UNIX Administration A Comprehensive Sourcebook for Effective Systems and Network Management

Contents

Section I UNIX Administration
1 UNIX — Introductory Notes
1.1 UNIX Operating System
1.2 User’s View of UNIX
1.3 The History of UNIX
1.3.1 Berkeley Standard Distribution — BSD UNIX
1.3.2 System V or ATT UNIX
1.4 UNIX System and Network Administration
1.4.1 System Administrator’s Job
1.4.2 Computing Policies
1.4.3 Administration Guidelines
1.4.3.1 Legal Acts
1.4.3.2 Code of Ethics
1.4.3.3 Organizations
1.4.3.4 Standardization
1.4.4 In This Book

2 The UNIX Model — Selected Topics
2.1 Introduction
2.2 Files
2.2.1 File Ownership
2.2.2 File Protection/File Access
2.2.2.1 Access Classes
2.2.2.2 Setting a File Protection
2.2.2.3 Default File Mode
2.2.2.4 Additional Access Modes
2.2.3 Access Control Lists (ACLs)
2.2.4 File Types
2.2.4.1 Plain (Regular) File
2.2.4.2 Directory
2.2.4.3 Special Device File
2.2.4.4 Link
2.2.4.5 Socket
2.2.4.6 Named Pipe
2.2.4.7 Conclusion
2.3 Devices and Special Device Files
2.3.1 Special File Names
2.3.2 Special File Creation
2.4 Processes
2.4.1 Process Parameters
2.4.1.1 Process Types
2.4.1.2 Process Attributes
2.4.1.3 File Descriptors
2.4.1.4 Process States
2.4.2 Process Life Cycles
2.4.2.1 Process Creation
2.4.2.2 Process Termination
2.4.3 Process Handling
2.4.3.1 Monitoring Process Activities
2.4.3.2 Destroying Processes
2.4.3.3 Job Control

3 UNIX Administration Starters
3.1 Superuser and Users
3.1.1 Becoming a Superuser
3.1.2 Communicating with Other Users
3.1.3 The su Command
3.2 UNIX Online Documentation
3.2.1 The man Command
3.2.2 The whatis Database
3.3 System Information
3.3.1 System Status Information
3.3.1.1 The uname Command
3.3.1.2 The uptime Command
3.3.1.3 The dmesg Command
3.3.2 Hardware Information
3.3.2.1 The HP-UX ioscan Command
3.3.2.2 The Solaris prtconf Command
3.3.2.3 The Solaris sysdef Command
3.4 Personal Documentation
3.5 Shell Script Programming
3.5.1 UNIX User Shell
3.5.2 UNIX Shell Scripts
3.5.2.1 Shell Script Execution
3.5.2.2 Shell Variables
3.5.2.3 Double Command-Line Scanning
3.5.2.4 Here Document
3.5.2.5 Few Tips

4 System Startup and Shutdown
4.1 Introductory Notes
4.2 System Startup
4.2.1 The Bootstrap Program
4.2.2 The Kernel Execution
4.2.3 The Overall System Initialization
4.2.3.1 rc Initialization Scripts
4.2.3.2 Terminal Line Initialization
4.2.4 System States
4.2.5 The Outlook of a Startup Procedure
4.2.6 Initialization Scripts
4.3 BSD Initialization
4.3.1 The BSD rc Scripts
4.3.2 BSD Initialization Sequence
4.4 System V Initialization
4.4.1 The Configuration File /etc/inittab
4.4.2 System V rc Initialization Scripts
4.4.3 BSD-Like Initialization
4.5 Shutdown Procedures
4.5.1 The BSD shutdown Command
4.5.2 The System V shutdown Command
4.5.3 An Example

5 UNIX Filesystem Management
5.1 Introduction to the UNIX Filesystem
5.2 UNIX Filesystem Directory Organization
5.2.1 BSD Filesystem Directory Organization
5.2.2 System V Filesystem Directory Organization
5.3 Mounting and Dismounting Filesystems
5.3.1 Mounting a Filesystem
5.3.1.1 The mount Command
5.3.2 Dismounting a Filesystem
5.3.3 Automatic Filesystem Mounting
5.3.4 Removable Media Management
5.4 Filesystem Configuration
5.4.1 BSD Filesystem Configuration File
5.4.2 System V Filesystem Configuration File
5.4.3 AIX Filesystem Configuration File
5.4.4 The Filesystem Status File
5.5 A Few Other Filesystem Issues
5.5.1 Filesystem Types
5.5.2 Swap Space — Paging and Swapping
5.5.3 Loopback Virtual Filesystem
5.6 Managing Filesystem Usage
5.6.1 Display Filesystem Statistics: The df Command
5.6.2 Report on Disk Usage: The du Command
5.6.3 Report on Disk Usage by Users: The quot Command
5.6.4 Checking Filesystems: The fsck Command

6 UNIX Filesystem Layout
6.1 Introduction
6.2 Physical Filesystem Layout
6.2.1 Disk Partitions
6.2.2 Filesystem Structures
6.2.3 Filesystem Creation
6.2.3.1 The mkfs Command
6.2.3.2 The newfs Command
6.2.3.3 The tunefs Command
6.2.4 File Identification and Allocation
6.2.4.1 Index Node (inode)
6.2.4.2 File Allocation
6.2.5 Filesystem Performance Issues
6.2.5.1 File Storage vs. File Transfer
6.2.5.2 Reserved Free Space
6.3 Logical Filesystem Layout
6.3.1 Logical Volume Manager — AIX Flavor
6.3.2 Logical Volume Manager — HP-UX Flavor
6.3.3 Logical Volume Manager — Solaris Flavor
6.3.4 Redundant Array of Inexpensive Disks (RAID)
6.3.5 Snapshot
6.3.5.1 The Volume Snapshot
6.3.5.2 The Filesystem Snapshot
6.3.6 Virtual UNIX Filesystem
6.4 Disk Space Upgrade

7 User Account Management
7.1 Users and Groups
7.1.1 Creation of User Accounts
7.1.2 User Database — File /etc/passwd
7.1.3 Group Database — File /etc/group
7.1.4 Creating User Home Directories
7.1.5 UNIX Login Initialization
7.1.5.1 Intialization Template Files
7.1.5.2 User Login Initialization Files
7.1.5.3 Systemwide Login Initialization Files
7.1.5.4 Shell Initialization Files
7.1.5.5 Setting the Proper Ownership
7.1.6 Utilities to Create User Accounts
7.2 Maintenance of User Accounts
7.2.1 Restricted User Accounts
7.2.2 Users and Secondary Groups
7.2.3 Assigning User Passwords
7.2.4 Standard UNIX Users and Groups
7.2.5 Removing User Accounts
7.3 Disk Quotas
7.3.1 Managing Disk Usage by Users
7.4 Accounting
7.4.1 BSD Accounting
7.4.2 System V Accounting
7.4.3 AIX-Flavored Accounting

8 UNIX System Security
8.1 UNIX Lines of Defense
8.1.1 Physical Security
8.1.2 Passwords
8.1.3 File Permissions
8.1.4 Encryption
8.1.5 Backups
8.2 Password Issues
8.2.1 Password Encryption
8.2.2 Choosing a Password
8.2.3 Setting Password Restrictions
8.2.4 A Shadowed Password
8.2.4.1 Usual Approach
8.2.4.2 Other Approaches
8.3 Secure Console and Terminals
8.3.1 Traditional BSD Approach
8.3.2 The Wheel Group
8.3.3 Secure Terminals — Other Approaches
8.4 Monitoring and Detecting Security Problems
8.4.1 Important Files for System Security
8.4.2 Monitoring System Activities
8.4.3 Monitoring Login Attempts
8.4.3.1 The su Log File
8.4.3.2 History of the Root Account
8.4.3.3 Tracking User Activities

And Many More