1 Advanced Unix Administrative Tools. 2 VMWare Image Setup We all need to check out the VMWare FC6 image that you’ll be using We all need to check out.

Slides:



Advertisements
Similar presentations
POS/420 Philip Robbins – March 19, 2013 (Week 2) University of Phoenix Mililani Campus Introduction to Unix.
Advertisements

1. Reasons for logging on as a root •Most people are familiar with Windows systems with regard to administrative privileges. Many user running windows.
Linux Users and Groups Management
Basic Unix system administration
Operating Systems for Administrators Instructor: Mr. Ahmed Al Astal ITGD4104 Department Requirement for senior student University of Palestine Faculty.
Advanced Workgroup System. Printer Admin Utility Monitors printers over IP networks Views Sharp and non-Sharp SNMP Devices Provided Standard with Sharp.
Introduction to Unix GLY 560: GIS for Earth Scientists Class Home Page:
Chapter 2 Accessing Your System and the Common Desktop Environment.
Lesson 22 – Introduction to Linux Systems Administration.
UNIX Chapter 00 A “ Quick Start ” into UNIX Operating System Mr. Mohammad Smirat.
1 Some basic Unix commands u Understand the concept of loggin into and out of a Unix shell u Interact with the system in a basic way through keyboard and.
Linux Shell. 2 Linux Command-Line Interface ■ Linux shells: A shell is a command interpreter that allows you to type commands from the keyboard to interact.
L INUX C OMMAND L INE I NTERFACE G UNAANBAN.G
Linux Operations and Administration
1. This presentation covers :  User Interface Administration  Files System and Services Management 2.
1 Web Server Administration Chapter 3 Installing the Server.
Chapter 9 Part II Linux Command Line Access to Linux Authenticated login using a Linux account is required to access a Linux system. The Linux prompt will.
POS/420 Introduction to Unix Philip Robbins – March 12, 2013 (Week 1)
Beams Division Local Administrators Meeting 9/17/02 Brian Drendel.
Introduction to Unix Administration Objectives –to identify the basic concepts of Unix administration Contents –history of Unix –unix vendors and standards.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Unix System Administration Rootly Powers Chapter 3.
CIS 191 – Lesson 2 System Administration. CIS 191 – Lesson 2 System Architecture Component Architecture –The OS provides the simple components from which.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
CENT 305 Information Systems Security Linux Introduction.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
Chap 1 ~ Introducing LINUX LINUX is a free-stable multi-user operating system that derives from UNIX operating system Benefits: 1) Linux is released under.
Chapter 2: Getting Started Logon to Logout. In this chapter … Logging on The Shell Superuser Getting Help Logging off.
UNIX and Shell Programming (06CS36) Unit 1 Continued… Shrinivas R. Mangalwede Department of Computer Science and Engineering K.L.S. Gogte Institute of.
CS 390 Unix Programming Summer Unix Programming - CS 3902 Course Details Online Information Please check.
Guide to Linux Installation and Administration, 2e1 Chapter 7 The Role of the System Administrator.
CS 390 Unix Programming Environment Summer Suchindra Rengan - CS3902 Course Details Instructors Suchindra Rengan – ‘sachin’ ( Section 001)
UNIX Commands. Why UNIX Commands Are Noninteractive Command may take input from the output of another command (filters). May be scheduled to run at specific.
Agenda Link of the week Use of Virtual Machine Review week one lab assignment This week’s expected outcomes Review next lab assignments Break Out Problems.
Chapter 0 A “Quick-Start” into the UNIX Operating System.
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
A Practical Guide to Fedora and Red Hat Enterprise Linux Unit 9: Basic Linux Administration Chapter 11: System Administration: Core Concepts Chapter 16:
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Introduction to Programming Using C An Introduction to Operating Systems.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Week Two Agenda Announcements Link of the week Use of Virtual Machine Review week one lab assignment This week’s expected outcomes Next lab assignments.
Lesson 3-Touring Utilities and System Features. Overview Employing fundamental utilities. Linux terminal sessions. Managing input and output. Using special.
Manually Creating a New User Account Presented by Carl South.
1 Terminology. 2 Requirements for Network Printing Print server Sufficient RAM to process documents Sufficient disk space on the print server.
CS 245 – Part 1 Using Operating Systems and Networks for Programmers Jiang Guo Dept. of Computer Science California State University Los Angeles.
Introduction to UNIX CS 2204 Class meeting 1 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
SCSC 455 Computer Security Chapter 3 User Security.
Module 1 - Introduction to Linux. Users must log-in Linux is case sensitive File and Directories naming conventions (No spaces!) Files and Directories.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
The Kernel At a high level, the kernel in an operating system serves as the bridge between applications and the actual data processing of the hardware.
A Mini UNIX Tutorial. What’s UNIX?  An operating system run on many servers/workstations  Invented by AT&T Bell Labs in late 60’s  There are many different.
June 1, 1999UNIX - Basic Environment1 Introduction to UNIX A. Basic Environment.
Basic UNIX system administration CS 2204 Class meeting 14 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright
Chap 1 ~ Introducing LINUX LINUX is a free-stable multi-user operating system that derives from UNIX operating system Benefits: 1) Linux is released under.
Using Linux Kaya Oğuz Room: 310.
A “Quick-Start” into the UNIX Operating System
Chapter 11: Managing Users
9 Linux on the Desktop.
Ubuntu Working in Terminal
Users and Accounts Lab 0.1. Users and Accounts Lab 0.1.
UNIX and Shell Programming (06CS36)
Rootly Powers Chapter 3.
UNIX and Shell Programming (06CS36)
Adding New Users.
Presentation transcript:

1 Advanced Unix Administrative Tools

2 VMWare Image Setup We all need to check out the VMWare FC6 image that you’ll be using We all need to check out the VMWare FC6 image that you’ll be using Login as rootLogin as root Password should be “thoughtpolice”Password should be “thoughtpolice” Now create a non-root account for yourself:Now create a non-root account for yourself: adduser adduser Create a password:Create a password: Passwd Passwd

3 Administrative Tools Superuser root Superuser root Unrestricted accessUnrestricted access Become a superuserBecome a superuser Log in to root Log in to root Use su or su – Use su or su – Inherits the env from current shellInherits the env from current shell Only use superuser when it is neededOnly use superuser when it is needed Change root password periodicallyChange root password periodically Employment status change for SA Employment status change for SA Unauthorized access Unauthorized access

4 Administrative Tools Always lock your screenAlways lock your screen Use xlock or simply log off Use xlock or simply log off Controlling su accessControlling su access System V System V BSD – member’s of group 0 BSD – member’s of group 0 Linux – GNU su does not check membership of group 0 Linux – GNU su does not check membership of group 0 Run a command with su same timeRun a command with su same time su root –c “command” su root –c “command”

5 Administrative Tools Facility sudo Facility sudo Selective accessSelective access Allow some user to run specific commands as root without having to know the root passwordAllow some user to run specific commands as root without having to know the root password RUN sudo command RUN sudo command Type in user’s own passwordType in user’s own password Good for a configurable time, default 5 minutesGood for a configurable time, default 5 minutes Configuration file /etc/sudoersConfiguration file /etc/sudoers Users Users Commands Commands Format Format Users host=commands

6 Administrative Tools More about Facility sudo More about Facility sudo Select the commands for sudo with careSelect the commands for sudo with care No shell scripts No shell scripts No utility which provides shell escapes No utility which provides shell escapes Editor visudoEditor visudo Lock Lock Syntax checking Syntax checking

7 Quick Sudo Lab As a normal user type the following: As a normal user type the following: /bin/cat /etc/sudoers Now try the following: Now try the following: sudo /bin/cat /etc/sudoers Now add the following to /etc/sudoers Now add the following to /etc/sudoers ALL=/bin/cat /etc/sudoers ALL=/bin/cat /etc/sudoers Now try step 2 again… Now try step 2 again…

8 Administrative Tools Advantages of sudoAdvantages of sudo Command logging - accountabilities Command logging - accountabilities Operators can do chores Operators can do chores Hide the real root password Hide the real root password Revoke the privilege without changing the root password Revoke the privilege without changing the root password A list of users with privileged access is maintained A list of users with privileged access is maintained Less chance of root shell left unattended Less chance of root shell left unattended

9 Administrative Tools Disadvantages of sudoDisadvantages of sudo Breach in security of a personal account can equal a compromise of the root account Breach in security of a personal account can equal a compromise of the root account Logging can be subverted Logging can be subverted sudo csh sudo csh sudo su sudo su

10 Administrative Tools Communicating with Users Communicating with Users Command writeCommand write write username [tty] write username [tty] only talks on local systemonly talks on local system Ctrl–D ends the write session it Ctrl–D ends the write session it Replying with write will create a two-way communication Replying with write will create a two-way communication Command talk or ytalkCommand talk or ytalk Must have a daemon listening Must have a daemon listening Separate window for sender and receiver Separate window for sender and receiver To refuse write, talk and ytalk requestsTo refuse write, talk and ytalk requests Use the command mesg n or y Use the command mesg n or y Default is n Default is n Root account overrides the setting Root account overrides the setting

11 Administrative Tools More about Communicating with Users More about Communicating with Users Sending message to allSending message to all Command = wall Command = wall Very useful for system announcements Very useful for system announcements “System going down. Save your work and logoff” The message of the DayThe message of the Day /etc/motd /etc/motd /etc/issue /etc/issue /etc/issue.net /etc/issue.net

12 Administrative Tools Administration tools Administration tools Examples:Examples: Digital Unix: SETUP Digital Unix: SETUP HP-UX: SAM HP-UX: SAM Solaris: admintool Solaris: admintool GoodGood Quick start to system administration Quick start to system administration Mask the raw commandsMask the raw commands Easy: combine several steps Easy: combine several steps DownsideDownside The command prompt is ususally faster The command prompt is ususally faster Not all commands available through menu Not all commands available through menu Slow down the learning process Slow down the learning process

13 Administrative Tools HP-UX’s SAM HP-UX’s SAM Perform a variety of system management tasksPerform a variety of system management tasks System configuration System configuration Change a parameter Change a parameter File system management File system management … Detailed loggingDetailed logging

14 Administrative Tools Admin tools for Linux Admin tools for Linux LinuxconfLinuxconf WebminWebmin Yet Another System Tool (YaST)Yet Another System Tool (YaST)

15 Manuals Unix has two types Unix has two types Man pagesMan pages Individual commands Individual commands For format For format Routines Routines Supplemental documentsSupplemental documents Printed Printed online from Internet online from Internet DVD/CDROM DVD/CDROM RFCs (Request for Comments) for protocols, standards used on the Internet RFCs (Request for Comments) for protocols, standards used on the Internet

16 Organization of man pages Solaris/ HP-UX LinuxContents 11 User-level commands and applications 22 System calls and kernel error 33 Library calls 45 Standard file formats 57 Miscellaneous files and documents 66 Games and demonstrations 74 Device drivers and network protocols 1m8 System administration commands 99 Obscure kernel specs and interfaces

17 Manual Man pages are kept Man pages are kept Under /usr/man/man# or /usr/share/man/man#Under /usr/man/man# or /usr/share/man/man# Format (troff, SGML)Format (troff, SGML) Compressed (compress or gzip)Compressed (compress or gzip) read manual pages: man read manual pages: man $man title$man title Example: $man ls Example: $man ls $man section title$man section title Example: $man 4 tty Example: $man 4 tty Solaris Example: $man –s 4 tty Solaris Example: $man –s 4 tty

18 Manual More about reading manual pages: man More about reading manual pages: man MANPATHMANPATH /etc/man.config /etc/man.config Add new man pages besides the system ones. Add new man pages besides the system ones.MANPATH=/home/share/localman:/usr/share/man Keyword search in synopsisKeyword search in synopsis $man –k keyword $man –k keyword Example: $man –k mount

19 Creating an ISO Image Step One: Step One: Place your cd’s or dvd in your drivePlace your cd’s or dvd in your drive As root type the following to make image:As root type the following to make image: dd if=/dev/cdrom of=/home/ISO/fc4-dvd.iso The ISO image will be create in your current directoryThe ISO image will be create in your current directory

20 Mounting the ISO Image Step two Step two Make directory under the /mnt directory called isoMake directory under the /mnt directory called iso Then you can mount the ISO image with:Then you can mount the ISO image with: mount -o loop=/dev/loop1 -t iso9660 filename.iso /mnt/iso To simplify this add the following line to /etc/fstabTo simplify this add the following line to /etc/fstab /home/ISO/fc4-dvd.iso /mnt/iso iso9660 loop=/dev/loop1,noauto

21