Break-Out Problems Upcoming Deadlines.
Linux+ Guide to Linux Certification, Third Edition
..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j [1].jpg.
..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j [1].jpg.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
Week Eleven Agenda Link of the week Review week ten lab assignment Week ten expected outcomes Next lab assignment Break-out problems Upcoming deadlines.
Guide to Linux Installation and Administration1 Chapter 4 Running a Linux System.
Week Eleven Agenda Announcements Link of the week Review week ten lab assignment Week ten expected outcomes Next lab assignment Break-out problems Upcoming.
..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j [1].jpg.
Scis.regis.edu ● CS 468: Advanced UNIX Class 4 Dr. Jesús Borrego Regis University 1.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Linux Security. Module 13 – Linux Security ♦ Overview Linux is more prone today to security loopholes and attacks, both inside and outside the network.
..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j [1].jpg.
1 Lecture 6 Introduction to Process Management COP 3353 Introduction to UNIX.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Process Description and Control Chapter 3. Source Modified slides from Missouri U. of Science and Tech.
System Administration. Logging in as System Administrator System Admin login (aka superuser, aka root) –login id: root –Default PS1 prompt: # –Home directory:
Agenda Administrative Issues Link of the Week This Week’s Expected Outcomes Points of interest Moving around in UNIX Break-Out Problems Upcoming Deadlines.
Genesis: From Raw Hardware to Processes Andy Wang Operating Systems COP 4610 / CGS 5765.
..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j [1].jpg.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j [1].jpg.
..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j [1].jpg.
..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j [1].jpg.
Thousands of Linux Installations (and only one administrator) A Linux cluster client for the University of Manchester A V Le Blanc I T Services University.
System Administration Startup Process. Why Care? ● Every process on your system comes about by following a specific chain of events from the machine startup.
Introduction to Kernel
SYSTEM ADMINISTRATION PART I by İlker Korkmaz and Kaya Oğuz
Chapter Objectives In this chapter, you will learn:
Processes and threads.
Instructor: Robert D’Andrea
Process Management Process Concept Why only the global variables?
Chapter 3: Process Concept
Boots Cassel Villanova University
Operating System.
Chapter 11: Managing Users
Chapter 2: System Structures
\. \Local Settings\Temporary Internet Files\Content
IS3440 Linux Security Unit 3 User Account Management
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Structure of Processes
Lecture 2: Processes Part 1
Chapter 2: The Linux System Part 2
Chapter 2: System Structures
Genesis: From Raw Hardware to Processes
Process Description and Control
SUSE Linux Enterprise Desktop Administration
LINUX SYSTEM ADMINISTRATION
Chapter 2: Operating-System Structures
Controlling Processes
Chapter 3: Processes.
Chapter 2: Operating-System Structures
Lecture 6 Introduction to Process Management
Presentation transcript:

\. \Local Settings\Temporary Internet Files\Content ..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Week Ten Agenda Announcements Link of the week Review supplemental information Review week nine lab assignment Week ten expected outcomes Next lab assignment Break-out problems Upcoming deadlines Lab assistance, questions, and concerns

Link of the week Protocol Directories http://www.protocols.com/pbook/ This site provides a break down of TCP/IP, VoIP, Cellular, and general protocols. Full directory listing of protocols. http://www.javvin.com/protocolsuite.html Network Protocol Suite Directory and Index Sites contains software, books, tools, and services. Network communication is defined by network protocols. Define: Network Protocol

Link of the week What type of things are determined by a network protocol? Type of error checking to be used. Data compression method to be used. How the sending device will indicate that it has finished sending a message. How the receiving device will indicate that it has received a message.

Supplemental Information Network daemon – Linux uses xinetd to monitor all configured ports and starts system resources usage only on-demand, since the daemons aren’t running all the time. Security and resource usage is the main objective.. Chroot jail – Utilized by Linux and UNIX OS to create an artificial root directory. Creating a temporary root directory prevents a program from accessing or modifying files outside the directory hierarchy starting at its root. Chroot affects only the current process and its child processes. The files need to be placed in the jail directory (such as /users) in directories that mimic their placement in the root (/) file system. So you need to copy all required files. For example, /usr/bin/rssh is located on / file system. If your jail is located at /users, then copy /usr/bin/rssh to /users/usr/bin/rssh.

Supplemental Information SELinux developed by the U.S. National Security Agency (NSA), implements Mandatory Access Control (MAC) in the Linux kernel. MAC enforces security policies that limit what a user or program can do. It defines a security policy that controls some or all objects, such as files, devices, sockets, and ports, and some subjects like processes. Utilizing SELinux, you can grant a process only those permissions it needs to be functional. TCP Wrapper is part of the client/server model, and can be used with any daemon that is linked against libwrap.a, and relies on the /etc/hosts.allow and /etc/hosts.deny files as the basis of a simple access control language. This access control language defines rules that selectively allow clients to access server daemons on a local system based on the client’s address and the daemon the client tries to access.

Supplemental Information iptables utility that builds and manipulates network packet filtering rules in the Linux kernel. You can use iptables to create a firewall that protects a system from outside intruders.

Review week nine lab assignment Physical Link ln small_passwd small_passwd_hard -rwx---r-x 2 dandrear faculty 402 Mar 1 10:43 small_passwd -rwx---r-x 2 dandrear faculty 402 Mar 1 10:43 small_passwd_hard A physical link provides an additional path to the data. Most all file name entries in a directory are hard links.

Review week nine lab assignment Symbolic Link ln –s small_passwd small_passwd_soft lrwxrwxrwx 1 dandrear faculty 12 Mar 7 12:22 small_passwd_soft -> small_passwd Provide an additional path to the data. Symbolic links allow data to be referenced across different file systems (no restrictions).

Review week nine lab assignment “Initializing” or “booting” the machine The startup process of a computing system is the installation of software. Many pieces of the software are configured into subsystems and are interdependent upon each other. Both Red Hat Linux and Solaris are based on the UNIX System V boot up procedure. Steps involved in the boot procedure CPU mode is set to RESET CPU is pre-programmed to begin execution at hex address 0Xfffffff0. Address 0Xfffffff0 is mapped to ROM (Read Only Memory). This ROM (BIOS ) address contains a set of routines that are burnt on the chip.

Review week nine lab assignment The I/O routines on the BIOS continue the boot process by reading Track 0, Sector 1 of the hard disk. This is the location of the Master Boot Record (MBR). The size of the MBR is 512 bytes. The MBR contains the disk partition tables, and executable code which is the first part of the boot loader. The MBR is independent of the kernel. In a Linux system, most modern boot loaders (such as LILO or GRUB), users can change which process the kernel spawns at the end of its initialization from the normal default of /sbin/init (file /sbin/init). The boot loader is responsible for loading the kernel into memory. Boot loaders are independent of the operating system and are executable code found inside the MBR. The boot loader must share the 512 bytes with the partition table.

Review week nine lab assignment Linux initrd (kernel ramdisk) brw-rw---- 1 root disk 1, 250 Jun 24 2004 initrd When Unix was written 30 years ago, one unusual design feature was that every physical device connected to the computer was represented as a file. There are differences between devices that is apparent. Disk devices are random-access, and others like terminals are sequential-access. A practical difference is that filesystems can only be mounted on block devices, not on character ones. For example, tapes are character devices. It is possible to copy the contents of a raw, quiescent (unmounted and not being modified) filesystem to a tape, but you will not be able to mount the tape, even though it contains the same information as the disk.

Review week nine lab assignment initrd provides the capability to load a RAM disk by the boot loader. This RAM disk can then be mounted as the root filesystem and programs can be run from it. Afterwards, a new root file system can be mounted from a different device. The previous root (from initrd) is then moved to a directory and can be subsequently unmounted.

Review week nine lab assignment The RAM disk image is loaded into memory. The initrd contains a set of hardware drivers that are used to boot the system. Once the drivers have been loaded, execution is turned over to the kernel. The kernel then executes a series of steps. - Memory size determination - Data Structure Initialization - Mount root partition - Hardware Configuration Kernel configures information based on probing the system bus, and querying drivers for information. Devices that are missing drivers are considered disabled. - Hand crafted/Spontaneous processes.

Review week nine lab assignment Linux Kernel Data Structure (task_struct) The task_struct data structure contains the following fields: - Process state running returning from system call processing an interrupt routine processing a system call ready waiting - Processes priority - Clock ticks (10ms intervals) which the process can continue executing without forced rescheduling. - Error number of the last faulting system call - Describe a processes: original parent, parent, youngest child, younger sibling, and finally older sibling. - Process ID - Timing information; for example, the amount of time the process has spent in user mode.

Review week nine lab assignment The Linux kernel process table is a data structure that describes all processes that currently exist. The process table is implemented as an array of pointers to task structures. The kernel process table is limited in size to 512 entries.

Review week nine lab assignment

Review week nine lab assignment

Review week nine lab assignment

Review week nine lab assignment init process The kernel starts a few spontaneous/handcrafted processes in the user space. The origin of the init process is from the kernel and not the fork and execute procedure. The init process has Process ID (PID) of one (1). The init process is the ultimate parent in the running system and plays an important role in the startup process. All future processes on the system are descendents of the init process. Once the system processes are created, then the kernels work is basically completed The init process performs the following tasks: Executions the /etc/rc.d/rc.sysinit script Sets the system clock Activates the paging process Starts the RAID devices Check and mounts other file systems Executes the /etc/inittab script Execution of run commands Switch to multi user mode After the run commands (rc) have executed, the system is fully operational.

Review week nine lab assignment init process It looks for the file /etc/inittab to see if there is an entry of the type initdefault. The initdefault entry determines the initial run level of the system. init login process 1. Init process spawns the getty or minigetty process 2. The getty process invokes the login process. After the user name has been entered, it is passed to the login process . 3. The login process prompts the user for a user password, and verifies it. If authentication is successful, the user’s shell is created. Otherwise, a failure causes an error message, ends and then init process will respawn getty or minigetty. 4. The user’s preferred shell will be invoked creating a session. Eventually, the user will logout.

Review week nine lab assignment

Review week nine lab assignment In UNIX, a process is a name given to a program being executed by the operating system. In Linux, that same program is referred to as a task or process. Linux considers both names as the same. A process consist of: - Program code, data, and stack - Open files (stdin, stdout, stderr) - System data structures - Environment (terminal type, user login directory) A Linux system will share code and system libraries among processes so that memory can be conserved and only keep one copy of the code is in memory at a time. Each Linux process is allocated a unique process identifier (PID). The range of PIDs is usually between 2 and 32,768.

Review week nine lab assignment Process A process can be terminated in a couple of ways: - Foreground process by typing Ctl-C or Ctl-Z - Background process with PID=n and typing kill -n Zombie Process A child process that terminates before its parent but still has an entry in the process table. This entry still needs to allow the process that started the zombie process to read its exit status. Orphan Process Is a process that is still executing, but whose parent has died. An orphan process is eventually adopted by the init process.

Review week nine lab assignment Process Processes go through various process states during their existence. These transitory states are managed by the operating system (OS). The specifics of these process states vary from one OS to another, as well as the state names. Process states: Created (fork and exec) Waiting (process scheduler - load from secondary storage to main memory) Running (after a process is assigned a processor by a short – term scheduler, context switch is performed) Blocked (waiting for resources - user input or secondary storage input. Then process is moved back to “waiting” state) Terminated (finished execution, waits to be removed from main memory)

Review week nine lab assignment Process Summary In Unix-like operating systems, the kernel is invoked when a process issues a system call. All processes have owners. Processes transition through various states. When an original process (parent) creates or spawns another processes (child), it inherits the file access and execution privileges belonging to the parent.

Review week nine lab assignment Thread Definition: The amount of work performed by a process or task. - A single threaded process is a process only performs one task. - A multi-threaded process is a process that performs multiple tasks concurrently without incurring additional overhead needed to create a new process.

Review week nine lab assignment System run levels 0 - Halt system 1 - System maintenance 2 – Multi-user mode 3 - Remote file sharing state 4 – unused 5 - X11 (X Window System for graphical desktop environment) 6 - Shutdown Shutdown command The shutdown command brings the system down in a graceful manner. This is the preferred way to shutdown your computer at the end of the day as it logs you out of the computer, clears the system memory of any errors that have developed over the course of the day, and leaves the machine ready for you to login immediately the next day. It also allows any needed updates to install automatically over the course of the night.

Review week nine lab assignment One commonly issued form of this command is shutdown -h now, which will shut down a system immediately. Another one is shutdown -r now to reboot. Another form allows the user to specify an exact time or a delay before shutdown: shutdown -h 20:00 will turn the computer off at 8:00 PM, and shutdown -r -t 60 will automatically reboot the machine within 60 seconds (one minute) of issuing the command. The complete syntax of the Linux version of the command is: usage: shutdown [-akrhfnc] [-t secs] time [message] -a use /etc/shutdown.allow -k don't really shutdown, only warn -r reboot after shutdown -h halt after shutdown -f do a 'fast' reboot (skip fsck) -F force fsck on reboot -n do not go through "init" but go down real fast -c cancel a running shutdown -t secs delay between warning and kill signal Caveat: The command kill sends the specified signal to the specified process or process group. As a precaution, avoid indiscriminate use of the kill command on jobs involving text editors, databases programs, mail programs, or any other program that has a large amount of user interaction. The kill command terminates a job without saving any of the user input or program results.

Week ten, eleven, twelve expected outcomes Upon successful completion of this module, the student will be able to: Manipulate user accounts. Describe how cron is used to invoke repetitive processes. Manipulate process structure including: A. fork/execute, B. Initialization process, C. Background/foreground, D. PS tool. Explain basic UNIX security issues. Describe disk and file system structure. Use backup and restore archival operations on a system. Establish network services. Investigate the structure of the LDAP directory using LDAP commands.

Next Lab Assignment Password File Location: /etc/passwd Field separators: Colon (:) File format: Username:Password:UID:GID:UserID:Home directory:Command/shell Example: dandrear:x:1020:1021:dandrear user:/export/home/dandrear:/bin/bash Permissions on Einstein: -rw-r--r-- 1 root root 1636 Aug 16 10:37 /etc/passwd

Next Lab Assignment Password File Username: It is used when user logs in. It should be between 1 and 32 characters in length. Password: An x character indicates that encrypted password is stored in /etc/shadow file. User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further UID 100-999 are reserved by system for administrative and system accounts/groups. Group ID (GID): The primary group ID (stored in /etc/group file) User ID Info: The comment field. It allow you to add extra information about the users such as user’s full name, phone number etc. This field use by finger command. Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes / Command/shell: The absolute path of a command or shell (/bin/bash). Typically, this is a shell. Please not it does not have to be a shell.

Next lab assignment Shadow File Location: /etc/shadow Field separators: Colon (:) File format: username:passwd:lastpasswdch:min:max:warn:inactive:expire:unused Example: dandrear:$1$dhBysgdhfteM9gd00:13064:0:99999:7::: Permissions on Einstein: -r-------- 1 root root 1107 Sep 5 15:24 /etc/shadow (Permission denied)

Next lab assignment Shadow File User name : It is your login name Password: It your encrypted password. The password should be minimum 6-8 characters long including special characters/digits Last password change (last changed): Days since Jan 1, 1970 that password was last changed Minimum: The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password Maximum: The maximum number of days the password is valid (after that user is forced to change his/her password) Warn : The number of days before password is to expire that user is warned that his/her password must be changed Inactive : The number of days after password expires that account is disabled Expire : days since Jan 1, 1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used Unused field:

Next lab assignment Group File Location: /etc/group Field separators: Colon (:) File format: Group name:Password:GID:User_list Example: faculty:x:410: staff:x:430: Permissions on Einstein: -rw-r--r-- 1 root root 833 Aug 16 10:37 group

Next lab assignment Group File Group name: Name of the group. Password: The group password would be encrypted. If this field is empty, no password is needed. GID: The numerical group ID and/or unique group identifier. User_list: All the group member's user names, separated by commas.

Next lab assignment

Next lab assignment

Next lab assignment

Next lab assignment

Break-out problems simple_script & What is a zombie process? What files are updated on a Linux system when a new user is added? sleep 10 What information is stored in the /etc/passwd file? What information is stored in the /etc/shadow file? What information is stored in the /etc/group file? What is a background process? What is a foreground process? What is an orphan process? nice command init process

Upcoming deadlines Startup/Shutdown Exercise, 9-1 is due July 5, 2009. Account/LDAP Script, 10-1 is due July 12, 2009. Process, 10-2 is due July 12, 2009. Knoppix File System Exercise, 11-1 is due July 19, 2009. Programming Assignment 2, 12-1 is due July 26, 2009. Archives Exercise, 12-2 is due July 26, 2009. Presentations for Public Domain/Open Source Lab Assignment 13-1 will be July 27 and August 3, 2009. Programming Assignment 3, 14-1 is due August 8, 2009. Final Exam, 15-1 will be administered August 3 – 8, 2009. Final Exam Outline will be posted on the Bulletin Board July 19, two weeks prior to the final exam date. This outline will be considered a “living” document. I will add additional information to it up to one week prior to the exam. All additional information posted after the initial posting will be highlighted/indicated.

Lab assistance, questions and answers Comments Concerns I will be available after this Franklin Live session to discuss any problems and/or concerns regarding lab assignments.