Red Hat Linux 5.2 Installation Guide
Red Hat Linux 5.2 Installation Guide
2
The Official Red Hat Linux Installation Guide
ISBN: 1-888172-19-3
Revision: Inst-5.2-Print-RHS (10/98)
While every precaution has been taken in the preparation of this book, the publisher assumes no
responsibility for errors or omissions, or for damages resulting from the use of the information con-
tained herein.
The Official Red Hat Linux 5.2 Installation Guide may be reproduced and distributed in whole or in part,
in any medium, physical or electronic, so long as this copyright notice remains intact and unchanged
on all copies. Commercial redistribution is permitted and encouraged, but you may not redistribute
it, in whole or in part, under terms more restrictive than those under which you received it.
Printed in Canada
Contents
6 What Do I Do Now? 83
6.1 Getting the Documentation That’s Right For You . . . . . . . . . . . . . . . . . . . . . 83
6.2 Basic System Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
6.3 The X Window System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
6.4 Configuring Your Red Hat Linux System For Sound . . . . . . . . . . . . . . . . . . . . 96
CONTENTS v
10 Glint 175
10.1 Starting glint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
10.2 The Package Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
10.3 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
10.4 Package Manipulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
G Glossary 365
Index 391
Welcome! And thanks for your interest in Red Hat Linux. We have what we think is the best Linux
distribution on the market today, and we work hard to keep it that way. Red Hat Linux 5.2 is the
latest in a long line of software from Red Hat Software. We hope you like it, and that you enjoy using
Red Hat Linux as much as we’ve enjoyed making it for you.
It’s interesting to note that, while Linux is popular and well-known by a certain segment of the
computer-using population, there are many people out there that are only now hearing about Linux.
For this group of people, the following section should provide enough background to help you get
acquainted with Linux and Red Hat Software.
What is Linux?
Back in August of 1991, a student from Finland began a post to the comp.os.minix newsgroup
with the words:
The student was Linus Torvalds, and the “hobby” he spoke of eventually became what we know
today as Linux.
A full-featured POSIX-like operating system, Linux has been developed not just by Linus, but by
hundreds of programmers around the world. The interesting thing about this is that this massive,
world-wide development effort is largely uncoordinated. Sure, Linus calls the shots where the kernel
is concerned, but Linux is more than just the kernel. There’s no management infrastructure; a student
in Russia gets a new motherboard, and writes a driver to support a neat feature the motherboard has.
A system administrator in Maryland needs backup software, writes it, and gives it away to anyone
that needs it. The right things just seem to happen at the right time.
x Preface
Another interesting thing is that Linux can be obtained for absolutely no money. That’s right, most
of the software is available (at no charge) to anyone with the time and inclination to download it. But
not everyone has that much time. . .
Internet. Red Hat Linux is also available on CD-ROM. For current information on our product offer-
ings and links to other Linux resources please check Red Hat Software’s web site at
http://www.redhat.com.
On most systems, Red Hat Linux is easy to install; the installation program can walk you through
the process in as little as 15 minutes. The system itself is very flexible. With RPM, you can install and
uninstall individual software packages with minimal effort. Because of RPM, Red Hat Linux is also
easy to maintain – package installations can be verified and corrected, and packages can be installed
and uninstalled simply and reliably. Furthermore, Red Hat Linux is easy to administer. Included
are a rich set of administrative tools which reduce the hassle of everyday system administration.
Complete source code is provided for the freely distributable components of the system.
Chapter 1, New Features Of Red Hat Linux 5.2 contains information concerning new functional-
ity that has been added to Red Hat Linux 5.2.
Chapter 2, Before You Begin contains information on tasks you should perform prior to starting
the Red Hat Linux installation.
Chapter 3, Starting the Installation contains detailed instructions for starting
the Red Hat Linux installation process.
Chapter 4, Continuing the Installation contains instructions on the main part of the installation
process.
Chapter 5, Finishing the Installation contains instructions on the last steps required to complete
the installation process.
Chapter 6, What Do I Do Now? contains information on logging in, performing system shutdowns,
and configuring the more popular system components (such as X).
Chapters 7 – 11 explain how to find documentation on your system, and how to use the various
system management and administration tools which accompany Red Hat Linux. They also
include an explanation of what’s special about your Red Hat Linux system, including where
special files live and more.
Appendixes contain extra information about Red Hat Linux, including an explanation on Red Hat
Software’s support offerings, frequently asked questions, etc.
xii Preface
Features chapter to reflect all the good stuff that’s been added to Red Hat Linux 5.2. We consider this
to be “business as usual”.
We’ve also made some changes as a direct result of customer feedback. Some people have expressed
confusion over all the different terms and acronyms that seem to surround computer technology in
general, and Linux in particular. For those people, we’ve added a glossary. While it’s not our goal
to include a complete data processing dictionary with every copy of Red Hat Linux, if you think a
particular word should be present but is not, feel free to let us know via docs@redhat.com.
As the linuxconf system configuration tool continues to mature, we’ve created a new system con-
figuration chapter containing task-based linuxconf documentation, as well as those vestiges of the
control-panel tools that still remain. Our goal is to continue adding linuxconf documentation; what
you see here is just a first step in that process.
We’ve also worked on the Frequently Asked Questions section of the Installation Guide, adding more
of the “timeless” questions that seem to persist from release to release, while weeding out version-
specific questions that, if you think about it, will always be somewhat dated, given the nature of
printed documentation.
The package list has proven to be quite popular; this time we’ve improved it by adding icons showing
whether a given package is part of one of several pre-defined sets of packages.
All of this has resulted in the Installation Guide putting on a little weight – 100 pages, to be exact.
This is a trend that we expect to continue, which leads us right into the next subject. . .
We Need Feedback!
If you spot a typo in the Installation Guide, or if you’ve thought of a way to make this manual better,
we’d love to hear from you! Please send mail to:
docs@redhat.com
Inst-5.2-Print-RHS (10/98)
That way we’ll know exactly which version of the guide you have. If you have a suggestion, try to be
as specific as possible when describing it. If you’ve found an error, please include the section number
and some of the surrounding text so we can find it easily. We may not be able to respond to every
message sent to us, but you can be sure that we’ll be reading them all!
questions, comments, and pleading requests for reviews of this manual. Without them, I wouldn’t
be here writing this, you wouldn’t be there reading this, and things wouldn’t be nearly as much fun.
Thanks, guys!
Thanks are also due to all the readers of past Installation Guides that took the time to send corrections,
suggestions, and even the occasional “well done”. I’ve tried to incorporate as much of your feedback
as possible (pagecount and deadlines permitting). Keep the feedback coming – it’s the only way I
know whether you’re getting what you need from our documentation!
Thanks to Paul Gerwe (one of our new writers) for his hard work documenting linuxconf. Thanks
also go to Support Genius Stephen Smoogen for his work on the new FAQ. It’s been a pleasure
working with you both.
Last but far from least is the support group at Red Hat Software. They have given many insightful
suggestions regarding this manual, based on extensive experience with thousands of Red Hat Linux
customers. So if you find yourself breezing through the installation chapters, it’s due in no small part
to their input. I thank them.
Edward C. Bailey
1
New Features Of Red Hat Linux
5.2
This chapter describes features that are new to Red Hat Linux 5.2.
Improved Installation Chapters – The chapters covering the installation of Red Hat Linux
have been expanded to include more detailed information in a more streamlined form.
Glossary – Appendix G contains a glossary of words some people might find confusing.
All-New FAQ – Appendix E contains a newly updated set of frequently asked questions. If
you run into problems (before or after the installation), check it out. . .
chmod +x .xinitrc
Now, the next time you start X, you’ll be running Window Maker.
While installing Red Hat Linux is a straightforward process, taking some time prior to starting the
installation can make things go much more smoothly. In this chapter, we’ll discuss the steps that
should be performed before you start the installation.
Please Note: If you are currently running a version 2.0 (or greater) Red Hat Linux system, you can
perform an upgrade. Skim this chapter to review the basic issues relating to installation, and read
the following chapters in order, following the directions as you go. The upgrade procedure starts
out identically to the installation procedure; you will be directed to choose an installation or upgrade
after booting the installation program and answering a few questions.
There are five things you should do prior to installing Red Hat Linux:
1. Make sure you have sufficient documentation to effectively use your Red Hat Linux system
after the installation.
2. Make sure you have access to the Red Hat Linux components required for installation.
3. Make sure you know your computer’s hardware configuration and networking information.
4. Decide, based on the first two tasks, what method you will use to install Red Hat Linux.
5. Determine where on your hard drive(s) Red Hat Linux will reside.
Let’s start by making sure you have the documentation you’ll need after you install Red Hat Linux.
6 Before You Begin
New To Linux – If this is your first time using Linux (or any Linux-like operating system, for
that matter), you’ll need solid introductory information on basic Unix concepts. For example,
O’Reilly and Associates (http://www.ora.com/) produce a wide variety of Linux and Unix-
related books. Give their more general titles a try.
Some Linux Experience – If you’ve used other Linux distributions (or a Linux-like operating
system), you’ll probably find what you’re looking for in some of the more in-depth reference
material available. Red Hat Software’s Linux Undercover and Linux Complete Command Reference
are great for overall documentation, while O’Reilly’s more specialized titles are valuable when
you need a lot of information on a particular subject.
Old Timer – If you’re a long-time Red Hat Linux user, you probably don’t need us telling you what
documentation to read. Thanks for reading this far!
ALPHA
INTEL
INTEL
Boot diskette.
Installation Guide
The Red Hat Linux Installation Guide is what you’re currently reading. It contains the information
necessary to install Red Hat Linux. In addition, it contains information about aspects of the operating
system that are unique to Red Hat Linux.
ALPHA
CDs 1 and 2
These two Compact Discs contain the entire Red Hat Linux distribution, including source code. CD
1 contains all the binary packages built for the type of computer (Intel, Alpha, or SPARC) that you
have . CD 2 contains the source packages that were used to build the binary packages on CD 1.
8 Before You Begin
Linux Applications CD
INTEL
This Compact Disc contains demonstration versions of a number of commercial Linux software
products. For more information, please refer to the README file on this CD.
Please Note: This CD and its contents are completely unsupported by Red Hat Software. All ques-
tions and issues concerning any software on this CD should be directed to the responsible company,
and not Red Hat Software.
Boot Diskette
INTEL
This diskette is used to start the installation process for Red Hat Linux/Intel. Depending on your
computer’s configuration and the type of installation you select, you may or may not need the boot
diskette. In addition, you may require a supplemental diskette, again depending on your system’s
hardware configuration, and the installation method you choose. When we discuss the different
installation methods later in this chapter, we’ll explain which diskettes are needed for each type of
installation, and give you instructions for producing any diskettes you require.
ALPHA
Alpha owners should refer to the Red Hat Linux Alpha Installation Addendum for information on
which diskettes are required.
SPARC
SPARC owners should turn to Section F.5.1 on page 357 for information on their diskette needs.
The CD-ROM case includes the the license terms for Red Hat Linux, in addition to the license terms
for any commercial software that may be included on the Red Hat Linux CD. In addition, information
about registering your copy of Red Hat Linux with Red Hat Software can be found here. Once
registered, you can receive installation support. Red Hat Software’s installation support program is
discussed in Appendix A on page 217.
Please Note: There is an alphanumeric registration string printed on the CD-ROM case. It is used
to register you for Red Hat Software’s installation support. Please make sure you don’t lose your
registration string – you won’t be able to get installation support without it!
2.2 Getting the Right Red Hat Linux Components 9
1-888172-xx-y
(Where xx and y may vary.) If your box has an ISBN number in this form, and you’re missing some-
thing, feel free to call us at 1-888-733-4281 (+1-919-547-0012 outside the USA), or to send mail to
sales@redhat.com.
If your box has a different ISBN number (or none at all), you’ll need to contact the company that
produced your boxed set. Normally, third-party producers will include their logo and/or contact
information on the outside of the box; an official Red Hat Linux boxed set has only our name and
contact info on the outside. . .
If your Red Hat Linux boxed set is complete, please skip ahead to section 2.2.4 on the following page.
INTEL
For people installing Red Hat Linux/Intel, you’ll need a boot diskette, and optionally, a supple-
mental diskette. It may also be possible to start the installation directly from the CD, under certain
conditions. We’ll discuss this in more detail when we outline the various installation methods
available.
ALPHA
People with Alpha-based systems should refer to the Red Hat Linux Alpha Installation Addendum
for additional information on the diskettes they may need.
SPARC
SPARC owners should refer to section F.5.1 on page 357 for information on which diskettes they’ll
need.
10 Before You Begin
2. Electronic Mail – By sending an empty mail message to errata@redhat.com, you will re-
ceive a mail message containing the complete Errata. Also included are URLs to each updated
package and diskette image in the Errata. By using these URLs, you can then download any
necessary diskette images. Remember to use binary mode when transferring a diskette image!
For now, concentrate only on the Errata entries that include new diskette images (the filenames al-
ways end in .img). If you find an entry that seems to apply to your problem, get a copy of the
diskette images, and create them using the instructions in Appendix B on page 225.
hard drive(s) – Specifically, the number, size, and type. If you have more than one, it’s helpful
to know which one is first, second, and so on. It is also good to know if your drives are IDE
or SCSI. If you have IDE drives, you should check your computer’s BIOS to see if you are
accessing them in LBA mode.
2.3 Things You Should Know 11
CD-ROM – Most importantly, the unit’s interface type (IDE, SCSI, or other interface) and, for
non-IDE, non-SCSI CD-ROMs, the make and model number. IDE CD-ROMs (also known as
ATAPI) are the most common type in recently manufactured, PC-compatible computers.
SCSI adapter (if one is present) – The adapter’s make and model number.
network card (if one is present) – The card’s make and model number.
mouse – The mouse’s type (serial, PS/2, or bus mouse), protocol (Microsoft, Logitech, Mouse-
Man, etc.), and number of buttons; also, for serial mice, the serial port it is connected to.
On many newer systems, the installation program is able to automatically identify most hardware.
However, it’s a good idea to collect this information anyway, just to be sure.
ALPHA
In addition to the latest hardware compatibility list on Red Hat Software’s website, owners of
Alpha-based systems should refer to the Red Hat Linux Alpha Installation Addendum for more
information on supported hardware configurations.
SPARC
In addition to the latest hardware compatibility list on Red Hat Software’s website, SPARC owners
should refer to Section F.1 on page 353 for a list of supported hardware.
If your computer is already running Windows 9x, you can use the following procedure to get addi-
tional configuration information:
With Windows running, click on the “My Computer” icon using the secondary (normally the
right) mouse button. A popup menu should appear.
Select “Properties”. The “System Properties” window should appear (See Figure 2.1 on the
following page). Note the information listed under “Computer:” – in particular the amount of
RAM listed.
Click on the “Device Manager” tab. You will then see a graphical representation of your com-
puter’s hardware configuration. Make sure the “View devices by type” button is selected.
At this point, you can either double-click on the icons (or single-click on the plus sign + ) to look
at each entry in more detail (See Figure 2.2 on page 13). Look under the following icons for more
information:
12 Before You Begin
Disk drives – You will find the type (IDE or SCSI) of hard drive here. (IDE drives will normally
include the word “IDE”, while SCSI drives won’t.)
Hard disk controllers – You can get more information about your hard drive controller here.
CDROM – Here is where you’ll find out about any CD-ROM drives connected to your com-
puter.
Please Note: In some cases, there may be no CD-ROM icon, yet your computer has a func-
tioning CD-ROM drive. This is normal, depending on how Windows was originally installed.
In this case, you may be able to glean additional information by looking at the CD-ROM driver
loaded in your computer’s config.sys file.
Mouse – The type of mouse present on your computer can be found here.
Display adapters – If you’re interested in running the X Window System, you should write
down the information you find here.
Sound, video and game controllers – If your computer has sound capabilities, you’ll find
more information about that here.
Network adapters – Here you’ll find additional info on your computer’s network card (if you
have one).
2.3 Things You Should Know 13
SCSI controllers – If your computer uses SCSI peripherals, you’ll find additional info on the
SCSI controller here.
While this method is not a complete substitute for opening your computer’s case and physically
examining each component, in many cases it can provide sufficient information to continue with the
installation.
Please Note: This information can also be printed by clicking on the “Print. . . ” button. A second
window will appear, allowing you to choose the printer, as well as the type of report (The “All
Devices and System Summary” report type is the most complete).
your video card – The card’s make and model number (or the video chipset it uses), and
the amount of video RAM it has. (Most PCI-based cards are auto-detected by the installation
program.)
14 Before You Begin
your monitor – The unit’s make and model number, along with allowable ranges for horizon-
tal and vertical refresh rates.
domain name – The name given to your organization. For instance, Red Hat Software has a
domain name of redhat.com.
hostname – The name of your computer. A computer might be named pooh, for instance.
Please Note: The information given above is an example only! Do not use it when you install Red
Hat Linux! If you don’t know the proper values for your network, ask your network administrator.
ALPHA
Alpha owners should take a moment to review the Red Hat Linux Alpha Installation Addendum,
particularly the first chapter. It covers aspects of the installation process that differ from a typical
Red Hat Linux/Intel installation.
SPARC
People with SPARC systems should take a moment to read Appendix F on page 353. This appendix
covers aspects of the installation process that differ from a typical Red Hat Linux/Intel installation.
You can install or upgrade Red Hat Linux via any of several different methods. Each method works
best in different situations, and has different requirements. But before we discuss each installation
method, let’s take a look at an issue that may affect some of you.
2.4 Installation Methods 15
INTEL
This section is specific to Intel-based computers only
Most Intel-based laptop computers support PCMCIA (also known as PC Card). Computers that
support PCMCIA devices contain a controller having one or more slots in which a PCMCIA device
can be installed. These devices may be modems, LAN adapters, SCSI adapters, and so on.
When installing Red Hat Linux/Intel on a PCMCIA-capable computer, it is important to note if a
PCMCIA device will be used during installation. For example, if you want to install Red Hat Linux/-
Intel from a CD-ROM, and your CD-ROM drive is connected to a PCMCIA adapter, the installation
program will require PCMCIA support. Likewise, if you are going to use one of the network-based
installation methods, you will need PCMCIA support if your network adapter is PCMCIA-based.
Please Note: You don’t need install-time PCMCIA support if you’re installing Red Hat Linux on a
laptop, and using the laptop’s built-in CD-ROM drive.
PCMCIA support is dependent on two things:
2. The type of PCMCIA device that you wish to use during the installation.
While nearly every PCMCIA controller and most popular PCMCIA devices are supported, there are
some exceptions. For more information, please consult the Red Hat Linux Hardware Compatibility
List at http://www.redhat.com/hardware.
The main thing to keep in mind is that if you require install-time PCMCIA support, you will need
a supplemental diskette. We’ll show you how to do this after you’ve determined which installation
method is best for you.
ALPHA
PCMCIA support is not available for the Alpha.
SPARC
PCMCIA support is not available for the SPARC.
How To Do It
As the name implies, you’ll need a Red Hat Linux CD-ROM, a supported CD-ROM drive, and a
means of starting the installation program.
INTEL
Intel systems will need to use the boot diskette (and the supplemental diskette if PCMCIA sup-
port is required). There is an alternate method of installing from CD-ROM that uses no diskettes,
but requires that the system be running DOS. We’ll discuss this approach (known as autoboot) in
Section 3.2.1 on page 34. For now, note that PCMCIA support is not available when using autoboot.
Please Note: The Red Hat Linux/Intel CD-ROM can also be booted by newer computers that
support bootable CD-ROMs. Not all computers support this feature, so if yours can’t boot from
CD-ROM, you’ll have to use a boot diskette (or autoboot from DOS) to get things started. Note that
you may need to change BIOS settings in your computer to enable this feature.
If you’ve determined that this installation method is most applicable to your situation, please skip
ahead to Section 2.5 on page 18.
How To Do It
When doing an FTP install, you’ll need LAN-based access to a network; a dialup connection via
modem won’t cut it. If your Local Area Network has Internet access, you can use one of the many
FTP sites that mirror Red Hat Linux. You can find a list of mirror sites at
ftp://ftp.redhat.com/pub/MIRRORS.
If your LAN doesn’t have Internet access, all is not lost. If there is a computer on your LAN that can
accept anonymous FTP requests, simply put a copy of the Red Hat Linux distribution on that system,
and you’re ready to go.
Please Note: Your FTP server must be able to handle long filenames.
INTEL
For an FTP installation, you must use both the boot and supplemental diskettes. You will need to
have a valid nameserver configured or you must specify the IP address of the FTP server you will
be using. You will also need the path to the Red Hat Linux directory on the FTP server.
If you’ve determined that this installation method is most applicable to your situation, please skip
2.4 Installation Methods 17
How To Do It
If you wish to perform an NFS installation, you will need to mount the Red Hat Linux CD-ROM
on a machine that supports ISO-9660 file systems with Rock Ridge extensions. The machine must
also support NFS. Export the CD-ROM file system via NFS. You will need to have a nameserver
configured, or know the NFS server’s IP address, as well as the path to the exported CD-ROM.
Please Note: Your NFS server must be able to handle long filenames.
INTEL
For an NFS installation, you’ll need a boot diskette only.
If you’ve determined that this installation method is most applicable to your situation, please skip
ahead to Section 2.5 on the following page.
How To Do It
If you wish to install from an SMB shared volume, you will need to mount the Red Hat Linux CD-
ROM on a Microsoft Windows NT or Windows 95 server that supports shared volumes. You will
need to have nameservices configured; you will also need the name of the shared volume contain-
ing the Red Hat Linux CD-ROM and the account and password information required to access the
volume.
Please Note: The Windows system’s Microsoft Networking name must be identical to the system’s
DNS hostname. For example, given a Microsoft Networking name of windows1, the system’s DNS
hostname must be windows1.whatever.your.domain.is.
18 Before You Begin
INTEL
For an SMB installation, you’ll need boot and supplemental diskettes.
If you’ve determined that this installation method is most applicable to your situation, please skip
ahead to Section 2.5.
How To Do It
The hard drive installation method requires a bit of up-front effort on your part, as you must copy
all the necessary files to a partition before starting the Red Hat Linux installation program. You must
first create a RedHat directory at the top level of your directory tree. Everything you will install
should be placed in that directory. First copy the base subdirectory and its contents.
Next, copy the packages you want to install to another subdirectory called RPMS. You can use avail-
able space on an existing DOS partition or a Linux partition that is not required in the install proce-
dure (for example, a partition that would be used for data storage on the installed system).
INTEL
If you are using a DOS filesystem, you will not be able to use the full Linux filenames for the RPM
packages. The installation process does not care what the filenames look like, but it is a good idea
that you keep track of them.
You’ll need a boot and supplemental diskette when installing from a hard drive.
INTEL
This section is specific to Intel-based computers only. If you are using an Alpha or SPARC computer,
please skip ahead to 2.7 on page 21.
Here’s a checklist that you can use to see if you’ll need to create a supplemental diskette:
Installing From a PCMCIA-Connected CD-ROM – If you’ll be installing Red Hat Linux from
a CD-ROM, and your CD-ROM drive is attached to your computer through a PCMCIA card,
you’ll need a supplemental diskette.
2.6 Installation Classes 19
Installing using a PCMCIA Network Card – If you will be using a PCMCIA network adapter
during the installation, you’ll need a supplemental diskette.
FTP Install – If you want to install Red Hat Linux via FTP, you’ll need a supplemental diskette.
Hard Drive Install – If you’ll be performing an install from a hard drive, you’ll need a supple-
mental diskette.
SMB Install – If you want to install from an SMB shared drive, you’ll need a supplemental
diskette.
If you’ve determined you’ll need a supplemental diskette, you’ll have to make one. The supple-
mental diskette image file is supp.img, and is located in the images directory on your Red Hat
Linux/Intel CD. Please turn to Appendix B on page 225 and follow the instructions there. Then,
return here, and read on.
Workstation
Server
Custom
These classes give you the option of simplifying the installation process (with some loss of configu-
ration flexibility), or retaining complete flexibility with a slightly more complex installation process.
Let’s take a look at each class in more detail, so you can see which one is right for you.
A workstation-class installation removes any linux-related partitions (and uses all free unpartitioned
disk space) to create the following partitions:
20 Before You Begin
INTEL
A 16MB partition (mounted as /boot) in which the Linux kernel and related files reside.
ALPHA
A 2MB partition (mounted as /dos) in which the MILO boot loader is located.
A larger (the exact size is dependent on available disk space) partition (mounted as /) in which
all other files are stored.
This approach to disk partitioning results in the simplest, filesystem configuration possible.
Please Note: You will need approximately 600MB of free disk space in order to perform a workstation-
class installation.
If your system already runs Windows, a workstation-class installation will automatically configure
your system to dual-boot using LILO.
A server-class installation removes all existing partitions on your system, so choose this installation
class only if you’re sure you have nothing you want saved! When the installation is complete, you’ll
find the following partitions:
INTEL
A 16MB partition (mounted as /boot) in which the Linux kernel and related files are kept.
ALPHA
A 2MB partition (mounted as /dos) in which the MILO boot loader is kept.
A larger (the exact size is dependent on available disk space) partition (mounted as /) in which
all other files are stored.
2.7 Disk Partitions 21
This approach to disk partitioning results in a reasonably flexible filesystem configuration for most
server-class tasks.
Please Note: You will need approximately 1.6GB of free disk space in order to perform a server-class
installation.
We will discuss partitioning issues in more detail below. For now, keep in mind that Red Hat
Linux requires at least two dedicated partitions, and that you cannot install Red Hat Linux to a
DOS/Windows partition!
Even if you will be installing Red Hat Linux on its own hard disk, or on a computer which contains
no other operating system, you’ll still need to create partitions for Red Hat Linux to use. In this case
it’s pretty easy, as there are no other partitions on the hard disk to worry about.
On the other hand, you may wish to install Red Hat Linux on a disk which already contains software
or data from a different operating system. Things can get a little trickier in this situation, since a
mistake can destroy your existing partitions, not to mention the data they contain!
During the installation process, you’ll be given the chance to create partitions for Red Hat Linux. At
this point, your main concern is making sure you have sufficient disk space available to create those
partitions. Let’s review the different ways to free up space for Red Hat Linux partitions.
First Two Letters – The first two letters of the partition name indicate the type of device on which
the partition resides. You’ll normally see either hd (for IDE disks), or sd (for SCSI disks).
The Next Letter – This letter indicates which device the partition is on. For example,
/dev/hda (the first IDE hard disk) or /dev/sdb (the second SCSI disk).
The number The final number denotes the partition. The first four (primary or extended) partitions
are numbered 1 through 4. Logical partitions start at 5. E.g., /dev/hda3 is the third primary
or extended partition on the first IDE hard disk; /dev/sdb6 is the second logical partition on
the second SCSI hard disk.
Keep this information in mind; it will make things easier to understand when you’re setting up the
partitions Red Hat Linux requires.
In this situation, the partitions already defined do not span the entire hard disk, leaving unallocated
space that is not part of any defined partition. If you think about it, an unused hard disk also falls
into this category; the only difference is that all the space is not part of any defined partition.
In this case, you can simply create the necessary partitions from the unused space.
Last year you replaced that tiny 105MB hard drive on your Windows system with a 1.2GB monster.
You partitioned it into two equal parts, figuring that you’d use the C: “drive” (really the drive’s first
partition) for Windows, and the D: “drive” (really the drive’s second partition) for your collection
of freeware programs downloaded from the Internet. Well, you’d been so used to using C: that you
never put anything of substance on D:.
If you find yourself in this situation, you can use the space allocated to the unused partition. In this
case, you’ll first need to delete the partition, and then create the appropriate Linux partitions in its
place. You can either delete the partition using DOS fdisk, or you’ll be given the opportunity to do
so during a custom-class installation.
This is the most common situation. It is also, unfortunately, the hardest to deal with. The main
problem is that you have enough free space, but it’s presently allocated to a partition that is in use.
If you purchased a computer with pre-installed software, the hard disk most likely has one massive
partition holding the operating system and data.
Aside from adding a new hard drive to your system, you have two choices:
Destructive Repartitioning – Basically, you delete the single large partition, and create several
smaller ones. As you might imagine, any data you had in that partition is destroyed. This
means that making a complete backup is necessary. For your own sake, make two backups,
use verification (if available in your backup software), and try to read data from your backup
before you delete the partition. Note also that if there was an operating system of some type
installed on that partition, it will need to be reinstalled as well.
After creating a smaller partition for your existing software, you can reinstall any software,
restore your data, and continue with your Red Hat Linux installation.
24 Before You Begin
Non-Destructive Repartitioning – Here, you run a program that does the seemingly impossible;
it makes a big partition smaller without losing any of the files stored in that partition. Many
people have found this method to be reliable and trouble-free. What software should you use
to perform this feat? There are several disk management software products on the market;
you’ll have to do some research to find the one that is best for your situation.
INTEL
As a convenience to our customers, we provide the fips utility. This is a freely available
program that can resize FAT (File Allocation Table) partitions. It’s included on the Red Hat
Linux/Intel CD-ROM in the dosutils directory.
Please Note: Many people have successfully used fips to repartition their hard drives.
However, because of the nature of the operations carried out by fips, and the wide variety
of hardware and software configurations under which it must run, Red Hat Software cannot
guarantee that fips will work properly on your system. Therefore, no installation support
whatsoever is available for fips; use it at your own risk.
That said, if you decide to repartition your hard drive with fips, it is vital that you do two
things:
Perform a Backup – Make two copies of all the important data on your computer.
These copies should be to removable media (such as tape or diskettes), and you should
make sure they are readable before proceeding.
Read the Documentation – Completely read the fips documentation, located in the
/dosutils/fipsdocs subdirectory on Red Hat Linux/Intel CD 1.
Should use decide to use fips, be aware that after fips runs you will be left with two parti-
tions: the one you resized, and the one fips created out of the newly-freed space. If your
goal is to use that space to install Red Hat Linux, you should delete the newly-created parti-
tion, either by using fdisk under your current operating system, or while setting up partitions
during a custom-class installation.
INTEL
If Red Hat Linux/Intel will coexist on your machine with OS/2, you must create your disk parti-
tions with the OS/2 partitioning software—otherwise, OS/2 may not recognize the disk partitions.
During the installation, do not create any new partitions, but do set the proper partition types for
your Linux partitions using the Linux fdisk.
2.7 Disk Partitions 25
INTEL
LILO (the LInux LOader) is the most commonly used method to boot Red Hat Linux on Intel-based
systems. Being an operating system loader, LILO operates “outside” of any operating system, using
only the Basic I/O System (or BIOS) built into the computer hardware itself. This section describes
LILO’s interactions with PC BIOSes, and is specific to Intel-compatible computers.
ALPHA
Alpha owners may skip ahead to Section 2.7.5 on the next page.
SPARC
SPARC owners may skip ahead to Section 2.7.5 on the following page.
LILO is subject to some limitations imposed by the BIOS in most Intel-based computers. Specifically,
most BIOSes can’t access more than two hard drives and they can’t access any data stored beyond
cylinder 1023 (the 1024th cylinder) of any drive. Note that some recent BIOSes do not have these
limitations, but this is by no means universal.
All the data LILO needs to access at boot time (including the Linux kernel) are located in the /boot
directory, which is normally part of the root partition (known as /). Here are the guidelines you must
follow if you are going to use LILO to boot your Red Hat Linux system:
On First Two IDE Drives – If you have 2 IDE (or EIDE) drives, /boot must be located on one of
them. Note that this two-drive limit also includes any IDE CD-ROM drives on your primary
IDE controller. So, if you have one IDE hard drive, and one IDE CD-ROM on your primary
controller, /boot must be located on the first hard drive only, even if you have other hard
drives on your secondary IDE controller.
On First IDE Or First SCSI Drive – If you have one IDE (or EIDE) drive and one or more SCSI
drives, /boot must be located either on the IDE drive or the SCSI drive at ID 0. No other SCSI
IDs will work.
On First Two SCSI Drives – If you have only SCSI hard drives, /boot must be located on a drive
at ID 0 or ID 1. No other SCSI IDs will work.
Partition Completely Below Cylinder 1023 – No matter which of the above configurations apply,
the partition that holds /boot must be located entirely below cylinder 1023. If the partition
holding /boot straddles cylinder 1023, you may face a situation where LILO will work ini-
tially (because all the necessary information is below cylinder 1023), but will fail if a new kernel
is to be loaded, and that kernel resides above cylinder 1023.
26 Before You Begin
As mentioned earlier, it is possible that some of the newer BIOSes may permit LILO to work with
configurations that don’t meet our guidelines. Likewise, some of LILO’s more esoteric features may
be used to get a Linux system started, even if the configuration doesn’t meet our guidelines. How-
ever, due to the number of variables involved, Red Hat Software cannot support such extraordinary
efforts.
Please Note: Disk Druid as well as the workstation- and server-class installs take these BIOS-related
limitations into account. However, if you decide to use fdisk instead, it is your responsibility to
ensure that you keep these limitations in mind.
A swap partition – Swap partitions are used to support virtual memory. If your computer has 16
MB of RAM or less, you must create a swap partition. Even if you have more memory, a swap
partition is still recommended. The minimum size of your swap partition should be equal to
your computer’s RAM, or 16 MB (whichever is larger). The largest useable swap partition is
roughly 127 MB, so making a swap partition larger than that will result in wasted space. Note,
however, that you can create and use more than one swap partition (although this is usually
only necessary for large server installations).
A root partition – The root partition is where / (the root directory) resides. It only needs to contain
things necessary to boot your system, as well as system configuration files. A root partition of
50 MB to 100 MB works well for most systems.
INTEL
Don’t forget the LILO constraints we mentioned in Section 2.7.4 on the page before!
A /usr partition – The /usr partition is where much of the software on a Red Hat Linux sys-
tem resides. This partition should be between 300 MB and 700 MB, depending on how many
packages you plan to install. If at all possible, try to be generous with the /usr partition. Any
RPM-based packages you install later will (in general) use more space from /usr than from
any other partition.
A /home partition – This is where users’ home directories go; the size of /home depends on how
many users you plan to have on your Red Hat Linux system and what they might store in their
home directories.
ALPHA
The following partition is specific to Red Hat Linux/Alpha installations.
2.7 Disk Partitions 27
A MILO partition – Alpha owners that will be using MILO to boot their systems should create a 1.5
MB DOS partition where MILO can be copied after the installation is complete.
Additionally, your circumstances may warrant creating one of more of the following partitions:
A /usr/local partition – Traditionally, /usr/local has been used to hold things you wish to
keep separate from the rest of your Red Hat Linux system, such as software that is not available
as an RPM package. The size depends on the amount of such software you anticipate putting
on your system.
A /usr/src partition – There are two things that normally are stored in /usr/src on a Red Hat
Linux system:
Linux Kernel Sources – The complete sources for the Linux kernel are stored here, and new
kernels are built here. At present, the kernel sources are approximately 30MB in size.
Keep in mind that you’ll want to have additional free space for building kernels, and you
may want to keep more than one version of the kernel available.
Sources For RPM-Based Packages – If a source package file (aka SRPM) is installed, the
files are stored here. Note that, unless specified otherwise, any packages built will also
use a build directory located here.
Again, the size of this partition would depend on the amount of software you anticipate build-
ing.
A /tmp partition – As the name implies, the /tmp partition is for temporary files. Creating a
partition dedicated to /tmp is a good idea for larger, multiuser systems or network server
machines. The reason is that many active users can fill the root partition (/), which is where
/tmp is located. It’s not necessary to dedicate a partition to /tmp on single-user workstations.
A /var partition – Your Red Hat Linux system will write to log files in /var/log. Files queued
for printing will normally be written to /var/spool. These are just two examples of data
that is written to /var. Unless otherwise configured, /var will be part of the root filesystem,
and normally will not have much available free space. If you anticipate a lot of print, mail,
or log activity on your system, you might want to consider creating a partition dedicated to
/var. In general, only multiuser or server systems would make effective use of a separate
/var filesystem.
An /opt partition – Some third-party software is designed to install itself under /opt. Unless
an /opt partition is created, software that attempts to install itself under /opt will end up
on the root partition, which may not have sufficient free space. Of course, this is not the only
way of solving the /opt problem; it is also possible to create an /opt symbolic link to another
partition with more space (such as /usr).
A /boot partition – While many of the partitions mentioned here make sense only for very large,
active systems, this partition might be very useful on a small system, where free space is tight.
If you recall, back in Section 2.7.4 on page 25, we discussed the various limitatons imposed
by the standard PC BIOS, and how these limitations impact the LILO bootloader. All the files
LILO needs to access (at boot time) are in the /boot directory. Since the files (including the
28 Before You Begin
Linux kernel) in /boot only take up a megabyte or so, if you’re having trouble finding space
for a 100 MB root partition in a place where LILO can get at it, you might have better luck trying
to squeeze in a 5-10 MB (generously oversized) partition for /boot. You’ll still need to create a
root partition, but it can now be located anywhere on your system – the BIOS restrictions only
apply to the partition holding /boot.
This chapter explains how to start the Red Hat Linux installation process. We’ll cover the following
areas in this chapter:
By the end of this chapter, the installation program will be running on your system, and the appro-
priate installation method will have been selected.
Window – Windows (also referred to as dialog boxes in this manual) will appear on your screen
throughout the installation process. At times, one window may overlay another; in these cases,
30 Starting the Installation
you may only interact with the window on top. When finished with that window, it will
disappear, allowing you to continue with the window that was underneath.
Text Input – Text input lines are regions where you can enter information required by the
installation program. When the cursor rests on a text input line, you may enter and/or edit
information on that line.
Check Box – Check boxes allow you to select or deselect a particular feature offered
to you
by the installation program. When the cursor rests within a check box, pressing Space causes
the check box to toggle between a selected and unselected state.
Text Widget – Text widgets are regions of the screen that are devoted to the display of text. At
times, text widgets may also contain other widgets, such as check boxes. It is possible that a
text widget may contain more information than could be displayed at one time. In these cases,
the text widget will have
a scroll
bar next to it; if you position the cursor within the text widget,
you can then use the " and # keys to scroll through all the information available.
Scroll Bar – Scroll bars provide a visual indication of your relative position in the information
being displayed in a text widget. Your current position is shown by a # character, which will
move up and down the scroll bar as you scroll back and forth.
Button Widget – Button widgets are the primary method of interacting with the installation
program. By “pressing” these buttons, you will progress through the series of windows that
make up the installation process. Buttons may be pressed when they are highlighted by the
cursor.
Cursor – Although not a widget, the cursor is used to select (and interact) with a particular
widget. As the cursor is moved from widget to widget, it may cause the widget to change
color, or you may only see the cursor itself positioned in or next to the widget. In Figure 3.1
on the next page, the cursor is positioned on the Ok button. Figure 3.2 on page 32 shows the
cursor on the first line of the text widget at the stop of the window.
As you might have guessed by our description of these widgets, the installation program is character-
based, and does not use a mouse. This is due to the fact that the installation program must run on
a wide variety of computers, some of which may not even have a mouse. The following section
describes the keystrokes necessary to interact with the installation program.
press Enter . To select an item with a check box, move the cursor to the check box and press Space to
select an item. To deselect, press Space a second time.
Pressing F12 accepts the current values and proceeds to the next dialog; it is usually equivalent to
pressing the OK button.
Please Note: Unless a dialog box is waiting for your input, do not press any keys during the instal-
lation process – it may result in unpredictable behavior.
problem. Please see Figure 3.3 on the next page for a listing of the virtual consoles, the keystrokes to
switch to them, and their contents.
In general, there should be no reason to leave virtual console #1 unless you are attempting to diagnose
installation problems. But if you are the curious type, feel free to look around.
Console Keystroke
Contents
1 Alt -
F1 installation dialog
2 Alt
- F2 shell prompt
3 Alt
- F3
install log (messages from install program)
4 Alt -F4
system log (messages from kernel, etc.)
5 Alt -F5 other messages
ALPHA
If you haven’t created your diskettes yet, please refer to the first chapter of the Red Hat Linux Alpha
Installation Addendum, and create them now. After you’ve created the necessary diskettes, please
finish reading the first chapter of the Red Hat Linux Alpha Installation Addendum for information
on starting the installation.
SPARC
If you haven’t prepared for the installation yet, please read Sections F.2 on page 355 through F.5.
Determine how you will boot the installation program, and issue the boot command that will start
the installation.
The initial screen will automatically start the installation program if you take no action within
the first minute. To disable this feature, press one of the help screen function keys.
If you press a help screen function key, there will be a slight delay as the help screen is read
from diskette.
Normally, you’ll only need to press Enter to boot. Watch the boot messages to see whether the Linux
kernel detects your hardware. If it does not properly detect your hardware, you may need to restart
the installation in “expert” mode. Expert mode disables most hardware probing, and gives you the
option of entering options for the drivers loaded during the installation. Expert mode can be entered
using the following boot command:
34 Starting the Installation
boot: expert
Please Note: The initial boot messages will not contain any references to SCSI or network cards.
These devices are supported by modules that are loaded during the installation process.
Options can also be passed to the kernel. For example, to instruct the kernel to use all the RAM in a
128 MB system, enter:
After entering any options, press Enter to boot using those options. If you do need to specify boot
options to identify your hardware, please make note of them – they will be needed later.
INTEL
Installing Without Using a Boot Diskette The Red Hat Linux/Intel CD-ROM can also be
booted by newer computers that support bootable CD-ROMs. Not all computers support this fea-
ture, so if yours can’t boot from CD-ROM, there is one other way to start the installation without
using a boot diskette. The following method is specific to Intel-based computers only.
If you have MS-DOS installed on your computer, you can boot the installation system directly from
the CD without using any diskettes.
To do this, use the following commands (assuming your CD is drive d:):
C:n> d:
D:n> cd ndosutils
D:ndosutils> autoboot.bat
Note that this method will not work if run in a DOS window – the autoboot.bat file must be
executed with DOS as the only operating system. In other words, Windows cannot be running.
If your computer can’t boot directly from CD-ROM, and you can’t use a DOS-based autoboot), you’ll
have to use a boot diskette to get things started.
PCMCIA support during the installation. If you will be using a PCMCIA device during the installa-
tion (for example, you have a PCMCIA ethernet card and you’ll be installing via NFS, or you have a
PCMCIA SCSI card and will be installing from a SCSI CD), you should select Yes.
Please Note: This question applies only to PCMCIA support during the actual installation. Your
installed Red Hat Linux system will still support PCMCIA, even if you say No here (assuming that
you select the pcmcia-cs package during the subsequent installation).
If you require PCMCIA support, you will then be asked to insert the supplemental diskette – Select
OK when you’ve done so.
The installation program will then display a progress bar as the supplemental diskette is loaded.
Please Note: If you are performing an installation in expert mode, you will be asked whether PCM-
CIA support is required. As you might imagine, you must answer Yes if the installation requires
access to a PCMCIA device.
CD-ROM – If you have a CD-ROM drive and the Red Hat Linux CD-ROM. Does not require a
supplemental diskette. Please refer to Section 3.4.1 to select the CD-ROM installation method.
NFS – If you are installing from an NFS server which is exporting the Red Hat Linux CD-ROM or
a mirror image of Red Hat Linux. Does not require a supplemental diskette. Please refer to
Section 3.4.2 on the next page to select the NFS installation method.
Hard Drive – If you copied the Red Hat Linux files to a local hard drive. Requires a supplemental
diskette. Please refer to Section 3.4.6 on page 41 to select the hard drive installation method.
FTP – If you are installing directly from an FTP server. Requires a supplemental diskette. Please
refer to Section 3.4.7 on page 42 to select the FTP installation method.
SMB Image – If you are installing from a Windows “shared drive”. Requires a supplemental
diskette. Please refer to Section 3.4.8 on page 42 to select the SMB installation method.
SCSI Select this if your CD-ROM is attached to a supported SCSI adapter; the installation program
will then ask you to choose a SCSI driver. Choose the driver that most closely resembles your
adapter. You may specify options for the driver if necessary; however, most drivers will detect
your SCSI adapter automatically.
Other If your CD-ROM is neither an IDE nor a SCSI CD-ROM, it’s an “other”. Sound cards with
proprietary CD-ROM interfaces are good examples of this CD-ROM type. The installation
program presents a list of drivers for supported CD-ROMs – choose a driver and, if necessary,
specify any driver options.
Please Note:A partial list of optional parameters for CD-ROMs can be found in Appendix D on
page 301. If you have an ATAPI CD-ROM, and the installation program fails to find it (in other
words, it asks you what type of CD-ROM you have), you must restart the installation, and enter
linux hdX =cdrom. Replace the X with one of the following letters, depending on the interface the
unit is connected to, and whether it is configured as master or slave:
(If you have a third and/or fourth controller, simply continue assigning letters in alphabetical order,
going from controller to controller, and master to slave.)
Once your CD-ROM drive has been identified, you will be asked to insert the Red Hat Linux CD-
ROM into your CD-ROM drive. Select Ok when you have done so. After a short delay, the next
dialog box will appear. Turn to Chapter 4 on page 43 to continue installing Red Hat Linux.
Static IP address – You must supply all the necessary network-related information manually.
Please Note: The BOOTP and DHCP selections require an active, properly configured bootp (or
dhcp) server running on your local area network.
If you choose BOOTP or DHCP, your network configuration will be set automatically, and you can
skip the rest of this section.
If you’ve selected Static IP address, you’ll need to specify all the networking information yourself.
Figure 3.8 on the following page contains example networking information similar to what you’ll be
needing.
Please Note: The information in figure 3.8 on the next page is a sample only! You should obtain the
proper information for your network from your network administrator.
40 Starting the Installation
Choose OK to continue.
Please Note: If you’re doing an FTP installation, head back to Section 4.6 on page 56, and pick up
where you left off. If you’re doing an SMB installation, head back to Section 4.7 on page 57, and
continue from there. If you’re doing an NFS installation, read on.
partition on a locally-attached hard drive. If you haven’t done this yet, please refer to Section 2.4.6
on page 18. Installing from a hard drive requires the supplemental diskette; when you are directed
to, please insert it in your computer’s diskette drive, and select OK. A progress bar will be displayed
as the supplemental diskette is loaded.
Next, turn to Chapter 4 on the next page, and follow the directions there.
4.1.1 Installing
You usually install Red Hat Linux on a clean disk partition or set of partitions, or over another instal-
lation of Linux.
Please Note: Installing Red Hat Linux over another installation of Linux (including Red Hat Linux)
does not preserve any information from the prior installation. Make sure you save any important
files!
If you wish to perform a full install, choose Install, and skip to section 4.2 on the next page.
44 Continuing the Installation
4.1.2 Upgrading
The installation process for Red Hat Linux 5.2 includes the ability to upgrade from prior versions of
Red Hat Linux (version 2.0 and later) which are based on RPM technology. Upgrading your system
installs the modular 2.0.x kernel as well as updated versions of the packages which are currently
installed on your machine. The upgrade process preserves existing configuration files by renaming
them using a .rpmsave extension (e.g., sendmail.cf.rpmsave) and leaves a log telling what
actions it took in /tmp/upgrade.log. As software evolves, configuration file formats can change,
so you should carefully compare your original configuration files to the new files before integrating
your changes.
If you wish to upgrade your Red Hat Linux system, choose Upgrade.
Please Note: Some upgraded packages may require that other packages are also installed for proper
operation. The upgrade procedure takes care of these dependencies, but it may need to install addi-
tional packages. You will be shown the names of the required packages, and you may then decide to
install them or not. You should install all such packages; otherwise, some of the upgraded packages
may not work properly (or at all).
Please Note: If you choose either Workstation or Server, part (or all) of your computer’s stored data
will be erased! You will be asked to confirm your decision; however, please keep in mind that once
the installation program receives your confirmation, the erasure is irrevocable.
If you choose a workstation- or server-class installation, you should turn to one of the following
sections, depending on the installation method you’ve selected:
Disk Druid – This is Red Hat Linux’s install-time disk management utility. It can create and
delete disk partitions according to user-supplied requirements, in addition to managing mount
points for each partition.
fdisk – This is the traditional Linux disk partitioning tool. While it is somewhat more flexible
than Disk Druid, the downside is that fdisk assumes you have some experience with disk
partitioning, and are comfortable with its somewhat terse user interface.
With the exception of certain esoteric situations, Disk Druid can handle the partitioning requirements
for a typical Red Hat Linux installation.
SPARC
Note that there are some things you should be aware of if you decide to use Disk Druid under Red
Hat Linux/SPARC. Please refer to Appendix F on page 353 for more information.
ALPHA
Note that there are some things you should be aware of if you decide to use Disk Druid under Red
Hat Linux/Alpha. Please refer to the Alpha Installation Addendum for more information.
Select the disk partitioning tool you’d like to use, and press Enter . If you choose Disk Druid, con-
tinue reading. If you’d rather use fdisk, please turn to Section 4.4.2 on page 52.
4.4 Creating Partitions for Red Hat Linux 47
Each line in the “Current Disk Partitions” section represents a disk partition. You’ll note that this
section has a scroll bar to the right, which means that there might be more partitions than can be
displayed at one time. If you use the " and # keys, you can see if there are any additional partitions
there. Each line in this section has five different fields:
Mount Point – This field indicates where the partition will be mounted when Red Hat Linux is
installed and running.
Requested – The “Requested” field shows the minimum size requested when the partition was
defined.
Actual – The “Actual” field shows the space currently allocated to the partition.
Another Type of Partition As you scroll through the “Current Disk Partitions” section, you
might see an “Unallocated Requested Partitions” title bar, followed by one or more partitions. As the
title implies, these are partitions that have been requested but, for one reason or another, have not
been allocated. A common reason for having an unallocated partition is a lack of sufficient free space
for the partition. In any case, the reason the partition remains unallocated will be displayed after the
partition’s mount point.
Each line in the “Drive Summaries” section represents a hard disk on your system. Each line has the
following fields:
Total – The “Total” field shows the total available space on the hard disk.
Used – This field shows how much of the hard disk’s space is currently allocated to partitions.
Free – The “Free” field shows how much of the hard disk’s space is still unallocated.
Bar Graph – This field presents a visual representation of the space currently used on the hard
disk. The more pound signs there are between the square braces, the less free space there is. In
Figure 4.4, the bar graph shows no free space.
4.4 Creating Partitions for Red Hat Linux 49
Please Note: The “Drive Summaries” section is displayed only to indicate your computer’s disk
configuration. It is not meant to be used as a means of specifying the target hard drive for a given
partition. This is described more completely in Section 4.4.1 on the next page.
These buttons control Disk Druid’s actions. They are used to add and delete partitions, and to change
partition attributes. In addition, there are buttons that are used to accept the changes you’ve made,
or to exit Disk Druid entirely. Let’s take a look at each button in order.
Add – The “Add” button is used to request a new partition. When selected, a dialog box will appear
containing fields that must be filled in.
Edit – The “Edit” button is used to modify attributes of the partition currently highlighted in the
“Current Disk Partitions” section. Selecting this button will cause a dialog box to appear. Some
or all of the fields in the “Edit Partition” dialog box may be changed, depending on whether
the partition information has already been written to disk or not.
Delete – The “Delete” button is used to delete the partition currently highlighted in the “Current
Disk Partitions” section. Selecting this button will cause a dialog box to appear asking you to
confirm the deletion.
Ok – The “Ok” button causes any changes made to your system’s partitions to be written to disk.
You will be asked to confirm your changes before Disk Druid rewrites your hard disk partition
table(s). In addition, any mount points you’ve defined are passed to the installation program,
and will eventually be used by your Red Hat Linux system to define the filesystem layout.
Back – This button causes Disk Druid to abort without saving any changes you’ve made. When
this button is selected, the installation program will take you back to the previous screen, so
you can start over.
While there is some overlap between Disk Druid’s buttons and the available functions keys, there are
two function keys that have no corresponding buttons:
F2 (Add NFS) – This function key is used to add a read-only NFS-served filesystem to the
set of mount points on your Red Hat Linux system. When selected, a dialog box will appear
containing fields that must be filled in.
F5 (Reset) – This function key is used to discard all changes you may have made while
in Disk Druid, and return the list of partitions to those read from the partition table(s) on
your hard disk(s). When selected, you’ll be asked to confirm whether you want the changes
discarded or not. Note that any mount points you’ve specified will be lost, and will need to be
reentered.
50 Continuing the Installation
Please Note: You will need to dedicate at least one partition to Red Hat Linux, and optionally more.
This is discussed more completely in Section 2.7.5 on page 26.
Now let’s see how Disk Druid is used to set up partitions for your Red Hat Linux system.
Adding a Partition
To Add a new partition, select the Add button, and press Space or Enter . A dialog box entitled
“Edit New Partition” will appear (see Figure 4.5). It contains the following fields:
Mount Point – Highlight this field, and enter the partition’s mount point. For example, if this
partition should be the root partition, enter /, enter /usr for the usr partition, and so on.
Size (Megs) – In this field, enter the size (in megabytes) of the partition. Note that this field
starts with a “1” init, meaning that unless you change it, you’ll end up with a 1 MB partition.
Delete it using the Backspace key, and enter the desired partition size.
Growable? – This check box indicates whether the size you entered inthe previous field is
to be considered the partition’s exact size, or its minimum size. Press Space to check and
uncheck the box. When checked, the partition will grow to fill all available space on the hard
disk. In this case, the partition’s size will expand and contract as other partitions are modified.
Note that you can make more than one partition growable; if you do so, the additional free
space will be shared between all growable partitions.
Type – This fieldcontains
a list of different partition types. Select the appropriate partition
type by using the " and # keys.
4.4 Creating Partitions for Red Hat Linux 51
Allowable Drives – This field contains a list of the hard disks installed on your system, with
a check box for each. If a hard disk’s box is checked, then this partition may be created on that
hard disk. If the box is not checked, then partition will never be created on that hard disk. By
using different check box settings, you can direct Disk Druid to place partitions as you see fit,
or let Disk Druid decide where partitions should go.
Ok – Select this button and press Space when you are satisfied with the partition’s settings,
and wish to create it.
Cancel – Select this button and press Space when you don’t want to create the partition.
Problems When Adding a Partition If you attempt to add a partition and Disk Druid can’t
carry out your request, you’ll see a dialog box like the one in Figure 4.6. In the box are listed any
partitions that are currently
unallocated, along with the reason they could not be allocated. Select the
Ok button, and press Space to continue. Note that the unallocated partition(s) are also displayed
on Disk Druid’s main screen (though you may have to scroll the “Current Disk Partitions” section to
see them).
Deleting a Partition
To delete a partition,
highlight the partition in the “Current Disk Partitions” section, select the Delete
button, and press Space . You will be asked to confirm the deletion.
52 Continuing the Installation
Editing a Partition
Please Note: If the partition already existed on your hard disk, you will only be able to change the
partition’s mount point. If you want to make any other changes, you will need to delete the partition
and recreate it.
Starting Over
If you’d like to abandon any changes you’ve madewhile in Disk Druid, and would rather use fdisk
instead, you can select the Back button, and press Space . If you want to continue using Disk Druid,
but would like to start over, press F5 , and Disk Druid will be reset to its initial state.
Once you’ve finished configuring partitions and entering mount points, your
screen should look
something like the one in Figure 4.7 on the facing page. Select OK, and press Space . Then turn to
Section 4.5 on page 56.
An Overview of fdisk
fdisk includes online help which is terse but useful. Here are a few tips:
To list the current partition table, use the p command (see Figure 4.9).
Linux fdisk creates partitions of type Linux native by default. When you create a swap
partition, don’t forget to change it to type Linux swap using the t command. The value for
the Linux swap type is 82. For other partition types, use the l command to see a list of
partition types and values.
Linux allows up to four (4) partitions on one disk. If you wish to create more than that, one
(and only one) of the four may be an extended partition, which acts as a container for one or
more logical partitions. Since it acts as a container, the extended partition must be at least as
large as the total size of all the logical partitions it is to contain.
It’s a good idea to write down which partitions (e.g., /dev/hda2) are meant for which filesys-
tems (e.g., /usr) as you create each one.
Please Note: None of the changes you make take effect until you save them and exit fdisk
using the w command. You may quit fdisk at any time without saving changes by using the
q command.
When you are finished partitioning your disks, press Done; you may see a message indicating that
the installation program needs to reboot. This is a normal occurrence after changing a disk’s partition
data; it usually happens if you created, changed, or deleted any extended partitions. After you press
OK, your machine will reboot. Follow the same installation steps you did up until Partitioning
Disks; then simply choose Done.
If you are performing an upgrade, the installation program tries to find your root partition automat-
ically; if it does, it obtains all this information automatically, and goes on to the next step.
Red Hat Linux also allows you to mount read-only NFS volumes when
your system boots; this
allows directory trees to be shared across a network. To do so, press F2 . If you have not selected
a network-related installation method, you will be presented with several dialog boxes concerning
56 Continuing the Installation
network configuration (Turn back to Section 3.4.4 on page 39 for more information). Fill them in
appropriately. You will then see a dialog box entitled “Edit Network Mount Point”. Enter the NFS
server’s hostname, the path to the NFS volume, and the local mount point for that volume (see
Figure 4.11).
If the installation program can’t find a swap partition and you’re sure one exists, make sure you have
set the partition type to Linux swap; see Section 4.4 on page 46 for information on how this is done
with Disk Druid or fdisk.
If you are performing an FTP installation, please mark this place in the manual, because you’ll be re-
turning here later. Turn to Section 3.4.3 on page 38. This section will guide you through the necessary
network configuration dialog boxes. When you get to the “FTP Setup” dialog box, come back here. . .
OK, you’re back. You should have entered all the necessary network information, and should now
be looking at the “FTP Setup” dialog box. Here’s where you point the installation program at the
FTP site of your choice (see Figure 4.13 on the next page). Enter the name or IP address of the FTP
site you are installing from, and the name of the directory there which contains the RedHat directory
for your architecture. For example, if the FTP site contains the directory
/pub/mirrors/redhat/i386/RedHat, enter /pub/mirrors/redhat/i386. If you are not us-
ing anonymous FTP, or if you need to use a proxy FTP server (if you’re behind a firewall, for exam-
ple), check the check box, and another dialog box will request the FTP account and proxy informa-
tion.
If everything has been specified properly, you should see a message box indicating that
base/hdlist is being retrieved.
If you are doing a workstation- or server-class installation, please turn to Chapter 5 on page 65.
Otherwise, turn to Section 4.9 on page 59 to continue installing Red Hat Linux.
returning here later. Turn to Section 3.4.3 on page 38. This section will guide you through the neces-
sary network configuration dialog boxes. When you get to the “SMB Setup” dialog box, come back
here. . .
At this point, you should have entered all the necessary network information, and should now be
looking at the “SMB Setup” dialog box. This is where you’ll specify which SMB server, share, and
account information the installation program should use (See Figure 4.14 on the facing page).
First, you’ll need to enter the SMB server name. It’s important to note that the name expected here is
the server’s Microsoft Networking name, and not a fully qualified domain name.
Next, enter the name of the shared volume. Since different implementations of the SMB protocol
handle share names differently, you might find that the case of the share name is important. In most
cases (no pun intended) entering the share name in lower case seems to work best.
Next, enter the account name and password. In general, the account name should be guest. A
password (which is case-sensitive) must be present. If the share is made available without a password,
it will most likely not work.
After entering all the required information, select Ok, and press Space . If everything is working
properly, there will be a slight delay as the list of available packages is read by the installation pro-
gram.
If you are doing a workstation- or server-class installation, please turn to Chapter 5 on page 65.
Otherwise, turn to Section 4.9 on the facing page to continue installing Red Hat Linux.
4.8 For Hard Drive Installations Only. . . 59
Space . If you wish to check for bad blocks while formatting each filesystem, select Check for bad
blocks during format. Select OK, and press Space .
At this point, the installation program will format every partition you selected for formatting. This
can take several minutes (and will take even longer if you directed the installation program to check
for bad blocks).
Once all partitions have been formatted, the installation program starts to install packages. A win-
4.10 Selecting and Installing Packages 63
Package Installation Progress Bar – A bar showing how complete the current package installa-
tion is.
Statistics Section – This section has three rows labeled “Total”, “Completed”, and “Remaining”.
As you might guess, these rows contain statistics on the total number of packages that will
be installed, statistics on the number of packages that have been completely installed, and
statistics on the packages that have not yet been installed. The information tracked on these
three rows includes:
Overall Progress Bar – This bar changes color showing how close to completion the entire instal-
lation is.
If you’re doing an FTP installation, a message box will pop up as each package is retrieved from the
FTP site.
64 Continuing the Installation
At this point there’s nothing left for you to do until all the packages have been installed. How quickly
this happens depends on the number of packages you’ve selected, and your computer’s speed. Once
all the packages have been installed, please turn to the next chapter to finish your installation of Red
Hat Linux.
5
Finishing the Installation
If you find an exact match for your mouse in the list, highlight that entry.
If you find a mouse that you are certain1 is compatible with your mouse, highlight that entry.
Otherwise, select one of the Generic entries, based on your mouse’s number of buttons, and
its interface. To determine your mouse’s interface, follow the mouse cable back to where it
plugs into your system. If the connector at the end of the mouse cable plugs into a rectangular
1 No guessing allowed!
66 Finishing the Installation
connector, you have a serial mouse. On the other hand, if the connector is round, you have
a PS/2 mouse. If you are installing Red Hat Linux on a laptop computer, in most cases the
pointing device will be PS/2 compatible.
The Emulate 3 Buttons checkbox allows you to use a two-button mouse as if it had three buttons. In
general, it’s easiest to use the X Window System if you have a three-button mouse. If you select this
checkbox, you can emulate a third, “middle” button by pressing both mouse buttons simultaneously.
If you’ve selected a mouse with a serial interface, you will then see a screen similar to the one shown
in Figure 5.2 on the facing page. Simply highlight the appropriate serial port for your mouse, select
Ok, and press Space .
If you wish to change your mouse configuration after you have booted your Red Hat Linux system,
you may use the /usr/sbin/mouseconfig command.
clockchips. The recommended choice is No Clockchip Setting, since XFree86 can automatically
detect the proper clockchip in most cases.
Finally, Xconfigurator
prompts you to select the video modes you wish to use; select one or more
modes by pressing Space . Xconfigurator then writes a configuration file containing all of your
choices to /etc/X11/XF86Config.
Keep this setup – Keeps the network configuration you used during the installation. All
the networking information you entered previously becomes part of your system’s permanent
configuration.
Reconfigure network now – The installation program presents the network configuration
dialogs in Section 3.4.3 on page 38. The values you used during installation will be filled in as
5.4 Configuring the Clock 69
defaults. Choose this if your system will be installed on a network other than the one you used
to install Red Hat Linux.
Don’t setup networking – Don’t set up networking at all. Your system will not have network-
ing configured. Choose this if you installed your system over a network, but it will be used as
a standalone workstation.
Note that you can run /usr/sbin/ntsysv or /sbin/chkconfig after the installation to change
which services automatically start on reboot.
After selecting a printer type, you’ll be presented with a dialog box entitled “Standard Printer Op-
tions” (see Figure 5.7 on page 72). Enter the name of the queue and the spool directory you’d like to
use, or accept the default information.
The dialog box you’ll see next depends on the printer connection type you selected. Turn to the
section that corresponds to your printer connection type:
5.6 Configuring a Printer 71
After selecting the printer type, you will see a dialog box similar to the one in Figure 5.12 on the
next page. Set the paper size and resolution appropriately. The Fix stair-stepping of text check box
should be checked if your printer does not automatically perform a carriage return after each line.
Finally, you’ll see a dialog box that contains all the information pertaining to your printer (see Fig-
ure 5.13 on page 76). Verify that the information is correct. If everything looks OK, select Done. If
you need to make changes, select Edit. You can also select Cancel if you’d rather not configure a
printer at this time.
If you select Done, you will be given the option to configure another printer, or you may continue
with the installation.
5.6 Configuring a Printer 75
Use It Instead of LILO – You can use a boot diskette instead of LILO. This is handy if you’re
trying Red Hat Linux for the first time, and you’d feel more comfortable if the boot process for
your other operating system is left unchanged. With a boot diskette, going back to your other
operating system is as easy as removing the boot diskette and rebooting.
Use It In Emergencies – The boot diskette can also be used in conjunction with a rescue disk,
which will give you the tools necessary to get an ailing system back on its feet again2 .
Use It When Another Operating System Overwrites LILO – Other operating systems may
not be as flexible as Red Hat Linux when it comes to supported boot methods. Quite often,
installing or updating another operating system can cause the master boot record (originally
containing LILO) to be overwritten, making it impossible to boot your Red Hat Linux installa-
tion. The boot diskette can then be used to boot Red Hat Linux so you can reinstall LILO.
Giventhese reasons to create a boot diskette, you should seriously consider doing so. Select Yes and
press Space to create a boot diskette. Next, you’ll see a dialog box directing you to insert a blank
2 To do this, you’ll need to create a rescue diskette from the rescue.img image contained in the images
directory of your Red Hat Linux CD-ROM. Appendix B on page 225 explains how to do this.
78 Finishing the Installation
diskette in your computer’s diskette drive. Select Ok, and press Space when you’ve done so.
After a short delay, your boot diskette will be done. After removing it from your diskette drive, label
it clearly. Note that if you would like to create a boot diskette after the installation, you’ll be able
to do so. If you boot your system with the boot diskette (instead of LILO), make sure you create
a new boot diskette if you make any changes to your kernel. For more information, please see the
mkbootdisk man page.
The Master Boot Record (MBR) is the recommended place to install LILO, unless the MBR al-
ready starts another operating system loader, such System Commander or OS/2’s Boot Man-
ager. The master boot record is a special area on your hard drive that is automatically loaded
by your computer’s BIOS, and is the earliest point at which LILO can take control of the boot
process. If you install LILO in the MBR, when your machine boots, LILO will present a boot:
prompt; you can then boot Red Hat Linux or any other operating system you configure LILO
to boot (see below).
5.9 Installing LILO 79
The first sector of your root partition is recommended if you are already using another boot loader
on your system (such as OS/2’s Boot Manager). In this case, your other boot loader will take
control first. You can then configure that boot loader to start LILO (which will then boot Red
Hat Linux).
A dialog box will appear that will let you select the type of LILO installation you desire (see Fig-
ure 5.16). Select the location you wish to install LILO and press OK. If you do not wish to install
LILO, press Skip.
Please Note: If you choose Skip, you will not be able to boot your Red Hat Linux system directly,
and will need to use another boot method (such as a boot diskette). Use this option only if you know
you have another way of booting your Red Hat Linux system!
Finally, the installation program will display a screen similar to the one in Figure 5.18 on page 81.
Every partition that may be bootable is listed, including partitions used by other operating systems.
The “Boot label” column will be filled in with the word linux on the partition holding your Red Hat
Linux system’s root filesystem. Other partitions may also have boot labels. If you would like to add
80 Finishing the Installation
Boot Diskette You can use the boot diskette created by the installation program (if you elected to
create one).
LOADLIN can load Linux from MS-DOS; unfortunately, it requires a copy of the Linux kernel (and
an initial ram disk, if you have a SCSI adapter) to be available on an MS-DOS partition. The
5.10 Finishing Up. . . 81
only way to accomplish this is to boot your Red Hat Linux system using some other method
(e.g., from LILO on a diskette) and then copy the kernel to an MS-DOS partition. LOADLIN is
available from
ftp://sunsite.unc.edu/pub/Linux/system/boot/dualboot/
and sunsite’s various mirror sites.
SYSLINUX is an MS-DOS program very similar to LOADLIN; it is also available from
ftp://sunsite.unc.edu/pub/Linux/system/boot/dualboot/ and sunsite’s
various mirror sites.
Some commercial bootloaders, such as System Commander, are able to boot Linux (but still
require LILO to be installed in your Linux root partition).
Pressing Enter – Causes LILO’s default boot entry (as defined by the dialog box shown in
Figure 5.18) to be booted.
82 Finishing the Installation
Entering a Boot Label, followed by Enter – Causes LILO to boot the operating system
corresponding to the entered boot label.
Doing Nothing – After LILO’s timeout period, (which, by default, is five seconds) Lilo will
automatically boot the default boot entry.
Do whatever is appropriate to boot Red Hat Linux. You should see one or more screens worth of
messages scroll by. Eventually, you should see a login: prompt.
Congratulations! Your Red Hat Linux installation is complete! If you’re not sure what to do next,
turn to Chapter 6.
6
What Do I Do Now?
Now that your installation of Red Hat Linux is complete, you might be wondering, “What do I do
now?” If so, this chapter is for you. We’ll start with some basic things you should know in order
to properly start and stop your Red Hat Linux system. Then we’ll show you how to do some post-
installation configuration so you can set things up just the way you want it. But before we do any of
that, let’s talk about documentation. . .
New To Linux – Has never used any Linux (or Linux-like) operating system before, or has had only
limited exposure to Linux. May or may not have experience using other operating systems
(such as Windows). Is this you? If so, please turn to Section 6.1.1.
Some Linux Experience – Has installed and successfully used Linux (but not Red Hat Linux)
before. Or, may have equivalent experience with other Linux-like operating systems. Does
this describe you? If so, please turn to Section 6.1.2 on the facing page.
Old Timer – Has installed and sucessfully used Red Hat Linux before. Are you an old-timer? If so,
please turn to Section 6.1.3 on the next page.
An brief history of Linux – Many aspects of Linux are the way they are because of historical
precedent. There is also a Linux culture that, again, is based to a great deal on past history. A
bit of knowledge about the history of Linux will serve you well, particularly as you interact
with more experienced Linux users on the Internet.
An explanation of how Linux works – While it’s not necessary to delve into the most ar-
cane aspects of the Linux kernel, it’s a good idea to know something about how Linux is put
together. This is particularly important if you’ve been working with other operating systems;
some of the assumptions you hold about how computers work may not transfer from that op-
erating system to Linux. A few paragraphs that discuss how Linux works (and particularly
how it differs from the operating system you’re used to), can be invaluable in getting off to a
good start with your Red Hat Linux system.
An introductory command overview (with examples) – This is probably the most important
thing to look for in Linux documentation. The design philosophy behind Linux is that it’s
better to use many small commands connected together in different ways than it is to have a
few large (and complex) commands that do the whole job themselves. Without some examples
that illustrate the Linux approach to doing things, you will find yourself intimidated by the
sheer number of commands available on your Red Hat Linux system.
As you gain more experience using your Red Hat Linux system, you’ll probably find that you’ll need
more in-depth information. Continue reading the next section to find out more about the kinds of
documentation that will help you at that point.
6.1 Getting the Documentation That’s Right For You 85
An extensive list of available commands – While you can find this sort of information on-
line in the man pages, you might also want it in book form. While there are several such books
on the market, Red Hat sells the Linux Complete Command Reference. This book contains the
man page entries for hundreds of commands, system calls and file formats, all formatted for
easy reading. Best of all, there is a comprehensive index, and a searchable version of the book
on CD-ROM. A book like this is invaluable for:
Task-oriented information – Many times, you’ll find that you’d like to configure your Red
Hat Linux system in a certain way, but you’re not sure where to begin. In this case, it’s often
a big help to see what others in similar circumstances have done. This is where the Linux
Documentation Project (also known as the LDP) can come in handy. Each of their HOWTOs
document a particular aspect of Linux, from low-level kernel esoterica, to using Linux in an
amateur radio station.
If you selected one of the various howto packages when you installed Red Hat Linux, you’ll
find the HOWTOs on your system in /usr/doc/HOWTO. If, on the other hand, you’d like
a printed version of these documents, Red Hat Software sells Linux Undercover, which is a
compendium of the most popular LDP documents.
There are times when you’ll just have to sit there and look at the sources to understand things. For-
tunately, because of the freely available nature of Linux, it’s easy to get the sources. Now if it were
only that easy to understand them. . .
Now that we’ve covered documentation, let’s look at some of the most commonly-performed system
tasks.
86 What Do I Do Now?
Selecting Red Hat Linux at the LILO prompt – If you elected to install LILO, and you
entered boot labels for other partitions containing other operating systems, your computer will
be configured to dual boot. This means that you can enter the
name of the operating system you
want to boot at the LILO Boot: prompt. If you press the Tab key at the LILO prompt, you’ll
see a list of the operating systems LILO can boot for you. Select the entry for your Red Hat
Linux installation, and you’re off and running!
Booting from a diskette – If you created a boot diskette when you installed Red Hat Linux,
you can boot from that to get Linux running. Make sure the diskette is inserted in your com-
puter’s first diskette drive,
and startthe boot sequence by applying power, pressing the reset
button, or typing the Ctrl , Alt , and Del keys simultaneously.
As you might guess from the last line, it’s time to log in. . .
6.2 Basic System Tasks 87
Logging In
The first time you log into your Red Hat Linux system, you’ll have to log in as “root”. This is the name
of the user account that has full access to everything on the system. Normally, the root account is only
used when performing system administration tasks, such as creating new user accounts, shutting
down the system, etc. That’s because root’s unrestricted access can wreak havoc if you enter the
wrong command. So be careful when logged in as root, and use the root account only when needed!
To log in, enter root at the login: prompt. Press the Enter (or Return ) key. A Password: prompt
should appear. Type the same password you entered back in Section 5.7 on page 76, pressing Enter
when done. You should then see something like this:
[root@bigdog /root]#
Congratulations! You’ve successfully logged in! Next, it’s time to learn how to log out.
Logging Out
When you’re done using your Red Hat Linux system, you should log out. Although many shells
have a logout command, most people simply type Ctrl -D . This should return you to the login
prompt you first saw when you booted your Red Hat Linux system.
Please Note: If you’re using the X Window System, your log out procedure will be different, de-
pending on how you’ve started X. We’ll cover this in more detail later.
Now that you know how to log in and out, let’s move on. . .
Accounts
As it turns out, there are several different ways of creating new accounts. We’ll use the most basic
method; the useradd command. Basically, all you need to enter (as root, remember!) is:
88 What Do I Do Now?
That wasn’t very exciting, was it? Well, let’s try to login:
login:
Not knowing what blarg’s password was, we just pressed Enter . Guess that wasn’t the right pass-
word. Say, how do you specify a password for a new account?
Passwords
The first two scenarios are really one and the same; there’s really no difference (as far as passwd is
concerned) between an account that’s just be created, or one that has existed for the past five years.
All you need to remember is that you must be logged in as root, and that you must specify the account
name whose password you want to change. Using the account we just created as an example, let’s
give passwd a try:
As you might have guessed, the password is not displayed when you enter it. You also have to type
the password twice, to make sure you didn’t make a mistake while entering it. Let’s try logging into
the new account again:
6.2 Basic System Tasks 89
Once you’re logged in to an account, you can change that account’s password by using the passwd
command without the account name. In this case, you will be asked for the account’s current pass-
word, followed by the new password:
The su Command
There may be times when you’d like to issue a command or two as another user. Normally, system
administrators need this capability – they (like all good sysadmins) use their personal, non-privileged
account most of the time. But maybe a user’s password needs to be changed, or the permissions on
a system file need to be modified. Such things only take a minute, so it’s a pain logging out, logging
in as root, doing whatever it was they needed to do as root, logging out, and – finally – logging back
into their personal accounts.
A much simpler approach is to use the su command. With su, your current login session can “be-
come” a root (or other user’s) login session. In the following example, user blarg decides they need
to do something as root:
[blarg@bigdog blarg]$ su
Password:
[root@bigdog blarg]#
As you can see, after issuing the su command, the user is prompted for a password – the root pass-
word. After it’s been entered correctly, the usual shell prompt is displayed. But if you look closely,
you’ll note that the shell prompt is different. For one, it starts with root, indicating that the current
user has changed. The other difference is the prompt’s ending character, which changed from a dol-
lar sign ($) to a pound sign (#). This is a traditional way of indicating whether a shell is running as
root or not.
90 What Do I Do Now?
It’s also possible to use su to become another user. To do this, run su, giving only the user’s account
name. So, to become user blarg, one need only issue the command su blarg. If you ran su from
your own account, you’ll need to enter the other user’s password (in our example, user blarg’s pass-
word would be required). However, if you were already root, no password is required, as it would
be somewhat redundant.
You’ll find that su will come in handy, particularly if you, like most Linux users, act as your own
system administrator.
ps ax
Each one of the lines displayed by ps represents a process. You can think of each process as being
a “running program”. Each process may be working with files, and if you simply turn off your
computer, these processes won’t have a chance to close those files, and finish running in a clean
manner. So when the time comes to shut your system down, you’ll need some way of telling all these
processes to finish up, and exit cleanly. And the way this is normally done is with the shutdown
command.
The shutdown command can only be run by root, so you’ll need to either be logged in as root, or
you can use the su command to “become” root. The basic syntax for shutdown is:
Please Note: The shutdown program resides in /sbin. If your PATH environment variable does
not include /sbin, you will need to include the full path when you enter the command (i.e.,
/sbin/shutdown -h now).
In most cases, you should include one of the following options:
If you don’t include either option, shutdown will bring your system into “single user” mode. Un-
less you know why you want to be in single-user mode, you probably don’t want to be in single-user
6.3 The X Window System 91
mode. Simply enter the shutdown command (this time with -h or -r), and the shutdown will com-
plete normally.
The shutdown command also gives you quite a bit of flexibility in terms of timing. If you want the
shutdown to proceed right away, just enter the word “now”. If you want to shut the system down
five minutes from now, you can enter “+5”. Therefore, this command:
shutdown -r +15
means, “shut the system down starting fifteen minutes from now, and reboot after the shutdown has
completed”. While shutdown has more options available, we’ve only described the basics necessary
to perform a clean shutdown. If you’re interested in learning more, enter man shutdown to learn
more about shutdown’s capabilities.
XFree86 Configuration
Xconfigurator
xf86config
by hand
92 What Do I Do Now?
Xconfigurator and xf86config are functional equivalents and should work equally well. If you
are unsure of anything in this process, a good source of additional documentation is:
http://www.xfree86.org
Xconfigurator is a full-screen menu driven program that walks you through setting up your X
server. xf86config is a line oriented program distributed with XFree86. It isn’t as easy to use
as Xconfigurator, but it is included for completeness. If these utilities fail to provide a work-
ing XF86Config file, you may have an unsupported card or you may need to write the config file
by hand. Usually the former is the case, so check and make sure your card is supported before at-
tempting to write the config file yourself.If your card is not supported by XFree86 you may wish to
consider using a commercial X server. If you have questions about whether or not your video card is
supported you can check out http://www.xfree86.org for information on XFree86.
The X Server Provided you selected the proper video card at install time, you should have the
proper X server installed. When later running Xconfigurator or xf86config, you need to make
sure you select the same video card or the autoprobe will fail.
If you think you installed the wrong X server for your video card, you will have to install the correct
one before it can be configured. For instance, if the CD is mounted on /mnt/cdrom, and you need
to install the S3 server, enter the following commands:
cd /mnt/cdrom/RedHat/RPMS
rpm -ivh XFree86-S3-3.1.2-1.i386.rpm
ln -sf ../../usr/X11R6/bin/XF86_S3 /etc/X11/X
This will install the S3 server and make the proper symbolic link.
Xconfigurator To configure X Windows you must first select your video card. Scroll down the
list of supported cards until you locate the card in your machine. Figure 6.1 may help you determine
the video server that matches your hardware. If your card is not listed it may not be supported by
XFree86.In this case you can try the last card entry on the list (Unlisted Card) or a commercial X
Windows server.
The next step is to select your monitor. If your monitor is not listed you can select one of the generic
monitor entries or “Custom” and enter your own parameters. Custom monitor configuration is rec-
ommended only for those who have a sound understanding of the inner workings of CRT displays.
The average user should probably use one of the generic selections from the list. After selecting a
monitor you need to tell Xconfigurator how
much video
memory you have. Move the highlight to
the appropriate list entry and then press Enter or F12 to continue. For the next step it is recom-
mended that you select the default (No Clockchip Setting) entry, but experienced users may want to
select a specific clockchip.
6.3 The X Window System 93
Selecting your Server If you are unsure what chipset you have, the best way to find out is
usually to look at the card. Figure 6.1 lists which chipsets and boards require which servers. Pick the
one that best matches your hardware.
Server Chipset
8514 IBM 8514/A Boards and true clones
AGX All XGA graphics boards
I128 #9 Imagine 128 (including Series II) boards
Mach32 ATI boards using the Mach32 chipset
Mach64 ATI boards using the Mach64 chipset
Mach8 ATI boards using the Mach8 chipset
Mono VGA boards in monochrome
P9000 Diamond Viper (but not the 9100) and Others
S3 #9 Boards, most Diamonds, some Orchids, Others
S3V Boards using the S3 ViRGE (including DX, GX, VX) chipset
SVGA Trident 8900 & 9400, Cirrus Logic, C & T, ET4000, S3 ViRGE, Others
VGA16 All VGA boards (16 color only)
W32 All ET4000/W32 cards, but not standard ET4000’s
Finishing Up If later you want to increase your refresh rate for your monitor, you can edit the
config file by hand or you can run Xconfigurator again and pick a monitor from our list that more
closely matches the specs of your monitor.
The final configuration step consists of selecting the video modes that you want to include in your
XF86Config file. Use the arrow keys to move the cursor up and down the list under
each color
depth (8, 16 and 24 bit). Use the Spacebar to select individual resolutions and the Tab key to move
between color depth fields. When you
have selected the
video modes you want to use move the
cursor to the “OK” button and press Enter , or use the F12 shortcut. An information screen will
give you the most current information on selecting video modes, starting and stopping the X server.
Starting X Manually
Red Hat Linux, as installed, will not start X automatically for you. Therefore, you’ll see the same
character-cell login prompt you saw when you first booted your Red Hat Linux system.
In order to get X started, you’ll first need to log in. Do so (using your non-root account), and then
enter the startx command. The screen should go blank, and (after a short delay) you should see
a graphical desktop with one or more windows. The appearance of the desktop you’ll see will vary,
depending on the packages you installed and other variables.
When you’re done, and you’d like to leave X, you can click on any part of the desktop (in other
words, the part of the screen without any windows) using your mouse’s primary button. Select the
“Exit Fvwm”, “Quit”, or “logout” menu entry, and X will shut down, leaving you at your original
character-cell shell prompt. You can then logout as usual.
Starting X Automatically
Please Note: Make sure you verify that your X configuration works properly before making X start
automatically. Failure to do so can make it difficult to log into your Red Hat Linux system. If you
haven’t done so already, review the previous section before continuing.
It is possible to configure your Red Hat Linux system such that X will start automatically whenever
the system is booted. When configured in this manner, xdm will run, which will present a graphically-
oriented login screen. After logging in, you will have a regular X session running, just as if you had
issued a startx command manually. Pretty neat, eh?
Here’s a quick overview of how it’s done:
Testing xdm Using telinit – The telinit command is used to change your Red Hat Linux
system’s “run level”. It is the run level that controls various aspects of system operation, including
whether xdm should be started or not. Newly-installed Red Hat Linux systems use run level 3 as
their default; this results in the character-cell login prompt you’ve seen. Since xdm is started at run
level 5, you’ll need to issue the command:
6.3 The X Window System 95
/sbin/telinit 5
Please Note: You will need to be logged in as root in order to use telinit. Also note that you
should not be running anything else on your Red Hat Linux system when you change run levels, as
any running programs may be killed by the run level change.
If everything is configured properly, after a short delay you should see an xdm login screen. Log in,
verifying that an X desktop appears. Then log out to make sure that xdm reappears. If it does, your
system is configured properly to automatically start X. If there are problems, you can go back to run
level 3 using telinit (ie, “/sbin/telinit 3”), or by rebooting.
Editing /etc/inittab – The file /etc/inittab is used to, among other things, determine the
system’s default run level. We need to change the default run level from 3 to 5; therefore, we’ll need
to edit /etc/inittab. Using the text editor of your choice, change this line in /etc/inittab:
id:3:initdefault:
id:5:initdefault:
Please Note: Make sure you change only the number 3 to be 5! Do not change anything else,
otherwise your Red Hat Linux system may not boot at all! When you’ve made the change, exit the
editor, and use this command to review your handiwork:
less /etc/inittab
(Press the Space key to page through the file; Q will exit.) If everything looks OK, it’s time to
reboot.
Rebooting – Refer to Section 6.2.4 on page 90 to properly reboot your Red Hat Linux system.
Congratulations! You’re now fully graphical (well, your system is, at least). . .
Thanks to wmconfig, it’s easy to change the appearance of your desktop. Simply select the Prefer-
ences menu entry, and (under WM Style) you’ll be able to pick from several different desktop (also
known as window manager) styles. If you want to learn more about the nuts and bolts behind the
scenes, read the wmconfig man page for more information.
96 What Do I Do Now?
Note that even if you’re running X, you still have access to the regular character-cell user interface.
That’sbecause
Red
Hat Linux
uses virtual consoles while X is running. To switch to a virtual console,
press Ctrl -Alt -Fn , where Fn is any one of the first six function keys. When switching virtual
consoles, you should see a standard login prompt; at this point you can login and use the system
normally on any (or all) of the virtual consoles.
When you’d like to go back to your X session, simply press Ctrl -Alt -F7 .
Please Note: Some people remap keys under X; if you do this, be aware that your X keyboard
mappings
will only be active when in X. This can be confusing if, for example, you’ve swapped
the Ctrl and Caps Lock keys under X, as you will have to use two different keystrokes to switch
between X and non-X virtual consoles.
There are several tools that can make life easier for the new Red Hat Linux user. They perform tasks
that either require root access, or can only be done by memorizing arcane commands. They all require
X to run, so you’ll need to get that set up first. These tools are:
User Information Tool – Makes it easy to update your “gecos”, or basic account information.
Run /usr/bin/userinfo to start it.
User Password Tool – Changing passwords is simple with this tool. It’s started by running
/usr/bin/userpasswd
Filesystem Mounting Tool – Makes mounting and unmounting filesystems simple. Every
user-mountable filesystem must have the user option present in /etc/fstab (see the mount
man page for more information on the user option). Run
/usr/bin/usermount to start it.
Network Device Tool – Starting and stopping network interfaces becomes a point-and-click
operation with this tool. Run /usr/bin/usernet to start this tool. Requires that every inter-
face to be controlled by usernet is configured to be “user-controllable” This can be done by
using netcfg, and selecting the interface’s Allow any user to (de)activate interface checkbox.
ALPHA
Modular sound drivers are not supported for Alpha-based systems.
Red Hat Linux 5.2 includes modular versions of the standard OSS/Free sound drivers. This makes it
possible to load and unload the various sound drivers without recompiling the kernel or rebooting.
For additional information, please consult the README files in the rhsound documentation direc-
tory (/usr/doc/rhsound*). The latest information can always be found at
ftp://ftp.redhat.com/pub/sound/.
If you have any issues concerning the modular sound drivers, please send mail to
sound-bugs@redhat.com. There is also a mailing list associated with the modular sound drivers
(sound-list@redhat.com). To subscribe, send mail to sound-list-request@redhat.com
with ”subscribe” as the subject line.
At this point, most sound cards should be recognized by the modular sound drivers; however,
drivers for the following sound cards were among the first to be developed, and as such, have re-
ceived the most testing:
Plug and Play Aware – sndconfig is able to detect and automatically configure Plug and Play
sound cards such as the Sound Blaster 16 PnP. The configuration information is stored in the
/etc/isapnp.conf file, along with the configuration information for any other Plug and
Play devices. In order to ensure that no configuration will be lost, sndconfig saves your
original /etc/isapnp.conf file as /etc/isapnp.conf.bak.
98 What Do I Do Now?
To set up your sound card, run /usr/sbin/sndconfig. Note that you must be root in order to run
sndconfig. If your system contains a Plug and Play sound card, sndconfig will identify it, and
configure it appropriately.
If you do not want sndconfig to probe for Plug and Play sound cards, run sndconfig with the
--noprobe option. It is also possible to manually specify the settings for your sound card; to do so,
run sndconfig with the --noautoconfig option.
If sndconfig cannot automatically identify your system’s sound card (or you ran sndconfig with
the --noprobe
option), you’ll be asked to select the type of sound card you have (See Figure 6.2).
Use the " and # keys to scroll through the different cards listed, and position the highlight on the
entry that matches your system’s sound card.
If you’ve run sndconfig with the --noautoconfig option, you’ll see a screen similar to the one in
Figure
6.3 on the facing page. Here is where you can specify the settings for your sound card. Using
the Tab key, select a field. Then
use the arrow keys to select the desired setting for that field. When
finished, select Ok, and press Space .
Finally, sndconfig will attempt to play a sound sample to verify proper configuration of your sound
card. If you can hear the sound sample (make sure the speaker volume is turned up), you’re done!
6.5 Mouse configuration 99
Red Hat Linux includes thousands of pages of online documentation to help you learn how to use the
system. The man pages, info documents, and plain text files included provide information on almost
every aspect of Linux. If you’ve installed it, Red Hat Linux also includes documentation produced
by the Linux Documentation Project.
Man Pages – Authoritative reference material for commands, file formats, and system calls.
Package Documentation – Many packages include additional documentation; RPM can help
you find it.
HOWTOs and FAQs – Helpful information from the Linux Documentation Project.
The locate Command – A command that can help bridge the gap between a command and
its documentation.
info Pages – Hypertext documentation without the Web.
102 Finding Documentation
q to quit
Enter to page down line by line
Space to page down page by page
b to page back up by one page
/ followed by a string and Enter to search for a string
n to find the next occurrence of the previous search
There are times when it’s just a lot more convenient to read something from a sheet of paper. Pro-
viding you have a working printer, you can print man pages as well. If you don’t have Postscript
printing capability and just want to print ASCII, you can print man pages with:
If you do have a postscript printer, you will probably want to print with:
In both of those commands substitute “COMMAND” for the command you are trying to get help for.
Sometimes you’ll find that certain system components have more than one man page. Here is a table
showing the sections that are used to divide man pages:
7.1 On Line Help 103
Section Contents
1 user commands
8 system commands
2 system calls
3 library calls
4 devices
5 file formats
6 games
7 miscellaneous
9 kernel internals
n Tcl/Tk commands
This is also the order in which the sections are searched. This can be important; here’s an example:
Let’s say that you want to see the man page for the swapon system call. So, you type man swapon.
You will actually get the man page for swapon(8), which is actually the command used to control
swapping. Using the chart above, you can see that what you want is a “system call” and is located in
section 2. You can then type man 2 swapon. All of this is because man searches the man directories
in the order shown above, which means that the swapon(8) man page would be found before the
swapon(2) man page.
You can also search the man pages for strings. You do this using
man -k string to search for. This won’t work, however, unless the makewhatis database has
been created. Under Red Hat Linux, this is done by a cron job overnight. If you don’t leave your sys-
tem running overnight the database won’t get created. If that is the case, run the following command
as the root user:
/etc/cron.weekly/makewhatis.cron
Once you’ve done that (note that it might take a while), you could enter man -k swapon. That
command would return:
# man -k swapon
swapon, swapoff (2) - start/stop swapping to file/device
swapon, swapoff (8) - enable/disable devices and files for
paging and swapping
So you can see that there are pages in section 2 and 8 both referring to swapon (and swapoff in this
case).
Man pages provide a great deal of information in very little space. Because of this, they can be
difficult to read. Here’s a quick overview of the major sections in most man pages:
104 Finding Documentation
Name – The name of the program or programs documented in the man page. There may be
more than one name, if the programs are closely related.
Synopsis – An overview of the program’s command syntax, showing all options and argu-
ments.
Description – A short description of the program’s function.
Options – A list of all options, with a short description of each (often combined with the
previous section).
See Also – If present, lists the names of other programs that are related in some way to this
program.
Files – If present, contains a list of files that are used and/or modified by the program.
If you are new to Linux, don’t expect to be able to use man pages as tutorials; they are meant as
concise reference material. Trying to learn about Linux using the man pages is similar to trying to
learn how to speak English from reading a dictionary. But there are other sources of information
that may be more useful to those people just starting out with Linux; let’s continue our search for
documentation. . .
This command will return a listing of all the documentation (including man pages) from the package
containing the file /usr/bin/rtin. RPM is capable of a lot more than this simple example. For
more information on RPM, turn to Chapter 9 on page 165.
Of course, maybe this kind of information is not exactly what you’re looking for. Maybe you’re more
interested in task-oriented documentation. If so, read on. . .
zless 3Dfx-HOWTO.gz
The zless command uses the same keystrokes as less, so you can easily move back and forth
through a HOWTO.
/usr/doc/HOWTO/mini contains the ASCII versions of all the available mini-HOWTOs. They are
not compressed and can be viewed with more or less.
/usr/doc/HOWTO/other-formats/html contains the HTML versions of all the HOWTOs and
the Linux Installation and Getting Started guide. To view things here, just use the web browser of your
choice.
/usr/doc/FAQ contains ASCII versions (and some HTML versions) of some popular FAQs, includ-
ing the RedHat-FAQ. They can be viewed using more or less, or (in the case of HTML files) with
the web browser of your choice.
/etc/cron.daily/updatedb.cron
You will need to be root on your system when doing that. That will allow locate to work properly.
So, if you know you need to find all the “finger” files, you could run:
106 Finding Documentation
locate finger
/usr/bin/finger
/usr/lib/irc/script/finger
/usr/man/man1/finger.1
/usr/man/man8/in.fingerd.8
/usr/sbin/in.fingerd
One thing to note, however, is that locate not only returns hits based on file name, but also on path
name. So if you have a /home/djb/finger/ directory on your system, it would get returned along
with all files in the directory.
<list-name>-request@redhat.com
To subscribe, send mail to the address of the list you want to subscribe to with subscribe in the
Subject: line.
To unsubscribe, send mail to the address of the list you want to unsubscribe from with
unsubscribe in the Subject: line.
Then to send mail to the list, you just send it to the address above without the -request in the name.
Red Hat Software currently hosts a number of newgroups specifically for users of our software. You
can either read these groups directly from news.redhat.com, or ask your news admin to add the
redhat.* hierarchy to their news server.
108 Finding Documentation
8
System Configuration
After installing your Red Hat Linux system, it’s easy to think that the decisions you made during the
installation are engraved in granite, never to be changed again. Nothing could be further from the
truth!
One of the main strengths of Linux is that the operating system can be configured to do just about
anything. Here at Red Hat Software, we’ve worked hard to try to make system configuration as easy
and accessible as possible. To that end, we’ve worked hard on two fronts:
Anyone familiar with Red Hat Linux over the years has probably seen what we call our “control
panel” system configuration tools. These tools have been developed by Red Hat Software to make
system configuration easier. And while these tools do make life easier for the Red Hat Linux user, we
began a search for a system configuration tool with even more flexibility and power.
Our search ended with the inclusion of linuxconf into Red Hat Linux 5.1 in June of 1998. Now, with
this version of Red Hat Linux, we’ve been able to more fully document the more popular aspects of
system configuration using linuxconf.
Note that we said “more popular aspects”. One of linuxconf’s greatest strengths – the incredible
range of configuration options under its control – is actually a liability when it comes time to docu-
110 System Configuration
ment them all. Rest assured however, that we will continue to expand linuxconf documentation as
new versions of Red Hat Linux are released.
But what about the control panel tools? They’re still there. While linuxconf at present can do nearly
everything the control panel tools can, there are two areas in which the control panel still holds the
upper hand:
Printer configuration
To that end, we’ve left the control panel documentation in this manual as the second half of this
chapter.
But now, let’s take a look at linuxconf. . .
Notation
Accurately describing the location of specific screens within linuxconf is easy, but lengthy given
linuxconf’s hierarchical nature. If the structure was a family tree, most of the data entry screens are
in the fourth generation. To describe the path to the screen where you would add new users to your
system, we could write this out as:
“select the Config option from the main screen, then the users accounts option off of
that; on the users accounts screen that appears, select the normal option and then select
the user accounts option.”
8.1 System Configuration With Linuxconf 111
Rather lengthy and not immediately accessible. Given the structural similarity to a family tree, we
could write it as
But that’s an awful lot of begets. Instead, we’ll use the following format:
Config ) Users accounts ) Normal ) User accounts
It’s much more concise and clear. It assumes as its base the linuxconf entry screen. The other advan-
tage to this approach is that it’s not interface specific, so regardless of which interface you’re using,
you know exactly where the information is. You’re happy, we’re happy, and the trees who lobbied
against lengthy descriptions are happy. What could be better?
system at any rate1 . Anyway, type linuxconf at the shell prompt to begin the program. Linuxconf
has the following user interfaces:
Command line – Linuxconf’s command-line mode is handy for manipulating your system’s
configuration in scripts.
Character-Cell – Using the same user interface style as the Red Hat Linux installation pro-
gram, the character-cell interface makes it easy to navigate your way through linuxconf, even
if you aren’t running X.
X Window-Based – Linuxconf can take advantage of X, and give you an easy-to-use “point
and click” tree menu interface. This form of navigation is new in Linuxconf! Please see the Tree
Menu Interface subsection of section 8.1.1 for more information. This is the interface we’ll use
for illustrations throughout this chapter.
Web-Based – A web-based interface makes remote system administration a breeze. The web
interface will even play nice with the Lynx character-cell web browser!
Linuxconf will normally start in either character-cell or X mode, depending on the DISPLAY en-
vironment variable. The first time you run linuxconf, an introductory message will be displayed;
although it is only displayed once, accessing help from the main screen will give you the same basic
information.
Linuxconf has context-specific help available. For information on any specific aspect of linuxconf,
please select Help from the screen you’d like help with. Note that not all help screens are complete
at this time; as help screens are updated, they will be included in subsequent versions of linuxconf.
The new version of Linuxconf comes complete with a tree menu interface.
1 One could argue that it’s pretty much the same thing.
8.1 System Configuration With Linuxconf 113
Finding the appropriate panel should be simple and fast! You can collapse and expand sections by
clicking on the menu item icons. Click the icon once to activate it for that particular sub-menu. A
single click will then collapse it; another single click will expand it again.
Selected entries will appear as tabs in the right-hand panel and will remain there until closed. This
will greatly reduce the clutter of windows on your desktop that Linuxconf has typically caused. If
you end up with more tabs open than you like, just hit Cancel on the bottom of each tab to close it
without making any changes, or Accept to implement them.
Please Note: If you’ve grown fond of the previous X Windows interface, it’s still available. To return
to it:
4. De-select the This module is active checkbox for the treemenu module.
5. Click Accept
114 System Configuration
6. Click Quit
7. Restart Linuxconf
For security reasons, web-based access to linuxconf is disabled by default. Before attempting to
access linuxconf with a web browser, you’ll need to enable access. Here’s how to do it from the
text-mode interface:
4. In the Linuxconf html access control dialog box, enter the hostname of any computers that
should be allowed access to linuxconf. This would also include your own system, if you wish
to use the web-based interface locally. Web accesses related to linuxconf may be logged to your
system’s htmlaccess.log file by selecting the check box shown.
5. Select the Accept button and press Space . Then select the Quit buttons on each dialog box to
back out
of the menu hierarchy. When you come to a dialog box labelled Status of the system,
press Enter to take the default action, which is to apply the changes you’ve made.
At this point, web-based access has been enabled. To test it out, go to one of the systems that you
added to the access control list. Launch your web browser, and enter the following URL:
http://<host>:98/
(Replacing <host> with your system’s hostname, of course.) You should see the main linuxconf
page. Note that you will need to enter your system’s root password to gain access beyond the first
page.
4. Select Add
8.1 System Configuration With Linuxconf 115
Adding a user is one of the most basic tasks you will encounter in administering your system. To
add a user:
The User account creation tab is where you enter all the information on the new account. There are
a number of fields you should be aware of, some required, some optional.
Required Fields:
Login name – the name of the account. Usually all lowercase letters. First or last names,
initials or some combination thereof are fairly common login names. For a user named John T.
Smith, “smith”, “john”, “jts”, or “jsmith” would be common user names. Of course “spike” or
something else works just fine, too. You can also use numbers so “jts2” would be fine if you
had a second person with the same initials. There is no default for this field.
Optional Fields:
Full name – this is the name of the user or the account. For an individual, it would be their
name, “John T. Smith” for example. If the account represents a position rather than a person,
the full name might be the title. So an account called “webmaster” might have a full name of
“Red Hat Webmaster” or just “Webmaster”. There is no default for this field.
116 System Configuration
group – here you can specify the group associated with the account. The default is a group
that’s the same as the login name. So “jsmith” would have the group “jsmith”.
Supplementary groups – here is where you can specify any additional groups. We suggest
that if you want to add a user to a group or groups, you do so here, rather than changing the
group field. Group names should be separated by spaces. The default for this field is blank,
meaning no supplementary groups.
Home directory – specifies the home or login directory for the account. The default is
/home/login, where login is replaced by the login name. A home directory is your starting
point in the directory structure when you log in, or if in X, for each xterm window opened.
This is also where account specific preference files are stored.
Command interpreter – specifies the location of the command interpreter. Command inter-
preters are usually referred to as shells. The default is displayed in the drop down box.
User ID – the number associated with each user account. This is automatically generated by
the system when the account is created.
The User account creation screen has a number of fields; only the login name is required, though
filling in the Full name field is strongly recommended. Once you have entered the login name and
8.1 System Configuration With Linuxconf 117
any other desired information select the Accept button at the bottom of the screen. If you decide
against creating a new user, hit Cancel instead.
Upon hitting Accept linuxconf will prompt you to enter the password. There is also a field called
Confirmation where you will need to type the password again. This is to prevent you from mistyping
the password. Passwords must be at least 6 characters in length. They may contain numbers as well
as a mix of lowercase and uppercase letters. Hit Accept when finished.
6. Select Accept
If you have more than 15 accounts on the system, Linuxconf will provide you with a filter
screen (see figure 8.4 on page 116). You can use this to select a smaller range of accounts than
the full list. To get the full list, select Accept without changing any of the parameters. For
detailed information on the various filters, select the Help button on the Filter control screen.
Select the account you wish to modify. This will open the User information tab.
8.1 System Configuration With Linuxconf 119
On the User information screen, the information can be changed as desired. To implement the
changes select Accept. If you decide against making any changes select Cancel. This guarantees
that no changes are made.
Linuxconf will then prompt you to enter the new password. There is also a field called Confirmation
where you will need to type the password again. This is to prevent you from mistyping the password.
8.1 System Configuration With Linuxconf 121
Passwords must be at least 6 characters in length. They may contain numbers as well as a mix of
lowercase and uppercase letters. If you decide against changing the password, just hit Cancel. Once
you have entered the new password select Accept.
Changing the roots password isn’t handled in the same manner as changing a user’s password. Be-
cause of both the importance and security considerations surrounding root access, linuxconf requires
you to verify that you currently have access to the root account.
The screen is a little confusing because neither the title, nor the description really explains the screen’s
purpose. Linuxconf seems to be asking for the new password, which isn’t actually the case. Instead
linuxconf wants the current root password to verify access to the root account. Linuxconf does re-
quire root access to run, but once running there’s nothing to keep anyone from sitting down at the
computer if the person using linuxconf steps out for a minute. The potential pitfalls are extensive! If
the person who was originally using linuxconf, logs out of root, they won’t be able to get back into
it. A lack of validation would also give free reign over the computer to whoever had changed root’s
password.
Once you have entered root’s current password, it will prompt you for a new password. There
is also a field called Confirmation where you will need to type the password again (see figure 8.7
on page 119). This is to prevent you from mistyping the password. Passwords must be at least 6
122 System Configuration
characters in length. They may contain numbers as well as a mix of lowercase and uppercase letters.
If you decide against changing the root password, just hit Cancel. Once you have entered the new
password select Accept. The change takes place immediately and is effective not only for logging in
as root, but also for becoming root using the su command.
Why disable an account? Good question! There’s no single answer, but we can provide some reasons
why this option is available. The biggest reason is security. For example, you may have created a
special account to be used by clients, coworkers, or friends to access specific files on your system.
This account gets used from time to time, but should only be used when you know there’s a need.
Leaving an unused account around is a target for people who’d want to break into your system.
Deleting it requires you to recreate it every time you want to use it. Disabling an account solves both
problems by allowing you to simply select or de-select a check-box.
To disable an account:
De-select the check-box that states that The account is enabled. Select the choiceAccept button
at the bottom of the window and you’re all set.
The account is disabled and can be enabled later using a similar method.
By default, all newly-created user accounts are enabled. If you need to enable an account, you can
use Linuxconf to do it.
7. Select Accept
Please Note: While there are a couple options that let you retain files associated with an account,
any information or files deleted are gone and effectively unrecoverable. Take care when using this
option!
To delete an account:
On the User accounts screen (see figure 8.5 on page 117) select the account you wish to delete
At the bottom of the User information screen (see figure 8.8 on page 120) select Del to delete
the account.
useraccount-1998-10-10-497.tar.gz
The date indicates when the account was deleted, and the number following it is the process
ID of the process that actually performed the deletion. The oldaccounts directory is created
in the same place as all of your user directories, and is created automatically the first time you
remove a user account using this option.
3. Files not contained in the user’s home directory, but owned by that user remain. The file is
owned by the deleted account’s user ID (UID). If you create a new account and specifically
assign it the UID of a deleted account, it will then become the owner of any remaining files.
8.1 System Configuration With Linuxconf 125
Selecting Delete the account’s data on the Deleting account <accountname> screen (see figure 8.10)
will:
Please Note: Files not contained in the user’s home directory, but owned by that user will remain
on the system. The file will still be owned by the deleted account’s user ID (Uid). If you create a new
account and specifically assign it the Uid of a deleted account, it will then become the owner of any
such “orphaned” files.
Selecting Leave the account’s data in place on the Deleting account <accountname> screen (see
figure 8.10) will:
Please Note: Files and directories owned by the deleted account’s user ID (Uid) will remain on the
system. If you create a new account and specifically assign it the Uid of a deleted account, it will then
become the owner of these “orphaned” files.
8.1.2 Groups
All users belong to one or more groups. Just as each file has a specific owner, each file belongs to
a particular group as well. The group might be specific to the owner of the file, or may be a group
shared by all users. The ability to read, write or execute a file can be assigned to a group; this is
separate from the owner’s rights. For example, the owner of a file will be able to write to a document,
while other group members may only be able to read it.
4. Select Add
5. Enter the Group name, and optionally alternate members
6. Select Accept
If you have more than 15 groups, you will be given the option to select the groups by providing a
prefix.
You may add a group directly from this screen, or move on to the User groups screen. To move on
select choiceAccept with or without a prefix, to add a new group, hit choiceAdd.
Select Add at the bottom of the User groups screen.
8.1 System Configuration With Linuxconf 127
Enter a group name. You may also wish to specify members of the group and can do so in the
Alternate members field. The list of users should be space delimited, meaning that each username
must have a space between it and the next one. When you’re finished, select Accept and the group
will be created.
5. Select Del
6. Confirm deletion
128 System Configuration
To delete a group:
If you have more than 15 groups, you will be given a filter screen (see figure 8.11 on the page before)
to narrow your choice of groups by specifying a prefix.
On the User groups screen (see figure 8.12) select the group you wish to delete.
You’ll be presented with the Group specification screen (see figure 8.13 on the next page)
8.1 System Configuration With Linuxconf 129
Select Del to delete the group. Linuxconf will then prompt you to confirm the deletion. Choose
yes to delete the group.
The group’s files will still remain and their respective owners will still have sole control over them.
The group name will be replaced with the deleted group’s ID. The files may be assigned to a new
group by using the chgrp command. More information on chgrp can be found by typing the com-
mand info chgrp or man chgrp at the shell prompt. If a new group is created and the deleted
group’s ID is specified then the new group will have access to the deleted group’s files. Don’t worry,
linuxconf doesn’t recycle old group numbers any more than it does old user IDs, so it won’t happen
by accident.
There are two ways to modify the list of users that belong to a group. You can either update each
user account itself, or you can update the group definitions. In general, the fastest way is to update
each of the group definitions. If you’re planning on changing more information for each user than
just the group information, then updating each user account may prove easier.
130 System Configuration
- Under Groups
5. Add or remove new users to the Alternate members(opt) field; make sure all user names are
separated with a space “ ” character
5. Select Accept
- Under Users
5. Select Accept
6. Repeat steps 3 through 5 for each additional user to be added
If you have more than 15 groups, you will be given a filter screen (see figure 8.11 on page 127) to
narrow your choice of groups by specifying a prefix.
Select the group you wish to modify. This will open the Group specification screen (see fig-
ure 8.13 on page 129).
Add or remove each user from the Alternate members field. Make sure that all of the user
names are separated by a space “ ” character.
Once you’ve done this select Accept which can be found at the bottom of the screen.
This will automatically update each user account with the group showing up in the Supplementary
groups field if added or absent if removed.
Adding and removing groups can also be done by modifying each individual user account.
If you have more than 15 accounts on the system, Linuxconf will provide you with a filter screen (see
figure 8.4 on page 116).
On the User accounts screen (see figure 8.5 on page 117), select a user that you wish to update.
You will be presented with the User information screen (see figure 8.8 on page 120).
Add or remove the desired groups from the, choiceSupplementary groups field. Each group
should be separated by a space “ ” character.
Once you’ve made all the changes you’d like, select choiceAccept at the bottom of the screen.
This will automatically update the group definitions. Repeat the process for each user.
files as leaves. Filesystems reside on mass storage devices such as diskette drives, hard drives, and
CD-ROMs.
For example, a diskette drive on DOS and Windows machines is typically referenced by A:n. This
describes both the device (A:), and the root directory on that device (n). The primary hard drive on
the same systems is typically referred to as the “C” drive because the device specification for the first
hard drive is C:. To specify the root directory on the C drive, you would use C:n.
Under this arrangement, there are two filesystems – the one on A:, and the one on C:. In order to
specify any file on a DOS/Windows filesystem, you must either explicitly specify the device on which
the file resides, or it must be on the system’s default drive (which is where DOS’ infamous C prompt
comes from – that’s the default drive in a system with a single hard drive).
Under Linux, it is possible to link the filesystems on several mass storage devices together into a
single, larger, filesystem. This is done by placing one device’s filesystem “under” a directory on
another device’s filesystem. So while the root directory of a diskette drive on a DOS machine may be
referred to as A:n, the same drive on a Linux system may be accessible as /mnt/floppy.
The process of merging filesystems in this way is known as mounting. When a device is mounted, it
is then accessible to the system’s users. The directory “under” which a mounted device’s filesystem
becomes accessible is known as the mount point. In the previous paragraph’s example, /mnt/floppy
was the diskette drive’s mount point. Note that there are no restrictions (other than common con-
ventions) as to the naming of mount points. We could just as easily mounted the floppy to
/long/path/to/the/floppy/drive.
One thing to keep in mind is that all of a device’s files and directories are relative to its mount point.
Consider the following example:
A Linux System
A CD-ROM
So, if the above describes the individual filesystems, and you mount the CD-ROM at /foo, the new
operating system directory structure would be:
To mount a filesystem make sure to be logged in as root, or become root using the su command. For
the latter, type su at the shell prompt and then enter the root password. Once you are root, type
mount followed by the device and then the mount point. For example, to mount the first diskette
drive on /mnt/floppy, you would type the command mount /dev/fd0 /mnt/floppy.
At installation, Red Hat Linux will create /etc/fstab. This file contains information on devices
and associated mount points. The advantage to this file is that it allows you to shorten your mount
commands2 . Using the information in /etc/fstab, you can type mount and then either the mount
point or the device. The mount command will look for the rest of the information in /etc/fstab.
It’s possible to modify this file by hand, or by using linuxconf. To use linuxconf, please see Sec-
tions 8.1.3 and 8.1.3 on page 135.
Source – The physical hardware; hd indicates an IDE hard drive, fd indicates a diskette drive,
and cdrom typically indicates a CD-ROM drive. If your system has a SCSI drive, you will see
an sd instead. More than one drive of a type are listed by letters, so hda represents the first
IDE drive, while hdb would be the second. In some cases, you’ll see numbers following these
letters; on hard drives, the numbers represent the partitions on that drive, while for diskette
drives, this number refers to the actual unit.
2 It also controls which filesystems are automatically mounted when the system is booted.
134 System Configuration
Mount point – This is where in the system the drive is to be mapped when mounted.
FsType – This is where the type of filesystem is indicated. A standard Linux partition uses the
ext2 filesystem type. A filesystem type of vfat indicates a DOS filesystem with long filename
support, while a fat filesystem type is for DOS filesystems supporting traditional 8.3 filenames.
The iso9660 filesystem type indicates a CD-ROM drive, as seen in figure 8.14.
Please Note: Red Hat Linux 5.2 can access FAT32 filesystems using the vfat filesystem type.
Size – Size indicates the size of the filesystem in megabytes (M). For removable media devices
such as diskette and CD-ROM drives the stated size is listed as zero.
Partition type – A description of the filesystem used on that partition.
Filesystems from other machines on a network may also be available. These can range from single
small directories or entire volumes. No information on Size or Partition type is available for these
partitions, either. Additional information on these filesystems (should you have any available) will
be contained under:
Config ) File systems ) Access nfs volume
8.1 System Configuration With Linuxconf 135
The screen is similar to the Local volume screen (see figure 8.14 on the facing page), with some
notable differences in the information provided for each entry:
Source – This will be the name of the machine serving the filesystem, followed by the re-
mote directory. For example: foo:/var/spool/mail where foo is the machine serving the
directory, and /var/spool/mail is the directory being served.
4. Select Add
136 System Configuration
6. Enter the path to the remote filesystem in the Volume field. For example, /var/spool/mail
NFS stands for Network FileSystem. It is a way for computers to share sections of their local filesys-
tem across a network. These sections may be as small as a single directory, or include thousands of
files in a vast hierarchy of directories. For example, many companies will have a single mail server
with individuals’ mail files served as an NFS mount to each users’ local systems.
To add an NFS mount:
On the NFS volume screen (see figure 8.15 on the page before), select Add
The three fields on the Base tab are what you’ll need to concern yourself with.
Server – The host name of the machine the desired filesystem resides on. For example,
foo.bar.com.
Volume – The filesystem you wish to add. For example, /var/spool/mail.
Mount point – Where in your system you want the remote file system accessible from. For
example, /mnt/mail.
This is all you need to get the mount created. Linuxconf will update your /etc/fstab file ac-
cordingly. If you are aware of additional requirements, please read the help file on the Volume
specification screen and see the mount man page for more information.
Once you have entered the information, select Accept.
8.1 System Configuration With Linuxconf 137
4. Select Add
5. Select the type of connection
7. Select Use PAP authentication only if necessary (only available for PPP accounts)
8. Select Accept
There are several pieces of information you will need to get from your ISP (Internet Service Provider)
or systems administrator before getting your PPP or SLIP account working. In the case of some
providers, you may have to sort through directions on how to set up a PPP connection on a Linux
system. Some ISPs are ill-equipped to handle individuals using Linux. Don’t worry, you can still
get connected; you just need some additional information from your ISP. The following is what you
need for a connection with Red Hat Linux. The ISP representatives may tell you you don’t need
this information, or may tell you you need more than this. Red Hat has streamlined the information
needed using intelligent defaults and tools such as linuxconf to simplify this process for you. Unless
they have a document specifically for Red Hat Linux, just request the information below and go from
there. Specifically, you’ll need:
an IP address for your machine if the network you are connecting to isn’t going to provide you
a dynamic one
whether or not your ISP uses an authentication method such as PAP, CHAP or MS-CHAP. If
so, you will need a secret to enable authentication. The secret will be a word or sequence of
characters. CHAP and MS-CHAP are not currently supported using linuxconf, and are rarely
used.
Additional information which may be helpful, but isn’t necessary includes a secondary nameserver
address, and a search domain. Once you have all this information, you’re ready to get connected.
Select Add
8.1 System Configuration With Linuxconf 139
Initially there won’t be any configurations specified. When you select Add you will be given a choice
between PPP, SLIP and PLIP.
PPP is the most commonly used interface and is the default. To set up a PPP connection select PPP
and hit Accept.
You’ll see the following fields:
Modem port - indicates where your modem is. Should already be set.
Use PAP authentication (checkbox) - check if you know that the system you are dialing into
requires this
Notice that the title bar is PPP interface ppp0. ppp0 is the first PPP interface, ppp1 would be the
second and so on. It’s important to keep track of which interface you’re using if you have more than
one. SLIP connections use sl instead of ppp for their interface prefix. With the exception of a PAP
authentication option, the entry screens for adding a PPP or a SLIP account are identical.
Enter the complete phone number for the remote machine, and make sure to include any numbers
required to access outside lines. For example, if you need to dial “9” and then the number, and the
computer you’re connecting to has a telephone number of “555 0111”, then you’d enter “95550111”.
The next thing it asks you for is the modem port. This is a drop down box of available ports. If
you’re using a dual-boot Linux/Windows system and you know the COM port your modem is on,
the following map may be of use:
Map to Windows COM ports are as follows:
The login name is the one for the PPP account. The password you enter will be shown in plain text,
so be careful who you have around when you enter it! If you will be using PAP authentication, check
the box; when you’ve entered the other required information, select the Customize button at the
bottom of the screen. All the other information is provided on the various tabs and can be set within
the Customize screen, but it’s easier to find the information all in one place on the primary screen.
Select the PAP tab and enter your username and then the secret the ISP has provided you in the Secret
field. The other defaults should be sufficient, but if you need to, you can edit the initial settings using
the Customize option.
6. Select Accept
You can edit an existing configuration as well as delete it by selecting it from the list on the
PPP/SLIP/PLIP configurations screen.
You will then be presented with the choicePPP/SLIP/PLIP configurations screen (see fig-
ure 8.17 on page 139). Select the configuration you would like to modify or delete.
8.1 System Configuration With Linuxconf 143
This will open the appropriate interface screen for your configuration. If you wish to delete the
configuration, the handy Del button is there at the bottom of the screen. The Modem port is on the
Hardware tab and, again, is a drop down menu. If you want to change the other settings you entered
when you originally created the configuration, you’ll want to select the Communication tab. The
first Send field contains your login, and the next Send field contains your password. The Expect
fields correspond to the login: and password: prompts, which explains the ogin: and ord:
entries.
Once you have made your changes, you can test to see if your configuration is working. Select Con-
nect from the bottom of the screen. This will attempt to connect you to the remote system using the
information you’ve entered. Once you’ve finished configuring and testing your setup, we recom-
mend using the usernet utility to control your dial-up networking connection on a daily basis. See
the usernet man page for more information.
144 System Configuration
Due to the number of possible choices and sub-choices, no quick reference is available for this section.
Setting up a network connection over ethernet requires an entirely different type of setup. Network
connections to token ring or arcnet networks follow a similar procedure, but will not be discussed
here.
The first item on this screen is a checkbox to indicate whether this adaptor is enabled or not. It should
be checked if this is the one you intend to use. Below that is a choice of Config modes. Manual means
that you will be providing all the information and entering it yourself. DHCP and bootp retrieve
their information from a remote server of the corresponding kind. If you’re not sure what option to
choose, talk to your systems administrator. If you’re the systems administrator and you’re not sure,
select Manual, and consider a career in the food-services industry. . .
DHCP and bootp Required fields:
Net device - The type of network card you are using; for example, eth0 would be the appro-
priate entry to use the first Ethernet card.
Kernel module - The correct module based on your network card; for further information see
the list below.
146 System Configuration
For DHCP and bootp configurations you only need to specify the Net device and the Kernel module.
For the Net device, you will choose from a list where the eth prefix represents ethernet cards, the
arc specifies an arcnet card and the tr specifies token ring cards. A complete list of network cards
and their respective modules can be found in Section D.4 on page 304. For the most recent up to date
list, please see our website at:
http://www.redhat.com
The netmask information will be set by default, though depending on what kind of network you are
setting up, or becoming a part of, you may need to specify this. If you are connecting to an ISP, ask
them for the information. Most likely it will be 255.255.255.0 (the default).
Required fields for Manual Configuration:
Primary name + domain – the primary name is the name of your computer, while the domain
is how your network is specified. For example, foo.bar.com; foo is the primary name and
bar.com is the domain.
IP address – this is the address of the machine and will follow the pattern of x.x.x.x. For
example, 192.168.0.13
Net device – type of network card you are using; eth0 would be the appropriate entry to use
the first ethernet card
Kernel module – the correct module based on your network card
Information on net devices and kernel modules is described above. The appropriate primary name +
domain and IP address will depend on whether you are adding the computer to an existing network
or creating a new network. For connecting to an existing network, contact your systems administra-
tor for the information. Getting a network connected to the Internet is beyond the scope of this book,
and we recommend the following starting point:
TCP/IP Network Administration, 2nd Edition, by Craig Hunt (O’Reilly and Associates)
If you’re setting up a private network that won’t ever be connected to the Internet, then you can
choose any primary name + domain name you would like and have several choices for IP addresses
(See Figure 8.24).
The three sets of numbers above, correspond to class a, b, and c networks respectively. The classes
are used to describe the number of IP addresses available as well as the range of numbers used to
described each. The numbers above have been set aside for private networks.
Please Note: You cannot use these IP addresses if you connect to the Internet. If you want your
network to be connected to the Internet, or think you might want to at some point in the future, do
yourself a favor, and get yourself non-private addresses now.
Nameserver Specification
A nameserver and default domain are also needed to establish a network connection. The name-
server is used to translate host names such as private.network.com to their corresponding IP ad-
dress such as 192.168.7.3. The default domain tells the computer where to look if a fully qualified
hostname isn’t specified. Fully qualified means that the full address is given, so foo.redhat.com
is the fully qualified hostname, while the hostname is simply foo. If you specified your default do-
main as redhat.com, then you could use just the hostname to connect successfully. For example
ftp foo would be sufficient if your search domain is redhat.com, while ftp foo.redhat.com
would be required if it wasn’t.
To specify the nameserver, open Config ) Networking ) Name server specification (DNS) .
Nameservers are ranked according to the order in which they are accessed, so it’s not unusual to see
nameservers referred to as primary, secondary, tertiary and so on down the list if more than one is
specified. Each of these must be an IP address and not a name. The computer has no way to re-
solve the name until it connects to a nameserver. Screamingly obvious when stated, but occasionally
overlooked when people are simply asked to supply an address for a computer.
In addition to a default domain, you can also specify search domains. Search domains work differ-
ently; they progress from one to six in a similar manner to the nameserver. However, they all take
precedence over the default domain! Keep this in mind when specifying search domains. Search
domains are not commonly used.
The one item not yet covered is the checkbox for DNS usage. If you are running a small private net-
work with no Internet connection, then using /etc/hosts files and keeping them all synchronized
will work. As you add more and more machines, the complexity increases until it is easier to have a
single machine run a DNS than to continue to sync /etc/hosts files.
There is another reason for not using DNS, and that is if your network is going to use NIS instead.
Note that NIS can be used in conjunction with DNS. So to sum it all up, unless you know why using
/etc/hosts or NIS would be best for your situation, DNS is probably going to be your best choice.
You can add, modify, or delete entries from the /etc/hosts file using linuxconf. Open Config )
Networking ) Misc ) Information about other hosts .
To modify or delete an entry select it. To delete the entry, select Del at the bottom of the host/network
definition screen.
To modify it, change the information as necessary. To add a new entry, select Add at the bottom of
148 System Configuration
the /etc/hosts screen. This will also open the host/network definition screen.
Required Fields:
Primary name + domain – the primary name is the name of the computer, while the domain
is how the network it is attached to is specified. For example, given foo.bar.com, foo is the
primary name and bar.com is the domain.
IP number – also referred to as IP address; this is the address of the machine and will follow
the pattern of x.x.x.x. For example, 192.168.0.13
Optional Fields:
Alias – A shorthand for the fully qualified domain name. This is often the same as the primary
name. So, for example, if the fully qualified domain name is foo.bar.com, you could select
foo as the alias.
Comment – a comment on the machine. For example, “The remote nameserver”.
8.1 System Configuration With Linuxconf 149
You will need to specify both the primary name + domain and the IP number. The other fields are
optional. Once finished, select Accept.
The zone field is a pull-down list that is long and extensive. It is often designated by a large region
and then a city or zone within it. Examples include Europe/Vienna and US/Eastern. There is a
checkbox to Store date in CMOS in GMT format. Hours are specified from 0 (midnight) to 23 (11
150 System Configuration
PM). Months are specified by number as well. For the year, please specify all four digits. All other
fields should be self explanatory.
xhost +localhost
After starting the control panel, simply clicking on an icon starts up a tool. Please note that you are
not prevented from starting two instances of any tool, but doing so is a very bad idea because you
may try to edit the same files in two places and end up overwriting your own changes. If you do
accidentally start a second copy of a tool, you should quit it immediately. Also, do not manually edit
any files managed by the control-panel tools while the tools are running. Similarly, do not run any
other programs (such as linuxconf) that may change those files while the tools are running.
PostScript files
In other words, simply printing a GIF or RPM file using the lpr command will result in the printer
doing “the right thing”.
In order to create a new print queue, choose Add. Then, select what type of printer is being added.
There are four types of print queues which can be configured with printtool:
8.2 System Configuration With the Control Panel 153
Local print queues are for printers attached to a printer or serial port on your Red Hat Linux
system.
Remote print queues are attached to a different system which you can access over a TCP/IP
network.
SMB print queues are attached to a different system which uses LAN-Manager-type (SMB)
networking.
NCP print queues are attached to a different system which uses Novell’s NetWare network
technology.
ALPHA
NetWare print queues are not supported supported out-of-the-box on Red Hat Linux/Alpha.
After choosing the printer type, a dialog box requests further information about the print queue (See
Figure 8.32 on the next page). All types of print queues require the following information:
Queue Name: What the queue will be called. Multiple names can be specifed with the |
(pipe) character separating entries.
Spool Directory: This is the directory on the local machine where files are stored before
printing occurs. Be careful to not have more than one printer queue use a given spool directory.
File Limit: Maximum size print job accepted, in kilobytes (1 kb = 1024 bytes). A size of 0
indicates no limit should be imposed.
Input Filter: Filters convert printed files into a format the printer can handle. Press Select to
choose the filter which best matches your printer (See Figure 8.33 on page 155).
In addition to configuring print queues able to print graphical and PostScript output, you
can configure a text-only printer, which will only print plain ASCII text. Most printer drivers
are also able to print ASCII text without converting it to PostScript first; simply choose Fast
text printing when you configure the filter. Please Note: This only works for non-PostScript
printers.
154 System Configuration
Suppress Headers: Check this if you don’t want a header page printed at the beginning of
each print job.
Printer Device: Usually /dev/lp1; the name of the port which the printer is attached to. Se-
rial printers are usually on /dev/ttyS? ports. Note that you will need to manually configure
serial parameters.
For remote printers, the dialog box contains additionsl fields; fill in the following information:
The remote machine must be configured to allow the local machine to print on the desired queue.
Typically /etc/hosts.lpd controls this.
For SMB and NCP printers, fill in the following information:
Hostname of Printer Server: Name of the machine to which the printer you want to use is
attached.
IP number of Server: The IP address of the machine to which the printer you want to use is
attached; this is optional.
User: Name of user you must login as to access the printer (typically guest for Windows
servers, or nobody for samba servers).
8.2 System Configuration With the Control Panel 155
Password: Password (if required) to use the printer (typically blank). Someone should be
able to tell you this if you do not already know it.
Please Note: If you need to use a username and password for an SMB (LAN Manager) or NCP
(NetWare) print queue, they are stored unencrypted in a local script. Thus, it is possible for another
person to learn the username and password. It is therefore recommended that the username and
password for use of the printer not to be the same as that for a user account on the local Red Hat Linux
system, so that the only possible security compromise would be unauthorized use of the printer. If
there are file shares from the SMB server, it is recommended that they also use a different password
than the one for the print queue.
After you have added your print queue, you may need to restart the printer daemon (lpd). To do so,
choose Restart lpd from the lpd menu.
You may print a test page for any print queue you have configured. Select the type of test page you
would like to print from the Tests menu.
156 System Configuration
For instance, when the kernel wants to load support for ethernet, kerneld needs to know which
8.2 System Configuration With the Control Panel 157
ethernet card you have, and if your ethernet card requires special configuration, it needs to know
about that, too.
To change the options being given to a module when it is loaded, click on the line to select it, then
click the Edit button. kernelcfg will bring up a window which looks like Figure 8.37. The options
kernelcfg knows about (normally all available options) will each have their own field. Normally, you
will want to ignore the Other arguments field. Some modules normally take no arguments; just in
case, they have an Arguments field which allows you to enter configuration information.
Changing Modules
To change which module gets invoked to provide a generic service, such as an ethernet card or SCSI
host adapter module, you need to delete the old one and add a new one. To delete a module, select
it by clicking on it, then click on Remove. Then click on Add to add the new module, as explained in
the following section.
If you have changed your SCSI controller (scsi hostadapter), remember to make a new initial
ramdisk with the /sbin/mkinitrd command as documented in section 11.6.2 on page 200.
Adding Modules
To add a module of any type, click on the Add button. You will be presented with a dialog box
(Figure 8.38 on the following page) asking you to choose a module type. Ethernet is eth, Token Ring
is tr, SCSI controllers are scsi hostadapter, and so on. Click OK to continue to
the next dialog box. If there is more than one module which can be used for the module type you
have chosen, you will be presented with a dialog box (Figure 8.39 on the next page) which asks which
158 System Configuration
module you want to use, and may also ask for specifics about the type of module; for ethernet, for
example, you need to choose from eth0, eth1, etc. When you are done, click OK again to continue
to specify any module options in the next dialog box (Figure 8.39), which is the same as the dialog
for editing a module.
Restarting Kerneld
The changes that you make with the Kernel Daemon Configuration tool will be made in the
/etc/conf.modules file, which kerneld reads whenever it is started. Once you have made changes,
you can restart kerneld by clicking on the Restart kerneld button. This will not cause any modules
which are currently in use to be reloaded, it will only notify kerneld to use the configuration when it
loads more modules in the future.
support works well on most hardware, but some hardware setups may exhibit unpredictable behav-
ior. When using the Network Configuration Tool click Save to write your changes to disk, to quit
without making any changes select Quit.
Managing Names
The Names panel of the Network Configuration tool serves two primary purposes: setting the host-
name and domain of the computer, and determining which name server will be used to look up other
hosts on the network. The Network tool is not capable of configuring a machine as a nameserver. To
edit a field or add information to a field simply click on the field with the left mouse button and type
the new information.
Managing Hosts
In the Hosts management panel you have the ability to add, edit, or remove hosts from the /etc/hosts
file. Adding or editing an entry involves identical actions. An edit dialog box will appear, simply
type the new information and click Done when you are finished. See Figure 8.41 on the next page for
an example.
160 System Configuration
If you have added a networking interface to your machine since installing Red Hat Linux, or you
didn’t configure your ethernet card at install time, you can configure it with a few clicks of a mouse.
Please Note: You may need to configure kerneld to load a driver for the network interface you are
adding (e.g., eth0); see Section 8.2.2 on page 156 for more information.
Begin adding an interface by clicking on Interfaces in the main panel. This will bring up a window
of configured devices with a row of available options, see figure 8.42 on the next page.
To add a device, first click the Add button then select the type of interface you want to configure
from the box that appears (See Figure 8.43 on the facing page).
Please Note: There is now a clone button available in netcfg. This button can be used to create a
“clone” of an already-existing interface. By using clone interfaces, it is possible for a laptop to have
one Ethernet interface defined for a work LAN, and a clone Ethernet device defined for a home LAN.
PPP Interface Adding a PPP interface can be as simple as supplying the phone number, login
name and password in the Create PPP Interface dialog shown in Figure 8.44 on page 162. If you need
to use PAP authentication for your PPP connection, choose Use PAP authentication. In many cases
some degree of customization will be needed to establish a PPP connection. Choosing the Customize
button will allow you to make changes to the hardware, communication, and networking settings for
the PPP interface.
8.2 System Configuration With the Control Panel 161
SLIP Interface In order to configure a SLIP interface you must first supply a phone number, login
name, and password. This will supply the initial parameters for the chat script needed to establish
a SLIP connection. When you choose Done, a dialog titled Edit SLIP Interface appears that enables
you to further customize the hardware, communication and networking parameters for your SLIP
interface.
PLIP Interface To add a PLIP interface to your system you only have to supply the IP address,
the remote IP address, and the Netmask. You can also select if you want to activate the interface at
boot time.
Ethernet, Arcnet, Token Ring and Pocket Adaptor Interfaces If you are adding an eth-
ernet, arcnet, token ring or pocket adapter to your computer you will need to supply the following
information:
Activate interface at boot time: If you want the device to be configured automatically when
your machine boots select this by clicking on the box.
Allow any user to (de)activate interface: Check this if you want any user to be able to
activate or deactivate the interface.
Interface configuration protocol: If you have a BOOTP or DHCP server on your network
and would like to use it to configure the interface, choose the appropriate option; otherwise,
choose none.
8.2 System Configuration With the Control Panel 163
After providing the configuration information for your new device, click Done. The device should
appear in your Interfaces list as an inactive device. (The active column should have a label of no).
To activate the new device, first select it with a mouse click and then choose on the Activate button.
If it does not come up properly, you may need to reconfigure it by choosing on Edit.
Managing Routes
In the Routes management screen you have the ability to add, edit, or remove static networking
routes. Adding or editing an entry involves identical actions, just like the Hosts panel. An edit
dialog box will appear, simply type the new information and click Done when you are finished. See
figure 8.45 for an example.
Please Note: Changing the time can seriously confuse programs that depend on the normal pro-
gression of time, and could possibly cause problems. Try to quit as many applications and processes
as possible before changing the time or date.
9
Package Management with RPM
The Red Hat Package Manager (RPM), is an open packaging system available for anyone to use,
and works on both Red Hat Linux as well as other Linux and UNIX systems. Red Hat Software
encourages other vendors to take the time to look at RPM and use it for their own products. RPM is
distributable under the terms of the GPL.
For the end user, RPM provides many features that make maintaining a system far easier than it has
ever been. Installing, uninstalling, and upgrading RPM packages are all one line commands, and
all the messy details are taken care of for you. RPM maintains a database of installed packages and
their files, which allows you to perform powerful queries and verification of your system. During
upgrades RPM handles configuration files specially, so that you never lose your customizations – a
feature that is impossible with straight .tar.gz files.
For the developer, RPM allows you to take source code for software and package it into source and
binary packages for end users. This process is quite simple and is driven from a single file and
optional patches that you create. This clear delineation of “pristine” sources and your patches and
build instructions eases the maintenance of the package as new versions of the software are released.
Upgradability With RPM you can upgrade individual components of your system without com-
pletely reinstalling. When you get a new release of an operating system based on RPM (such
as Red Hat Linux), you don’t need to reinstall your machine (as you do with operating sys-
tems based on other packaging systems). RPM allows intelligent, fully-automated, in-place
upgrades of your system. Configuration files in packages are preserved across upgrades, so
you won’t lose your customizations.
Powerful Querying RPM is also designed to have powerful querying options. You can do searches
through your entire database for packages or just certain files. You can also easily find out
what package a file belongs to and where it came from. The files an RPM package contains are
in a compressed archive, with a custom binary header containing useful information about the
package and its contents, allowing you to query individual packages quickly and easily.
System Verification Another powerful feature is the ability to verify packages. If you are worried
that you deleted an important file for some package, simply verify the package. You will
be notified of any anomalies. At that point, you can reinstall the package if necessary. Any
configuration files that you modified are preserved during reinstallation.
Pristine Sources A crucial design goal was to allow the use of “pristine” software sources, as dis-
tributed by the original authors of the software. With RPM, you have the pristine sources along
with any patches that were used, plus complete build instructions. This is a big advantage for
several reasons. For instance, if a new version of a program comes out, you don’t necessarily
have to start from scratch to get it to compile. You can look at the patch to see what you might
need to do. All the compiled-in defaults, and all of the changes that were made to get the
software to build properly are easily visible this way.
This goal may only seem important for developers, but it results in higher quality software for
end users too. We would like to thank the folks from the BOGUS distribution for originating
the pristine source concept.
9.2.1 Installing
RPM packages typically have file names like foo-1.0-1.i386.rpm, which includes the package
name (foo), version (1.0), release (1), and architecture (i386). Installing a package is as simple as:
As you can see, RPM prints out the name of the package (which is not necessarily the same as the file
name, which could have been 1.rpm), and then prints a succession of hash marks as the package is
installed, as a sort of progress meter.
Installing packages is designed to be simple, but you can get a few errors:
If you really want to install the package anyway, you can use --replacepkgs on the command line,
which tells RPM to ignore the error:
Conflicting Files
If you attempt to install a package that contains a file that has already been installed by another
packages, you’ll see:
To cause RPM to ignore that error, use --replacefiles on the command line:
Unresolved Dependency
RPM packages can “depend” on other packages, which means that they require other packages to be
installed in order to run properly. If you try to install a package for which there is such an unresolved
dependency, you’ll see:
To handle this error you should install the requested packages. If you want to force the installa-
tion anyway (a bad idea since the package probably will not run correctly), use --nodeps on the
command line.
9.2.2 Uninstalling
Uninstalling a package is just as simple as installing:
# rpm -e foo
#
Notice that we used the package name “foo”, not the name of the original package file
“foo-1.0-1.i386.rpm”.
You can encounter a dependency error when uninstalling a package if some other installed package
depends on the one you are trying to remove. For example:
# rpm -e foo
removing these packages would break dependencies:
foo is needed by bar-1.0-1
#
To cause RPM to ignore that error and uninstall the package anyway (which is a bad idea since the
package that depend on it will probably fail to work properly), use --nodeps on the command line.
9.2.3 Upgrading
Upgrading a package is almost just like installing.
9.2 Using RPM 169
What you don’t see above is the fact that RPM automatically uninstalled any old versions of the foo
package. In fact you may want to always use -U to install packages, since it works fine even when
there are no previous versions of the package installed.
Since RPM performs intelligent upgrading of packages with configuration files, you may see a mes-
sage like:
This means that your changes to the configuration file may not be “forward compatible” with the
new configuration file in the package, so RPM saved your original file, and installed a new one. You
should investigate and resolve the differences between the two files as soon as possible to ensure that
your system continues to function properly.
Since upgrading is really a combination of uninstalling and installing, you can encounter any errors
from those modes, plus one more: If RPM thinks you are trying to upgrade to a package with an older
version number, you will see:
9.2.4 Querying
Querying the database of installed packages is accomplished with rpm -q. A simple use is rpm -q
foo which will print the package name, version, and release number of the installed package foo:
# rpm -q foo
foo-2.0-1
#
170 Package Management with RPM
Instead of specifying the package name, you can use the following options with -q to specify what
package(s) you want to query. These are called Package Specification Options.
There are a number of ways to specify what information to display about queried packages. The
following options are used to select the information you are interested in. These are called Information
Selection Options.
-i displays package information such as name, description, release, size, build date, install
date, vendor, and other miscellaneous information.
-l displays the list of files that the package “owns”.
-s displays the state of all the files in the package.
-d displays a list of files marked as documentation (man pages, info pages, README’s, etc).
-c displays a list of files marked as configuration files. These are the files you change after
installation to adapt the package to your system (sendmail.cf, passwd, inittab, etc).
For those options that display file lists, you can add -v to your command line to get the lists in a
familiar ls -l format.
9.2.5 Verifying
Verifying a package compares information about files installed from a package with the same in-
formation from the original package. Among other things, verifying compares the size, MD5 sum,
permissions, type, owner and group of each file.
rpm -V verifies a package. You can use any of the Package Selection Options listed for querying to
specify the packages you wish to verify. A simple use is rpm -V foo which verifies that all the files
in the foo package are as they were when they were originally installed. For example:
rpm -Va
9.3 Impressing Your Friends with RPM 171
If everything verified properly there will be no output. If there are any discrepancies they will be
displayed. The format of the output is a string of 8 characters, a possible “c” denoting a configuration
file, and then the file name. Each of the 8 characters denotes the result of a comparison of one attribute
of the file to the value of that attribute recorded in the RPM database. A single “.” (period) means
the test passed. The following characters denote failure of certain tests:
5 MD5 checksum
S File size
L Symbolic link
T File modification time
D Device
U User
G Group
M Mode (includes permissions and file type)
If you see any output, use your best judgment to determine if you should remove or reinstall the
package, or somehow fix the problem.
Let’s say you delete some files by accident, but you aren’t sure what you deleted. If you want
to verify your entire system and see what might be missing, you would enter:
rpm -Va
If some files are missing, or appear to have been corrupted, you should probably either re-
install the package or uninstall, then re-install the package.
Let’s say you run across a file that you don’t recognize. To find out which package owns it,
you would enter:
172 Package Management with RPM
xjewel-1.6-1
We can combine the above two examples in the following scenario. Say you are having prob-
lems with /usr/bin/paste. You would like to verify the package that owns that program
but you don’t know which package that is. Simply enter:
/usr/man/man4/ispell.4
/usr/man/man4/english.4
/usr/man/man1/unsq.1
/usr/man/man1/tryaffix.1
/usr/man/man1/sq.1
/usr/man/man1/munchlist.1
/usr/man/man1/ispell.1
/usr/man/man1/findaffix.1
/usr/man/man1/buildhash.1
/usr/info/ispell.info.gz
/usr/doc/ispell-3.1.18-1/README
You find a new koules RPM, but you don’t know what it is. To find out some information on
it, enter:
Description :
This arcade-style game is novel in conception and
excellent in execution. No shooting, no blood, no guts,
no gore. The play is simple, but you still must develop
skill to play. This version uses SVGAlib to run on a
graphics console.
Now you want to see what files the koules RPM installs. You would enter:
/usr/man/man6/koules.6
/usr/lib/games/kouleslib/start.raw
/usr/lib/games/kouleslib/end.raw
/usr/lib/games/kouleslib/destroy2.raw
/usr/lib/games/kouleslib/destroy1.raw
/usr/lib/games/kouleslib/creator2.raw
/usr/lib/games/kouleslib/creator1.raw
/usr/lib/games/kouleslib/colize.raw
/usr/lib/games/kouleslib
/usr/games/koules
These are just several examples. As you use the system you will find many more uses for rpm.
http://www.rpm.org/
There is also an RPM book available. It’s called Maximum RPM , and is available from Red Hat
Software and your local bookstore. It contains a wealth of information about RPM for both the end-
user and the package builder. An on-line version of the book is available at http://www.rpm.org/.
There is also a mailing list for discussion of RPM related issues, called
rpm-list@redhat.com. The list is archived on
http://www.redhat.com/support/mailing-lists/. To subscribe, send
mail to rpm-list-request@redhat.com with the word subscribe in the subject line.
174 Package Management with RPM
10
Glint
Red Hat provides a graphical tool to aid in package installation and removal. It’s called glint (Graph-
ical Linux INstallation Tool) and runs under the X Window System. It allows easy installation, unin-
stallation, upgrading, querying, and verification of packages. The interface is similar to the one found
in many popular file managers and is simple to use.
Operations are performed in glint by selecting the packages to operate on and then selecting the
operation to perform via pushbuttons. Installing a package places all of the components of that
package on your system. Uninstalling one removes all traces of the package except for configuration
files you have modified. Upgrading a package installs the newly available version and uninstalls all
other versions that were previously installed. This allows quick upgrading to the latest releases of
packages.
The query operation lets you examine the details of both installed or available packages. You can
view the description of the package, where and when it was built, the files in the package, and
other attributes. All of the configuration and documentation components of each package are clearly
marked as such to reduce the time you spend looking for them.
Using glint to perform all of these operations is the same as using rpm to do them from the command
line. However, the graphical nature of glint often makes these operations easier to perform.
The normal way to handle glint is to display the available packages and files, select the ones you
want to operate on, and then press a button or choose a menu item that performs the operation. For
instance, you can install several packages with a few button clicks.
176 Glint
If you’d like to examine a subgroup in a new window, double click the middle mouse button on its
folder. If your mouse has only two buttons, click both. This will create a new window with that
group in it.
The context sensitive menu for a package also allows easy selection and unselection. Using the se-
lect and unselect options on a package’s icon selects or unselects that package, while those op-
tions on a group’s folder icon select and unselect all of the packages in that group. Using these menu
options makes selecting groups of packages much quicker than selecting each package individually.
178 Glint
To see what packages are available for you to install, choose the Available pushbutton from any
glint window. After a few moments, a new window, like the one shown in figure 10.3, will appear.
The differences in the title and buttons indicate that this window is listing packages you may install.
Navigating through these packages and selecting them is the same as in the other glint windows.
If you get an error message from glint saying that it can’t find any RPMs, see the section below on
Configuration.
10.3 Configuration
The only configuration information glint needs is the path to new RPMs. When you’re using your
Red Hat Linux CD-ROM, this will probably be
/mnt/cdrom/RedHat/RPMS, which is the default path for glint. If you download new RPMs from
the Internet or want to install RPMs via a NFS mounted CD-ROM this path will probably be different
for you.
To change this path, first be sure to close all of the windows listing available packages you may have
open. Then choose the Configuration option from one of the remaining windows. This will open
a dialog box like the one shown in figure 10.4. Here you can type the full path to the RPMs you’d
like to look at. Choosing the Save button will save this path, making it the default for future glint
sessions. The Default button restores the path to the one that glint used when it started.
After changing this path and closing the dialog box, you can use the Available button to view the
packages available in the new location.
10.4 Package Manipulation 179
On the very left of the window is a list of the packages that have been queried. Selecting one of them
will change the information in the rest of the window. You may step through them in order by using
the Next and Previous buttons on the right side of the window.
180 Glint
The name, version, and release of the current package are in the top middle of the query window.
Immediately below this is the description of the package, which can be quite large. A scroll bar is
there to let you read the whole thing.
Below the description is a list of the files contained in the package. Along with the full path to the
file, the file list tells you a couple of other things. If a D appears to the left of the path, that file
is a documentation file and would be a good thing to read. If a C appears there, then the file is a
configuration file. A * means that the correct version of that file is not installed on your system. This
can occur because a more recent version of a package was installed or because two packages contain
different versions of the same file.
More information on a package can be seen by clicking on the Details pushbutton. A window like
the one in figure 10.6 will then appear. This lists more information about the package being displayed
in the main query window. When you select a new package in the query window, the information in
the details window will change to reflect your new choice.
You may also select, unselect, or verify a package while querying it by using the buttons provided.
Click on the Close button when you are finished looking at the packages.
the current file being checked appears as the last element in the list, and the problem is listed as
(checking). A full list of the problems that can be found through verification appears in figure
10.8.
Problem Description
missing The file is no longer on your system
mode permission bits have changed
size file’s size has changed
uid owner’s uid has changed
gid owner’s gid has changed
md5 the md5 checksum has changed
link the file is a symlink to the wrong place
To get more information on the problems found with a file, double click on the file’s path. A window
like the one shown in figure 10.9 lists the expected and current values of the attributes that are amiss.
After you’ve begun the installation, a window appears like the one in figure 10.11. It tracks the
progress of the installation so you’ll know something is happening. The top bar shows how much
of the current package (whose name is listed inside of it) has been installed while the bottom graph
shows how much of the total installation has been finished. The number of packages, package sizes,
and time estimates are continually updated.
If a problem occurs during the installation, a window will appear listing any errors that occurred. If
this happens, you should correct the problems and then try again.
After the installation has completed, the package and groups that have been installed are moved
from the available window to the main glint window to show you that they have been successfully
installed.
Upgrading Packages
When a new version of a package has been released, it is easy to install it on your system. Select the
packages from the window of available packages in the same way you select packages for installation.
Both the Upgrade button and the context sensitive menus will begin the upgrade.
During the upgrade, you’ll see a progress indicator like the one for installing packages. When it’s
finished, the installed packages will appear in the the main glint windows and any old versions of
the packages will be removed.
It is much better to use the upgrade option than to uninstall the old versions of a package and then
install the new one. Using upgrade ensures that any changes you made to package configuration
files get preserved properly, while doing it manually could cause those changes to be lost.
10.4 Package Manipulation 183
If you run out of disk space during an installation, the install will fail. However, the package which
was being installed when the error occurred may leave some files around. To clean this up, reinstall
the package after you’ve made more disk space available.
from a group’s menu, the operation is performed on all of the packages in that group, so be careful!
Once you’ve begun the uninstall, glint asks for confirmation, showing a window like the one in figure
10.12. All of the packages that are about to be uninstalled are listed. You should look at them all to
ensure you’re not about to remove something you want to keep. Clicking the Yes button will start
the uninstallation process. After it completes, the packages and groups that have been removed will
disappear from any windows they were in.
11
System Administration
This chapter is an overview of the Red Hat Linux system. It will illustrate things that you may not
know about the system and things that are somewhat different from other UNIX systems.
http://www.pathname.com/fhs/
186 System Administration
The /etc directory is reserved for configuration files that are local to your machine. No binaries are
to put in /etc. Binaries that were in the past put in /etc should now go into /sbin or possibly
/bin.
The X11 and skel directories should be subdirectories of /etc:
/etc
|- X11
+- skel
The X11 directory is for X11 configuration files such as XF86Config. The skel directory is for
“skeleton” user files, which are files used to populate a home directory when a user is first created.
The /lib directory should contain only those libraries that are need to execute the binaries in /bin
and /sbin.
The /sbin directory is for executables used only by the root user, and only those executables needed
to boot and mount /usr and perform system recovery operations. The FSSTND says:
“/sbin typically contains files essential for booting the system in addition to the binaries
in /bin. Anything executed after /usr is known to be mounted (when there are no
problems) should be placed in /usr/sbin. Local-only system administration binaries
should be placed into
/usr/local/sbin.”
The /usr directory is for files that are shareable across a whole site. The /usr directory usually
has its own partition, and it should be mountable read only. The following directories should be
subdirectories of /usr:
/usr
|- X11R6
|- bin
|- dict
|- doc
|- etc
|- games
|- include
|- info
|- lib
|- local
|- man
|- sbin
|- share
+- src
The X11R6 directory is for the X Window System (XFree86 on Red Hat Linux), bin is for executables,
doc is for random non-man-page documentation, etc is for site-wide configuration files, include is for
C header files, info is for GNU info files, lib is for libraries, man is for man pages, sbin is for system
administration binaries (those that do not belong in /sbin), and src is for source code.
“The /usr/local hierarchy is for use by the system administrator when installing soft-
ware locally. It needs to be safe from being overwritten when the system software is
updated. It may be used for programs and data that are shareable amongst a group of
machines, but not found in /usr.”
The /usr/local directory is similar in structure to the /usr directory. It has the following subdi-
rectories, which are similar in purpose to those in the /usr directory:
/usr/local
|- bin
|- doc
188 System Administration
|- etc
|- games
|- include
|- info
|- lib
|- man
|- sbin
+- src
Since the FSSTND requires that you be able to mount /usr read-only, any programs that write log
files or need spool or lock directories probably should write them to the /var directory. The FSSTND
says /var is for
“... variable data files. This includes spool directories and files, administrative and log-
ging data, and transient and temporary files.”
/var
|- log
|- catman
|- lib
|- local
|- named
|- nis
|- preserve
|- run
|- lock
|- tmp
+- spool
|- at
|- cron
|- lpd
|- mail
|- mqueue
|- rwho
|- smail
|- uucp
+- news
11.2 Special Red Hat File Locations 189
System log files such as wtmp and lastlog go in /var/log. The /var/lib directory also con-
tains the RPM system databases. Formatted man pages go in /var/catman, and lock files go in
/var/lock. The /var/spool directory has subdirectories for various systems that need to store
data files.
User Private Group Each user has its own primary group, of which only it is a member.
11.3 Users, Groups and User-Private Groups 191
umask = 002 The traditional UNIX umask is 022, which prevents other users and other members of a
user’s primary group from modifying a user’s files. Since every user has their own private group
in the UPG scheme, this “group protection” is not needed. A umask of 002 will prevent users
from modifying other users’ private files. The umask is set in /etc/profile.
setgid bit on Directories If you set the setgid bit on a directory (with chmod g+s directory), files
created in that directory will have their group set to the directory’s group.
Most computing sites like to create a group for each major project and assign people to the groups
they need to be in. Managing files traditionally has been difficult, though, because when someone
creates a file it is owned by the primary group he or she belongs to. When a single person works on
multiple projects, it becomes hard to make the files owned by the group that is associated with that
project. In the UPG scheme, groups are automatically assigned to files on a project-by-project basis,
which makes managing group projects very simple.
Let’s say you have a big project called devel, with many people editing the devel files in a devel
directory. Make a group called devel, chgrp the devel directory to devel, and add the all the
devel users to the devel group. Now, all the devel users will be able to edit the devel files and create
new files in the devel directory, and these files will always retain their devel group. Thus, they
will always be edit-able by other devel users.
If you have multiple projects like devel, and users who are working on multiple projects, these users
will never have to change their umask or group when they move from project to project. The setgid
bit on each project’s main directory “selects” the proper group.
Since each user’s HOME directory is owned by the user and their private group, it is safe to set the
setgid bit on the HOME directory. However, by default, files are created with the primary group of
the user, so the setgid bit would be redundant.
Since the UPG scheme is new, many people have questions about it, and they wonder why it is
necessary. The following is the rationale for the scheme.
You’d like to have a group of people work on a set of files in say, the
/usr/lib/emacs/site-lisp directory. You trust a few people to mess around in there, but
certainly not everyone.
So you enter:
But when a user creates a new file it is assigned the group of the users default group (usually
users). To prevent this you enter
which causes everything in the directory to be created with the “emacs” group.
But the new file needs to be mode 664 for another user in the emacs group to be able to edit it.
To do this you make the default umask 002.
Well, this all works fine, except that if your default group is “users”, every file you create in
your home directory will be writable by everybody in “users” (usually everyone).
To fix this, you make each user have a “private group” as their default group.
At this point, by making the default umask 002 and giving everyone a private default group, you can
easily set up groups that users can take advantage of without doing any magic. Just create the group,
add the users, and do the above chown and chmod on the group’s directories.
These modules may be stacked, so that multiple modules are used. For instance, rlogin normally
makes use of at least two authentication methods: if “rhosts” authentication succeeds, it is sufficient
to allow the connection; if it fails, then standard password authentication is done.
New modules can be added at any time, and PAM-aware applications can then be made to use them.
For instance, if you have a one-time-password calculator system, and you can write a module to sup-
port it (documentation on writing modules is included with the system), PAM-aware programs can
use the new module and work with the new one-time-password calculators without being recom-
piled or otherwise modified in any way.
11.4.2 Services
Each program which uses PAM defines its own “service” name. The login program defines the
service type login, ftpd defines the service type ftp, etc. In general, the service type is the name of
the program used to access the service, not (if there is a difference) the program used to provide the
service.
#%PAM-1.0
auth required /lib/security/pam_securetty.so
auth required /lib/security/pam_pwdb.so shadow nullok
auth required /lib/security/pam_nologin.so
account required /lib/security/pam_pwdb.so
password required /lib/security/pam_cracklib.so
password required /lib/security/pam_pwdb.so shadow -
nullok use_authtok
session required /lib/security/pam_pwdb.so
The first line is a comment. Any line that starts with a # character is a comment. Lines two through
four stack up three modules to use for login authorization. Line two makes sure that if the user is
trying to log in as root, the tty on which they are logging in is listed in the /etc/securetty file
if that file exists. Line three causes the user to be asked for a password and the password checked.
Line four checks to see if the file /etc/nologin exists, and if it does, displays the contents of the
file, and if the user is not root, does not let him or her log in.
Note that all three modules are checked, even if the first module fails. This is a security decision—it is
designed to not let the user know why their authentication was disallowed, because knowing why
it was disallowed might allow them to break the authentication more easily. You can change this
11.4 User Authentication with PAM 195
behavior by changing required to requisite; if any requisite module returns failure, PAM
fails immediately without calling any other modules.
The fifth line causes any necessary accounting to be done. For example, if shadow passwords have
been enabled, the pam pwdb.so module will check to see if the account has expired, or if the user
has not changed his or her password and the grace period for changing the password has expired.
The sixth line subjects a newly-changed password to a series of tests to ensure that it cannot, for
example, be easily determined by a dictionary-based password cracking program.
The seventh line (which we’ve had to wrap) specifies that if the login program changes the user’s
password, it should use the pam pwdb.so module to do so. (It will do so only if an auth module
has determined that the password needs to be changed—for example, if a shadow password has
expired.)
The eighth and final line specifies that the pam pwdb.so module should be used to manage the ses-
sion. Currently, that module doesn’t do anything; it could be replaced (or supplemented by stacking)
by any necessary module.
Note that the order of the lines within each file matters. While it doesn’t really matter much in which
order required modules are called, there are other control flags available. While optional is rarely
used, and never used by default on a Red Hat Linux system, sufficient and requisite cause
order to become important.
Let’s look at the auth configuration for rlogin:
That looks almost like the login entry, but there’s an extra line specifying an extra module, and the
modules are specified in a different order.
First, pam securetty.so keeps root logins from happening on insecure terminals. This effectively
disallows all root rlogin attempts. If you wish to allow them (in which case we recommend that you
either not be internet-connected or be behind a good firewall), you can simply remove that line.
Second, pam nologin.so checks /etc/nologin, as specified above.
Third, if pam rhosts auth.so authenticates the user, PAM immediately returns success to rlogin
without any password checking being done. If
pam rhosts auth.so fails to authenticate the user, that failed authentication is ignored.
Finally (if pam rhosts auth.so has failed to authenticate the user), the
pam pwdb.so module performs normal password authentication.
Note that if you do not want to prompt for a password if the securetty check fails, you can change
the pam securetty.so module from required to requisite
196 System Administration
Please Note: There are a few additional points of interest concerning these utilities:
The utilities have been slightly modified to support Red Hat Software’s user private group
scheme. For a description of the modifications, please see the useradd man page. For more
information on user private groups, please turn to Section 11.3.3 on page 190.
make config An interactive text program. Components are presented and you answer with
Y (yes), N (no), or M (module).
make menuconfig A graphic, menu driven program. Components are presented in a menu
of categories, you select the desired components in the same manner used in the Red Hat Linux
installation program. Toggle the tag corresponding to the item you want included; Y (yes), N
(no), or M (module).
make xconfig An X Windows program. Components are listed in different levels of menus,
components are selected using a mouse. Again, select Y (yes), N (no), or M (module).
Please Note: In order to use kerneld (see Section 8.2.2 for details) and kernel modules you must
answer Yes to kerneld support and module version (CONFIG MODVERSIONS) support in the
configuration.
198 System Administration
Please Note: If you are building a Linux/Intel kernel on (or for) a machine that uses a “clone”
processor (for example, one made by Cyrix or AMD), it is recommended to choose a Processor type
of 386.
If you wish to build a kernel with a configuration file (/usr/src/linux/.config) that you have
already created with one of the above methods, you can omit the make mrproper and make con-
fig commands and use the command make dep followed by make clean to prepare the source
tree for the build.
The next step consists of the actual compilation of the source code components into a working pro-
gram that your machine can use to boot. The method described here is the easiest to recover from in
the event of a mishap. If you are interested in other possibilities details can be found in the Kernel-
HOWTO or in the Makefile in /usr/src/linux on your Linux system.
rm -rf /lib/modules/2.0.29-old
mv /lib/modules/2.0.29 /lib/modules/2.0.29-old
Of course, if you have upgraded your kernel, replace 2.0.29 with the version you are using.
Install the new modules (even if you didn’t build any) with
make modules install.
If you have a SCSI adapter and made your SCSI driver modular, build a new initrd image (see
Section 11.6.2; note that there are few practical reasons to make the SCSI driver modular in a custom
kernel).
In order to provide a redundant boot source to protect from a possible error in a new kernel you
should keep the original kernel available. Adding a kernel to the LILO menu is as simple as re-
naming the original kernel in /boot, copying the new kernel to /boot, adding a few lines in
/etc/lilo.conf and running /sbin/lilo. Here is an example of the default /etc/lilo.conf
file shipped with Red Hat Linux:
boot=/dev/hda
map=/boot/map
install=/boot/boot.b
prompt
timeout=100
image=/boot/vmlinuz
label=linux
root=/dev/hda1
read-only
11.6 Building a Custom Kernel 199
Now you must update /etc/lilo.conf. If you built a new initrd image you must tell LILO to use
it. In this example of /etc/lilo.conf we have added four lines at the bottom of the file to indicate
another kernel to boot from. We have renamed /boot/vmlinuz to
/boot/vmlinuz.old and changed its label to old. We have also added an initrd line for the
new kernel:
boot=/dev/hda
map=/boot/map
install=/boot/boot.b
prompt
timeout=100
image=/boot/vmlinuz
label=linux
initrd=/boot/initrd
root=/dev/hda1
read-only
image=/boot/vmlinuz.old
label=old
root=/dev/hda1
read-only
Now when the system boots and you press Tab at the LILO boot: prompt two choices will be
shown;
LILO boot:
linux old
To boot the new kernel (linux) simply press Enter , or wait for LILO to time out. If you want to
boot the old kernel (old), simply enter old and press Enter .
Here is a summary of the steps;
mv /boot/vmlinuz /boot/vmlinuz.old
cp /usr/src/linux/arch/i386/boot/zImage /boot/vmlinuz
edit /etc/lilo.conf
run /sbin/lilo
You can begin testing your new kernel by rebooting your computer and watching the messages to
ensure your hardware is detected properly.
200 System Administration
The /etc/conf.modules file has a line for your SCSI adapter; for example:
To build the new initrd image, run /sbin/mkinitrd with parameters such as this:
where /boot/newinitrd-image is the file to use for your new image, and 2.0.12 is the kernel
whose modules (from /lib/modules) should be used in the initrd image (not necessarily the
same as the version number of the currently running kernel).
When configuring the kernel only answer Yes and No to the questions (don’t make anything
modular).
Omit the steps:
make modules
make modules_install
Edit the file /etc/rc.d/rc.sysinit and comment out the line depmod -a by inserting a
“#” at the beginning of the line.
11.7 Sendmail
A default sendmail.cf file will be installed in /etc. The default configuration should work for
most SMTP-only sites. It will not work for UUCP sites; you will need to generate a new send-
mail.cf if you need to use UUCP mail transfers. To generate a new sendmail.cf, you will need
11.8 Controlling Access to Services 201
to install m4 and the sendmail source package. Read the README file in the sendmail sources for
more details on creating sendmail configuration files. Also, O’Reilly & Associates publishes a good
sendmail reference entitled sendmail by Bryan Costales.
One common sendmail configuration is to have a single machine act as a mail gateway for all the ma-
chines on your network. For instance, at Red Hat Software we have a machine mail.redhat.com
that does all our mail. On that machine we simply need to add the names of machines for which
mail.redhat.com will handle mail to /etc/sendmail.cw. Here is an example:
Then on the other machines, torgo, poodle, and devel, we need to edit
/etc/sendmail.cf to “masquerade” as mail.redhat.com when sending mail, and to forward
any local mail processing to redhat.com. Find the DH and DM lines in
/etc/sendmail.cf and edit them thusly:
With this type of configuration, all mail sent will appear as if it were sent from redhat.com, and
any mail sent to torgo.redhat.com or the other hosts will be delivered to mail.redhat.com.
Please be aware that if you configure your system to masquerade as another any email sent from
your system to your system will be sent to the machine you are masquerading as. For example, in
the above illustration, log files that are periodically sent to root@poodle.redhat.com by the cron
daemon would be sent to root@mail.redhat.com.
This configuration allows all connections from redhat.com and *.redhat.com machines. It also
allows talk, finger, and ftp requests from all machines.
tcpd allows much more sophisticated access control, using a combination of
/etc/hosts.allow and /etc/hosts.deny. Read the tcpd(8) and hosts access(5) man pages for
complete details.
/etc/ftpaccess This file defines most of the access control for your ftp server. Some of the things
that you can do are: set up logical “groups” to control access from different sites, limit the
number of simultaneous FTP connections, configure transfer logging, and much more. Read
the ftpaccess man page for complete details.
/etc/ftphosts The ftphosts file is used to allow or deny access to certain accounts from various
hosts. Read the ftphosts man page for details.
/etc/ftpusers This file lists all the users that are not allowed to ftp into your machine. For
example, root is listed in /etc/ftpusers by default. That means that you can not ftp to
your machine and log in as root. This is a good security measure, but some administrators
prefer to remove root from this file.
export filesystems to other systems, and mount filesystems exported from other machines.
In this command, bigdog is the hostname of the NFS fileserver, /mnt/export is the filesystem
that bigdog is exporting, and /mnt/local is a directory on my local machine where we want to
mount the filesystem. After the mount command runs (and if we have the proper permissions from
bigdog) we can enter ls /mnt/local and get a listing of the files in /mnt/export on bigdog.
directory hostname(options)
/mnt/export speedy.redhat.com
/mnt/export speedy.redhat.com(ro)
/etc/rc.d/init.d/nfs stop
/etc/rc.d/init.d/nfs start
See the following man pages for more details: nfsd(8), mountd(8), and exports(5). Another good
reference is Managing NFS and NIS Services by Hal Stern, published by O’Reilly & Associates.
204 System Administration
Files in /etc/sysconfig
/etc/sysconfig/clock
/etc/sysconfig/keyboard
/etc/sysconfig/mouse
/etc/sysconfig/network
/etc/sysconfig/pcmcia
/etc/sysconfig/amd
/etc/sysconfig/tape
– true – indicates that the clock is set to UTC. Any other value indicates that it is set to
local time.
– true – (for Alpha-based systems only) Indicates the ARC console’s 42-year time offset is
in effect; Any other value indicates that the normal Unix epoch is assumed.
(The current Red Hat Linux installation sets this to “no” by default (for RFC compliance), but if
FORWARD IPV4 is not set at all, forwarding is enabled for compatibility with the configuration
files used on Red Hat Linux versions 4.2 and earlier.)
GATEWAY=gw-ip , where gw-ip is the IP address of the network’s gateway.
GATEWAYDEV=gw-dev , where gw-dev is the gateway device (e.g. eth0).
NISDOMAIN=dom-name , where dom-name is the NIS domain name.
PCIC OPTS=option, where option is the socket driver (i82365 or tcic) timing parameters.
CORE OPTS=option, where option is the list of pcmcia core options.
CARDMGR OPTS=option, where option is the list of options for the PCMCIA cardmgr.
11.11 The Boot Process, Init, and Shutdown 207
ADIR=path, where path is the amd directory. It should be “/.automount”, and is normally
never changed.
DEV=devnam, where devnam is the tape device (for example, “/dev/nst0)”. Use the non-
rewinding device for these scripts.
For SCSI tapes this is “/dev/nst#”, where “#” is the number of the tape drive you want to
use. If you only have one, then use “/dev/nst0”.
For IDE tapes you use “/dev/ht#”, where “#” is the number of the tape drive you want to
use. If you only have one, then use “/dev/ht0”.
For floppy tape drives use “/dev/ftape”.
ADMIN=account , where account is the user account to send mail to if the backup fails for
any reason. Normally set to “root”.
SLEEP=time , where time is the time to sleep between tape operations. Some drives need a
bit more than others, but “5” seems to work for 8mm, 4mm, and DLT.
BLOCKSIZE=size , where size is the tape drive’s optimal block size. A value of “32768”
worked fine for 8mm, then 4mm, and now DLT. An optimal setting is probably however much
data your drive writes at one time.
SHORTDATE=date , where date is a string that evaluates to a short date string, to be used in
backup log filenames. The default setting is: “$(date +%y:%m:%d:%H:%M)”
DAY=date , where date is a string that evaluates to a date string, to be used for the log file
directory. The default setting is: “$(date +log-%y:%m:%d)”
DATE=date , whre date is a string that evaluates to a reguarl date string, to be used in log
files. The default setting is: “$(date)”
LIST=file , where file is the file name the incremental backup will use to store the incremental
list. It will be followed by a sequence number.
DOTCOUNT=count , where count is the name of a file used for counting as you go, to know
which incremental list to use.
208 System Administration
COUNTER=count-file , where count-file is used for rewinding when done (might not use).
BACKUPTAB=file , where file is the name of the file in which we keep our list of backup(s)
we want to make.
Files in /etc/sysconfig/network-scripts/
/etc/sysconfig/network-scripts/ifup
/etc/sysconfig/network-scripts/ifdown
/etc/sysconfig/network-scripts/network-functions
/etc/sysconfig/network-scripts/ifcfg-<interface-name>
/etc/sysconfig/network-scripts/ifcfg-<interface-name>-<clone-name>
/etc/sysconfig/network-scripts/chat-<interface-name>
/etc/sysconfig/network-scripts/dip-<interface-name>
/etc/sysconfig/network-scripts/ifup-post
/etc/sysconfig/network-scripts/ifdhcpc-done
/etc/sysconfig/network-scripts/ifcfg-<interface-name>,
/etc/sysconfig/network-scripts/ifcfg-<interface-name>-<clone-name> – The first
file defines an interface, while the second file contains only the parts of the definition that are different
in a ”clone” (or alternative) interface. For example, the network numbers might be different, but
everything else might be the same, so only the network numbers would be in the clone file, while all
the device information would be in the base ifcfg file.
The items that can be defined in an ifcfg file depend on the interface type.
The following values are common to all base files:
DEVICE=name , where name is the name of the physical device (except dynamically-allocated
PPP devices where it is the ”logical name”).
IPADDR=addr , where addr is the IP address.
NETMASK=mask , where mask is the netmask value.
NETWORK=addr , where addr is the network address.
BROADCAST=addr , where addr is the broadcast address.
GATEWAY=addr , where addr is the gateway address.
The following values are common to all PPP and SLIP files:
– yes – This device should be kept active at all times, even if deactivated after a modem
hangup.
– no – This device should not be kept active at all times.
210 System Administration
MODEMPORT=port , where port is the modem port’s device name (for exmaple,
“/dev/modem”).
LINESPEED=baud , where baud is the modem’s linespeed (for example, “115200”).
– yes – Insert default abort strings when creating/editing the script for this interface.
– no – Do not insert default abort strings when creating/editing the script for this inter-
face.
(This represents a simplified interface; it doesn’t let people specify which characters to escape.
However, almost everyone can use an asyncmap of 00000000 anyway, and it’s possible to set
PPPOPTIONS to use an arbitrary asyncmap if so desired.)
PAPNAME=name , where name is used as part of "name $PAPNAME" on the pppd command
line.
note that the “remotename” option is always specified as the logical ppp device name, like
“ppp0” (which might perhaps be the physical device ppp1 if some other ppp device was
brought up earlier...), which makes it easy to manage pap/chap files – name/password pairs
are associated with the logical ppp device name so that they can be managed together.
In principle, there shouldn’t anything that would keep the logical PPP device names from
being “worldnet” or “myISP” instead of “ppp0” – “pppN”.
RETRYTIMEOUT=value , where value represents the number of seconds to wait before re-
attempting to establish a connection after a previous attempt has failed.
SysV init also differs from BSD init in that the config files are in a subdirectory of /etc instead of
residing directly in /etc. This directory is called rc.d. In there you will find rc.sysinit and the
following directories:
init.d
rc0.d
rc1.d
rc2.d
rc3.d
rc4.d
rc5.d
rc6.d
init.d contains a bunch of scripts. Basically, you need one script for each service you may need to
start at boot time or when entering another runlevel. Services include things like networking, nfs,
sendmail, httpd, etc. Services do not include things like setserial that must only be run once and then
exited. Things like that should go in rc.local or rc.serial.
If you want rc.local, it should be in /etc/rc.d. Most systems include one even though it doesn’t
do much. You can also include an rc.serial in /etc/rc.d if you need to do serial port specific things
at boot time.
The chain of events is as follows:
The kernel looks in several places for init and runs the first one it finds
init runs /etc/rc.d/rc.sysinit
rc.sysinit does a bunch of necessary things and then runs rc.serial (if it exists)
The default runlevel is decided in /etc/inittab. You should have a line close to the top like:
id:3:initdefault:
From this, you’d look in the second column and see that the default runlevel is 3, as should be the
case for most systems. If you want to change it, you can edit /etc/inittab by hand and change
the 3. Be very careful when you are messing with the inittab. If you do mess up, you can fix it by
rebooting and doing:
This should allow you to boot into single user mode so you can fix inittab.
Now, how does it run all the right scripts? If you enter ls -l on rc3.d, you might see something
like:
What you’ll notice is that there are no real “files” in the directory. Everything there is a link to one of
the scripts in the init.d directory. The links also have an “S” and a number at the beginning. The “S”
means to start this particular script and a “K” would mean to stop it. The number is there just for
ordering purposes. Init will start all the services based on the order they appear. You can duplicate
numbers, but it will only confuse you somewhat. You just need to use a two digit number only, along
with an upper case “S” or “K” to start or stop the services you need to.
How does init start and stop services? Simple. Each of the scripts is written to accept an argument
which can be “start” and “stop”. You can execute those scripts by hand in fact with a command like:
/etc/rc.d/init.d/httpd.init stop
to stop the httpd server. Init just reads the name and if it has a “K”, it calls the script with the “stop”
argument. If it has an “S” it calls the script with a “start” argument. Why all these runlevels? Some
people want an easy way to set up machines to be multi-purpose. I could have a “server” runlevel
that just runs httpd, sendmail, networking, etc. Then I could have a “user” runlevel that runs xdm,
networking, etc.
0 Halt
1 Single user mode
2 Multiuser mode, without NFS
3 Full multiuser mode
4 Not used
214 System Administration
If your machine gets into a state where it will not boot due to a bad /etc/inittab, or will not let
you log in because you have a corrupted /etc/passwd or have simply forgotten your password,
boot into single user mode by typing linux 1 at the LILO boot prompt. A very bare system will
come up and you will be given a shell from which you can fix things.
shutdown -h now
shutdown -r now
Each will cleanly shutdown the system. After shutting everything down, the first will halt the ma-
chine, and the second will reboot.
Although the reboot and halt commands are now “smart” enough to invoke shutdown if run
while the system is in runlevels 1-5, it is a bad habit to get into, as not all Linux-like operating
systems have this feature.
11.12 Rescue Modes 215
A Handy Trick
Have you ever rebuilt a kernel and, eager to try out your new handiwork, rebooted before running
LILO? And you didn’t have an entry for an older kernel in lilo.conf? Read on. . .
Here’s a handy trick. In many cases, it’s possible to boot your Red Hat Linux/Intel from the Red Hat
Linux boot diskette with your root filesystem mounted and ready to go. Here’s how:
Enter the following command at the boot diskette’s boot: prompt:
(Replace the XX in /dev/hdXX with the appropriate letter and number for your root partition.)
What does this do? First, it starts the boot in single-user mode, with the root partition set to your
root partition. The empty initrd specification bypasses the installation-related image on the boot
diskette, which will cause you to enter single-user mode immediately.
Is there a downside to this trick? Unfortunately, yes. Because the kernel on the Red Hat Linux boot
diskette only has support for IDE built-in, those of you with SCSI-based systems won’t be able to use
this trick. In that case, you’ll have to use the boot/rescue diskette combination mentioned above.
216 System Administration
A
Getting Technical Support
What it is
How to get it
After registering successfully, support may be obtained by sending a specially formatted message to
support@redhat.com. The message format is described in the support HOW-TO, located at:
http://www.redhat.com/support/register/support-how2.html
This e-mail will then be delivered to Red Hat Software support where it will be distributed to a Red
Hat Support Engineer.
As the name implies, installation support centers on helping you successfully install Red Hat Linux
on your computer. This includes support in three distinct areas:
– Getting any supported hardware necessary for installation recognized by the installation
program.
(See http://www.redhat.com/hardware/)
– Assisting with the creation of a root and swap partition using the free space available on
your hard drive.
– Using the installation program to configure LILO to boot Red Hat Linux, and one other
operating system (such as DOS, Windows 95, or Windows NT) already residing on your
hard drive.
Assisting with final configuration tasks, such as:
Naturally, although our installation support service will get your system running Red Hat Linux,
there are many other optional tasks that you might want to undertake, such as compiling a cus-
tomized kernel, adding support for devices not included in the installation process, and so on.
For assistance with these tasks, please consider the many books on Linux at your local bookstore,
or various on-line resources. A starting point in your on-line search for Linux information should
always be:
http://www.redhat.com/support/
for information specific to Red Hat Linux, or:
A.2 Getting Support 219
http://www.redhat.com/linux-info/
for more general Linux information. Another good resource is
http://www.linux.org/.
Red Hat Software can only support customers that have purchased the official Red Hat Linux Box
set. If you have obtained Red Hat from any other publisher, you must contact them for support.
Examples of other publishers would be:
Macmillan/Sams
Cheapbytes
Also, RHL-Intel obtained via any of the following methods does not qualify for support from Red
Hat Software:
A.2.1 Registration
In order to receive technical support for your Red Hat Software product, you have to register it.
Every official Red Hat product comes with a Registration Card. Your product registration number
appears on both the detachable mail-in portion and on the top portion of this card. The product
registration number uniquely identifies a product which you have purchased (such as Red Hat Linux)
that includes 90 days of free installation technical support by fax or email.
220 Getting Technical Support
If you don’t have access to the World Wide Web, but you do have access to Internet mail, you can
send registration details to register@redhat.com. Please include the following information:
Contact Information: name, address, city, state/province, country, zip/postal code, and tele-
phone and fax numbers; also, your support ID if you have one;
Product Information: name of product you are registering, product registration number (very
important!), architecture you’re using the product on (Intel, Alpha/AXP, or Sparc), and what
you’re using the product for (File Server, Internet Server, Workstation, Home Computer, or
Other);
System Information: CPU (i386, i486, i586, i686/PentiumPro, AXP21164,
AXP21064, Sparc4C, Sparc4M), CPU speed (MHz), amount of RAM (MB), hard drives (num-
ber, size, type, partitions), video card, CD-ROM drive, any network card, and other hardware
components (SCSI or ISDN adaptors, etc.).
Although a mail-in portion is provided with your registration card, we do not recommend registering
via fax or snail mail if you have access to either the World Wide Web or Internet mail; if you do so,
your registration is likely to be delayed considerably. If you do wish to register via fax, fax a copy of
your registration card to Red Hat Software at +1-919-361-2711.
A.2 Getting Support 221
symptoms of the problem (“Red Hat Linux 5.2 doesn’t recognize my CD-ROM drive.”)
when the problem began (“It stopped working yesterday ...”)
what changes you have made to your system around the time of the problem (“... after I
disconnected it from the IDE controller.”)
any diagnostic output specifically related to the problem (“In the bootup messages, it says
‘Cannot find /dev/hdb; device disconnected’.”) however, this can be taken overboard; don’t
send us your system logs unless we ask you for them.
other relevant information (“I’m using the floppy installation method, from the CD.”)
Red Hat’s support system is email-based and is partially automated; for this reason, it is important to
make sure you send support questions in the correct format, so that your message will be recognized
and routed to an appropriate support technician. In order to receive technical support for your Red
Hat Software product, you must first register it.
Submitting trouble tickets can be sent in the traditional email way, or can be initiated via the World
Wide Web. After providing the information for the registration, you will have a new menu allowing
you to edit your registration information or open a trouble ticket. Hurry and login now to open a
ticket on the Web! http://www.redhat.com/support/register/
To open a support ticket via email, all you need to do is send the support system a message with
a Subject: of [registration #nnnn nnnn nnnn nnnn], where nnnn nnnn nnnn nnnn is the
registration number of the product for which you are requesting support. For example, if your regis-
tration number is fffe 0fff ff00 ff00, the subject line should read:
The square brackets, the number sign, and the word ‘registration’ must be present. If you wish, you
may add explanatory text to the subject line:
Once you’ve opened a ticket, support responses come to you with the support ticket number in the
subject line:
222 Getting Technical Support
To correspond about the same problem, simply send a reply with the same subject:
If you feel that the problem has been solved the ticket can also be closed by you. Simply add close
to the same subject:
Once your problem is solved or your question answered, the technician handling your support ticket
can close the ticket. This can also be done by you via the website. Either method will result in a
message from the support system stating the ticket is closed and contain a summary of the problem
and the solution. You can open a new ticket for your next support question. All past correspondence
will be saved in the database under the old ticket number and can be accessed with your account at
any time.
The address for Red Hat’s Technical Support System is support@redhat.com; all support ques-
tions should go there. There are also several related addresses:
For a copy of the Red Hat FAQ (Frequently Asked Questions, with answers), send mail to
faq@redhat.com.
For a copy of the Red Hat PPP Tips (tips on setting up a PPP connection), send mail to ppp-
tips@redhat.com.
Question – I’ve sent several messages to the Red Hat Support System, and I’ve gotten absolutely
no response. Is anybody there?
Answer – Check your registration information to make sure your email address is correct. You can
check it by logging in at
http://www.redhat.com/support/register/.
Question – I know I have already registered, but I keep getting a message from the support system
telling me I’m not registered. Is the system broken?
A.3 Support FAQ (Frequently Asked Questions) 223
Answer – When you register via email, your message goes to an actual human who registers you
manually. Depending on the backlog of people sending in registrations via this method, this
can delay your registration anywhere from several hours to several days.
Question – I’ve done everything perfectly for my registration, but I’m still getting messages telling
me I have an invalid registration number.
Answer – Please make sure you’re using a valid product registration number. If you have not
purchased the official box set from Red Hat Software or a Vendor that sells the official version
(it will say ’official’ on the box) you will not be able to register, as Red Hat Software cannot
support products packaged and sold by other software publishers.
Question – I see this thing on the registration page that asks me what my login is? What is my
login anyway?
Answer – If you are a first time user of the the support system or accessed the support system after
August 15, 1997 then the Login can be whatever you want it to be. It must be all one word
and if there is already a duplicate you will be warned of an error. If you accessed the system
before this time and have a valid registration, your login will be the email address you had
when registering and the password will be the old Support ID number. You can change the
password if you like; however the login cannot be changed.
Question – I’ve tried entering a login and password but it won’t accept it. Why won’t it accept the
password I’m trying to enter?
Answer – The password must be a minimum of 5 alphanumeric characters long and no more than
8. Make sure you typed in the exact same password both times for both password fields on the
registration page.
Question – I hear that it’s possible to change my registration information and view all my old
tickets and the past correspondence. How do I do that?
It is sometimes necessary to create a diskette from an image file (for example, you might need to use
updated diskette images obtained from the Red Hat Linux Errata).
As the name implies, an image file is a file that contains an exact copy (or image) of a diskette’s
contents. Since a diskette contains filesystem information in addition to the data contained in files,
the image file is not usable until it has been written to a diskette.
To start, you’ll need a blank, formatted, high-density (1.44 MB), 3.5-inch diskette. You’ll need access
to a computer with a 3.5-inch diskette drive, and capable of running a DOS program, or the dd utility
program found on most Linux-like operating systems.
The image files are found in the following directories on your Red Hat Linux CD:
images – Contains the boot and supplemental images for Red Hat Linux/Intel, and the vari-
ous kernel and ramdisk images for Red Hat Linux/Alpha.
On the Red Hat Linux/SPARC CD, this directory contains the boot image, and an image for
network booting.
milo – Contains the various images for the Red Hat Linux/Alpha miniloader, MILO. This
directory exists only on Red Hat Linux/Alpha CDs.
Once you’ve selected the proper image, it’s time to transfer the image file onto a diskette. As men-
tioned previously, this can be done on a DOS-capable system, or on a system running a Linux-like
operating system.
226 Making Installation Diskettes
C:n> d:
D:n> cd ndosutils
D:ndosutils> rawrite
Enter disk image source file name: ..nimagesnboot.img
Enter target diskette drive: a:
Please insert a formatted
diskette into drive A: and
press --ENTER-- : Enter
D:ndosutils>
rawrite first asks you for the filename of a diskette image; enter the directory and name of the
image you wish to write (for example, ..nimagesnboot.img). Then rawrite asks for a diskette
drive to write the image to; enter a:. Finally, rawrite
asks for confirmation that a formatted diskette
is in the drive you’ve selected. After pressing Enter to confirm, rawrite copies the image file onto
the diskette. If you need to make another diskette, label another diskette, and run rawrite again,
specifying the appropriate image file.
If you need to make another diskette, label another diskette, and run dd again, specifying the appro-
priate image file.
C
Package List
This appendix lists the packages that make up Red Hat Linux. In each entry, you’ll find the following
information:
In addition, some packages will have one or more of the following icons alongside the package name:
B This package is part of the Red Hat Linux base, meaning that it is always installed.
W Workstation-class installations include this package.
S Server-class installations include this package.
Please Note: This package list was automatically generated right before Red Hat Linux 5.2 went into
production. Because of the short timeframes involved, you might find minor typesetting problems
228 Package List
in the package lists. However, we felt that an up-to-date package list was more important than a
picture-perfect package list. We hope you’ll agree. . .
You may also notice that some packages have different versions, and that packages listed here are
not mentioned in the installation program (and vice versa). Any differences in package versions
are normally due to the normal bug fixing process. It’s possible that “missing” or “extra” packages
are the result of last-minute changes prior to pressing CDROMs. Also note that all the packages in
the “Base” group (and subgroups) are always installed, therefore you will not see them mentioned
explicitly during the installation process.
Using the Package List After Installation This list can come in handy even after you’ve
installed Red Hat Linux. You can use it search for documentation. Here’s how:
If you installed the package, you should get a list of filenames. Each file contains documentation
relating to the package you specified. Here are some of the types of filenames you’ll see:
/usr/man. . . something.n – This is a man page. You can view it by using the man command
(for example, man something. You might also need to include the file’s ending number in
the man command (as in man n something.
/usr/X11R6/man. . . something.nx – This is a man page for part of the X Window System.
View these files the same way as a regular man page.
/usr/doc/something. . . – Files under /usr/doc can be in any number of different formats.
Sometimes the end of the filename can provide a clue as to how it should be viewed:
– .html – An HTML file. View with the web browser of your choice.
– .txt – A text file. View with cat or less.
– .ps – A Postscript file. You can print it to a Postscript printer, or you can view it with gv.
– .gz – A file compressed with gzip. If you make a copy of the original file, you can use
gunzip to decompress it (you’ll probably want to keep the original file compressed to
save space). You can then view the file as you would normally. The zless command
combines gunzip and less, and makes it possible to read compressed text files without
making interim copies. There are other, more elegant ways to work with compressed
files, but this approach will work for those just starting to use Linux.
C.1 Applications 229
In general, most of the documentation files you’ll find will be one of those listed above. If in
doubt, it’s a good bet that the file is text. You can always try the file command to see if the
file’s contents can be identified.
/usr/info. . . – Files in /usr/info
are meant to be viewed using the info (or Emacs’ Info
mode). If you use Emacs, press Ctrl -I , followed by I to view the main Info screen.
C.1 Applications
As this section’s name implies, this is where you can find most of the applications available with Red
Hat Linux. We’ve split the applications into several different categories to make finding things a bit
easier.
(If you noticed that we said “most of the applications” above, you can find more apps by looking at
X11’s application section towards the end of the appendix.)
C.1.1 Communications
This section contains packages that help you communicate – either via fax, on-line chat, or simple
terminal emulation.
efax – (Version 0.8a, 203K)
This is a program to send and receive faxes over class 1 or class 2 fax modems. It has a nice interface
to help facilitate faxing.
C.1.2 Databases
This section contains packages that provide basic database support for Red Hat Linux.
postgresql – (Version 6.3.2, 9,312K) S
PostgreSQL Data Base Management System (formerly known as Postgres, then as Postgres95).
PostgreSQL is an enhancement of the POSTGRES database management system, a next-generation
DBMS research prototype. While PostgreSQL retains the powerful data model and rich data types of
POSTGRES, it replaces the PostQuel query language with an extended subset of SQL. PostgreSQL is
free and the complete source is available.
PostgreSQL development is being performed by a team of Internet developers who all subscribe to
the PostgreSQL development mailing list. The current coordinator is Marc G. Fournier
(scrappy@postgreSQL.org). This team is now responsible for all current and future development of
PostgreSQL.
The authors of PostgreSQL 1.01 were Andrew Yu and Jolly Chen. Many others have contributed to
the porting, testing, debugging and enhancement of the code. The original Postgres code, from which
PostgreSQL is derived, was the effort of many graduate students, undergraduate students, and staff
programmers working under the direction of Professor Michael Stonebraker at the University of
California, Berkeley.
The original name of the software at Berkeley was Postgres. When SQL functionality was added in
1995, its name was changed to Postgres95. The name was changed at the end of 1996 to PostgreSQL.
PostgreSQL runs on Solaris, SunOS, HPUX, AIX, Linux, Irix, FreeBSD, and most flavours of Unix.
postgresql-clients – (Version 6.3.2, 1,131K) S
This package includes only the clients and client libraries needed to access an PostgreSQL server. The
server is included in the main package. If all you need is to connect to another PostgreSQL server,
the this is the only package you need to install.
In this package there are client libraries available for C, C++ and PERL, as well as several command-
line utilities you can use to manage your databases on a remote PostgreSQL server.
postgresql-data – (Version 6.3.2, 780K) S
This packages includes an initial database structure directory for PostgreSQL. For a quick startup
on PostegreSQL, it is recommended to install this package with your PostgreSQL backend server
(altough it is not required).
If you choose to not install this package you will have to create the initial database yourself using
’initdb’ command and possibly modify the postgresql startup script if you choose a directory other
than /var/lib/pgsql for storing your databases.
C.1 Applications 231
C.1.3 Editors
In this section, we have an assortment of packages that provide basic (and in some cases not so basic)
file editing capabilities.
ed – (Version 0.2, 103K) B
This is the GNU line editor. It is an implementation of one of the first editors under *nix. Some
programs rely on it, but in general you probably don’t *need* it.
emacs – (Version 20.3, 17,337K) W S
Emacs is the extensible, customizable, self-documenting real-time display editor. Emacs has special
code editing modes, a scripting language (elisp), and comes with many packages for doing mail,
news, and more, all in your editor.
This package includes the libraries necessary to run the emacs editor - the actual program can be
found in either the emacs-nox or emacs-X11 packages, depending on whether you use X Windows or
not.
emacs-X11 – (Version 20.3, 5,839K) W
This package contains an emacs binary built with support for X Windows. It will still work fine
outside of X Windows (on the console, for instance) but supports the mouse and GUI elements when
used inside of X Windows.
emacs-el – (Version 20.3, 16,778K)
This package contains the emacs-lisp sources for many of the elisp programs included with the main
emacs package. You do not need this package unless you want to modify these packages, or see some
elisp examples.
emacs-nox – (Version 20.3, 2,443K) W S
This package contains an emacs binary built without support for X Windows. While the emacs binary
in the main emacs package will work fine outside of X Windows (on the console, for instance), the
one in this package has a smaller memory image.
development enbironment.
C.1.4 Emulators
In this section are packages that let your Red Hat Linux system run programs meant for other oper-
ating systems.
dosemu – (Version 0.98.1, 1,721K) W
C.1 Applications 233
This package enables you to run a number of DOS programs under Linux. This package includes
an image with DOS-C kernel (MS DOS 3.31 compatible) and FreeDos utilities. You should be able to
start up the DOS emulator by logging in as root and typing ’dos’ at the prompt.
C.1.5 Engineering
This section contains packages for those of you that are into engineering.
C.1.6 Graphics
This section contains packages that help you work with graphics-related material.
ghostscript – (Version 4.03, 2,737K) W S
Ghostscript is a PostScript interpretor. It can render both PostScript and PDF compliant files to de-
vices which include an X window, many printer formats (including support for color printers), and
popular graphics file formats.
ghostscript-fonts – (Version 4.03, 3,679K) W S
234 Package List
These fonts can be used by the GhostScript interpreter during text rendering.
C.1.7 Mail
This section contains several of the more popular e-mail-related programs.
elm – (Version 2.4.25, 476K) W S
ELM is one of the most popular terminal mode mail handling programs. It is powerful, easy to use,
and easy to find help on. It has all the mail handling features you would expect, including MIME
support (via metamail).
exmh – (Version 2.0.2, 1,814K) W S
exmh is a graphical interface to the MH mail system. It includes MIME support, faces, glimpse
indexing, color highlighting, PGP interface, and more. Requires sox (or play) for sound support.
fetchmail – (Version 4.5.8, 549K) W S
Fetchmail is a program that is used to retrieve mail from a remote mail server. It can use the Post
Office Protocol (POP) or IMAP (Internet Mail Access Protocol) for this, and delivers the mail through
the local SMTP server (normally sendmail).
mailx – (Version 8.1.1, 88K) B
C.1 Applications 235
The /bin/mail program can be used to send quick mail messages, and is often used in shell scripts.
metamail – (Version 2.7, 333K) W S
Metamail is an implementation of MIME, the Multipurpose Internet Mail Extensions, a proposed
standard for multimedia mail on the Internet. Metamail implements MIME, and also implements
extensibility and configuration via the ”mailcap” mechanism described in an informational RFC that
is a companion to the MIME document.
mutt – (Version 0.93.2, 507K) W S
Mutt is a small but very poweful full-screen Unix mail client. Features include MIME support, color,
POP3 support, message threading, bindable keys, and threaded sorting mode.
nmh – (Version 0.27, 4,353K) W S
nmh mail handling system (with POP support). nmh is a popular mail handling system but includes
only a command line interface. It is an important base, however, for programs like xmh and exmh.
pine – (Version 4.04, 3,071K) W S
Pine is a very full featured text based mail and news client. It is aimed at both novice and expert
users. It includes an easy to use editor, pico, for composing messages. Pico has gained popularity as
a stand alone text editor in it’s own right. It features MIME support, address books, and support for
IMAP, mail, and MH style folders.
C.1.8 Math
This section contains packages of interest to the mathematician in all of us.
bc – (Version 1.05a, 128K) B
bc is a text mode calculator of sorts. It has many extended features such as base translation. It can
also accept input from stdin and return output. dc is the RPN version.
C.1.9 Networking
This section contains network-related packages.
C.1.10 News
This section contains packages that you can use to read on-line newsgroups.
slrn – (Version 0.9.4.3, 302K) W S
Slrn is an easy to use but powerful full-screen NNTP based newsreader. It relies extensively on the S-
Lang programmer’s library for many of its features. Slrn works particularly well over slow network
connections.
tin – (Version 1.22, 537K) W S
Tin is a full-screen easy to use Netnews reader. It can read news locally (i.e. /usr/spool/news) or
remotely (rtin or tin -r option) via a NNTP (Network News Transport Protocol) server.
trn – (Version 3.6, 431K) W S
‘trn’ is one of the original threaded news readers. this version is configured to read news from an
NNTP news server.
C.1.11 Productivity
This section contains packages aimed at helping you keep track of time, and staying productive.
ical – (Version 2.2, 785K) W S
ical is a popular X-based calendar/scheduler application which can help you keep track of single
events and recurring events (daily, weekly, monthly, or yearly), and sets off alarms to warn you of
appointments.
C.1.12 Publishing
This section contains packages that turn your Red Hat Linux system into a high-quality typesetting
workstation. (In fact, the printed version of this document is produced using many of these tools!)
groff – (Version 1.11a, 2,941K) B
The groff text formatting system can be used to create professional looking documents on both paper
and a computer screen. All the man pages are processed with groff, so you’ll need this package to
read man pages.
The Lout system reads a high-level description of a document similar in style to LaTeX and produces
a PostScript file which can be printed on many laser printers and graphic display devices. Plain text
output is also available.
Lout offers an unprecedented range of advanced features, including optimal paragraph and page
breaking, automatic hyphenation, PostScript EPS file inclusion and generation, equation formatting,
tables, diagrams, rotation and scaling, sorted indexes, bibliographic databases, running headers and
odd-even pages, automatic cross referencing, multilingual documents including hyphenation (most
European languages are supported, including Russian), formatting of C/C++ programs, and much
more, all ready to use. Furthermore, Lout is easily extended with definitions which are very much
easier to write than troff of TeX macros because Lout is a high-level language, the outcome of an
eight-year research project that went back to the beginning.
tetex-latex – (Version 0.9, 6,443K) W
LaTeX is a TeX macro package. The LaTeX macros encourage writers to think about the content of
their documents, rather than the form. The ideal, very difficult to realize, is to have no formatting
commands (like “switch to italic” or “skip 2 picas”) in the document at all; instead, everything is
done by specific markup instructions: “emphasize”, “start a section”.
tetex-xdvi – (Version 0.9, 1,025K) W S
xdvi is a program which runs under the X window system. It is used to preview dvi files, such as are
produced by tex and latex.
texinfo – (Version 3.12, 505K) W S
The GNU project uses the texinfo file format for much of its documentation. This package includes
the tools necessary to create .info files from .texinfo source files, as well as an emacs interface to all
these tools.
C.1.13 Sound
This section contains packages that let you use your Red Hat Linux system’s sound capabilities.
aumix – (Version 1.13, 47K) W
This program provides a tty based, interactive method of controlling a sound cards mixer. It lets you
adjust the input levels from the CD, microphone, and on board synthesizers as well as the output
volume.
cdp – (Version 0.33, 36K)
This program allows you to play audio CD’s on your computers CDROM drive. It provides a version
with a full screen interface as well as a command line version.
maplay – (Version 1.2, 70K)
This program plays MPEG 2 format audio files through your PC’s sound card. MPEG audio files
are popular for sending high fidelity music over the Internet, and http://www.iuma.com contains a
large archive of MPEG 2 sound files.
playmidi – (Version 2.4, 145K) W
Plays MIDI sound files through a sound card synthesizer. It includes basic drum samples for use
with simple FM synthesizers.
playmidi-X11 – (Version 2.4, 46K) W
X program for playing MIDI sound files through a sound card synthesizer. It includes basic drum
samples for use with simple FM synthesizers.
sox – (Version 12.14, 349K) W
The self described ”swiss army knife of sound tools”, sox can convert between many different digi-
tized sound formats and perform simple sound manipulation functions.
C.2 Base
This section contains the packages that are consider basic to every Red Hat Linux system. You will
normally will not see them during the installation process, but they’re included here for your infor-
mation.
C.2.1 Kernel
This section contains packages related to your Red Hat Linux system’s kernel. This part of the Linux
operating system is central to all system operations.
kernel – (Version 2.0.36, 4,726K) B
This package contains the Linux kernel that is used to boot and run your system. It contains few
device drivers for specific hardware. Most hardware is instead supported by modules loaded after
booting.
kernel-headers – (Version 2.0.36, 1,551K) W S
These are the C header files for the Linux kernel, which define structures and constants that are
needed when building most standard programs under Linux, as well as to rebuild the kernel.
basesystem – (Version 4.9, 0K) B
While this package does not contain any files, it does perform an important function. It defines the
components of a basic Red Hat system, as the package installation order to use during bootstrapping.
It should be the first package installed on a system, and it should never be removed.
crontabs – (Version 1.7, 4K) B
The root crontab file is used to schedule execution of various programs.
dev – (Version 2.5.9, 0K) B
Unix and unix like systems (including Linux) use file system entries to represent devices attached to
the machine. All of these entries are in the /dev tree (though they don’t have to be), and this package
contains the most commonly used /dev entries. These files are essential for a system to function
properly.
etcskel – (Version 1.3, 5K) B
This is part of the Base Red Hat system. It contains the files that go in /etc/skel, which are in turn
placed in every new user’s home directory when new accounts are created.
filesystem – (Version 1.3.2, 79K) B
This package contains the basic directory layout for a Linux system, including the proper permissions
for the directories. This layout conforms to the Linux Filesystem Standard (FSSTND) 1.3.
initscripts – (Version 3.72, 94K) B
This package contains the scripts use to boot a system, change run levels, and shut the system down
cleanly. It also contains the scripts that activate and deactivate most network interfaces.
mailcap – (Version 1.0, 29K) B
This is the Red Hat Mailcap package. Installing it will allow programs like lynx to automatically use
zgv to display pictures (provided zgv is installed).
pam – (Version 0.64, 2,747K) B
PAM (Pluggable Authentication Modules) is a powerful, flexible, extensible authentication system
which allows the system administrator to configure authentication services individually for every
pam-compliant application without recompiling any of the applications.
pamconfig – (Version 0.51, 2K) B
This package has been made obsolete by pam-0.56, and is provided for compatibility purposes only.
If the command:
rpm -q –whatrequires pamconfig
returns no package names, you may remove this package with:
rpm -e pamconfig
242 Package List
passwd – (Version 0.50, 17K) B
This password-changing program uses PAM (Pluggable Authentication Modules) to set or change a
password. Like all PAM-capable applications, it can be configured using a file in the /etc/pam.d/
directory.
pwdb – (Version 0.54, 1,260K) B
pwdb (Password Database Library) allows configurable access to and management of /etc/passwd,
/etc/shadow, and network authentication systems including NIS and Radius.
redhat-release – (Version 5.2, 0K) B
Red Hat Linux release file
rootfiles – (Version 5.2, 2K) B
This package contains all the startup files for the root user. These are basically the same files that are
in the etcskel package.
setup – (Version 1.9.1, 8K) B
This package contains a number of very important configuration and setup files, including the passwd,
group, profile files, etc.
termcap – (Version 9.12.6, 424K) B
The /etc/termcap file is a database defining the capabilities of various terminals and terminal em-
ulators. Programs use /etc/termcap to gain access to various features of terminals such as the bell,
color, and graphics.
C.3 Daemons
This section contains packages for all the daemons available for your Red Hat Linux system. Dae-
mons are programs that run automatically, and perform various system functions for you.
SysVinit – (Version 2.74, 141K) B
SysVinit is the first program started by the Linux kernel when the system boots, controlling the
startup, running, and shutdown of all other programs.
at – (Version 3.1.7, 60K) B
at and batch read commands from standard input or a specified file which are to be executed at a
later time, using /bin/sh.
bdflush – (Version 1.5, 9K) B
This program flushes the disk buffers the kernel keeps to prevent them from growing too stale.
C.3 Daemons 243
gpm – (Version 1.13, 193K) B
GPM adds mouse support to text-based Linux applications such as emacs, Midnight Commander,
and more. It also provides console cut-and-paste operations using the mouse. Includes a program to
allow pop-up menus to appear at the click of a mouse button.
kernel-pcmcia-cs – (Version 2.0.36, 754K) B
Many laptop machines (and some others) support PCMCIA cards for expansion. Also known as
”credit card adapters”, PCMCIA cards are small cards for everything from SCSI support to modems.
They are hot swappable (they can be exchanged without rebooting the system) and quite convienent.
This package contains support for numerous PCMCIA cards of all varieties and supplies a daemon
which allows them to be hot swapped.
procmail – (Version 3.10, 179K) B
Red Hat Linux uses procmail for all local mail delivery. In addition to regluar mail delivery duties,
procmail can be used to do many different automatic filtering, presorting, and mail handling jobs. It
is the basis for the SmartList mailing list processor.
C.4 Development
This section contains packages of interest to programmers. Red Hat Linux comes with a very power-
ful and rich set of tools for the programmer, so there are several different subsections here.
C.4.1 Building
This section contains packages that help programmers easily build programs.
autoconf – (Version 2.12, 524K) W S
GNU’s ”autoconf” is a tool for source and Makefile configuration. It assists the programmer in cre-
ating portable and configurable packages, by allowing the person building the package to specify
various configuration options.
”autoconf” is not required for the end user - it is needed only to generate the configuration scripts.
automake – (Version 1.3, 777K) W S
Automake is an experimental Makefile generator. It was inspired by the 4.4BSD make and include
files, but aims to be portable and to conform to the GNU standards for Makefile variables and targets.
C.4.2 Debuggers
This section contains a number of packages that make it easier to find bugs in a program.
ElectricFence – (Version 2.0.5, 44K) W S
C.4 Development 245
Electric Fence is a libary that can be used for C programming and debugging. You link it in at compile
time and it will warn you of possible problems such as free’ing memory that doesn’t exist, etc.
gdb – (Version 4.17.0.4, 1,251K) W S
This is a full featured, command driven debugger. It allows you to trace the exectuion of programs
and examine their internal state at any time. It works for C and C++ compiled with the GNU C
compiler gcc.
strace – (Version 3.1, 114K) W S
Strace prints a record of each system call another program makes, including all of the arguments
passed to it and the system call’s return value.
xxgdb – (Version 1.12, 95K) W
xxgdb is a graphical interface to GNU’s debugger. It has the ability to display source files as they
are executed, set breakpoints, and singlestep through or over commands - all with an easy-to-use
graphical X Windows interface.
C.4.3 Languages
This section lists the packages containing various programming languages.
egcs – (Version 1.0.3a, 2,782K) W S
A compiler aimed at integrating all the optimizations and features necessary for a high-performance
and stable development environment.
egcs-c++ – (Version 1.0.3a, 1,780K) W
This package adds C++ support to the GNU C compiler. It includes support for most of the current
C++ specification, including templates and exception handling. It does not include a standard C++
library, which is available separately.
C.4.4 Libraries
This section contains packages of the various libraries. Some libraries are required for normal sys-
tem operation, while others are only needed if you will be using their features in a program you’re
writing.
cracklib – (Version 2.7, 69K) B
Checks passwords for security related characteristics - length, uniqueness, whether they are in a
word database, etc.
e2fsprogs-devel – (Version 1.12, 257K)
Libraries and header files needed to develop ext2 filesystem-specific programs.
faces-devel – (Version 1.6.1, 22K) W
This is the xface development environment. It contains the static libraries and header files for doing
xface development.
gd-devel – (Version 1.3, 7K) W
This package contains the files needed for development of programs linked against GD.
gdbm-devel – (Version 1.7.3, 70K) W
These are the development libraries and header files for gdbm, the GNU database system. These are
required if you plan to do development using the gdbm database.
C.4 Development 249
glibc – (Version 2.0.7, 15,608K) B
Contains the standard libraries that are used by multiple programs on the system. In order to save
disk space and memory, as well as to ease upgrades, common system code is kept in one place and
shared between programs. This package contains the most important sets of shared libraries, the
standard C library and the standard math library. Without these, a Linux system will not function. It
also contains national language (locale) support and timezone databases.
This package is all you need to develop programs that manipulate tiff images.
zlib-devel – (Version 1.1.3, 162K) W
The ’zlib’ compression library provides in-memory compression and decompression functions, in-
cluding integrity checks of the uncompressed data. This version of the library supports only one
compression method (deflation) but other algorithms may be added later and will have the same
stream interface.
This package contains the header files and libraries needed to develop programs that use these zlib.
C.4.5 System
This section lists the packages containing system-level development tools.
linuxconf-devel – (Version 1.12r5, 2,706K) W
This package provides the components needed to develop linuxconf modules outside of the linuxconf
source tree. The kit is also needed to develop standalone utilities using the linuxconf user interface
toolkit.
C.4.6 Tools
This section contains packages that provide the usual assortment of tools that programmers require.
binutils – (Version 2.9.1.0.14, 4,537K) B W S
Binutils is a collection of utilities necessary for compiling programs. It includes the assembler and
linker, as well as a number of other miscellaneous programs for dealing with executable formats.
bison – (Version 1.25, 154K) W S
This is the GNU parser generator which is mostly compatible with yacc. Many programs use this as
part of their build process. Bison is only needed on systems that are used for development.
byacc – (Version 1.9, 52K) W S
This is a public domain yacc parser. It is used by many programs during their build process. You
probably want this package if you do development.
cdecl – (Version 2.5, 74K) W S
This is a package to translate English to C/C++ function declarations and vice versa. It is useful for
programmers.
cproto – (Version 4.4, 84K) W S
Cproto generates function prototypes for functions defined in the specified C source files to the stan-
dard output. The function definitions may be in the old style or ANSI C style. Optionally, cproto also
outputs declarations for variables defined in the files. If no file argument is given, cproto reads its
252 Package List
The Revision Control System (RCS) manages multiple revisions of files. RCS automates the storing,
retrieval, logging, identification, and merging of revisions. RCS is useful for text that is revised
frequently, for example programs, documentation, graphics, papers, and form letters.
C.5 Documentation
This section lists packages that contain a variety of Linux-related information. There is a lot of good
information here; unless you are low on disk space, you should install these packages. (Note, how-
ever, that you probably don’t need all the HOWTO packages; in most cases howto and howto-html
will probably suffice.)
the files have been translated, so you most likely will need the english version installed if you want
to have a complete HOWTO install.
C.6 Extensions
This section lists packages that provide language-specific extensions to Red Hat Linux.
C.7 Games 257
C.6.1 Japanese
This section lists packages that provide Japanese-specific extensions to Red Hat Linux.
C.7 Games
This section lists the packages that provide fun and entertainment to Red Hat Linux system owners
the world over. Game packages that run under the X window system can be found in the X11 section
near the end of this appendix.
C.8 Libraries
This section lists packages that contain various libraries. These libraries are used by other program
to support various functions, such as image manipulation, compatibility with older binary program
formats, and screen handling.
library in your own programs. With these, you can create your own own programs that use this
library.
libtermcap – (Version 2.0.8, 55K) B
This is the library for accessing the termcap database. It is necessary to be installed for a system to be
able to do much of anything.
libtermcap-devel – (Version 2.0.8, 11K) W
This is the package containing the development libaries and header files for writing programs that
access the termcap database. It may be necessary to build some other packages as well.
libtiff – (Version 3.4, 602K) W S
This package is a library of functions that manipulate TIFF images.
libungif – (Version 3.0, 37K) W S
GIF loading and saving shared library. (Saving uses an uncompressed gif algorithm that does not
use LZW compression.)
ncurses – (Version 4.2, 2,334K) B
The curses library routines give the user a terminal-independent method of updating character screens
with reasonable optimization. This implementation is “new curses” (ncurses) and is the approved
replacement for 4.4BSD classic curses, which is being discontinued.
has been designed from the beginning to be easily embedded into a program to make it extensible.
Slang also provides a way to quickly develop and debug the application embedding it in a safe and
efficient manner. Since slang resembles C, it is easy to recode slang procedures in C if the need arises.
C.9 Networking
This section lists packages that are related to networking. It has been split into several subsections
for easier browsing.
C.9.1 Admin
This section lists packages that provide basic network administrative functions.
anonftp – (Version 2.6, 1,046K) S
Contains the files needed for allowing anonymous ftp access to your machine. This lets any user get
files from your machine without having an account, which is a popular way of making programs
available on the Internet.
caching-nameserver – (Version 5.2, 3K) S
Includes configuration files for bind (the DNS nameserver) which make it behave as a simple caching
nameserver. Many users on dialup connections use this package (along with bind) and make the it’s
own nameserver to speed up name resoultions.
net-tools – (Version 1.46, 190K) B
This is a collection of the basic tools necessary for setting up networking on a Linux machine. It
262 Package List
includes ifconfig, route, netstat, rarp, and some other minor tools.
nfs-server-clients – (Version 2.2beta37, 10K) W S
This package contains client programs that interact with NFS servers. It is not needed to mount NFS
volumes. At the moment the only program in it is showmount, which can be used to show exported
and mounted filesystems.
tcp wrappers – (Version 7.6, 242K) W S
With this package you can monitor and filter incoming requests for the SYSTAT, FINGER, FTP, TEL-
NET, RLOGIN, RSH, EXEC, TFTP, TALK, and other network services.
C.9.2 Daemons
This section lists packages that provide various network-related daemons. Daemons are programs
that are run automatically to perform various system functions.
MARS is a NetWare compatible file and printer server. It lets you use a Linux machine as a file and
print server for NetWare based clients using NetWare’s native IPX protocol suite.
Squid supports SSL, extensive access controls, and full request logging. By using the lightweight In-
ternet Cache Protocol, Squid caches can be arranged in a hierarchy or mesh for additional bandwidth
savings.
Squid consists of a main server program squid, a Domain Name System lookup program dnsserver,
a program for retrieving FTP data ftpget, and some management and client tools. When squid starts
up, it spawns a configurable number of dnsserver processes, each of which can perform a single,
blocking Domain Name System (DNS) lookup. This reduces the amount of time the cache waits for
DNS lookups.
Squid is derived from the ARPA-funded Harvest project.
dard time. It includes ntpdate, a program similar to rdate, and xntpd, a daemon which adjusts the
system time continuously.
C.9.3 Development
This section lists packages that are related to the development of networking-related code.
C.9.4 News
This section lists packages related to Usenet news.
C.9.5 Utilities
This section lists packages that provide handy utilities related to networking.
bind-utils – (Version 8.1.2, 471K) W S
Collection of utilities for querying name servers and looking up hosts. These tools let you determine
the IP addresses for given host names, and find information about registered domains and network
addresses.
bootpc – (Version 061, 35K) B W S
bootpc is the bootp client for Linux that will allow a linux machine to retrieve it’s networking infor-
mation from a server via the network. It sends out a general broadcast asking for the information
which is returned.
comanche – (Version 0.6a, 189K)
Comanche stands for COnfiguration MANager for apaCHE. It is a front end for the Apache Config-
uration Server Project Apache is the most popular, fast, reliable Web server on the internet. You can
C.9 Networking 267
rdate is a program that can retrieve the time from another machine on your network. If run as root,
it will also set your local time to that of the machine you queried. It is not super accurate; get xntpd
if you are really worried about milliseconds.
rdist – (Version 1.0, 118K) W S
Rdist is a program to maintain identical copies of files over multiple hosts. It preserves the owner,
group, mode, and mtime of files if possible and can update programs that are executing.
traceroute – (Version 1.4a5, 29K) W S
Traceroute prints the route packets take across a TCP/IP. The names (or IP numbers if names are not
available) of the machines which are routing packets from the machine traceroute is running on to
the destination machine are printed, along with the time is took to receive a packet acknowledgement
from that machine. This tool can be very helpfull in diagnosing networking problems.
ftp – (Version 0.10, 83K) W S
This provides the standard Unix command-line ftp client. ftp is the standard Internet file transfer
protocol, which is extremely popular for both file archives and file transfers between individuals.
netkit-base – (Version 0.10, 53K) W S
This package provides the ping and inetd programs, which are both used for basic networking.
ntalk – (Version 0.10, 31K) W S
This package provides a client and daemon for the Internet talk protocol, which allows one-on-one
chatting between users on different systems.
pidentd – (Version 2.7, 116K) W S
identd is a program that implements the RFC1413 identification server. identd operates by looking
up specific TCP/IP connections and returning the user name of the process owning the connection.
routed – (Version 0.10, 38K) W S
A number of protocols are available for automatic updating of TCP/IP routing tables. RIP is the
simplest of those, and this package includes a daemon which broadcasts RIP routing notification and
handles incoming RIP packets.
rsh – (Version 0.10, 95K) W S
Rsh, rlogin, and rcp are a suite of programs which allow users to run commands on remote machines,
login into other machines, and copy files between machines. All of these commands use rhosts style
authentication. This package includes the client and servers needed for all of these services, as well as
a server for rexec, which is an alternate method of executing remote commands. All of these servers
are run from inetd and configured through /etc/inetd.conf and PAM. The rexecd server is disabled
by default, but the rest are enabled.
rusers – (Version 0.10, 36K) W S
The rusers server and client, both included in this package, allow users to find out what users are
logged into various machines on the local network.
Samba provides an SMB server which can be used to provide network services to SMB (sometimes
called ”Lan Manager”) clients, including various versions of MS Windows, OS/2, and other Linux
machines. Samba also provides some SMB clients, which complement the built-in SMB filesystem in
Linux. Samba uses NetBIOS over TCP/IP (NetBT) protocols and does NOT need NetBEUI (Microsoft
Raw NetBIOS frame) protocol.
This release is known as the ”Locking Update” and has full support for Opportunistic File Locking. In
addition this update includes native support for Microsoft encrypted passwords, improved browse
list and WINS database management.
Please refer to the WHATSNEW.txt document for fixup information. This binary release includes en-
crypted password support. Please read the smb.conf file and ENCRYPTION.txt in the docs directory
for implementation details.
telnet – (Version 0.10, 175K) W S
Telnet is a popular protocol for remote logins across the Internet. This package provides a command
line telnet client as well as a telnet daemon which allows remote logins into the machine it is running
on. The telnet daemon is enabled by default, and may be disabled by editing /etc/inetd.conf.
tftp – (Version 0.10, 32K) W S
The trivial file transfer protocol (tftp) is normally used only for booting diskless workstations. It
provides very little security, and should not be enabled unless it is needed. The tftp server is run
from /etc/inetd.conf, and is disabled by default on Red Hat systems.
timed – (Version 0.10, 60K) W S
This timed server allows remote machines to query the time-of-day of the machine the server is
running on. This allows for simple time syncronization across a network.
C.10 Shells
This section lists packages that provide a wide variety of shells for your Red Hat Linux system.
ash – (Version 0.2, 247K) B
ash is a bourne shell clone from Berkeley. It supports all of the standard Bourne shell commands and
C.11 Utilities 271
has the advantage of supporting them while remaining considerably smaller than bash.
bash – (Version 1.14.7, 1,327K) B
Bash is an sh-compatible command language interpreter that executes commands read from the stan-
dard input or from a file. Bash also incorporates useful features from the Korn and C shells (ksh and
csh).
Bash is ultimately intended to be a conformant implementation of the IEEE Posix Shell and Tools
specification (IEEE Working Group 1003.2).
mc – (Version 4.1.35, 869K) W
Midnight Commander is a visual shell much like a file manager, only with way more features. It is
text mode, but also includes mouse support if you are running GPM. Its coolest feature is the ability
to ftp, view tar and zip files, and poke into RPMs for specific files. :-)
C.11 Utilities
This section lists packages that provide various utilities for your Red Hat Linux system. Because
there are so many, we’ve split them into different subsections.
C.11.1 Archiving
This section lists packages that provide utilities for data archiving.
272 Package List
zip is a compression and file packaging utility for Unix, VMS, MSDOS, OS/2, Windows NT, Minix,
Atari and Macintosh. It is analogous to a combination of the UNIX commands tar(1) and compress(1)
and is compatible with PKZIP (Phil Katz’s ZIP for MSDOS systems).
C.11.2 Console
This section lists packages that provide utilities that manage your Red Hat Linux system’s console.
C.11.3 File
This section lists packages containing file-related utility programs.
file – (Version 3.25, 198K) B
This package is useful for finding out what type of file you are looking at on your system. For
example, if an fsck results in a file being stored in lost+found, you can run file on it to find out if
it’s safe to ’more’ it or if it’s a binary. It recognizes many file types, including ELF binaries, system
libraries, RPM packages, and many different graphics formats.
fileutils – (Version 3.16, 868K) B
These are the GNU file management utilities. It includes programs to copy, move, list, etc, files.
The ls program in this package now incorporates color ls!
findutils – (Version 4.1, 155K) B
This package contains programs to help you locate files on your system. The find program can search
through a hierarchy of directories looking for files matching a certain set of criteria (such as a filename
274 Package List
pattern). The locate program searches a database (create by updatedb) to quickly find a file matching
a given pattern.
git – (Version 4.3.17, 698K) W
GIT is a file system browser for UNIX systems. An interactive process viewer/killer, a hex/ascii file
viewer, an auto-mount shell script and a per file type action script are also available.
The standard ANSI color sequences are used where available. Manual pages and info documentation
are also provided.
relative symlinks.
C.11.4 Printing
This section lists packages that provide utility programs related to printing.
mpage – (Version 2.4, 84K) W S
mpage formats multiple pages of ASCII text onto a single page of PostScript. It supports many
different layouts for the final pages.
C.11.5 System
This section lists packages that provide utilities that perform various system-related functions.
MAKEDEV – (Version 2.3.1, 24K) B
The /dev tree holds special files, each of which corresponds to a type of hardware device that Linux
supports. This package contains a script which makes it easier to create and maintain the files which
fill the /dev tree.
adjtimex – (Version 1.3, 22K)
adjtimex is a kernel clock management system. It is useful in adjusting the system clock for accuracy.
helptool – (Version 2.4, 23K) W S
The help tool provides a unified graphical interface for searching through many of the help sources
available, including man pages and GNU texinfo documents.
info – (Version 3.12, 193K) B
The GNU project uses the texinfo file format for much of its documentation. This package includes a
standalone browser program to view these files.
ipfwadm – (Version 2.3.0, 85K) W S
This is the IP firewall and accounting administration tool. It is useful if you need to run a firewall (a
machine that acts as a secure gateway to the Internet).
isapnptools – (Version 1.15a, 175K) B
These programs allow ISA Plug-And-Play devices to be configured on a Linux machine.
This program is suitable for all systems, whether or not they include a PnP BIOS. In fact, a PnP BIOS
adds some complications because it may already activate some cards so that the drivers can find
them, and these tools can unconfigure them, or change their settings causing all sorts of nasty effects.
If you have (for example) plug and play network cards that already work, I suggest you read section
4 on the format of the configuration file below very carefully.
kbd – (Version 0.96a, 1,080K) B
This package contains utilities to load console fonts and keyboard maps. It also includes a number
of different fonts and keyboard maps.
kbdconfig – (Version 1.8.2, 23K) B
This is a terminal mode program for setting the keyboard map for your system. Keyboard maps are
necessary for using non US default keyboards. Kbdconfig loads the selected keymap before exiting
and configures your machine to use that keymap automatically after rebooting.
kernelcfg – (Version 0.5, 58K) W S
Red Hat Linux kernelcfg provides a GUI interface which allows you to easily administrate your
kerneld configuration.
ldconfig – (Version 1.9.5, 109K) B
ldconfig scans a running system and sets up the symbolic links that are used to load shared libraries
properly. It also creates /etc/ld.so.cache which speeds the loading programs which use shared li-
braries.
lilo – (Version 0.20, 1,437K) B
Lilo is repsonsible for loading your linux kernel from either a floppy or a hard drive and giving it
control of the system. It can also be used to boot many other operating sysetms, including the BSD
variants, DOS, and OS/2.
278 Package List
linuxconf – (Version 1.12r5, 7,324K) B
Linuxconf has an easy-to-navigate user interface that is accessible from a text console, a web interface,
and a GUI interface.
Linuxconf has the ability to manage:
Networking: Host information: IP Address, Hostname etc. IP Subnet allocation Resolving Name
Servers Routing and Gateways NIS IPX Interface Setup PPP and Slip Dialout NFS File Systems
Named (DNS) Zones and Secondaries Reverse Lookup Sendmail Virtual Email Domains UUCP IP
Aliasing DCHP/BOOTP Server RARP Server Input Firewalling Output Firewalling Blocking Fire-
walling IP Masquerading Packet Accounting Mail to Fax Gateway User Accounts: User and Group
management PPP Acounts Slip Accounts UUCP Accounts POP Only Accounts Virtual Email Domain
Accounts Email Aliases For Normal and Virtual Domains Policies For Passwords and User Accounts
Available User Shells Crontab Management Shadow Management File Systems: Local Partition Man-
agement (/etc/fstab) NFS Volume Management (Samba Volume Management coming soon) Swap
File and Partition Management User and Group Disk Quotas File Permissions Boot Mode: Lilo Con-
figuration Default Boot Mode Runlevel Definitions
And more...
logrotate – (Version 2.6, 41K) B
Logrotate is designed to ease administration of systems that generate large numbers of log files.
It allows automatic rotation, compression, removal, and mailing of log files. Each log file may be
handled daily, weekly, monthly, or when it grows too large.
losetup – (Version 2.8a, 7K) B
Linux supports a special block device called the loopback device, which maps a normal file onto
a virtual block device. This package contains programs for setting up and removing the mapping
between files and loopback devices.
Block loopback devices should not be confused with the networking loopback device, which is con-
figured with the normal ifconfig command.
lpr – (Version 0.33, 168K) W S
This package manages printing services. It manages print queues, sends jobs to local printers and
remote pritners, and accepts jobs from remote clients.
man – (Version 1.5f, 89K) B
The man page suite, including man, apropos, and whatis. These programs are used to read most of
the documentation available on a Linux system. The whatis and apropos programs can be used to
find documentation related to a particular subject.
mingetty – (Version 0.9.4, 31K) B
mingetty, by Florian La Roche, is a lightweight, minimalist getty for use on virtual consoles only.
mingetty is not suitable for serial lines (the author recommends using ‘mgetty’ for that purpose).
C.11 Utilities 279
mkbootdisk – (Version 1.1, 5K) B
This package creates a self-contained boot disk for booting a system. It assumes that the boot disk
should use the root partition mentioned in /etc/fstab. The resultant boot disk includes all of the SCSI
modules needed to use the system.
mkdosfs-ygg – (Version 0.3b, 15K) W
This is the mkdosfs package. You can use this under Linux to create MS-DOS FAT file systems.
mkinitrd – (Version 1.8, 6K) B
Generic kernels can be built without drivers for any SCSI adapters which load the SCSI driver as
a module. To solve the problem of allowing the kernel to read the module without being able to
address the SCSI adapter, an initial ramdisk is used. That ramdisk is loaded by the operating system
loader (such as lilo) and is available to the kernel as soon as it is loaded. That image is resonsible for
loading the proper SCSI adapter and allowing the kernel to mount the root filesystem. This program
creates such a ramdisk image using information found in /etc/conf.modules.
mouseconfig – (Version 3.0.8, 61K) B
This is a text based mouse configuration tool. You can use it to set the proper mouse type for pro-
grams like ’gpm’. It also can be used in conjunction with the Red Hat Xconfigurator to setup the
mouse for the X Window System.
mt-st – (Version 0.5, 64K) B
The mt program can be used to perform many operations on tapes, including rewind, eject, skipping
files and blocks, etc.
netcfg – (Version 2.19, 165K) W S
Red Hat Linux netcfg provides a GUI interface which allows you to easily administrate your network
setup.
ntsysv – (Version 0.9.4, 19K) B
ntsysv provides a full-screen tool for updating the /etc/rc.d directory hierarchy, which controls the
starting and stopping of system services.
quota – (Version 1.55, 80K) B
Quotas allow the system administrator to limit disk usage by a user and/or group per filesystem.
This package contains the tools which are needed to enable, modify, and update quotas.
Setserial is a program which allows you to look at and change various attributes of a serial device,
including its port, its IRQ, and other serial port options.
setuptool – (Version 1.0, 9K) B
setup is a friendly text-mode menu program that gives you easy, instant access to all the text-mode
configuration programs in Red Hat Linux.
sh-utils – (Version 1.16, 337K) B
The GNU shell utilities provide many of the basic common commands used (among other things) for
shell programming, hence the name. Nearly all shell scripts use at least one of these programs.
shadow-utils – (Version 980403, 583K) B
This package includes the programs necessary to convert standard UNIX password files to the shadow
password format, as well as programs for command-line management of the user’s accounts. - ’pw-
conv’ converts everything to the shadow password format. - ’pwunconv’ unconverts from shadow
passwords, generating a file in the current directory called npasswd that is a standard UNIX pass-
word file. - ’pwck’ checks the integrity of the password and shadow files. - ’lastlog’ prints out the last
login times of all users. - ’useradd’, ’userdel’ and ’usermod’ for accounts management. - ’groupadd’,
’groupdel’ and ’groupmod’ for group management.
A number of man pages are also included that relate to these utilities, and shadow passwords in
general.
C.11.6 Terminal
This section lists packages that provide utilities related to terminal handling.
dialog – (Version 0.6, 88K) W
Dialog is a utility that allows you to build user interfaces in a TTY (text mode only). You can call
dialog from within a shell script to ask the user questions or present with choices in a more user
friendly manner. See /usr/doc/dialog-*/samples for some examples.
C.11.7 Text
This section lists packages that provide utilities related to the handling and manipulation of text.
Sed copies the named files (standard input default) to the standard output, edited according to a
script of commands.
textutils – (Version 1.22, 683K) B
These are the GNU text file (actually, file contents) processing utilities. They include programs to
split, join, compare, and modify files.
words – (Version 2, 411K) B
This package contains the english dictionary in /usr/dict. It is used by programs like ispell as a
database of words to check for spelling and so forth.
C.12 X11
This section lists packages related to the X Window System. If you’d like your Red Hat Linux system
to have a spiffy graphical user interface, this is where you’ll need to look. Since there are so many
X-related packages, we’ve divided them into subsections to make it easier to browse.
C.12.1 Amusements
This section lists packages containing various amusing programs that run under X.
multimedia – (Version 2.1, 325K) W
This package contains XPlaycd, XMixer and XGetfile. XPlaycd is a program to play audio cd’s using
a cdrom drive. XMixer is used to control the mixer on a soundcard. XGetfile is a versatile file browser,
made for use in shell-scripts.
xbanner – (Version 1.31, 648K) W S
XBanner displays text, patterns, and images on the root window. This allows users to customize both
their normal X background and the background used on xdm style login screens.
C.12.2 Applications
This section lists packages containing various applications that run under X.
ImageMagick – (Version 4.1.0, 2,427K) W S
ImageMagick is an image display, conversion, and manipulation tool. It runs under X windows. It
is very powerful in terms of it’s ability to allow the user to edit images. It can handle many different
formats as well.
gimp – (Version 1.0.1, 7,347K) W
The GIMP is an image manipulation program suitable for photo retouching, image composition and
image authoring. Many people find it extremely useful in creating logos and other graphics for web
pages. The GIMP has many of the tools and filters you would expect to find in similar commercial
offerings, and some interesting extras as well.
The GIMP provides a large image manipulation toolbox, including channel operations and layers,
effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
This version of The GIMP includes a scripting facility, but many of the included scripts rely on fonts
that we cannot distribute. The GIMP ftp site has a package of fonts that you can install by yourself,
which includes all the fonts needed to run the included scripts. Some of the fonts have unusual li-
censing requirements; all the licenses are documented in the package. Get
ftp://ftp.gimp.org/pub/gimp/fonts/freefonts-0.10.tar.gz and
ftp://ftp.gimp.org/pub/gimp/fonts/sharefonts-0.10.tar.gz if you are so inclined. Alternatively, choose
fonts which exist on your system before running the scripts.
ghostview.
Gopher, a method of accessing information on the Internet, is made easy with this X-Windows gopher
client. Although gopher is less up-to-date than the WWW, Xgopher can still open up a portal to the
vast storehouse of information available on the Internet.
xloadimage – (Version 4.1, 235K)
Xloadimage displays images in an X11 window, loads them onto the root window, or writes them
into a file. Many image types are recognized.
xmorph – (Version 1996.07.12, 123K) W
xmorph allows you to create fascinating ”morphs” - animated changes between two different images
- and provides the tools to do so in an intuitive and easy-to-comprehend manner.
xpaint – (Version 2.4.9, 407K) W
XPaint is a color image editing tool which features most standard paint program options, as well as
advanced features such as image processing algorithms. It allows for the editing of multiple images
simultaneously and supp
C.12.3 Games
This section lists packages that contain various games capable of running under X.
290 Package List
The classic arcade action game comes to your screen with xchomp, the PacMan-like game. Not as
extensive as the original game, but still lots of fun!
An assortment of geometric puzzles and toys, including an electronic version of Rubik’s cube, and a
”dinosaur cube” program.
C.12.4 Libraries
This section lists packages containing various X-related system libraries.
GLIB includes generally useful data structures, GDK is a drawing toolkit which provides a thin layer
over Xlib to help automate things like dealing with different color depths, and GTK is a widget set
for creating user interfaces.
imlib – (Version 1.8, 342K) W S
Imlib is an advanced replacement library for libraries like libXpm that provides many more features
with much greater flexability and speed.
C.12.5 Shells
This section lists packages containing various graphically-oriented shells.
C.12.6 Utilities
This section lists packages containing utilities related to the X window system.
294 Package List
Xconfigurator – (Version 3.79, 266K) W S
This is the Red Hat X Configuration tool. It is based on the sources for xf86config, a utility from
XFree86. It has a nicer user interface added to make it easier for the end user.
NOTE - use mouseconfig to change your mouse type, then re-run Xconfigurator to set X up for your
new mouse type.
It can display in 12 or 24 hour modes, and displays the date when a mouse button is held down. It
has two large fonts built into it, but it can animate other fonts.
AfterStep – (Version 1.5, 3,384K) W S
AfterStep is a continuation of the BowMan window manager which was originally put together by
Bo Yang. BowMan was based on the fvwm window manager, written by Robert Nation. Fvwm was
based on code from twm. And so on... It was originally designed to emulate some of the look and feel
of the NEXTSTEP user interface, but has since taken steps towards adding more useful, requested,
and neat features especially in 1.4 version ! The changes which comprise AfterStep’s personality
were originally part of bowman development, but due to a desire to move past simple emulation
and into a niche as its own valuable window manager, AfterStep designers decided to change the
project name and move on.
Important features of AfterStep include:
1. Wharf: a free-floating application loader which can ”Swallow” running programs and also can
contain ”Folders” of more applications. 2. Gradient filled TitleBars with 5 button : help/zap, ac-
tion/tasks, iconize/maximise, shade/stick & close/destroy buttons 3. Gradient filled root window
PopUp menus which can be configured to accomodate different tastes and styles of management 4.
NEXTSTEP style icons which give a consistent look to the entire desktop 5. Pixmapped Pager with
desktop pixmmaping 6. Easy to use look files, to share you desktop appearance with your friends
7. Start menu entries in a hierarchy of directories 8. WinList : a tasklist which can be horizontal or
vertical 9. Many modules & asapps to give a good look to your X window station
AfterStep-APPS – (Version 1.5, 715K) W S
This package includes some applets that can be used in the Wharf module used by window Managers
like AfterStep and WindowMaker.
They all look very cool and will make your desktop look more appealing once you add them to your
Wharf module.
AnotherLevel – (Version 0.7.2, 308K) W S
AnotherLevel is the next version of TheNextLevel. TheNextLevel desktop was created by Greg J.
Badros and was the winning entry in the 1996 Red Hat Desktop Contest. It features a powerful
and attractive fvwm configuration that works with fvwm2. That version suffered a number of en-
hancements and transformations, so we called it AnotherLevel. Some documentation is available in
/usr/doc/AnotherLevel in html format.
This desktop is defined to be easily reconfigured. Most attributes may be redefined by copying
/etc/X11/AnotherLevel/fvwm2rc.defines to a user’s home directory as .fvwm2rc.defines and mod-
ifying the copied file appropriately.
fvwm2 – (Version 2.0.46, 1,471K) W S
fvwm is a version of the popular ”Feeble Virtual Window Manager”
fvwm2-icons – (Version 2.0.46, 599K) W S
This package contains icons, bitmaps and pixmaps for fvwm and fvwm2.
C.12.8 XFree86
This section lists packages containing part of XFree86, a freely available version of the X Window
System. In order to use X, you must install an X server capable of driving your Red Hat Linux
system’s video card. As you can see, XFree86 has a number of servers from which to choose.
X11R6-contrib – (Version 3.3.2, 446K) W S
This is a collection of X programs from X11R6’s contrib tape, which contains programs contributed
by various users. It includes listres, xbiff, xedit, xeyes, xcalcm, xload, and xman amoung others.
XFree86-75dpi-fonts – (Version 3.3.2.3, 1,060K) W S
The 75dpi fonts used on most Linux systems. Users with high resolution displays may prefer the
100dpi fonts available in a separate package.
C.12.9 gnome
This section contains packages that are related to the GNOME desktop environment.
gnome-libs – (Version 0.20, 556K) W S
300 Package List
This appendix is provided to illustrate some of the possible parameters that may be needed by certain
drivers. It should be noted that, in most cases, these additional parameters are unnecessary. Also
included is a list of network hardware and the associated modules required by that hardware.
Please keep in mind that if a device you are attempting to use requires one of these parameters,
and support for that device is not compiled into the kernel, the traditional method of adding the
parameter to the LILO boot command will not work. Drivers loaded as modules require that these
parameters are specified when the module is loaded. The Red Hat Linux installation program gives
you the option to specify module parameters when a driver is loaded.
For more information concerning the device support compiled into the kernel used by the Red Hat
Linux installation program, please refer to Section 2.8 on page 28.
One of the more commonly used parameters, the hdX=cdrom parameter, can be entered at the boot
prompt, as it deals with support for IDE/ATAPI CD-ROMs, which is part of the kernel.
302 General Parameters and Modules
Configuration Example
non-IDE Mitsumi CD-ROM on port mcd=0x340,11
340, IRQ 11
Sony CDU 31 or 33 at port 340, no cdu31a port=0x340 cdu31a irq=0
IRQ
Aztech CD-ROM at port 220 aztcd=0x220
ATAPI CD-ROM, jumpered as mas- hdc=cdrom
ter on 2nd interface
Panasonic-type CD-ROM on a sbpcd=0x230,1
SoundBlaster at port 230
Please Note: Most newer Sound Blaster cards come with IDE interfaces. You do not need to use
sbpcd parameters, only use hdx parameters.
Configuration Example
Adaptec AHA1522 at port 330, IRQ aha152x=0x330,11,7
11, SCSI ID 7
Adaptec AHA1542 at port 330 bases=0x330
Future Domain TMC-800 at CA000, controller type=2
IRQ 10 base address=0xca000 irq=10
When a parameter has commas, make sure you do not put a space after a comma.
For example, for a 3com 3c509 ethernet card located at IO address 210 (IO addresses are usually in
hexadecimal) and IRQ 10, use the following parameters for the 3c509 driver:
io=0x210 irq=10
You can use multiple ethernet cards in one machine . If each card uses a different driver (e.g., 3c509
and a DE425), you simply need to add aliases (and possibly options) for each card to
/etc/conf.modules; for example:
ether=irq,base addr,interface
For example:
304 General Parameters and Modules
(For more information about using more than one ethernet card, see the Multiple-Ethernet mini-
HOWTO.)
E.1 Introduction
This is the Official Red Hat Linux FAQ. It answers many commonly-asked questions concerning Red
Hat Linux.
It is maintained by faq-maintainer@redhat.com; all comments or suggestions for this FAQ
should be sent to that address. To get a more recent version of this FAQ see Section E.4 on the
following page.
E.2 Errata
The single best source of information, especially with respect to bugs or problems with the Red Hat
Linux distribution are the errata pages,available at
http://www.redhat.com/support/docs/errata.html. Be sure to review both the general
errata as well as the platform-specific errata specific to your version of Red Hat Linux. (See also
Section E.4 on the next page for other ways to access the errata).
It may seem strange that we list this as the very first item, but the errata pages are perhaps the best
308 Red Hat Linux Installation Support FAQ
resource for fixing 90% of the common problems with Red Hat Linux. In addition, security holes for
which a solution exists are generally on the errata page 24 hours after Red Hat has been notified.
You should always check there first.
General:
http://www.redhat.com
ftp://ftp.redhat.com
redhat@redhat.com
Sales:
http://www.redhat.com/products
Support: http://www.redhat.com/support
Bugs: Bugs should be entered via the Red Hat bug tracking system at
http://developer.redhat.com/bugs/report.phtml
Suggestions and requests for new features:suggest@redhat.com
Suggestions on improving Red Hat documentation:docs@redhat.com
http://www.best.com/ aturner/RedHat-FAQ/
http://www.linuxhq.com
http://sunsite.unc.edu/LDP/
http://developer.redhat.com
– Email Addresses: (You can get documents from the following automated reply ad-
dresses)
Latest fixes for newest Red Hat release errata@redhat.com
Hardware list hardware-compat@redhat.com
How to get support support-howto@redhat.com
This FAQ document faq@redhat.com
Tips on getting PPP to work ppp-tips@redhat.com
– FTP servers: (There are also many Red Hat mirrors. Please see Section E.12.1 on
page 351)
Red Hat FTP server ftp://ftp.redhat.com
RPM FTP server ftp://ftp.rpm.org
– Usenet newsgroups: For these newsgroups, pick one when asking a question; cross-
posting between multiple newsgroups is frowned upon.
For answers:
comp.os.linux.announce
comp.os.linux.answers
For questions:
comp.os.linux.advocacy
comp.os.linux.development.apps
310 Red Hat Linux Installation Support FAQ
comp.os.linux.development.system
comp.os.linux.hardware
comp.os.linux.m68k
comp.os.linux.misc
comp.os.linux.networking
comp.os.linux.prog
comp.os.linux.setup
comp.os.linux.x
Question
I am looking to acquire a copy of Red Hat Linux. How can I do this? Is there more than one way to do this?
Answer
Red Hat Linux is available on CD directly from Red Hat Software or from various Red Hat Linux
resellers; it is also available via FTP from many sites around the world. (See Sections E.4 on page 308
and E.12.1 on page 351.)
Question
I have a problem with a package. I would like to see if an update to that package has been made available from
Red Hat. Where can I look for this?
Answer
Keep your eye on the Red Hat Linux Errata. (See Section E.2 on page 307)
Also check the contrib directory on our FTP mirrors for packages that users have contributed. We
also make periodic announcements to the redhat-announce-list mailing list.
E.5 General Questions 311
Question
I am looking for other people who use Red Hat Linux so that I can discuss a problem I would like to use Red
Hat Linux to fix. Or I am having problems with Red Hat Linux that are outside of the installation support that
was provided. Where can I turn to for answers?
Answer
In general, mailing lists and newgroups are the best way of getting in touch with other Red Hat Linux
users. Many of the applicable mailing lists and newsgroups are listed in Section E.4 on page 308.
Question
I need to make changes to a program that came with Red Hat Linux. Does Red Hat Linux include source code
for this program?
Answer
Yes. We include the exact source code that was used to build the distribution. From release 2.0 on,
Red Hat Linux has been built with the RPM packaging system; RPM only uses pristine source (the
same as what you’d find at the author’s site), possibly including a Red-Hat-supplied patch. The
sources (along with any patches) are contained in a source RPM file.
To install a source RPM, use the following command:
RPM installs sources under the redhat source tree, which is /usr/src/redhat by default (you
can configure the directory using the topdir command in /etc/rpmrc). Spec files (packagename-
n.nn.spec) are installed in /usr/src/redhat/SPECS, while source archives and patch files go in
/usr/src/redhat/SOURCES.
To unpack the source once it’s installed, change to /usr/src/redhat/SPECS and use the following
command:
Question
I purchased the Red Hat Linux boxed set and have been having problems with the cd. It looks like it is scratched,
or it just doesn’t read. I even tried it on another system. What should I do?
Answer
If you are experiencing physical problems with the product you received (e.g., your manual is miss-
ing pages or your CD is scratched), please contact the Sales Office at Red Hat Software (Section E.3
on page 308)
We’ll make sure the problem is rectified promptly. Please do not report these problems on the
redhat-list or to Red Hat Support, as it is likely an isolated problem, and your product simply
needs to be replaced.
(Note: This is not a common problem, but it does happen from time to time.)
E.6 Installation
E.6.1 How much disk space does Red Hat Linux Use?
Question
I am worried about how room Red Hat Linux will need to use on my hard drive. How much disk space do I
need to reserve for Red Hat Linux?
Answer
As new features are added to software, that software grows in size. Red Hat Linux is no exception;
it has grown an average of 20% with each release, due primarily to additional packages and libraries
adding more features.
E.6 Installation 313
For Red Hat Linux version 4.2, the minimum disk space requirements include at least 16 MB for a
swap partition, and 60 MB for basic installation with no X, development tools, or TeX. See
http://www.redhat.com/support/docs/hardware.html for more information on disk space
requirements.
Not suprisingly, with 5.2 the minimum disk space is larger. If you choose a custom install and deselect
all automatically-selected packages, you will need at least a 16 MB swap partition, and 120 MB for a
basic installation with no X, development tools, or Tex.
If you are installing via the workstation- or server-class installation methods, you will need to have
450MB free for a workstation install and 1620 MB free for a server install.
Of course, these installation methods may install many items an expert may not wish to install. In
that case, a custom install is more flexible, as you can include or remove items at will. In general, the
following is a good average for a typical custom install.
Any additional space can be allocated to a partition which you can name whatever you like (ie
/stuff /private /test).
If you plan to run a server, you should configure it a bit differently, adding a /tmp partition and a
/var partition.
Question
I have a blank hard drive and would like to install DOS (or Windows) and Linux onto it. What is the best
method of doing this?
Answer
It is recommended to install the non-Linux operating system first, and then installing Linux. This
allows the other OS to ”get comfortable” with the hardware and possibly write values to the MBR
that it would just over-write if Linux was installed first.
You will probably need to do this in a several step method, however. Start the install, but if the oper-
ating system allocates the entire drive for itself, see if you can ”bail out” early and use the operating
system’s native fdisk to create a primary partition of the size you want to leave for the OS (150-500
314 Red Hat Linux Installation Support FAQ
megs is average, depending on your needs). Then reboot and go through the install again and nor-
mally the OS will just use the space that you’ve just set aside. Once the install is finished, you can
then begin the Linux installation.
Question
I do not have a cdrom that will work with Linux and I can not install from the network. Is there another
method?
Answer
If you cannot use a CD-ROM or a network to install Red Hat Linux, you can install Red Hat Linux
from a hard drive; just follow these steps.
You’ll need a DOS partition that is formatted in FAT16; create a directory called nRedHat in it. From
there you will need to copy the items from the cdrom (E: in our example) over to the hard-drive (C:
in our example). Here’s what you would do:
mkdir C:nRedHat
mkdir C:nRedHatnbase
mkdir C:nRedHatnRPMS
copy E:nRedHatnbase C:nRedHatnbase
copy E:nRedHatnRPMS C:nRedHatnRPMS
If you do not have enough disk space for copying the entire RPMS directory tree over to your hard-
drive, you will need to look in the file nRedHatnbasencomps file for the RPMS that are needed in
the base and in any other sections you feel you need.
Once you have done this, you can start the install and choose a Hard-Drive install. You will be
asked to insert the supplemental floppy. Once the supplemental disk has been loaded, you will be
presented with the next screen on the install. When asked to select the partition containing the Red
Hat Linux files, do so, and the install will proceed from there.
Question
My box didn’t include floppy disks, or my floppy disks are bad. What can I do?
E.6 Installation 315
Answer
We are sorry for the problem. The cdrom contains all the data to make new boot and supplemental
floppies for your system. To make new floppies under DOS, Win95, NT, or even Linux. Be aware
that this process will overwrite any data on the 1.44 Megabyte floppies. Here’s how it’s done:
cd ndosutils
rawrite.exe
..nimagesnboot.img
4. Then change floppies, and run ’rawrite’ again. When prompted enter:
..nimagesnsupp.img
If you are in Linux (or another Linux-like operating system), you can mount the CD-ROM and use
dd to write the data to floppy. With Linux, you could do the following:
E.6.5 What is the difference between Linux and DOS disk names?
Question
I have an IDE system, and I am confused by how Linux sets up drives in comparison to DOS. Can you explain
this?
Answer
Linux sets up the drive system in a very different manner than DOS, and this can be rather confusing.
Instead of calling the first hard drive ”C:”, Linux uses a combination of letters signifying what kind
of BUS (sd for SCSI, hd for IDE) and in which order the drive was detected. Finally a number is
added onto the end to specify which partition on the drive is being referenced.
For IDE hard drives the layout depends on which IDE channel the drive is on and whether it is the
master or slave on that channel.
316 Red Hat Linux Installation Support FAQ
ide0 = primary
ide1 = secondary
ide2 = tertiary
ide3 = quaternary
The partition number follows an old PC standard that there are a limit of 4 primary partitions per
hard drive. However, one of those partitions can be designated as an extended partition. Inside of
this extended partition, logical partitions can be specified (for most drives you can have 12 logical
drives in the extended partition for 16 partitions all together).
The numbering scheme is broken into the following:
Question
Linux is having trouble detecting my IDE CD-ROM drive during the install. Can I force the install to see it?
Answer
Sometimes IDE cdrom drives will not be detected either due to the fact that they are on a IDE channel
the BIOS doesn’t know about, or that when queried, replies back with data that Linux thinks is bogus
(Early NEC IDE cdrom’s respond with data saying that it is an IDE floppy drive instead of a cdrom.)
To solve your problem, you need to manually specify the the CD-ROM drive from the LILO boot
prompt.
When you see:
E.6 Installation 317
boot:
or:
LILO:
linux hdX=cdrom
where X is the IDE letter that Linux would specify for that drive depending on which IDE bus it is
on.
Question
Answer
Laptops are one of the hardest pieces of hardware to support in the industry. Many times the com-
pany that constructs the hardware has to tweak a chipset to make it fit in the confined structure or
meet certain power requirements. These changes are usually only documented internally for trade
secret reasons, leaving others to find work arounds.
When Red Hat support finds itself with a laptop question, our first and sometimes only reference is
the Linux Laptop Pages, which can be found at:
http://www.cs.utexas.edu/users/kharker/linux-laptop/
Question
I am trying to upgrade my earlier Red Hat system to 5.x, but it complains that it can’t find a valid RPM data
base. What do I need to do?
318 Red Hat Linux Installation Support FAQ
Answer
The problem is that a few earlier versions of rpm would write the database in a way that seems
corrupted to later versions. Rebuilding the database fixes this problem. To do this, we will need to
upgrade rpm on your system to the one on the installation cdrom, and then rebuild the database.
First thing to do is mount the system CD on the system:
mount /mnt/cdrom
cd /mnt/cdrom/RedHat/RPMS
rpm -Uvh --nodeps --force rpm-*rpm
When the new RPM is installed, rebuild the database using the following command:
rpm --rebuilddb
This will rewrite the database in a format that can be used by the version of RPM used during the
installation (since they are now the same).
Question
I have an Adaptec 2920. During the install I do not see a choice for it, why is that, and what do I do? Or, I have
a Future Domain TMC-3260, but when I specify options for it to be probed, it isn’t found during the install.
Answer
The Adaptec 2920 does not use an Adaptec chip set, but actually uses the Future Domain TMC3260. If
the card is not found with an auto-probe, you will need to specify options for it. When the installation
menu asks you about SCSI, choose ”options” and enter the following :
If the above options do not work, your card may have a newer BIOS that can’t be probed correctly.
We are working on the problem, but at this time do not have a satisfactory solution.
Question
I have an Adaptec SCSI card with the aic7xxx chipset (2940/2840/2740/3940/etc). It is pretty common, so
why is it not fully supported by Red Hat Linux?
Answer
The problem is that in the past Adaptec was not open about how their hardware worked, which
made it difficult to write a Linux driver for it.
However, Adaptec has recently changed their position on this matter, and Doug Ledford (the current
writer of the aic7xxx.c SCSI code) has made significant headway in making the 2940 very functional.
The problem currently is that this work is still in “catchup-mode” and may not work for people
with the latest cards. Our current suggestion is to try the following when debugging Adaptec 2940
problems.
7. Make sure that on a SCSI chain that the drive you are installing to is SCSI ID 0 (or 1 if you have
no IDE drives in the system). Otherwise, your system may not be able to boot.
8. Others have found that using the conservative/slow settings ”no tagged queuing”, ”5MB/s”
etc, fixes problems.
9. Another problem found with some systems is that, if SCAM support is turned on, turning it
off has solved the problem.
Question
During the install, I get a fatal signal 11 or signal 7. What does this mean and what can I do?
Answer
Signal 11’s and signal 7’s are errors indicating a hardware error in memory or on the bus. This can
be due to problems in executables or with the hardware of the system. The Linux kernel uses more
capabilities of the CPU, cache, and memory, and tends to expose marginally operating hardware.
The first thing to do is check to see if you have the latest installation and supplemental floppies from
Red Hat. Check the errata for updates, and also the FTP site to see if newer versions are available. If
the latest images still fail, it may be due to hardware. Common suspects are memory or CPU-cache.
Try turning off the CPU-cache in the BIOS and see if the problem goes away. Also try swapping
memory around in the motherboard slots to see if it is either slot or memory related.
The premier site on the net for this problem can be found at http://www.bitwizard.nl/sig11/
Answer
Filipe Custsdio reported the following as a solution from upgrading 4.2 and earlier releases to 5.1:
I had a repeating sig 11 problem whenever I tried to upgrade my Redhat 4.2 to 5.1.
The problem was not with my hardware, but with my RPM database. A simple ”rpm
–rebuilddb” solved it.
To best accomplish this, you will should download the latest version of RPM from
ftp://ftp.redhat.com/pub/redhat/updates. Boot into your older version of linux. Log in
as root, upgrade to the new version of RPM you downloaded, and then rebuild the RPM database:
Question
I would like to be able to use the live file system on the cdrom to boot.
Answer
Red Hat Linux no longer supports the Live boot feature due to the change to a modular kernel.
Because of this change, booting from read-only file system is not practical. The cdrom does contain
data in its /live section that can be executed in rescue mode, but one needs to set the PATH and
LD LIBRARY PATH environment variables.
Question
I have NT and would like to install Linux, but I have heard there are problems with booting both OS’s. How
can I avoid this?
Answer
The best instructions on dual-booting NT and Linux are to be found in the Linux+NT-Loader
HOWTO. The latest version can be found at the Linux Documentation Project’s website:
http://sunsite.unc.edu/LDP/HOWTO/mini/Linux+NT-Loader A possibly earlier one can
also be found on the Red Hat Linux cdrom in ndocnHOWTOnmininLinux+NT-Loader.
Question
I can not install Linux below the 1023rd cylinder in my system. What can I do?
Answer
You will need to have the kernel below this limit, and use a different bootloader than LILO. The BIOS
may not be able to reach it for one of the following reasons:
322 Red Hat Linux Installation Support FAQ
The kernel is on a drive the BIOS can’t boot to (not on Primary IDE or SCSI chain)
You have hardware that can only be initialized in DOS (Plug and Play, etc)
You will probably need to use the LOADLIN boot loader that is provided on the cdrom in ndosutils.
You will need to copy this directory over to your DOS hard drive partition and edit the auto-
boot.bat file to point to its new position and remove the initrd= line. If your system is a SCSI
system, you will need to go into rescue mode and copy the /mnt/boot/initrd.img from the hard
drive over to the dos partition, and use it for booting.
Question
For whatever reason, I want to remove LILO from the Master Boot Record (MBR) of my machine. How do I do
this?
Answer
There are several methods to removing LILO from the master boot record of the machine. Inside of
Linux, you can replace the MBR with an earlier saved version of the MBR using the /sbin/lilo
command:
/sbin/lilo -u
In DOS, NT, and Windows 95 you can use the fdisk command to create a new MBR with the ”undoc-
umented” flag /mbr. This will rewrite the MBR to ONLY boot the primary DOS partition:
fdisk /mbr
Question
For whatever reason, I want to remove Linux from my hard-drive. I tried using DOS’s fdisk, and it shows
non-DOS partitions, but it can’t remove them. What do I need to do?
E.6 Installation 323
Answer
If you need to remove linux from a hard drive, and have attempted to do this with the default DOS
fdisk, you are having the ”Partitions exist but they don’t exist” problem. The best way to remove
non-DOS partitions is with a tool that understands partitions other than DOS.
You can do this with the installation floppy by doing the following. Start the installation, select
install (versus upgrade) and when it comes to partitioning the drive, choose fdisk. In fdisk type p
to print out the partition numbers, and remove the Linux partitions with the d command. If satisfied
with the changes you have made, you can quit with a w and the changes will be saved to disk. If you
deleted too much, type q and no changes will occur.
Once you have removed the Linux partitions, you can reboot the box with Control-Alt-Delete
instead of continuing with the install.
Question
I cant use LILO to boot my machine, and have heard of something called LOADLIN. How do I set it up to
work?
Answer
C:n> CD nLOADLIN
C:nLOADLIN> LOADLIN zimage /dev/hdb1 ro vga=ask
Or, if you want to load a big kernel together with a RAM disk:
or, if you have more parameters than will fit into the 128-byte DOS command line:
SMARTDRV /C
C:nLOADLINnLOADLIN C:nLOADLINnZIMAGE root=/dev/hdb2 ro vga=3
So you could simply type: LINUX.BAT and you are on the road!
A sample LINUX.BAT file is provided with the LOADLIN package.
Question
I have installed Linux without errors but on a reboot, I get only an L, LI, and some other items. What is
happening and how can I recover?
Answer
If you have rebooted the system and have gotten an L, LI, or a combination of this and a lot of
scrolling numbers, this indicates that LILO is having a problem bootstrapping itself due to one or
more problems.
Write down the error codes that are being printed and what letter it stopped on (L, LI, LIL, etc). If
you can access the cdrom (from DOS floppies or another machine), you can cd to (assuming DOS)
nlivenusrndocnlilo-0.20nREADME and check to see what the error seems to indicate.
Most of the time, the LILO failures are due to the BIOS and the hard-drive mismatching geometries
or something similar:
First the kernel (or parts of it) are above the 1023 cylinder so the BIOS can not bootstrap the
information. If your BIOS has the capability to use LBA (Linear Block Addressing) mode and it
isn’t already enabled, you should enable it and then re-run lilo (either by reinstalling or using
rescue mode). In most cases, you will probably have to repartition after enabling LBA.
If you can reinstall and add more partitions, create a /boot partition and place it entirely
below the 1023rd cylinder.
You have placed the kernel on a drive the BIOS can’t access. This can be an IDE drive that is
not on the primary chain (IDE0 hda, hdb) or if you have placed Linux on a SCSI drive it is
because the SCSI ID is not 0 (or 1 if you have NO IDE drives in the system).
E.7 Using Red Hat Linux 325
If you need to gather more information for someone else (either for official support or from the
mailing lists, newsgroups, friends, etc) you can use the rescue mode
Insert the installation floppy, and at the boot prompt type:
linux rescue
After a couple of screens that ask about hardware you will get a root prompt (#). You will need to
mount the linux root partition like is done in this example which has the / partition as /dev/hda5:
mkdir /mnt
mount /dev/hda5 /mnt
lilo -v -r /mnt
Record the output of the command. You can add more -v’s if you need more information. If errors
still occur, you can send that output to the appropriate support group.
Question
I am totally new to linux and don’t know anything about how to use it. or What is this root@localhost#
I am seeing?
Answer
Many users new to Red Hat Linux need additional documentation on learning Linux. We are aware
of this, and are continuing to expand our documentation, but should you require additional infor-
mation, the following resources may be useful for you.
Books:
Web Sites:
http://www.redhat.com/linux-info/ldp/LDP/gs/node5.html
http://www.best.com/ aturner/RedHat-FAQ/
For a complete description of supported hardware, please visit:
http://www.redhat.com/support/docs/rhl/intel/rh50-hardware-intel.html
Question
I heard I can run Quake on my linux system. How do I set this up?
Answer
In order to get Quake to run on your system, you need to download the Quake/Linux program from:
http://www.idsoftware.com/archives/quakearc.html
Question
How come I don’t see colors when I run ls? When I am using my old Linux, the filenames all have different
colors.
Answer
In order to allow the color option, you must edit .bashrc. This line must be placed in the file:
Question
I have installed Red Hat Linux. When I attempt to run a simple program I compiled, the following happens:
$ a.out
bash: a.out: command not found
I have used other versions of Linux and never had such a problem in running programs. What is going on?
Answer
The problem is that, according to the computer shell, the program isn’t there. The computer shell
(the part of the OS that runs your commands) finds programs using a very strict path setting that
figures out where items are. If you type the following, you will see what your PATH variable is set to:
echo $PATH
One of the items that should not be there is the current working directory [cwd] (sometimes called
the present working directory). The cwd is known as “.”, so to execute commands in the cwd, you
need to either add the directory to your path, or type something like the following:
$ ./a.out
Question
I have purchased the MacMillan boxed set of Red Hat, and it says that it comes with extra on-line documenta-
tion. How do I install and read it?
Answer
The MacMillan Complete Red Hat Linux Operating System comes with several books (and parts of
books) as an added value. These books are in PDF format, and require that you use a PDF document
reader on them. The Linux Acrobat reader is included for this purpose.
To install the Reader, you will need to do the following while logged in as the user root.
Insert the installation cdrom and issue the following commands:
328 Red Hat Linux Installation Support FAQ
mount /mnt/cdrom
mkdir /tmp/acro
cd /tmp/acro
tar xzvf /mnt/cdrom/ebooks/acrobat.tar
# this will extract the files into the /tmp/acro directory
./INSTALL
# This will run the INSTALL script for your data. I usually install
# them into the default location of /usr/local
You can now run the command acroread and view the documentation in /mnt/cdrom/ebooks
Question
When I try to start X with with the startx command I get errors that no server was installed and I am left
back at a shell prompt. What could be wrong?
Answer
When you get an error about no servers installed, you should check to see if first the correct X server
was installed and that the correct links have been set.
If you are using the latest Red Hat packages, you will be using the xserver-wrapper as a method to
protect against various security problems.
/usr/X11R6/bin/X should be a symbolic link to xserver-wrapper and /etc/X11/X should be a
symbolic link to the card-specific X server that you use, for example XF86 SVGA.
Here’s an example of how you might create these symbolic links, as root:
cd /usr/X11R6/bin
ln -sf xserver-wrapper ./X
cd /etc/X11
ln -sf "../../usr/X11R6/bin/XF86_SVGA" ./X
This should set the symbolic links correctly for your system.
E.8 X Window System 329
Question
Answer
One of the most common reasons is that you are not using the correct command to start the X server.
The best command to start the X windows system is:
startx
If you are using this command, and only the gray screen is coming up, there can be some other
explanations. First, are you waiting long enough? Due to either the speed of the processor, the
amount of memory (less than 16 megs of ram), or network problems it may take up to 6 minutes
before X windows is fully operational. In most cases this is an indication of a problem that can be
solved (faster CPU, more memory, or finding out what is broken in networking).
Another problem can be that the starting scripts are not able to execute some command. You can try
to get around this by creating a very simple ˜/.xinitrc and running startx. You may also check
/var/log/Xerrors for errors that might help you troubleshoot the problem.
Question
I would like to change the way Red Hat sets up my X window session. How do I customize the X window
manager?
Answer
To customize any of the default window manager settings, add or remove programs from the menus,
and/or change which programs start up automatically, you will need to change the files in
/etc/X11/AnotherLevel. Please see the man pages for xinit, startx, AnotherLevel, fvwm2,
FvwmM4, and wmconfig for more details.
To try other window managers not included with Red Hat Linux, you may want ot look at:
http://www.plig.org/xwinman/
330 Red Hat Linux Installation Support FAQ
Question
I don’t like the Win95-like window manager configuration. How can I change it?
Answer
If you don’t like the look or feel of the default window manager setup, you can select a different style
from the Preferences menu, and then clicking on WM Style menu.
If you are interested in changing to other window managers, you will want to check out this web
page:
http://www.plig.org/xwinman/
Question
I get an error about errno=111. What does it mean and what can I do?
Answer
Whenever the XFree86 Xserver crashes, dies, ceases to exist or is inaccessible for any reason, you
will see the error message X11TransSocketUNIXConnect: Can’t connect: errno = 111
or one similar to it.
It is a message from an X-client (any program running on your XFree86 Xserver, for example the
window manager) telling you that it tried to connect to the Xserver, but failed to do so for some
reason.
To further debug this issue, you will need to look into the server output for what got this error.
Normally you should see the real error message (why the server stopped to work) a few lines before
the error 111 message. If you still can’t make head or tail from all those messages, make sure to
quote the FULL server output in your problem report (to either technical support or a mailing list).
Obtaining the full server output is normally accomplished by redirecting both standard output and
standard error to a file while starting the server. You can do this by running X like this:
Other useful information to check are the symbolic links of X, the .xinitrc (if one exists) or what
commands were running when the error occurred.
E.8 X Window System 331
Question
Answer
cd /usr/X11R6/lib/X11/xkb/keymap
cp xfree86 metro
This will solve many of the problems experienced. However it isn’t a full solution due to the fact that
some of the XFree86 mappings are out of date with modern keyboards. If you still experience prob-
lems with the keyboard settings, you will need to use the xmodmap and xev commands to correct
the problems. Please send these corrections to bugs@xfree86.org so that they can be corrected in
the main distributions.
Question
I get an error message that libX can’t be opened. or I can’t compile X apps due to missing libraries.
Answer
More than likely, the required libraries are not installed. You will need to (re)install the packages to
get them.
Insert the Red Hat Linux installation cdrom.
mount /mnt/cdrom
cd /mnt/cdrom/RedHat/RPMS
rpm -Uvh --force XFree86-devel* XFree86-libs* Xaw3d*
This should install most of the X libraries that you might need. If you still get the error, it may be due
to the fact that the requested library is part of a package we do not provide (qt, xforms, motif, etc).
332 Red Hat Linux Installation Support FAQ
Question
Answer
AGP cards were not supported in XFree86 before version 3.3.2. If you have 3.3.2 installed on your
system, then Xconfigurator should show which AGP cards are supported.
If you do not already have 3.3.2, you may want to consider upgrading to this release. Please see their
web page at http://www.xfree86.org/ for more details.
Question
Answer
To enable X to run at boot time and using xdm to log in, you need to change the file /etc/inittab.
Edit your /etc/inittab file. Replace this line:
id:3:initdefault:
id:5:initdefault:
Save your changes, and reboot the machine. (Note you could also manually change init levels to 5
but we find that rebooting the machine is actually less error prone.)
Question
My computer has a NeoMagic graphics card chipset, how can I get X to work?
E.8 X Window System 333
Answer
Question
I upgraded from 4.1 (or earlier) and now when I use startx, the machine seems to hang at a grey screen.
Answer
The problem is that releases prior to 4.2 installed (.Xclients) in every user’s home directory, which
calls:
However, this window manager doesn’t exist in 5.x. The proper workaround for this problem is to:
rm -f ˜/.Xclients
rm -f /home/*/.Xclients
Question
When I run netscape, the colors don’t seem right, or When I run netscape, I get error messages and warnings
about colors.
Answer
The reason is that X has run out of colors to allocate to applications (this shows up a lot on 16 and
256 color applications) To solve this problem you can try the following:
1. run netscape with -install switch. This can be ugly in that you’ll see color flashes.
2. run X in 15bpp or higher. To obtain a higher bpp than 8 (default) run startx like:
startx --bpp 16
If it doesn’t work, consult your X driver manuals, Xconfigurator or upgrade your video-
card.
Question
I am using Accelerated X, but when I try to start it I get this error: Fatal server error: could
not open default font ’fixed’. What can I do to fix this?
Answer
In 5.x, the fonts come gzipped. Your version of AcceleratedX does not know how to handle this.
What you need to do is gzip -d the fonts in your font directory, then run mkfontdir.
Question
I have a Microsoft serial mouse, and Linux doesn’t want to work with it. What can I do to fix it?
Answer
It has been found that the 2 button Microsoft Mouse of version 2.1A or greater is a ”smart” mouse. It
has been speculated that it is looking for wakeup signals from Windows, or it will not respond back
to the computer.
This causes X and/or gpm to not work with Linux because the mouse is not responding in a way
these programs are expecting. To ”reset” the mouse to work with these programs, you can follow
one of several methods. Use mouseconfig to set things up before running X:
E.9 System Administration 335
Question
Answer
PAM is a standard adopted by other unices such as Solaris 2.6. For more information on PAM please
read: http://www.redhat.com/linux-info/pam/
Question
Answer
Due to United States export restrictions on encryption technology, Red Hat Linux can not be shipped
with ssh. The site ftp://ftp.replay.com has set up various downloads of ssh and PGP.
Question
My machine has 128 Megs of RAM, however linux only sees 64 megs of it. What is going on, and how can I
fix it?
336 Red Hat Linux Installation Support FAQ
Answer
There are a couple of things that could be causing Linux to not see all your memory. On some 386
systems you need to compile your kernel with ‘Limit memory to 16M?” enabled.
On most systems, the reason is that the BIOS has a limit of how much memory it will tell the OS
is present in the machine, even though the board can have more. Common limits seen with this
problem are 16M, 32M, 64M, and 128M. To get around this, we need to explicitly specify the amount
of memory to the kernel at boot time via the mem=< actual memory goes here > flag.
In the following example, we have a 32M machine but only 16M are being seen by Linux. At the
LILO prompt, we type:
After the machine boots, we use the free command to see if the larger amount of memory was recog-
nized by the kernel. If so, we can add an append line to the /etc/lilo.conf file and rerun lilo to
make it happen permanently. The example from above could look like the following:
boot=/dev/sda
map=/boot/map
install=/boot/boot.b
prompt
timeout=50
image=/boot/vmlinuz-2.0.32
label=linux
root=/dev/sda1
initrd=/boot/initrd-2.0.32.img
read-only
append="mem=32M"
Question
I have over 64 Megs in my pentium or greater machine, however it seems sluggish when doing anything. If I
tell Linux to use only 64Megs with the mem=64M machine, it seems to speed up. What is going on and can I
do anything about it?
E.9 System Administration 337
Answer
The most likely answer to this problem has to do with the motherboard of the computer. Many
motherboards limit the L2 cache to be able to access up to 64 megs. The ones that we know of to
be affected by this problem are the NX (I believe this was only for pentium 60-90), FX, VX, and TX
boards from Intel. These are limited to a maximum of 512K of L2 cache. There may be other boards
that have this problem, but these are our current canidates.
The following is from a user who researched the problem for us:
Question
I am trying to use an old application that is compiled with libc5 libraries. When I run it, I immediately get
SEGV errors or similar problems. What is going on, and what can I do?
Answer
The problem with crashing libc5 applications can be due to several items:
1. Before/after the upgrade, there was installed another version of libc that didn’t get obsoleted
by the upgrade process or placed libc5 libraries in a place that causes conflict.
To find out if this is the case, do this:
glibc-devel-2.0.5c-12
libc-5.3.12-24
glibc-debug-2.0.5c-12
rpm-2.4.10-1glibc
rpm-devel-2.4.10-1glibc
glibc-profile-2.0.5c-12
glibc-2.0.5c-12
If you see items like libc-debug-5.3.12-18 or libc-5.4.44-2, you will need to remove
these packages (for example, rpm -e libc-debug) and run ldconfig -v
2. Your /etc/ld.so.conf file has been changed from an optimal setting. For optimal loading,
set your /etc/ld.so.conf file in the following order:
/usr/i486-linuxaout/lib
/usr/i486-linux-libc5/lib
/usr/openwin/lib
/usr/X11R6/lib
Question
When I run fstool, I get a message that says a partition seems to have been deleted and asks if I want to remove
it from /etc/fstab.
Answer
The fstool program is not working properly with current versions of tcl and shouldn’t be used.
It should have been obsoleted, but slipped through the cracks.
First we will have to fix the /etc/fstab file since fstool may have corrupted it. The areas that
seem to be changed by fstool are usually the cdrom and swap. Here are sample lines (note that
you will need to change the actual partitions to match those on your system):
rpm -e fstool
If you are running 5.1 or later, please use the linuxconf program.
E.9 System Administration 339
Question
Answer
Question
Answer
Here’s something you can try: edit /etc/conf.modules and add the following line to the others:
If you need to send the ppa driver any options about which LP is being used etc, you would add the
line:
Question
I’m having problems getting my IDE zip drive to work. Can I make it work with Linux?
340 Red Hat Linux Installation Support FAQ
Answer
First check and make sure there is a disk in the drive. Also, make sure you are mounting it as partition
4 instead of 1. An example would be hdc4. The reason for this is that the Macintosh uses partition 4
for its data partition and has problems if data is on another partition.
Question
Answer
Due to the experimental nature of Linux on a dual processor Intel machine, Red Hat Linux doesn’t
currently support this hardware without a recompile of the kernel.
However, we encourage you to investigate Linux for the dual processor systems at
http://www.linux.org.uk/SMP/title.html
E.9.11 Problems with Red Hat 5.x, older applications and time
Question
Answer
Some libc5 apps want /usr/lib/zoneinfo, so you can either recompile them for libc6 or provide
a symlink so that things will work:
ln -s ../share/zoneinfo /usr/lib/zoneinfo
Please also see check the Red Hat errata (http://www.redhat.com/errata) for other items.
E.9 System Administration 341
Question
I have all the latest updates installed, but my programs still get the incorrect time.
Answer
If you have installed all the latest updates and you programs still get the incorrect time, try checking
the settings in /etc/sysconfig/clock. They probably look something like this:
UTC=true
ARC=false
This means that Linux will assume that your BIOS clock is set to the UTC or GMT timezone. More
than likely, the clock is set to your local timezone, and you need to change the UTC line to be:
UTC=false
Question
During the install, I was not asked to use the 2nd cdrom. When I use the X program glint on it, it reports that
there are no rpms, but when I look at the directories, I see lots of them. What is going on?
Answer
The 2nd cdrom in the Red Hat Linux boxed set contains the source code rpms (SRPM) for all of the
Open Source applications that are on the first cdrom. From these source rpms, you can build all the
Open Source applications we have in the distribution.
The reason that glint does not see source rpms is due to the fact that SRPMS are not stored in any of
the RPM databases. This makes it almost impossible to tell if you have installed an src.rpm before or
are over-writing an older version. Thus you will need to use the plain rpm command to install these
items.
rpm -ivh < filename > will install the source code into the directory that the maintainer of
that SRPM used. The data in src.rpms packaged by Red Hat are installed into /usr/src/redhat
by default.
342 Red Hat Linux Installation Support FAQ
Rebuilding and improving on rpms is beyond the scope of this answer. The book Maximum RPM
and the man pages are good sources of information on this.
Question
Linux recognizes my CDROM, but when I try to mount it, I get ”mount failed” What do I do?
Answer
If your system was installed properly, simply typing mount /mnt/cdrom should work. If it does
not, you must edit your /etc/fstab file. Here is an example of entry in /etc/fstab:
# For more details, see the fstab man page (ie, man fstab)
# CD-ROM device directory (filesystem type and options)
/dev/hdc /mnt/cdrom iso9660 noauto,ro 0 0
To find out what the CD-ROM device is, type dmesg j less and scan it for information regarding
your CD-ROM. If you wish to mount the CD-ROM without adding this to your /etc/fstab:
Question
I have Linux installed on an IDE drive, and for whatever reason I need to boot from floppy. How can I boot my
system from the install floppy?
Answer
If you have installed Linux onto an IDE hard-drive, you can boot from the installation floppy using
the following method:
Insert the installation floppy and restart the machine. At the boot: prompt type the following:
vmlinuz root=/dev/hdXY
[Example: vmlinuz root=/dev/hdb5 ]
E.9 System Administration 343
Where X = is the Linux drive letter and Y is the partition on the drive you installed the root (/)
partition to.
Question
Answer
The 2.0.xx kernels do not directly support the Plug and Play (PNP) protocol. You will need to either
disable PNP on the card (via jumpers or card setup tools). You can also change your boot method to
use Loadlin.exe from Windows (as windows would then have set up the PNP hardware).
Finally you can try using the isapnptools programs. First, type this:
This will create a configuration file that you will need to edit to choose the settings used for each
card. Then type isapnp /etc/isapnp.conf to set up the devices.
See http://www.roestock.demon.co.uk/isapnptools/ for more information.
Question
Answer
First make sure that your sound card is on the list of supported sound cards. Also, have you up-
graded to the latest soundconfig, from here:
ftp://ftp.redhat.com/pub/sound/sndconfig/
You’ll also need the latest kernel with sound module support. If you haven’t already, you should
download and install these packages.
344 Red Hat Linux Installation Support FAQ
The sound engineer recommends downloading the sound tools mentioned above and reporting
problems to the sound-list@redhat.com (http://archive.redhat.com/) so that they can
be worked on.
Question
When the system boots up, I see a message that says I have unknown PCI hardware. What does this mean?
Answer
The error ”unknown PCI device” can occur for several reasons. The first and most harmless one is
that PCI isn’t responding to Linux’s queries in a way it understands, but Linux is able to keep going.
The more common occurrence is that the system hangs on querying PCI bus cards and cannot get
any further.
Since this is a hardware problem in the kernel, there is not much that RedHat can do except point
you to the maintainer of that section of the kernel. They may be able to let you know what is going
on, and may want to look at what hardware you do have in your system so they can better handle it
in the future. The maintainer can be reached at:
linux-pcisupport@cck.uni-kl.de
/proc/pci
your exact hardware description. Try to find out which device is unknown. It may be your
main-board chip set, PCI-CPU bridge or PCI-ISA bridge.
If you can’t find the actual information in your hardware booklet, try to read the references of
the chip on the board.
Question
I used to be able to specify options to LILO: to get various hardware recognized. However, now those options
don’t seem to do anything. Why is this and what can I do?
E.9 System Administration 345
Answer
Due to the fact that the kernels built by Red Hat after 4.0 use a modular kernel interface, many of
the options that worked with either a different Linux or in Red Hat Linux prior to 4.0 no longer
work. Instead you will have to supply items in the /etc/conf.modules file so that either kmod or
kerneld will be able to load them correctly into kernel space.
Question
Currently when the machine boots, LILO defaults to running Linux. I would like it to boot my other operating
system. How can I accomplish this?
Answer
To change the default OS that Linux boots into, you will need to edit the /etc/lilo.conf file and
change the order of the OS’s that LILO looks at. In the following example we change the order of
booting so that DOS gets booted by default instead of Linux.
pico /etc/lilo.conf
boot=/dev/hda
map=/boot/map
install=/boot/boot.b
prompt
timeout=50
image=/boot/vmlinuz-2.0.31
label=linux
root=/dev/hda2
read-only
other = /dev/hda1
label = dos
table = /dev/hda
boot=/dev/hda
map=/boot/map
install=/boot/boot.b
346 Red Hat Linux Installation Support FAQ
prompt
timeout=50
other = /dev/hda1
label = dos
table = /dev/hda
image=/boot/vmlinuz-2.0.31
label=linux
root=/dev/hda2
read-only
Save your changes to the file and leave the editor. Run the command:
/sbin/lilo -v
The updated lilo will then be written to the boot device. On a reboot, the machine will boot into DOS
as default now instead of Linux, with a 5 second delay to give you time to choose linux at the boot
prompt if you wish to boot to Linux.
Question
How do I use rpm? What are some general commands that I will use with this command? Also, for whatever
reason, I think files have changed on my system but I don’t know which ones. Can RPM help?
Answer
Also for upgrading or installing some packages you may need to use additional flags to force the
install happen. It is only recommended to use these if you know why these flags were needed:
Querying
To see if a package is installed: rpm -q < packagename >
rpm -q somepackage
To list which files belong to a package: rpm -ql < packagename >
To see what package a file belongs to: rpm -qf < path-to-filename >
One can usually join various query commands together, so rpm -qil will give info and list all the
files in the package.
To look in a rpm file that isn’t installed, simply add p to the query line:
This example will list the information and the files contained in somepackage.
More Advanced
More advanced usage can be found in the man page for rpm and at the web site,
http://www.rpm.org
Verification
To see what files on the system may have changed from their initial settings you can use RPM, to
check up on them:
348 Red Hat Linux Installation Support FAQ
rpm -Va
will give you a list of all files that have changed in one form or another since the package it is associ-
ated was installed. This can be a lot of files (and a lot may be changed due to post installation work).
To just see what packages have changed so that you can verify them more individually, you can do
the following:
rpm -Va --pipe "awk ’print $2’ | xargs rpm -qf | sort -u" &> /tmp/file1
Then look in the file /tmp/file1 for which packages have had changes from them.
Question
I have installed Linux, and it seems to initially start booting. However it gets down to something called
sendmail and then the machine seems to hang. What is happening and what should I do?
Answer
If after the install the machine seems to hang when it reaches certain processes like sendmail, apache,
or SMB there is probably a network problem. The most common cause is that Linux can not look
up the name of the machine you have called the box (if you set up networking to have a machine
name). The machine is currently paused waiting for the network timeout of DNS lookups, and will
eventually bring up the login prompt. Login in as root and check the usual culprits for a problem.
If you are directly on a network with a DNS server, make sure the file /etc/resolv.conf has the
correct values for your machine’s DNS server. Check with your systems administrator that the values
are correct.
If you are using Linux on a network without a DNS server (or this box is going to be the DNS server),
then you will need to edit the /etc/hosts file to have the hostname and IP address so that the
lookups will occur correctly. The format of the /etc/hosts file is:
Question
I have upgraded to 5.x, and sendmail is no longer relaying email like it used to. What is going on?
Answer
Due to various email spammers using unknowing Red Hat boxes as email relayers and some other
problems, we have turned this off by default in 5.x
You can add the names of systems that you want to be allowed to relay mail to the file
/etc/relay allow. The web site
http://www.informatik.uni-kiel.de/%7Eca/email/check.html for more details on this.
If you are having problems with sites sending you UBE (Unsolicited Bulk Email), you can also
deny them access to your machines with the new features of sendmail. Add the sites to the file
/etc/mail/deny and then make a hash table for it.
The following command can be used to create the hash database version of this file:
Question
I have installed Linux, recompiled my kernel, and now I get errors when the network comes out about various
net-pf modules not found. What is happening and what should I do?
Answer
This means that Linux was unable to find modules for various network protocols. The most common
ones are net-pf-4 (IPX) and net-pf-5 (appletalk). It looks like that during a kernel recompile
these were not included and some service is looking for it during the boot.
First check to see that you are not running a service that is wanting it (mars-nwe, netatalk, etc). If
you are you will need to recompile the kernel with these items or turn off the service.
If you still get net-pf errors you can fix it by following these directions:
cd /etc
vi conf.modules
350 Red Hat Linux Installation Support FAQ
This should turn off the messages upon boot as it tells linux that these are OFF and should not be
looked for.
Question
I am having trouble setting up my printer. My printer is not listed in the printer configuration tool.
Answer
Due to licensing problems, we can not ship the latest ghostscript. It is however available for down-
load in the directory (having been contributed by another Red Hat user):
http://www.users.dircon.co.uk/˜typhoon/
Question
Answer
Some printers truncate ASCII lines when printing a page. This is how the printer handles lines that
are too long. The text must be run through something that will format the text, like pr or mpage
before sending it to the printer.
E.12 Appendix (Long answers) 351
E.12.1 The Red Hat FTP site is slow. Are there mirrors?
There are many mirrors of the Red Hat FTP site. An up-to-date list can always be found at:
ftp://ftp.redhat.com/pub/MIRRORS.html
The current version of Red Hat Linux is 5.2, and is available for Intel (386, 486, and various Pentiums),
Alpha (various types), and SPARC.
352 Red Hat Linux Installation Support FAQ
F
Information Specific to Red Hat
Linux/SPARC
This appendix describes the differences between Red Hat Linux/SPARC and Red Hat Linux/Intel
installations. While it provides a good overview of these differences, you will find it easier to read
chapters 2, 3, 4, and 5 in order. These chapters will refer you to the appropriate parts of this appendix
at the appropriate time.
In addition, there is a Linux/SPARC homepage at
http://www.geog.ubc.ca/s linux.html. It has a wealth of information for people considering
Red Hat Linux/SPARC, and is a great resource.
Unsupported Hardware – The following list contains hardware that is currently unsupported:
sun4 architecture
Eurocard sun4c machines, called the ‘sun4e’ under Solaris2.4 and others, are not supported.
These are VME-bus sun4c machines, to which the kernel has not been ported yet.
The following types of CD-ROMs are unsupported (for more information on CD-ROM com-
patibility issues, please visit
http://saturn.tlug.org/suncdfaq):
xx(a,b,c)
Where xx is used to specify the device type (such as sd for SCSI disks), a is the controller number, b,
is the device’s unit number, and c is the partition number. Please refer to The Sun Hardware Reference
if you have an older SPARC system, and require additional information on its boot command syntax.
356 Information Specific to Red Hat Linux/SPARC
As you might surmise, replace ip.address.of.sparc with the IP address of your SPARC sys-
tem, and replace hw:address:of:sparc with the MAC address of your SPARC system’s network
adapter. The IP address is assigned by your network administrator, and the MAC address is dis-
played on your SPARC system’s console at power-up.
To use an NFS-mounted root during the installation, add the following argument to your boot com-
mand:
linux nfsroot=nfs.server.ip.address:/path/to/RH/image
The word linux should always be included in a boot command that includes one or more argu-
ments, and must precede the first argument. Replace
nfs.server.ip.address with the NFS server’s IP address, and
/path/to/RH/image with the path to the exported directory containing the appropriate Red Hat
Linux/SPARC files.
F.5 Choosing a Boot Method 357
Boot From CD-ROM – The installation program is read directly from the Red Hat Linux/SPARC
CD-ROM.
Boot From the Network – The installation program is read from a TFTP server.
For SPARC systems with a PROM version of 2.0 or greater, the proper boot command (when in new
command mode) is:
boot floppy
On the other hand, SPARC systems with PROM versions less than 2.0 should use the following
command at the > prompt:
b fd()
Please Note:There have been reports that some systems with pre-2.0 PROMs cannot boot the Red
Hat Linux/SPARC installation program from diskette. If you find this to be the case with your SPARC
system, you will need to use another boot method.
358 Information Specific to Red Hat Linux/SPARC
boot cdrom
SPARC systems with PROM versions less than 2.0 may not be able to boot from a CD-ROM at all,
although we’ve received reports that at least some PROM 1.3 systems have been able to boot from
CD-ROM. Theoretically, if your SPARC system has a CD-ROM at SCSI id 6, the following command
should boot the Red Hat Linux/SPARC installation program:
b sd(0,6,0)
Unfortunately, due to a lack of resources, Red Hat Software has not been able to test this boot com-
mand. If one of our readers has been successful getting a pre-2.0 SPARC system booted from the
Red Hat Linux/SPARC CD-ROM, please send us mail at docs@redhat.com, and we’ll update this
manual. Thank you!
Note that using an NFS-mounted root after booting from CD-ROM is not supported, as the filesys-
tem on the Red Hat Linux/SPARC CD-ROM performs the same function as an NFS-mounted root.
Therefore, no additional boot command arguments should be given for CD-ROM boots.
1. Network boot with NFS-mounted root. This method is required for SPARC systems with less
than 12 MB of RAM.
2. Network boot with network-loaded ramdisk. This method can be used by systems with at
least 12 MB of RAM.
While booting your SPARC system from the network is fairly straightforward, there are several re-
quirements:
Setting up RARP If you are going to use rarp, please refer to Section F.4.1 on page 356.
TFTP Server Setup If you are going to set up a TFTP server on a Red Hat Linux system, simply
install the latest tftp package using RPM, and make sure the line in inetd.conf that will run
tftp is uncommented. Don’t forget to kill -HUP inetd if you needed to make any changes to
inetd.conf.
Next, you’ll need to make a symlink describing the SPARC system to be booted, and pointing to the
file from which it should boot. The name of the symlink contains two items:
To convert the more common “dotted decimal” IP address into its hex equivalent, convert each of the
address’ four groups of numbers into hex. If the resulting hex number is only one digit, add a leading
zero to it. Then append all four hex numbers together. For example, take the IP address 10.0.2.254.
Convert each set of four numbers into hex, and add a leading zero where necessary:
10 = A or 0A
0 = 0 or 00
2 = 2 or 02
254 = FE or FE
0A0002FE.SUN4M
The last step is figuring out what this symlink should point to. There are two choices. If you want to
use an NFS-mounted root, use the file /kernels/vmlinux. If you would rather use a ramdisk, use
the file /images/tftpboot.img.
Place the appropriate file in the TFTP server’s directory, and create the symlink. In this example,
we’re using the image that includes a ramdisk:
360 Information Specific to Red Hat Linux/SPARC
ln -s tftpboot.img 0A0002FE.SUN4M
You’re now ready to boot. If you’re going to boot tftpboot.img, simply use the following com-
mand (in new command mode):
boot net
On the other hand, if you’re going boot from vmlinux and use an NFS-mounted root, use this com-
mand:
b le()
This installation method requires that the contents of the Red Hat Linux/SPARC CD-ROM (or equiv-
alent files) have been copied to a hard disk directly attached to your SPARC system. It is important
to note that the partition holding these files cannot be used for any other purpose during the instal-
lation (ie, it cannot be given a mount point during the installation). In addition, the partition must be
in ext2 format.
linux serial
The installation program runs on the first serial port at 9600 baud, 8 bits, no parity, 1 stop bit (often
called 9600,8,N,1). The installation program can run in color, if your serial terminal supports color.
Note that a computer running kermit and connected to your SPARC system will display in color.
At
any
prompt dialog during a serial installation (any dialog with an OK button), you can press
Ctrl
to start a subshell. To return to the installation program, enter exit at the shell prompt.
- Z
When the installation is complete, simply boot normally, and Red Hat Linux should come up on your
serial terminal.
Please Note: If you want to have a “headless” installation, you must use a serial terminal to perform
the installation, and make sure you disable GPM.
362 Information Specific to Red Hat Linux/SPARC
The last kernel to be installed will be a multi-processor kernel, which will fail to work on sun4c
machines.
The default X server will end up as XsunMono, which may not work for most people.
If you do wish to install Everything, choose Select individual packages as well. Then, deselect all
the kernels except for one you wish to install (kernel-sparc works for most) and all X servers
except the one for your hardware (XsunMono for bwtwo video cards, Xsun for all 8-bit displays, and
Xsun24 for the supported 24-bit displays).
F.10 Partitioning
Please Note: If you decide to use Disk Druid to partition your system’s hard drive, be aware that, at
this time, Disk Druid cannot write disk labels on the SPARC. Therefore, the drive must have a valid
disk label on it prior to attempting to use Disk Druid. A disk label can be written using fdisk – after
that, Disk Druid should work normally.
There is one additional step required when partitioning a hard drive for Red Hat Linux/SPARC. You
must create the third partition of every disk as type Whole Disk spanning from cylinder 0 to the
end of the disk. It shouldn’t be used in any way, but it must exist. You can still create other partitions
as you normally would.
Note that this partition will already exist on any disk that has been used under SunOS or Solaris. If
you are partitioning a new disk, you can use fdisk’s “s” command to create a standard disk label
F.11 X Windows 363
(which includes the whole-disk partition). If you don’t care for the size of the other partitions created
by “s”, you can delete those partitions and recreate them with the sizes you want.
Use the first partition for swap, but when you create it, start it at cylinder 1 instead of cylinder
0.
F.11 X Windows
There is no mouse or X windows config on the SPARC. The 8 bit server is installed by default. If
you want to use the 24 bit server (for TCX cards), you need to install the Xsun24 package. If you
only have a bwtwo framebuffer and want to increase performance, install the XsunMono package.
Installing both of the above requires you to restart X windows. Also, you can uninstall the Xsun
package if you use one of the above servers.
364 Information Specific to Red Hat Linux/SPARC
G
Glossary
Alpha A RISC (Reduced Instruction Set Computer) architecture developed by Digital Equipment
Corporation.
IDE An acronym for AT Attachement Packet Interface. ATAPI is the protocol by which CD-ROM
drives communicate with a computer system over an IDE interface.
Binary Although the base two numbering system used by computers is known as binary, the word
often refers to the executable form of a program. Contrast with “source code”.
BIOS An acronym for Basic Input/Output System. On PC-compatible systems, the BIOS is used
to perform all necessary functions to properly initialize the system’s hardware when power is first
applied. The BIOS also controls the boot process, provides low-level input/output routines (hence
its name) and (usually) allows the user to modify details of the system’s hardware configuration.
Boot Diskette A diskette used to start most Red Hat Linux installations.
Boot Short for “bootstrap”. The process by which a computer starts running an operating system
when power is applied.
CISC An acronym for Complex Instruction Set Computer. A design philosophy for computers
whereby the processor is designed to execute a relatively large number of different instructions, each
taking a different amount of time to execute (depending on the complexity of the instruction). Con-
trast with RISC.
Cylinder When referring to disk drives, the number of different positions the disk drive’s read/write
heads can take over the unit’s disk platters. When viewed from above the platters, each head position
describes an imaginary circle of different diameters on the platter’s surface, but when viewed from
the side, these circles can be thought of as a series of cylinders nested within each other, hence the
term. See also Geometry.
Daemon A daemon is program that runs, without human intervention, to accomplish a given task.
For example, lpd is a daemon that controls the flow of print jobs to a printer.
Dependencies When referring to packages, dependencies are requirements that exist between
packages. For example, package foo may require files that are installed by package bar. In this ex-
ample, bar must be installed, or else foo will have unresolved dependencies. RPM will not normally
allow packages with unresolved dependencies to be installed.
Device Driver Software that controls a device that is connected to, or part of, a computer.
Disk Druid Disk Druid is a component of the Red Hat Linux installation program that is used to
partition disk drives during the installation process.
Diskette A small mass storage device in a removable cartridge, and meant to be read/written in
a compatible drive.
Glossary 367
Distribution An operating system (usually Linux) that has been packaged so as to be easily in-
stalled.
Domain Name A domain name is used to identify computers as belonging to a particular orga-
nization. Domain names are hierarchical in nature, with each level in the hierarchy being separated
from other levels with a period (pronounced “dot”). For example, Foo Incorporated’s Finance de-
partment might use the domain name “finance.foo.com”.
Dual Boot The act of configuring a computer system to boot more than one operating system. The
name is something of a misnomer, as it is possible to boot more than the two operating systems the
word “dual” implies.
EIDE An acronym for Enhanced Integrated Drive Electronics, which is a newer version of the IDE
interface standard. EIDE makes larger and faster disk drives possible; most systems sold today use
EIDE.
Errata Errata is Latin for “Ooops”1 . When software is found to have bugs, quite often the software
is fixed, and released as errata. Red Hat Linux is no exception to the rule; we have an Errata web
page at http://www.redhat.com/errata.
Extended Partition A segment of a disk drive that contains other partitions. See Partition.
FAQ An acronym for Frequently Asked Questions. Linux information is often presented in the
form of lists of questions and answers called FAQs.
fdisk fdisk is a utility program that is used to create, delete, or modify partitions on a disk drive.
Filesystem A filesystem is the method by which information is stored on disk drives. Different
operating systems normally use different filesystems, making it difficult to share the contents of a
disk drive between two operating systems. However, Linux supports multiple filesystems, making
it possible to, for example, read/write a partition dedicated to Windows.
Floppy A somewhat historical term for a small mass storage device in a removable cartridge, and
meant to be read/written in a compatible drive. See “diskette”.
1 Well, it should be. . .
368 Glossary
FQDN An acronym for Fully Qualified Domain Name. An FQDN is the human-readable name
that includes a computer’s hostname and associated domain name. For example, given a hostname
of “foo”, and a domain name of “bar.com”, the FQDN would be “foo.bar.com”.
FTP An acronym for File Transfer Protocol. Also the name of a program that, as the name implies,
permits the copying of files from one system on a network to another.
Gateway In networking terms, refers to a device that connects one or more computers on a net-
work to other networks. The device may be specialized hardware (such as a router), or may be a
general-purpose computer system configured to act as a gateway.
Geometry When referring to disk drives, the physical characteristics of the disk drive’s internal
organization. Note that a disk drive may report a “logical geometry” that is different from its “physi-
cal geometry”, normally to get around BIOS-related limitations. See also Cylinder, Head, and Sector.
GID Short for Group ID. The means by which a user’s membership in a group is identified to
various parts of Red Hat Linux. GIDs are numeric, although human-readable names are stored in
the /etc/group file.
Group Groups are a way of assigning specific access rights to certain classes of users. For example,
all users working on Project X could be added to group xproj. System resources (such as disk space)
devoted to Project X could then be configured to permit only members of xproj full access.
Hard Disk A hard disk contains rotating magnetic media (in the shape of a disk) that spin rapidly.
Small heads float over the surface of each disk, and are used to write to and read from the disk as it
rotates.
Head When referring to disk drives, the number of read/write heads within a disk drive. For each
platter in a disk drive, there are normally two heads for each platter – one for each surface – although
one surface may go unused. See also Geometry.
IDE An acronym for Integrated Drive Electronics, which is the name of a standard interface used
to connect primarily disk and CD-ROM drives to a computer system. See also “EIDE” and “ATAPI”.
Intel Company responsible for producing the microprocessors that most commonly appear in PC-
compatible personal computers. These processors include the 80386, 80486, Pentium, Pentium Pro,
and Pentium II.
Internationalization The practice of designing and writing programs that can be easily config-
ured to interact with the user in more than one language. Often referred to as “i18n” due to the
number of letters between the starting “i” and the ending “n”.
IP Address IP addresses are the method by which individual computer systems (or from a more
strictly accurate interpretation, the network interfaces on those computer systems) are identified on a
TCP/IP network. All IP addresses consist of four numbers, each ranging from 0 to 255, and separated
by periods.
Kernel The central part of an operating system upon which the rest of the operating system is
based.
Library When speaking of computers, refers to a collection of routines that perform operations
that are commonly required by programs. Libraries may be shared, meaning that the library routines
reside in a file separate from the programs that use them. Library routines may also be “statically
linked” to a program, meaning that copies of the library routines required by that program are physi-
cally added to the program. Such statically linked binaries do not require the existence of any library
files in order to execute. Programs linked against shared libraries will not execute unless the required
libraries have been installed.
LILO A commonly used bootstrap loader for Linux systems based on an Intel-compatible proces-
sor.
Linuxconf A versatile system configuration program written by Jacques Gelinas. Linuxconf pro-
vides a menu-based approach to system configuration via several different user interfaces.
Linux A full-featured, robust, freely-available operating system originally developed by Linus Tor-
valds.
370 Glossary
Logical Partition A partition that exists within an extended partition. See also “partition” and
“extended partition”.
Master Boot Record The master boot record (or MBR) is a section of a disk drive’s storage space
that is set aside for the purpose of saving information necessary to begin the bootstrap process on a
personal computer.
Memory When referring to computers, memory (in general) is any hardware that can store data
for later retrieval. However, the term is usually used to specifically refer to RAM.
MILO A commonly used bootstrap loader for Linux systems based on the Alpha processor.
Module In Linux, a module is a collection of routines that perform a system-level function, and
may be dynamically loaded and unloaded from the running kernel as required. Often containing
device drivers, modules are tightly bound to the version of the kernel; most modules built from one
version of a kernel will not load properly on a system running another kernel version.
Mount Point The directory under which a filesystem is accessible after being mounted.
Nameserver In TCP/IP networking terms, a nameserver is a computer that can translate a human-
readable name (such as “foo.bar.com”) into a numeric address (such as “10.0.2.14”).
Netmask A netmask is a set of four numbers separated by periods. Each number is normally
represented as the decimal equivalent of an eight-bit binary number, which means that each number
may take any value between 0 (all eight bits cleared) and 255 (all eight bits set). Every IP address
consist of two parts (the network address, and the host number). The netmask is used to determine
the size of these two parts. The positions of the bits that are set in the netmask are considered to
represent the space reserved for the network address, while the bits that are cleared are considered
to represent the space set aside for the host number.
NFS An acronym for Network File System, NFS is a method of making the filesystem on a remote
system accessible on the local system. From a user’s perspective, an NFS-mounted filesystem is
indistinguishable from a filesystem on a directly-attached disk drive.
Glossary 371
Operating System A collection of software that controls access to various resources in a com-
puter system.
Packages Files that contain software, and written in a particular format that enables the software
to be easily installed and removed.
PAM An acronym for Pluggable Authentication Modules. PAM is an authentication system that
controls access to Red Hat Linux.
Partition Table The partition table is a section of a disk drive’s storage space set aside to define
the partitions that exist on that disk drive.
Partition Type Partitions contain a field that is used to define the type of filesystem the partition
is expected to contain. The partition type is actually a number, although many times the partition
type is referred to by name. For example, the “Linux Native” partition type is 82. Note that this
number is hexadecimal.
Partition A segment of a disk drive’s storage space that can be accessed as if it was a complete
disk drive.
PCMCIA Acronym for Personal Computer Memory Card International Association. This organi-
zation produced a series of standards that define the physical, electrical, and software characteristics
of small, credit card-sized devices that can contain memory, modems, network adapters, and more.
Also known as PC Cards, these devices are mainly used in laptop computers (although some desktop
systems can use PCMCIA cards, too).
Permissions The set of identifiers that control access to files. Permissions consist of three fields:
user, group, and world. The user field controls access by the user owning the file, while the group
field controls access by anyone matching the file’s group specification. As the name implies, the
world field controls access by everyone else. Each field contains the sme set of bits that specify
operations that may or may not be performed, such as reading, writing, and executing.
PLIP An acronym for Parallel Line Internet Protocol. PLIP is a protocol that permits TCP/IP com-
munication over a computer’s parallel port using a specially-designed designed cable.
372 Glossary
POSIX A somewhat mangled acronym for Portable Operating System Interface. A set of standards
that grew out of the UNIX operating system.
Process A process (in somewhat simplistic terms) can be considered to be one instance of a run-
ning program on a Linux system.
PS/2 Mouse A PS/2 mouse gets its name from the original computer in which this type of mouse
was first used – the IBM PS/2. A PS/2 mouse can be easily identified by the small, round connector
at the end of its cable.
RAM An acronym for Random Access Memory. RAM is used to hold programs while they are
being executed, and data while it is being processed. RAM is also volatile, meaning that information
written to RAM will disappear when the computer’s power is turned off.
Red Hat Software A North Carolina software company. Produces and markets sofware for the
Linux operating system, including Red Hat Linux.
Rescue Diskette A diskette containing a rudimentary system environment. As the name im-
plies, a rescue diskette is normally used in an attempt to “rescue” an ailing system from the necessity
of re-installing the entire operating system.
RISC An acronym for Reduced Instruction Set Computer. A design philosophy for computers
whereby the processor is optimized to execute a relatively small number of different instructions in
a predictably small amount of time. Contrast with CISC.
ROM An acronym for Read Only Memory. ROM is used to hold programs and data that must
survive the computer being turned off. This is because ROM is non-volatile; data in ROM will remain,
unchanged, the next time the computer is turned back on. As the name implies, data cannot be
easily written to ROM; depending on the technology used in the ROM, writing may require special
hardware, or may be impossible. A computer’s BIOS may be stored in ROM.
Root The name of the login account given full and complete access to all system resources. Also
used to describe the directory named “/”as in, “the root directory”.
Glossary 373
RPM An acronym that stands for Red Hat Package Manager. RPM is also the name of a program
that enables the installation, upgrading, and removal of packages.
SCSI An acronym for Small Computer System Interface, SCSI is a standard interface for connecting
a wide variety of devices to a computer. Although the most popular SCSI devices are disk drives,
SCSI tape drives, scanners, and tape drives are also common.
Sector When referring to disk drives, the number of fixed-size (normally 512 byte) areas that can
be accessed by one of the disk drive’s read/write heads, in one rotation of the disk, without that head
changing position. See Also Geometry.
Serial Mouse A serial mouse is a mouse that is designed to be connected to a computer’s serial
port. A serial mouse can be easily identified by the rectangular-shaped connector at the end of its
cable.
setgid A system call that can be used to set the GID of a process. Programs can be written using
setgid such that they can assume the group ID of any group on the system.
setuid A system call that can be used to set the UID of a process. Programs can be written using
setuid such that they can assume the user ID of any process on the system. This is considered a
possible security problem if a program is “setuid root”.
Shadow Password Normally, each user’s password is stored, encrypted, in the file /etc/passwd.
This file must be readable by all users so that certain system functions will operate correctly. How-
ever, this means that copies of user’s encrypted passwords are easily obtained, making it possible to
run an automated password-guessing program against them. Shadow passwords, on the other hand,
store the encrypted passwords in a separate highly-protected file, making it much more difficult to
crack passwords.
SILO A commonly used bootstrap loader for Linux systems based on the SPARC processor.
SLIP An acronym for Serial Line Internet Protocol. SLIP is a protocol that permits TCP/IP com-
munication over serial line (typically over a dial-up modem connection).
SMB Short for Server Message Block, SMB is the communications protocol used by Windows-
based operating systems to support sharing of resources across a network.
374 Glossary
source code The human-readable form of instructions that comprise a program. Also known as
“sources”. Without a program’s source code, it is very difficult to modify the program.
SPARC A RISC (Reduced Instruction Set Computer) architecture developed by Sun Microsystems.
Supplemental Diskette A diskette required for certain types of Red Hat Linux installations.
Swap Also known as “swap space”. When a program requires more memory than is physically
available in the computer, currently-unused information can be written to swap, thereby freeing
memory. Swap space is located on a hard disk; some operating systems support swapping to a file,
but Linux swaps to a dedicated swap partition.
System Call A system call is a routine that accomplishes a system-level function on behalf of a
process.
TCP/IP An acronym for Transmission Control Protocol/Internet Protocol, TCP/IP is the name
given to the networking standard commonly used on the Internet today.
UID Short for User ID. The means by which a user is identified to various parts of Red Hat Linux.
UIDs are numeric, although human-readable names are stored in the /etc/passwd file.
UNIX A set of Linux-like operating systems that grew out of an original version written by some
guys at a phone company.2
Unmount The act of revoking access to a filesystem. (Note that the program that unmounts filesys-
tems is called umount.)
Virtual Console Virtual consoles provides multiple “screens” on which a user may log in and
run programs. One screen is displayed on the computer’s monitor at any given time; a key sequence
is used to switch between virtual consoles.
2 Just kidding – thank you Ken Thompson and Dennis Ritchie for your inspired operating system design!
Glossary 375
Widget A standardized on-screen representation of a control that may be manipulated by the user.
Scroll bars, buttons, and text boxes are all examples of widgets.
X Window System Also known as “X”, this graphical user interface provides the well-known
“windows on a desktop” metaphor common to most computer systems today. Under X, application
programs act as clients, accessing the X server, which manages all screen activity. In addition, client
applications may be on a different system than the X server, permitting the remote display of the
applications graphical user interface.
Due to the need for automated installation, Red Hat Software has created the kickstart installation
method. With this method, a system administrator can create a single file containing the answers
to all the questions that would normally be asked during a typical Red Hat Linux installation. The
kickstart installation method is powerful enough that often a single kickstart file can be used to install
Red Hat Linux on multiple machines.
Please Note: Kickstart installations can only be performed using the CD-ROM and NFS installation
methods. FTP, local hard disk, or SMB installations cannot be automated using kickstart mode.
H.1.1 On Diskette
To perform a diskette-based kickstart installation, the kickstart file must be named ks.cfg, and
reside in the boot diskette’s top-level directory. Note that the Red Hat Linux boot diskettes are in
MS-DOS format, making it easy to copy the kickstart file under Linux using the mcopy command
(or, if you insist, you can also use Windows). Although there’s no technological requirement for it,
most diskette-based kickstart installations install Red Hat Linux from CD-ROM.
filename "/usr/new-machine/kickstart/";
next-server blarg.redhat.com;
Note that you should use filename for the kickstart file’s name (or the directory in which the kicstart
file resides), and next-server to set the NFS server name.
If the filename returned by the BOOTP/DHCP server ends with a slash (“/”), then it is interpreted as
a path only. In this case, the client system mounts that path using NFS, and searches for a specially-
named file. The filename the client searches for is:
<ip-addr >-kickstart
The <ip-addr > section of the filename should be replaced with the client’s IP address in dotted
decimal notation. For example, the filename for a computer with an IP address of 10.10.0.1 would be
10.10.0.1-kickstart.
Note that if you don’t specify a server name, then the client system will attempt to use the server that
answered the BOOTP/DHCP request as its NFS server. If you don’t specify a path or filename, the
client system will try to mount /kickstart from the BOOTP/DHCP server, and will try to find the
kickstart file using the same <ip-addr >-kickstart filename as described above.
H.2 Starting a Kickstart Installation 379
If, on the other hand, the kickstart file resides on a server, the appropriate boot command would be:
boot: linux ks
Items must be specified in order. It is not a good idea to try to change the order of the required
items.
Items that aren’t required can be omitted.
For kickstart upgrades, the following items are required:
– language
– installation method
– device specification
– keyboard setup
– the upgrade keyword
– LILO configuration
If any other items are specified for an upgrade, those items will be ignored (note that this
includes package selection).
Omitting any required item will result in the installation process prompting the user for an
answer to that question, just as during a normal installation. If this happens, once the answer
is given the installation will continue unattended (unless it comes across another missing item).
380 Kickstart Installations
Lines starting with a pound sign (”#”) are treated as comments, and are ignored.
lang en
DHCP
BOOTP
static
The DHCP method uses a DHCP server system to obtain its networking configuration. As you might
guess, the BOOTP method is similar, requiring a BOOTP server to supply the networking configura-
tion.
The static method requires that you enter all the required networking information in the kickstart
file. As the name implies, this information is static, and will be used during the installation, and after
the installation as well.
To direct a system to use DHCP to obtain its networking configuration, use the following line:
To direct a machine to use BOOTP to obtain its networking configuration, use the following line in
the kickstart file:
H.3 The Kickstart File 381
The line for static networking is more complex, as you must include all network configuration infor-
mation on one line. You’ll need to specify:
IP address
netmask
gateway IP address
nameserver IP address
--ip 10.0.2.15 -
--netmask 255.255.255.0 -
--gateway 10.0.2.254 -
--nameserver 10.0.2.1
Please Note: The entire network configuration must appear on one line! We’ve wrapped it here to
make it easier to read.
Note that there are two restrictions you must keep in mind should you use the static method:
All static networking configuration information must be specified on one line; you cannot wrap
lines using a backslash, for example.
You can only specify one nameserver here. However, you can use the kickstart file’s %post
section (described in Section H.3.19 on page 389) to add more nameservers, if needed.
cdrom
If a kernel module is required to support the device, the module name follows the device type.
Finally, if there are any parameters that are required by a device, they can be specified by using the
--opts option. Enclose the parameters in quotes after --opts. We’ll show you some examples
below.
Note that you can specify more than one type of device in a given kickstart file. For example, if you
know the machines you’ll be kickstart-installing have either an Adaptec 1542 or a Buslogic SCSI card,
you can enter both in the kickstart file. But be aware that the installation program uses only the first
card found, so order the device entries appropriately.
An example for an ISA 3com Ethernet card would be:
keyboard us
H.3.8 Partitioning
The hard drive in the machine must be partitioned before Red Hat Linux can be installed. In this
section, we will describe how to specify disk partitioning in the kickstart file.
zerombr yes
On the other hand, if you are installing machines that have a valid partition table, even if you want
to change part (or all) of it, you should use zerombr this way:
zerombr no
clearpart --linux
To clear all partitions from a disk, this line would do the trick:
384 Kickstart Installations
clearpart --all
zerombr no
clearpart --all
part / --size 250
part swap --size 50
part /usr --size 500 --grow --maxsize 800
part /tmp --size 100 --grow
When defined this way, the installation program will first clear all partitions. It will then set up a
250MB root filesystem, followed by a 50MB swap partition. Next the installation program will create
H.3 The Kickstart File 385
a /usr partition of at least 500MB (remember, it’s growable), but it cannot grow beyond 800MB.
Finally, the last line will create a /tmp partition of at least 100MB (again, it’s growable).
So for that 1GB system, you would end up with a 250MB root, a 50MB swap, a 550MB /usr, and
a 150MB /tmp partition. If another system has a 2GB drive, you would get a 250MB root, a 50MB
swap, a 800MB /usr, and a 900MB /tmp.
install
upgrade
Keep in mind that for upgrades, the only items that matter are:
An example for a machine where the video card can be autoprobed properly would be:
An example for a machine where nothing is probed and the monitor isn’t in the list might be:
rootpw mypasswd
If you would rather use an encrypted password, grab it out of /etc/passwd (or wherever you have
the encrypted version stored), and add the --iscrypted option:
lilo
This will install LILO in the hard drive’s master boot record (MBR), and automatically configure boot
entries for your Linux installation as well as a DOS or Windows installation (if one is present).
If you don’t want LILO installed in the MBR, you can do so with by using the --location option.
There are three possible places where LILO can be installed:
none - don’t install LILO at all (in which case you’ll need your own method of booting the
installed system)
You can also use the --append option to add an append= line to the Linux boot entry. This is handy
if you need to do things like set memory sizes, etc. For example, to install LILO on the MBR on a
machine with 128MB of RAM, you would add the following lilo line:
(Due to the new kernel in Red Hat Linux 5.2, the mem boot-time option shouldn’t be necessary, but
we needed an example.)
%packages
@ Networked Workstation
@ C Development
@ Web Server
@ X Window System
bsd-games
As you can see, components are specified, one to a line, starting with an “@” symbol, a space, and then
the full component name as given in the comps file. Specify individual packages with no additional
characters (The bsd-games line in the example above is an individual package).
Please Note: You can also direct the kickstart install to use the workstation- and server-class intalla-
tion methods. To do this, simply add one of the following lines to the %packages section:
H.3 The Kickstart File 389
@ Workstation
@ Server
%post
This section creates a message-of-the-day file containing the date the kickstart installation took place,
and gets around the network keyword’s one-nameserver-only limitation by adding another name-
server to /etc/resolv.conf.
390 Kickstart Installations
Index
Symbols autoboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
autostart, selecting services for . . . . . . . . . . . . . . . . . . 69
/etc directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
/etc/hosts file, managing . . . . . . . . . . . . . . . . . . . . . . 159
/etc/sysconfig, files in . . . . . . . . . . . . . . . . . . . . . . . . . 204
/lib directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
B
basic system tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
/sbin directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 BIOS, issues related to LILO . . . . . . . . . . . . . . . . . . . . 25
/usr directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 boot diskette . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
/usr/local directory . . . . . . . . . . . . . . . . . . . . . . . 187, 189 boot hangs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
/var directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 boot method selection for SPARC . . . . . . . . . . . . . . 357
/etc/pam.conf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 boot problem, 1023rd cylinder . . . . . . . . . . . . . . . . . 321
/etc/pam.d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 boot problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
1023rd cylinder boot problem . . . . . . . . . . . . . . . . . . 321 boot process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
bootable CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
A
Accelerated X, problems with . . . . . . . . . . . . . . . . . . 334
booting
rescue mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
a trick . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
account management . . . . . . . . . . . . . . . . . . . . . . 114, 115 using diskettes . . . . . . . . . . . . . . . . . . . . . . . . 215
account modification . . . . . . . . . . . . . . . . . . . . . . 117, 118 using LILO . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 single user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
creating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 booting from diskette . . . . . . . . . . . . . . . . . . . . . . . . . . 342
acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii booting from diskette for SPARC . . . . . . . . . . . . . . . 357
Adaptec 274x/284x/294x . . . . . . . . . . . . . . . . . . . . . . 319 booting from floppy . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Adaptec 2920 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 booting installation program . . . . . . . . . . . . . . . . . . . . 33
Adaptec aic7xxx . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 booting Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
addendum, Alpha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
administration, system . . . . . . . . . . . . . . . . . . . . . . . . . 185
AGP support under X . . . . . . . . . . . . . . . . . . . . . . . . . 332
Alpha addendum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
C
CD number two, using . . . . . . . . . . . . . . . . . . . . . . . . . 341
Alpha computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x CD problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Alpha-specific information6–9, 11, 14, 15, 20, 25, 26, CD-ROM
33, 46, 97, 153 ATAPI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
AMD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 ATAPI, unrecognized . . . . . . . . . . . . . . . . . . . . . 38
anonymous FTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 bootable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Apache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4, 100 IDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Apache web server, configuring . . . . . . . . . . . . . . . . 100 other . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
applications, older . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 SCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
ATAPI CD-ROM CD-ROM boot commands, SPARC . . . . . . . . . . . . . 358
unrecognized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 CD-ROM installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
ATAPI CDROM, problems with . . . . . . . . . . . . . . . . 316 CD-ROM installation for SPARC . . . . . . . . . . . . . . . 360
392 INDEX
G
getting started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
SPARC-specific . . . . . . 8, 9, 11, 14, 15, 25, 33, 46
GIMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 information resources . . . . . . . . . . . . . . . . . . . . . . . . . . 308
GLINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . see glint information, network . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
glint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 information, pre-installation . . . . . . . . . . . . . . . . . . . . 10
available packages . . . . . . . . . . . . . . . . . . . . . . . 178 init, SysV-style . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
installing packages with. . . . . . . . . . . . . . . . . . 181 initrd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 initscript utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
package display . . . . . . . . . . . . . . . . . . . . . . . . . . 176 install
package manipulation . . . . . . . . . . . . . . . . . . . 179 CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15, 36
querying packages . . . . . . . . . . . . . . . . . . . . . . . 179 component selection . . . . . . . . . . . . . . . . . . . . . . 60
removing packages with . . . . . . . . . . . . . . . . . 183 continuing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
selecting packages . . . . . . . . . . . . . . . . . . . . . . . 177 finishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65, 81
starting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 FTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16, 37, 42
uninstalling packages with . . . . . . . . . . . . . . . 183 getting Red Hat Linux . . . . . . . . . . . . . . . . . . . . . . 6
upgrading packages with . . . . . . . . . . . . . . . . 182 Hard Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18, 37
verifying packages . . . . . . . . . . . . . . . . . . . . . . . 180 hard drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
glint configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17, 37, 38
glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 NFS server information . . . . . . . . . . . . . . . . . . . 41
group creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 package information . . . . . . . . . . . . . . . . . . . . . . 61
group management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 package selection . . . . . . . . . . . . . . . . . . . . . . 60, 61
group modification . . . . . . . . . . . . . . . . . . . . . . . . 129, 130 PCMCIA support . . . . . . . . . . . . . . . . . . . . . . 15, 35
groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 preparing for . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 selecting network drivers . . . . . . . . . . . . . . . . . 38
user-private . . . . . . . . . . . . . . . . . . . . . . . . . 189, 190 SMB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17, 42
rationale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 SMB image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
TCP/IP networking . . . . . . . . . . . . . . . . . . . . . . . 39
H
halt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186, 214
upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
installation
alternate methods . . . . . . . . . . . . . . . . . . . . . . . . 314
hard disk installation for SPARC . . . . . . . . . . . . . . . 361
classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
hard drive installation . . . . . . . . . . . . . . . . . . . . . . . . . . 18
kickstart . . . . . . . . . . . . see kickstart installations
hardware configuration . . . . . . . . . . . . . . . . . . . . . . . . . 10
language, selecting . . . . . . . . . . . . . . . . . . . . . . . . 35
finding with Windows . . . . . . . . . . . . . . . . . . . . 11
printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
hardware supported by SPARC . . . . . . . . . . . . . . . . 353
installation class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
installation guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
hosts, managing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
installation guide, improvements to . . . . . . . . . . . . . . 2
hosts.allow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
installation method
example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36, 37
hosts.deny . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
FTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
HOWTOs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
hard drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37, 41
HTML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
selecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
I
IDE CDROM, problems with. . . . . . . . . . . . . . . . . . . 316
SMB image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
installation method, choosing for SPARC. . . . . . . 360
info pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 installation methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
396 INDEX
K
kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 L
building . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197, 200 LAN manager printer, configuring . . . . . . . . . . . 70, 74
custom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197, 200 language
initrd image for . . . . . . . . . . . . . . . . . . . . . . . . . . 200 selecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
modular . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 laptops, installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
monolithic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 LDP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101, 105
version 2.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 library problems under X . . . . . . . . . . . . . . . . . . . . . . 331
kernel daemon. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156 license information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
kernel drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 LILO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78, 186
kernel options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 /etc/lilo.conf . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
kerneld . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Adding options to . . . . . . . . . . . . . . . . . . . . . . . . . 79
adding modules . . . . . . . . . . . . . . . . . . . . . . . . . 157 alternatives to . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
changing modules . . . . . . . . . . . . . . . . . . . . . . . 157 commercial products . . . . . . . . . . . . . . . . . . . 81
module options . . . . . . . . . . . . . . . . . . . . . . . . . . 157 LOADLIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
restarting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 SYSLINUX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
keyboard mapping under X . . . . . . . . . . . . . . . . . . . . 331 installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
keyboard navigation, installation program . . . . . . 30 MBR, installing on . . . . . . . . . . . . . . . . . . . . . . . . 78
keyboard type, selecting . . . . . . . . . . . . . . . . . . . . . . . . 35 root partition, installing on . . . . . . . . . . . . . . . . 78
keymap . . . . . . . . . . . . . . . see keyboard type, selecting LILO and modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
kickstart file LILO, BIOS-related issues . . . . . . . . . . . . . . . . . . . . . . . 25
cdrom keyword . . . . . . . . . . . . . . . . . . . . . . . . . . 382 LILO, partition-related issues . . . . . . . . . . . . . . . . . . . 25
clearpart keyword . . . . . . . . . . . . . . . . . . . . . . . 383 LILO, removing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
device keyword . . . . . . . . . . . . . . . . . . . . . . . . . . 382 Linux
diskette-based . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 booting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
format of . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
INDEX 397
package
P swap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
destructive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
INDEX 399
T
tasks, basic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 V
TCP wrapper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 verifying packages with glint . . . . . . . . . . . . . . . . . . 180
tcpd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 versions of Red Hat Linux . . . . . . . . . . . . . . . . . . . . . 351
technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Video Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 S3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
402 INDEX
video configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
viewing available packages with glint . . . . . . . . . . 178
virtual consoles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
X, used with . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
W
Window Maker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
window manager, changing . . . . . . . . . . . . . . . . . . . . . 95
Windows
finding hardware configuration with . . . . . . 11
Windows NT, dual-booting with . . . . . . . . . . . . . . . 321
wmconfig command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
World Wide Web . . . . . . . . . . . . . . . . . . . . . . . . see WWW
WWW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
server . . . . . . . . . . . . . . . . . . . . . . . . . . . . see Apache
X
X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
alternate window managers . . . . . . . . . . . . . . 330
customizing window managers . . . . . . . . . . 329
grey screen only . . . . . . . . . . . . . . . . . . . . . . . . . 329
handy tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
NeoMagic support for . . . . . . . . . . . . . . . . . . . 332
not starting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
starting automatically . . . . . . . . . . . . . . . . 94, 332
starting manually . . . . . . . . . . . . . . . . . . . . . . . . . 94
usermode tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
virtual consoles used with . . . . . . . . . . . . . . . . . 96
X Window System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
X window system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
X windows for SPARC . . . . . . . . . . . . . . . . . . . . . . . . . 363
X windows, configuring . . . . . . . . . . . . . . . . . . . . . . . . 66
Xconfigurator . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67, 92, 93
xdm, configuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
XFree86
configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 67, 91
Xconfigurator . . . . . . . . . . . . . . . . . . . . . . . 91, 92
xf86config . . . . . . . . . . . . . . . . . . . . . . . . . . 91, 92
server chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Z
Zip drive, IDE version . . . . . . . . . . . . . . . . . . . . . . . . . 339
Zip drive, parallel port version . . . . . . . . . . . . . . . . . 339
Index of Packages
A
acm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
bsd-games . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
byacc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
bzip2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
adjtimex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
AfterStep . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
AfterStep-APPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
am-utils . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
C
caching-nameserver . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
anonftp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 cdecl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
AnotherLevel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 cdp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
aout-libs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 chkconfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
apache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 christminster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
apache-devel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 cleanfeed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
apmd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 colour-yahtzee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
arpwatch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 comanche . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
ash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 control-panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
at . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 cpio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
aumix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 cproto . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
autoconf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 cracklib . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
autofs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 cracklib-dicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
automake . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 crontabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
awesfx . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 ctags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
cvs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
B
basesystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
cxhextris . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
bash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
basic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
D
dev . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
bc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
bdflush . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 dhcpcd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
biff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
bin86 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 diffstat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
bind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 diffutils . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
bind-devel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 dip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
bind-utils . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 dosemu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
binutils . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 dosemu-freedos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
bison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 dump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
blt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
bootp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
bootparamd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
bootpc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
E
e2fsprogs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
404 INDEX OF PACKAGES
F
f2c . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
gmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
gmp-devel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
gnome-core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
faces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 gnome-libs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
faces-devel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 gnome-libs-devel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
faces-xface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 gnome-linuxconf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
faq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 gnuchess . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
fetchmail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 gnuplot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 gperf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
filesystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 gpm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
fileutils . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 gpm-devel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
findutils . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 grep . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
finger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 groff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
flex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 groff-gxditview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
flying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 gsl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
fort77 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 gtk+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
fortune-mod . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 gtk+-devel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
ftp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 guavac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
fvwm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 guile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .246
fvwm2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .297 guile-devel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
fvwm2-icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 gv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
fwhois . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 gzip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
G
gated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
H
hdparm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
gawk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 helptool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
gcc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
howto . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
gd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
howto-chinese . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
gd-devel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
howto-croatian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
gdb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
howto-dvi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
INDEX OF PACKAGES 405
K
kaffe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
lslk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
lsof . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
ltrace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
406 INDEX OF PACKAGES
N
nag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
postgresql-clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
postgresql-data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
postgresql-devel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
INDEX OF PACKAGES 407
S
sag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
tcsh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
termcap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
samba . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 tetex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
408 INDEX OF PACKAGES
Y
yp-tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
ypbind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
ypserv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
ytalk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Z
zgv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
zip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272