Книга администратора Debian

ALTERNATIVE Configuration by “network profile”

Pdf просмотр
Размер7.63 Mb.
1   ...   9   10   11   12   13   14   15   16   ...   32
ALTERNATIVE Configuration by “network profile”
More advanced users may want to try the guessnet package for automatic network configuration. A group of test scripts determine which network profile should be activated and configure it on the fly.
Users who prefer to manually select a network profile will prefer the netenv program, found in the package of the same name.

8.3. Setting the Hostname and Configuring
the Name Service
The purpose of assigning names to IP numbers is to make them easier for people to remember. In reality, an IP address identifies a network interface associated with a device such as a network card. Since each machine can have several network cards, and several interfaces on each card,
one single computer can have several names in the domain name system.
Each machine is, however, identified by a main (or “canonical”) name, stored in the
/etc/hostname file and communicated to the Linux kernel by initialization scripts through the
hostname command. The current value is available in a virtual filesystem, and you can get it with the cat /proc/sys/kernel/hostname command.
, virtual filesystems
file trees are generated by “virtual” filesystems. This is a practical means of recovering information from the kernel (by listing virtual files) and communicating them to it (by writing to virtual files).
in particular is designed to provide access to internal kernel objects, especially those representing the various devices in the system. The kernel can, thus, share various pieces of information: the status of each device (for example, if it is in energy saving mode), whether it is a removable device, etc. Note that
has only existed since kernel version 2.6.
Surprisingly, the domain name is not managed in the same way, but comes from the complete name of the machine, acquired through name resolution. You can change it in the
/etc/hosts file; simply write a complete name for the machine there at the beginning of the list of names associated with the address of the machine, as in the following example: localhost arrakis.falcot.com arrakis
8.3.1. Name Resolution
The mechanism for name resolution in Linux is modular and can use various sources of information declared in the
/etc/nsswitch.conf file. The entry that involves host name resolution is hosts
. By default, it contains files dns
, which means that the system consults the
/etc/hosts file first, then DNS servers. NIS/NIS+ or LDAP servers are other possible sources.
Be aware that the commands specifically intended to query DNS (especially host) do not use the standard name resolution mechanism (NSS). As a consequence, they do not take into consideration
, and thus, not
/etc/hosts either. Configuring DNS Servers

DNS (Domain Name Service) is a distributed and hierarchical service mapping names to IP
addresses, and vice-versa. Specifically, it can turn a human-friendly name such as www.eyrolles.com into the actual IP address,
To access DNS information, a DNS server must be available to relay requests. Falcot Corp has its own, but an individual user is more likely to use the DNS servers provided by their ISP.
The DNS servers to be used are indicated in the
, one per line, with the nameserver keyword preceding an IP address, as in the following example:
Note that the
/etc/resolv.conf file may be handled automatically (and overwritten) when the network is managed by NetworkManager or configured via DHCP. The
If there is no name server on the local network, it is still possible to establish a small table mapping IP addresses and machine hostnames in the
/etc/hosts file, usually reserved for local network stations. The syntax of this file is very simple: each line indicates a specific IP address followed by the list of any associated names (the first being “completely qualified”, meaning it includes the domain name).
This file is available even during network outages or when DNS servers are unreachable, but will only really be useful when duplicated on all the machines on the network. The slightest alteration in correspondence will require the file to be updated everywhere. This is why
/etc/hosts generally only contains the most important entries.
This file will be sufficient for a small network not connected to the Internet, but with 5 machines or more, it is recommended to install a proper DNS server.
TIP Bypassing DNS
Since applications check the
/etc/hosts file before querying DNS, it is possible to include information in there that is different from what the DNS would return, and therefore to bypass normal DNS-based name resolution.
This allows, in the event of DNS changes not yet propagated, to test access to a website with the intended name even if this name is not properly mapped to the correct IP address yet.
Another possible use is to redirect traffic intended for a specific host to the localhost, thus preventing any communication with the given host. For example, hostnames of servers dedicated to serving ads could be diverted which would bypass these ads resulting in more fluid, less distracting, navigation.

8.4. User and Group Databases
The list of users is usually stored in the
/etc/passwd file, while the
/etc/shadow file stores encrypted passwords. Both are text files, in a relatively simple format, which can be read and modified with a text editor. Each user is listed there on a line with several fields separated with a colon (“
NOTE Editing system files
The system files mentioned in this chapter are all plain text files, and can be edited with a text editor. Considering their importance to core system functionality, it is always a good idea to take extra precautions when editing system files. First,
always make a copy or backup of a system file before opening or altering it. Second, on servers or machines where more than one person could potentially access the same file at the same time, take extra steps to guard against file corruption.
For this purpose, it is enough to use the vipw command to edit the
/etc/passwd file, or vigr to edit
. These commands lock the file in question prior to running the text editor, (vi by default, unless the
environment variable has been altered). The
-s option in these commands allows editing the corresponding shadow file.
BACK TO BASICS Crypt, a one-way function
crypt is a one-way function that transforms a string (
) into another string (
) in a way that
cannot be derived from
. The only way to identify
is to test all possible values, checking each one to determine if transformation by the function will produce
or not. It uses up to 8 characters as input (string
) and generates a string of 13, printable, ASCII characters (string
8.4.1. User List:
Here is the list of fields in the
/etc/passwd file:
login, for example rhertzog
password: this is a password encrypted by a one-way function (crypt), relying on
. The special value “
” indicates that the encrypted password is stored in
: unique number identifying each user;
: unique number for the user's main group (Debian creates a specific group for each user by default);
: data field usually containing the user's full name;
login directory, assigned to the user for storage of their personal files (the environment variable
generally points here);
program to execute upon login. This is usually a command interpreter (shell), giving the user free rein. If you specify /bin/false (which does nothing and returns control immediately), the user cannot login.

A Unix group is an entity including several users so that they can easily share files using the integrated permission system (by benefiting from the same rights). You can also restrict use of certain programs to a specific group.
8.4.2. The Hidden and Encrypted Password File:
/etc/shadow file contains the following fields:
encrypted password;
several fields managing password expiration.
file formats
These formats are documented in the following man pages: passwd(5), shadow(5), and group(5).
file security
, unlike its alter-ego,
, cannot be read by regular users. Any encrypted password stored in
/etc/passwd is readable by anybody; a cracker could try to “break” (or reveal) a password by one of several “brute force”
methods which, simply put, guess at commonly used combinations of characters. This attack — called a "dictionary attack" —
is no longer possible on systems using
8.4.3. Modifying an Existing Account or Password
The following commands allow modification of the information stored in specific fields of the user databases: passwd permits a regular user to change their password, which in turn, updates the
/etc/shadow file; chfn (CHange Full Name), reserved for the super-user (root), modifies the
field. chsh (CHange SHell) allows the user to change their login shell, however available choices will be limited to those listed in
; the administrator, on the other hand, is not bound by this restriction and can set the shell to any program of their choosing.
Finally, the chage (CHange AGE) command allows the administrator to change the password expiration settings (the
-l user
option will list the current settings). You can also force the expiration of a password using the passwd -e
command, which will require the user to change their password the next time they log in.
8.4.4. Disabling an Account
You may find yourself needing to “disable an account” (lock out a user), as a disciplinary measure, for the purposes of an investigation, or simply in the event of a prolonged or definitive absence of a user. A disabled account means the user cannot login or gain access to the machine.
The account remains intact on the machine and no files or data are deleted; it is simply inaccessible. This is accomplished by using the command passwd -l
(lock). Re-enabling the account is done in similar fashion, with the
-u option (unlock).

GOING FURTHER NSS and system databases
Instead of using the usual files to manage lists of users and groups, you could use other types of databases, such as LDAP or
db, by using an appropriate NSS (Name Service Switch) module. The modules used are listed in the
/etc/nsswitch.conf file, under the passwd
, shadow and group entries. See
Раздел, «Configuring NSS»
for a specific example of the use of an NSS module by LDAP.
8.4.5. Group List:
Groups are listed in the
/etc/group file, a simple textual database in a format similar to that of the
/etc/passwd file, with the following fields:
group name;
password (optional): This is only used to join a group when one is not a usual member
(with the newgrp or sg commands, see sidebar
BACK TO BASICS Working with several groups
: unique group identification number;
list of members: list of names of users who are members of the group, separated by commas.
BACK TO BASICS Working with several groups
Each user may be a member of many groups; one of them is their “main group”. A user's main group is, by default, created during initial user configuration. By default, each file that a user creates belongs to them, as well as to their main group. This is not always desirable; for example, when the user needs to work in a directory shared by a group other than their main group.
In this case, the user needs to change their main group using one of the following commands: newgrp, which starts a new shell, or sg, which simply executes a command using the supplied alternate group. These commands also allow the user to join a group to which they do not belong. If the group is password protected, they will need to supply the appropriate password before the command is executed.
Alternatively, the user can set the setgid bit on the directory, which causes files created in that directory to automatically belong to the correct group. For more details, see sidebar
SECURITY setgid directory and sticky bit
The id command displays the current state of a user, with their personal identifier (
uid variable), current main group (
gid variable), and the list of groups to which they belong (
groups variable).
The addgroup and delgroup commands add or delete a group, respectively. The groupmod
command modifies a group's information (its gid or identifier). The command passwd -g
changes the password for the group, while the passwd -r -g
command deletes it.
TIP getent
The getent (get entries) command checks the system databases the standard way, using the appropriate library functions,
which in turn call the NSS modules configured in the
/etc/nsswitch.conf file. The command takes one or two arguments:
the name of the database to check, and a possible search key. Thus, the command getent passwd rhertzog will give the information from the user database regarding the user rhertzog

8.5. Creating Accounts
One of the first actions an administrator needs to do when setting up a new machine is to create user accounts. This is typically done using the adduser command which takes a user-name for the new user to be created, as an argument.
The adduser command asks a few questions before creating the account, but its usage is fairly straightforward. Its configuration file,
, includes all the interesting settings:
it can be used to automatically set a quota for each new user by creating a user template, or to change the location of user accounts; the latter is rarely useful, but it comes in handy when you have a large number of users and want to divide their accounts over several disks, for instance.
You can also choose a different default shell.
The term “quota” refers to a limit on machine resources that a user is allowed to use. This frequently refers to disk space.
The creation of an account populates the user's home directory with the contents of the
template. This provides the user with a set of standard directories and configuration files.
In some cases, it will be useful to add a user to a group (other than their default “main” group) in order to grant them additional permissions. For example, a user who is included in the audio
group can access audio devices (see sidebar
BACK TO BASICS Device access permissions
This can be achieved with a command such as adduser

BACK TO BASICS Device access permissions
Each hardware peripheral device is represented under Unix with a special file, usually stored in the file tree under
(DEVices). Two types of special files exist according to the nature of the device: “character mode” and “block mode” files,
each mode allowing for only a limited number of operations. While character mode limits interaction with read/write operations, block mode also allows seeking within the available data. Finally, each special file is associated with two numbers
(“major” and “minor”) that identify the device to the kernel in a unique manner. Such a file, created by the mknod command,
simply contains a symbolic (and more human-friendly) name.
The permissions of a special file map to the permissions necessary to access the device itself. Thus, a file such as
, representing the audio mixer, only has read/write permissions for the root user and members of the audio group.
Only these users can operate the audio mixer.
It should be noted that the combination of udev, consolekit and policykit can add additional permissions to allow users physically connected to the console (and not through the network) to access to certain devices.

8.6. Shell Environment
Command interpreters (or shells) can be a user's first point of contact with the computer, and they must therefore be rather friendly. Most of them use initialization scripts that allow configuration of their behavior (automatic completion, prompt text, etc.).
bash, the standard shell, uses the
/etc/bash.bashrc initialization script for “interactive”
shells, and
/etc/profile for “login” shells.
BACK TO BASICS Login shell and (non) interactive shell
In simple terms, a login shell is invoked when you login to the console either locally or remotely via ssh, or when you run an explicit bash --login command. Regardless of whether it is a login shell or not, a shell can be interactive (in an xterm-type terminal for instance); or non-interactive (when executing a script).
DISCOVERY Other shells, other scripts
Each command interpreter has a specific syntax and its own configuration files. Thus, zsh uses
/etc/zshrc and
; csh uses
/etc/csh.login and
. The man pages for these programs document which files they use.
For bash, it is useful to activate “automatic completion” in the
/etc/bash.bashrc file (simply uncomment a few lines).
BACK TO BASICS Automatic completion
Many command interpreters provide a completion feature, which allows the shell to automatically complete a partially typed command name or argument when the user hits the Tab key. This lets users work more efficiently and be less error-prone.
This function is very powerful and flexible. It is possible to configure its behavior according to each command. Thus, the first argument following apt-get will be proposed according to the syntax of this command, even if it does not match any file (in this case, the possible choices are install
, remove
, upgrade
, etc.).
BACK TO BASICS The tilde, a shortcut to HOME
The tilde is often used to indicate the directory to which the environment variable,
, points (being the user's home directory, such as
). Command interpreters automatically make the substitution:
/hello.txt becomes
The tilde also allows access to another user's home directory. Thus, rmas/bonjour.txt is synonymous with
In addition to these common scripts, each user can create their own
/.bashrc and
/.bash_profile to configure their shell. The most common changes are the addition of aliases; these are words that are automatically replaced with the execution of a command, which makes it faster to invoke that command. For instance, you could create the la alias for the command ls -la | less command; then you only have to type la to inspect the contents of a directory in detail.
BACK TO BASICS Environment variables

Environment variables allow storage of global settings for the shell or various other programs called. They are contextual
(each process has its own set of environment variables) but inheritable. This last characteristic offers the possibility for a login shell to declare variables which will be passed down to all programs it executes.
Setting default environment variables is an important element of shell configuration. Leaving aside the variables specific to a shell, it is preferable to place them in the
/etc/environment file, since it is used by the various programs likely to initiate a shell session. Variables typically defined there include
, which usually contains the name of the company or organization, and
, which indicates the existence and location of an HTTP proxy.
TIP All shells configured identically
Users often want to configure their login and interactive shells in the same way. To do this, they choose to interpret (or
“source”) the content from
/.bashrc in the
/.bash_profile file. It is possible to do the same with files common to all users (by calling
/etc/bash.bashrc from

8.7. Printer Configuration
Printer configuration used to cause a great many headaches for administrators and users alike.
These headaches are now mostly a thing of the past, thanks to cups, the free print server using the
IPP protocol (Internet Printing Protocol).
This program is divided over several Debian packages: cups is the central print server; cups- bsd is a compatibility layer allowing use of commands from the traditional BSD printing system
(lpd daemon, lpr and lpq commands, etc.); cups-client contains a group of programs to interact with the server (block or unblock a printer, view or delete print jobs in progress, etc.); and finally, cups-driver-gutenprint contains a collection of additional printer drivers for cups.
CUPS (Common Unix Printing System) is a project (and a trademark) managed by Apple, Inc.
→ http://www.cups.org/
After installation of these different packages, cups is administered easily through a web interface accessible at the local address: http://localhost:631/
. There you can add printers
(including network printers), remove, and administer them. You can also administer cups with the graphical interface provided by the desktop environment. Finally, there is also the system-
config-printer graphical interface (from the Debian package of the same name).
NOTE Obsolescence of
cups no longer uses the
/etc/printcap file, which is now obsolete. Programs that rely upon this file to get a list of available printers will, thus, fail. To avoid this problem, delete this file and make it a symbolic link (see sidebar
Symbolic links
) to
, which is maintained by cups to ensure compatibility.

8.8. Configuring the Bootloader
It is probably already functional, but it is always good to know how to configure and install the bootloader in case it disappears from the Master Boot Record. This can occur after installation of another operating system, such as Windows. The following information can also help you to modify the bootloader configuration if needed.
BACK TO BASICS Master boot record
The Master Boot Record (MBR) occupies the first 512 bytes of the first hard disk, and is the first thing loaded by the BIOS to hand over control to a program capable of booting the desired operating system. In general, a bootloader gets installed in the
MBR, removing its previous content.
8.8.1. Identifying the Disks
CULTURE udev and
directory traditionally houses so-called “special” files, intended to represent system peripherals (see sidebar
TO BASICS Device access permissions
). Once upon a time, it used to contain all special files that could potentially be used.
This approach had a number of drawbacks among which the fact that it restricted the number of devices that one could use
(due to the hardcoded list of names), and that it was impossible to know which special files were actually useful.
Nowadays, the management of special files is entirely dynamic and matches better the nature of hot-swappable computer devices. The kernel cooperates with udev to create and delete them as needed when the corresponding devices appear and disappear. For this reason,
doesn't need to be persistent and is thus a RAM-based filesystem that starts empty and contains only the relevant entries.
The kernel communicates lots of information about any newly added device and hands out a pair of major/minor numbers to identify it. With this udevd can create the special file under the name and with the permissions that it wants. It can also create aliases and perform additional actions (such as initialization or registration tasks). udevd's behavior is driven by a large set of (customizable) rules.
With dynamically assigned names, you can thus keep the same name for a given device, regardless of the connector used or the connection order, which is especially useful when you use various USB peripherals. The first partition on the first hard drive can then be called
for backwards compatibility, or
/dev/root-partition if you prefer, or even both at the same time since udevd can be configured to automatically create a symbolic link.
In ancient times, some kernel modules did automatically load when you tried to access the corresponding device file. This is no longer the case, and the peripheral's special file no longer exists prior to loading the module; this is no big deal, since most modules are loaded on boot thanks to automatic hardware detection. But for undetectable peripherals (such as very old disk drives or PS/2 mice), this doesn't work. Consider adding the modules, floppy
, psmouse and mousedev to
/etc/modules in order to force loading them on boot.
Configuration of the bootloader must identify the different hard drives and their partitions. Linux uses “block” special files stored in the
directory, for this purpose. Since Debian Squeeze,
the naming scheme for hard drives has been unified by the Linux kernel, and all hard drives
(IDE/PATA, SATA, SCSI, USB, IEEE 1394) are now represented by
Each partition is represented by its number on the disk on which it resides: for instance,
is the first partition on the first disk, and
is the third partition on the
second disk.
The PC architecture (or “i386”, including its younger cousin “amd64”) has long been limited to using the “MS-DOS” partition table format, which only allows four “primary” partitions per disk. To go beyond this limitation under this scheme, one of them has to be created as an
“extended” partition, and it can then contain additional “secondary” partitions. These secondary partitions are numbered from 5. Thus the first secondary partition could be
followed by
, etc.
Another restriction of the MS-DOS partition table format is that it only allows disks up to 2 TiB
in size, which is becoming a real problem with recent disks.
A new partition table format called GPT loosens these constraints on the number of partitions (it allows up to 128 partitions when using standard settings) and on the size of the disks (up to
8 ZiB, which is more than 8 billion terabytes). If you intend to create many physical partitions on the same disk, you should therefore ensure that you are creating the partition table in the GPT
format when partitioning your disk.
It is not always easy to remember what disk is connected to which SATA controller, or in third position in the SCSI chain, especially since the naming of hotplugged hard drives (which includes among others most SATA disks and external disks) can change from one boot to another.
Fortunately, udev creates, in addition to
, symbolic links with a fixed name, which you could then use if you wished to identify a hard drive in a non-ambiguous manner. These symbolic links are stored in
. On a machine with two physical disks, for example, one could find the following:
ls -l
total 0
lrwxrwxrwx 1 root root 9 23 jul. 08:58 ata-STM3500418AS_9VM3L3KP -> ../../sda lrwxrwxrwx 1 root root 10 23 jul. 08:58 ata-STM3500418AS_9VM3L3KP-part1 -> ../../sda1
lrwxrwxrwx 1 root root 10 23 jul. 08:58 ata-STM3500418AS_9VM3L3KP-part2 -> ../../sda2
lrwxrwxrwx 1 root root 9 23 jul. 08:58 ata-WDC_WD5001AALS-00L3B2_WD-WCAT00241697 -> ../../sdb lrwxrwxrwx 1 root root 10 23 jul. 08:58 ata-WDC_WD5001AALS-00L3B2_WD-WCAT00241697-part1 -> ../../sdb1
lrwxrwxrwx 1 root root 10 23 jul. 08:58 ata-WDC_WD5001AALS-00L3B2_WD-WCAT00241697-part2 -> ../../sdb2
lrwxrwxrwx 1 root root 9 23 jul. 08:58 scsi-SATA_STM3500418AS_9VM3L3KP -> ../../sda lrwxrwxrwx 1 root root 10 23 jul. 08:58 scsi-SATA_STM3500418AS_9VM3L3KP-part1 -> ../../sda1
lrwxrwxrwx 1 root root 10 23 jul. 08:58 scsi-SATA_STM3500418AS_9VM3L3KP-part2 -> ../../sda2
lrwxrwxrwx 1 root root 9 23 jul. 08:58 scsi-SATA_WDC_WD5001AALS-_WD-WCAT00241697 -> ../../sdb lrwxrwxrwx 1 root root 10 23 jul. 08:58 scsi-SATA_WDC_WD5001AALS-_WD-WCAT00241697-part1 -> ../../sdb1
lrwxrwxrwx 1 root root 10 23 jul. 08:58 scsi-SATA_WDC_WD5001AALS-_WD-WCAT00241697-part2 -> ../../sdb2
lrwxrwxrwx 1 root root 9 23 jul. 16:48 usb-LaCie_iamaKey_3ed00e26ccc11a-0:0 -> ../../sdc lrwxrwxrwx 1 root root 10 23 jul. 16:48 usb-LaCie_iamaKey_3ed00e26ccc11a-0:0-part1 -> ../../sdc1
lrwxrwxrwx 1 root root 10 23 jul. 16:48 usb-LaCie_iamaKey_3ed00e26ccc11a-0:0-part2 -> ../../sdc2
lrwxrwxrwx 1 root root 9 23 jul. 08:58 wwn-0x5000c50015c4842f -> ../../sda lrwxrwxrwx 1 root root 10 23 jul. 08:58 wwn-0x5000c50015c4842f-part1 -> ../../sda1

Note that some disks are listed several times (because they behave simultaneously as ATA disks and SCSI disks), but the relevant information is mainly in the model and serial numbers of the disks, from which you can find the peripheral file.
The example configuration files given in the following sections are based on the same setup: a single SATA disk, where the first partition is an old Windows installation and the second contains Debian GNU/Linux.
8.8.2. Configuring LILO
LILO (LInux LOader) is the oldest bootloader — solid but rustic. It writes the physical address of the kernel to boot on the MBR, which is why each update to LILO (or its configuration file)
must be followed by the command lilo. Forgetting to do so will render a system unable to boot if the old kernel was removed or replaced as the new one will not be in the same location on the disk.
LILO's configuration file is
; a simple file for standard configuration is illustrated in the example below.
Пример 8.3. LILO configuration file
# The disk on which LILO should be installed.
# By indicating the disk and not a partition.
# you order LILO to be installed on the MBR.
# the partition that contains Debian root=/dev/sda2
# the item to be loaded by default default=Linux
# the most recent kernel image image=/vmlinuz label=Linux initrd=/initrd.img read-only
# Old kernel (if the newly installed kernel doesn't boot)
image=/vmlinuz.old label=LinuxOLD
initrd=/initrd.img.old read-only optional
# only for Linux/Windows dual boot other=/dev/sda1
8.8.3. GRUB 2 Configuration

GRUB (GRand Unified Bootloader) is more recent. It is not necessary to invoke it after each update of the kernel; GRUB knows how to read the filesystems and find the position of the kernel on the disk by itself. To install it on the MBR of the first disk, simply type grub-install /dev/sda.
NOTE Disk names for GRUB
GRUB can only identify hard drives based on information provided by the BIOS.
corresponds to the first disk thus detected,
the second, etc. In most cases, this order corresponds exactly to the usual order of disks under Linux, but problems can occur when you associate SCSI and IDE disks. GRUB stores correspondences that it detects in the file
. If you find errors there (because you know that your BIOS detects drives in a different order),
correct them manually and run grub-install again. grub-mkdevicemap can help creating a device.map file from which to start.
Partitions also have a specific name in GRUB. When you use “classical” partitions in MS-DOS format, the first partition on the first disk is labeled,
, the second
, etc.
GRUB 2 configuration is stored in
, but this file (in Debian) is generated from others. Be careful not to modify it by hand, since such local modifications will be lost the next time update-grub is run (which may occur upon update of various packages). The most common modifications of the
/boot/grub/grub.cfg file (to add command line parameters to the kernel or change the duration that the menu is displayed, for example) are made through the variables in
. To add entries to the menu, you can either create a
/boot/grub/custom.cfg file or modify the
/etc/grub.d/50_custom file. For more complex configurations, you can modify other files in
, or add to them; these scripts should return configuration snippets, possibly by making use of external programs. These scripts are the ones that will update the list of kernels to boot:
10_linux takes into consideration the installed
Linux kernels;
20_linux_xen takes into account Xen virtual systems, and
30_os-prober lists other operating systems (Windows, OS X, Hurd).
8.8.4. For Macintosh Computers (PowerPC): Configuring
Yaboot is the bootloader used by old Macintosh computers using PowerPC processors. They do not boot like PCs, but rely on a “bootstrap” partition, from which the BIOS (or OpenFirmware)
executes the loader, and on which the ybin program installs yaboot and its configuration file.
You will only need to run this command again if the
/etc/yaboot.conf is modified (it is duplicated on the bootstrap partition, and yaboot knows how to find the position of the kernels on the disks).
Before executing ybin, you must first have a valid
. The following is an example of a minimal configuration.
Пример 8.4. Yaboot configuration file
# bootstrap partition boot=/dev/sda2
# the disk
# the Linux partition partition=3
# boot after 3 seconds of inactivity
# (timeout is in tenths of seconds)
install=/usr/lib/yaboot/yaboot magicboot=/usr/lib/yaboot/ofboot enablecdboot
# last kernel installed image=/vmlinux label=linux initrd=/initrd.img read-only
# old kernel image=/vmlinux.old label=old initrd=/initrd.img.old read-only
# only for Linux/Mac OSX dual-boot macosx=/dev/sda5
# bsd=/dev/sdaX and macos=/dev/sdaX
# are also possible

8.9. Other Configurations: Time
Synchronization, Logs, Sharing Access…
The many elements listed in this section are good to know for anyone who wants to master all aspects of configuration of the GNU/Linux system. They are, however, treated briefly and frequently refer to the documentation.
8.9.1. Timezone
BACK TO BASICS Symbolic links
A symbolic link is a pointer to another file. When you access it, the file to which it points is opened. Removal of the link will not cause deletion of the file to which it points. Likewise, it does not have its own set of permissions, but rather retains the permissions of its target. Finally, it can point to any type of file: directories, special files (sockets, named pipes, device files,
etc.), even other symbolic links.
The ln -s

command creates a symbolic link, named
, pointing to
If the target does not exist, then the link is “broken” and accessing it will result in an error indicating that the target file does not exist. If the link points to another link, you will have a “chain” of links that turns into a “cycle” if one of the targets points to one of its predecessors. In this case, accessing one of the links in the cycle will result in a specific error (“too many levels of symbolic links”); this means the kernel gave up after several rounds of the cycle.
The timezone, configured during initial installation, is a configuration item for the tzdata package. To modify it, use the dpkg-reconfigure tzdata command, which allows you to choose the timezone to be used in an interactive manner. Its configuration is stored in the
/etc/timezone file. Additionally, the corresponding file in the
/usr/share/zoneinfo directory is copied into
; this file contains the rules governing the dates where daylight saving time is active, for countries that use it.
When you need to temporarily change the timezone, use the
environment variable, which takes priority over the configured system default:
Thu Feb 19 11:25:18 CET 2015
TZ="Pacific/Honolulu" date
Thu Feb 19 00:25:21 HST 2015
NOTE System clock, hardware clock
There are two time sources in a computer. A computer's motherboard has a hardware clock, called the “CMOS clock”. This clock is not very precise, and provides rather slow access times. The operating system kernel has its own, the software clock,
which it keeps up to date with its own means (possibly with the help of time servers, see
Раздел 8.9.2, «Time
). This system clock is generally more accurate, especially since it doesn't need access to hardware variables. However, since it only exists in live memory, it is zeroed out every time the machine is booted, contrary to the
CMOS clock, which has a battery and therefore “survives” rebooting or halting of the machine. The system clock is, thus, set from the CMOS clock during boot, and the CMOS clock is updated on shutdown (to take into account possible changes or
corrections if it has been improperly adjusted).
In practice, there is a problem, since the CMOS clock is nothing more than a counter and contains no information regarding the time zone. There is a choice to make regarding its interpretation: either the system considers it runs in universal time
(UTC, formerly GMT), or in local time. This choice could be a simple shift, but things are actually more complicated: as a result of daylight saving time, this offset is not constant. The result is that the system has no way to determine whether the offset is correct, especially around periods of time change. Since it is always possible to reconstruct local time from universal time and the timezone information, we strongly recommend using the CMOS clock in universal time.
Unfortunately, Windows systems in their default configuration ignore this recommendation; they keep the CMOS clock on local time, applying time changes when booting the computer by trying to guess during time changes if the change has already been applied or not. This works relatively well, as long as the system has only Windows running on it. But when a computer has several systems (whether it be a “dual-boot” configuration or running other systems via virtual machine), chaos ensues,
with no means to determine if the time is correct. If you absolutely must retain Windows on a computer, you should either configure it to keep the CMOS clock as UTC (setting the registry key
HKLM\SYSTEM\CurrentControlSet\Control\TimeZoneInformation\RealTimeIsUniversal to “1” as a DWORD), or use
hwclock --localtime --set on the Debian system to set the hardware clock and mark it as tracking the local time (and make sure to manually check your clock in spring and autumn).
8.9.2. Time Synchronization
Time synchronization, which may seem superfluous on a computer, is very important on a network. Since users do not have permissions allowing them to modify the date and time, it is important for this information to be precise to prevent confusion. Furthermore, having all of the computers on a network synchronized allows better cross-referencing of information from logs on different machines. Thus, in the event of an attack, it is easier to reconstruct the chronological sequence of actions on the various machines involved in the compromise. Data collected on several machines for statistical purposes won't make a great deal of sense if they are not synchronized.
NTP (Network Time Protocol) allows a machine to synchronize with others fairly accurately, taking into consideration the delays induced by the transfer of information over the network and other possible offsets.
While there are numerous NTP servers on the Internet, the more popular ones may be overloaded. This is why we recommend using the pool.ntp.org NTP server, which is, in reality, a group of machines that have agreed to serve as public
NTP servers. You could even limit use to a sub-group specific to a country, with, for example, us.pool.ntp.org for the United
States, or ca.pool.ntp.org for Canada, etc.
However, if you manage a large network, it is recommended that you install your own NTP server, which will synchronize with the public servers. In this case, all the other machines on your network can use your internal NTP server instead of increasing the load on the public servers. You will also increase homogeneity with your clocks, since all the machines will be synchronized on the same source, and this source is very close in terms of network transfer times. For Workstations
Since work stations are regularly rebooted (even if only to save energy), synchronizing them by
NTP at boot is enough. To do so, simply install the ntpdate package. You can change the NTP
server used if needed by modifying the
/etc/default/ntpdate file. For Servers
Servers are only rarely rebooted, and it is very important for their system time to be correct. To permanently maintain correct time, you would install a local NTP server, a service offered in the ntp package. In its default configuration, the server will synchronize with pool.ntp.org and provide time in response to requests coming from the local network. You can configure it by editing the
/etc/ntp.conf file, the most significant alteration being the NTP server to which it refers. If the network has a lot of servers, it may be interesting to have one local time server which synchronizes with the public servers and is used as a time source by the other servers of the network.
GOING FURTHER GPS modules and other time sources
If time synchronization is particularly crucial to your network, it is possible to equip a server with a GPS module (which will use the time from GPS satellites) or a DCF-77 module (which will sync time with the atomic clock near Frankfurt, Germany).
In this case, the configuration of the NTP server is a little more complicated, and prior consultation of the documentation is an absolute necessity.
8.9.3. Rotating Log Files
Log files can grow, fast, and it is necessary to archive them. The most common scheme is a rotating archive: the log file is regularly archived, and only the latest
archives are retained.
logrotate, the program responsible for these rotations, follows directives given in the
/etc/logrotate.conf file and all of the files in the
directory. The administrator may modify these files, if they wish to adapt the log rotation policy defined by
Debian. The logrotate(1) man page describes all of the options available in these configuration files. You may want to increase the number of files retained in log rotation, or move the log files to a specific directory dedicated to archiving them rather than delete them. You could also send them by e-mail to archive them elsewhere.
The logrotate program is executed daily by the cron scheduling program (described in
Раздел 9.7, «Scheduling Tasks with cron and atd»
8.9.4. Sharing Administrator Rights
Frequently, several administrators work on the same network. Sharing the root passwords is not very elegant, and opens the door for abuse due to the anonymity such sharing creates. The solution to this problem is the sudo program, which allows certain users to execute certain commands with special rights. In the most common use case, sudo allows a trusted user to execute any command as root. To do so, the user simply executes sudo
and authenticates using their personal password.
When installed, the sudo package gives full root rights to members of the sudo
Unix group. To delegate other rights, the administrator must use the visudo command, which allows them to
modify the
/etc/sudoers configuration file (here again, this will invoke the vi editor, or any other editor indicated in the
environment variable). Adding a line with
username ALL=
allows the user in question to execute any command as root.
More sophisticated configurations allow authorization of only specific commands to specific users. All the details of the various possibilities are given in the sudoers(5) man page.
8.9.5. List of Mount Points
BACK TO BASICS Mounting and unmounting
In a Unix-like system such as Debian, files are organized in a single tree-like hierarchy of directories. The
directory is called the “root directory”; all additional directories are sub-directories within this root. “Mounting” is the action of including the content of a peripheral device (often a hard drive) into the system's general file tree. As a consequence, if you use a separate hard drive to store users' personal data, this disk will have to be “mounted” in the
directory. The root filesystem is always mounted at boot by the kernel; other devices are often mounted later during the startup sequence or manually with the
mount command.
Some removable devices are automatically mounted when connected, especially when using the GNOME, KDE or other graphical desktop environments. Others have to be mounted manually by the user. Likewise, they must be unmounted
(removed from the file tree). Normal users do not usually have permission to execute the mount and umount commands.
The administrator can, however, authorize these operations (independently for each mount point) by including the user option in the
/etc/fstab file.
The mount command can be used without arguments (it then lists all mounted filesystems). The following parameters are required to mount or unmount a device. For the complete list, please refer to the corresponding man pages, mount(8) and umount(8). For simple cases, the syntax is simple too: for example, to mount the
partition, which has an ext3
filesystem, into the
directory, you would simply run mount -t ext3 /dev/sdc1 /mnt/tmp/.
/etc/fstab file gives a list of all possible mounts that happen either automatically on boot or manually for removable storage devices. Each mount point is described by a line with several space-separated fields:
device to mount: this can be a local partition (hard drive, CD-ROM) or a remote filesystem
(such as NFS).
This field is frequently replaced with the unique ID of the filesystem (which you can determine with blkid
) prefixed with
. This guards against a change in the name of the device in the event of addition or removal of disks, or if disks are detected in a different order.
mount point: this is the location on the local filesystem where the device, remote system, or partition will be mounted.
type: this field defines the filesystem used on the mounted device. ext4
, ext3
, vfat
, ntfs
, xfs are a few examples.
BACK TO BASICS NFS, a network filesystem
NFS is a network filesystem; under Linux, it allows transparent access to remote files by including them in the local filesystem.

A complete list of known filesystems is available in the mount(8) man page. The swap special value is for swap partitions; the auto special value tells the mount program to automatically detect the filesystem (which is especially useful for disk readers and USB
keys, since each one might have a different filesystem);
options: there are many of them, depending on the filesystem, and they are documented in the mount man page. The most common are rw or ro
, meaning, respectively, that the device will be mounted with read/write or read-only permissions.
noauto deactivates automatic mounting on boot.
nofail allows the boot to proceed even when the device is not present. Make sure to put this option for external drives that might be unplugged when you boot, because
systemd really ensures that all mount points that must be automatically mounted are actually mounted before letting the boot process continue to its end. Note that you can combine this with x-systemd.device-timeout=5s to tell systemd to not wait more than 5 seconds for the device to appear (see systemd.mount(5)).
user authorizes all users to mount this filesystem (an operation which would otherwise be restricted to the root user).
defaults means the group of default options: rw
, suid
, dev
, exec
, auto
, nouser and async
, each of which can be individually disabled after defaults by adding nosuid
nodev and so on to block suid
, dev and so on. Adding the user option reactivates it,
since defaults includes nouser backup: this field is almost always set to
. When it is
, it tells the dump tool that the partition contains data that is to be backed up.
check order: this last field indicates whether the integrity of the filesystem should be checked on boot, and in which order this check should be executed. If it is
, no check is conducted. The root filesystem should have the value
, while other permanent filesystems get the value
Пример 8.5. Example
# /etc/fstab: static file system information.
# proc /proc proc defaults 0 0
# / was on /dev/sda1 during installation
UUID=c964222e-6af1-4985-be04-19d7c764d0a7 / ext3 errors=remount-ro 0 1
# swap was on /dev/sda5 during installation
UUID=ee880013-0f63-4251-b5c6-b771f53bd90e none swap sw 0 0
/dev/scd0 /media/cdrom0 udf,iso9660 user,noauto 0 0
/dev/fd0 /media/floppy auto rw,user,noauto 0 0
arrakis:/shared /shared nfs defaults 0 0
The last entry in this example corresponds to a network filesystem (NFS): the
directory on the arrakis server is mounted at
on the local machine. The format of the

/etc/fstab file is documented on the fstab(5) man page.
GOING FURTHER Auto-mounting
The am-utils package provides the amd auto-mounting utility, able to mount removable media on demand when a user attempts to access their usual mount point. It will unmount these devices when no process is accessing them any longer.
Other auto-mounting utilities exist, such as automount in the autofs package.
Note also that GNOME, KDE, and other graphical desktop environments work together with udisks, and can automatically mount removable media when they are connected.
8.9.6. locate and updatedb
The locate command can find the location of a file when you only know part of the name. It sends a result almost instantaneously, since it consults a database that stores the location of all the files on the system; this database is updated daily by the updatedb command. There are multiple implementations of the locate command and Debian picked mlocate for its standard system.
mlocate is smart enough to only return files which are accessible to the user running the command even though it uses a database that knows about all files on the system (since its
updatedb implementation runs with root rights). For extra safety, the administrator can use
/etc/updatedb.conf to exclude some directories from being indexed.

8.10. Compiling a Kernel
The kernels provided by Debian include the largest possible number of features, as well as the maximum of drivers, in order to cover the broadest spectrum of existing hardware configurations. This is why some users prefer to recompile the kernel in order to only include what they specifically need. There are two reasons for this choice. First, it may be to optimize memory consumption, since the kernel code, even if it is never used, occupies memory for nothing (and never “goes down” on the swap space, since it is actual RAM that it uses), which can decrease overall system performance. A locally compiled kernel can also limit the risk of security problems since only a fraction of the kernel code is compiled and run.
NOTE Security updates
If you choose to compile your own kernel, you must accept the consequences: Debian cannot ensure security updates for your custom kernel. By keeping the kernel provided by Debian, you benefit from updates prepared by the Debian Project's security team.
Recompilation of the kernel is also necessary if you want to use certain features that are only available as patches (and not included in the standard kernel version).
GOING FURTHER The Debian Kernel Handbook
The Debian kernel teams maintains the “Debian Kernel Handbook” (also available in the debian-kernel-handbook package)
with comprehensive documentation about most kernel related tasks and about how official Debian kernel packages are handled. This is the first place you should look into if you need more information than what is provided in this section.
→ http://kernel-handbook.alioth.debian.org
8.10.1. Introduction and Prerequisites
Unsurprisingly Debian manages the kernel in the form of a package, which is not how kernels have traditionally been compiled and installed. Since the kernel remains under the control of the packaging system, it can then be removed cleanly, or deployed on several machines.
Furthermore, the scripts associated with these packages automate the interaction with the bootloader and the initrd generator.
The upstream Linux sources contain everything needed to build a Debian package of the kernel.
But you still need to install build-essential to ensure that you have the tools required to build a
Debian package. Furthermore, the configuration step for the kernel requires the libncurses5-dev package. Finally, the fakeroot package will enable creation of the Debian package without using administrator's rights.
CULTURE The good old days of kernel-package
Before the Linux build system gained the ability to build proper Debian packages, the recommended way to build such packages was to use make-kpkg from the kernel-package package.

8.10.2. Getting the Sources
Like anything that can be useful on a Debian system, the Linux kernel sources are available in a package. To retrieve them, just install the linux-source-
package. The apt-cache search
^linux-source command lists the various kernel versions packaged by Debian. The latest version is available in the Unstable distribution: you can retrieve them without much risk
(especially if your APT is configured according to the instructions of
Раздел 6.2.6, «Working with Several Distributions»
). Note that the source code contained in these packages does not correspond precisely with that published by Linus Torvalds and the kernel developers; like all distributions, Debian applies a number of patches, which might (or might not) find their way into the upstream version of Linux. These modifications include backports of fixes/features/drivers from newer kernel versions, new features not yet (entirely) merged in the upstream Linux tree,
and sometimes even Debian specific changes.
The remainder of this section focuses on the 3.16 version of the Linux kernel, but the examples can, of course, be adapted to the particular version of the kernel that you want.
We assume the linux-source-3.16 package has been installed. It contains
/usr/src/linux- source-3.16.tar.xz
, a compressed archive of the kernel sources. You must extract these files in a new directory (not directly under
, since there is no need for special permissions to compile a Linux kernel):
is appropriate.
/kernel; cd

tar -xaf /usr/src/linux-source-3.16.tar.xz
CULTURE Location of kernel sources
Traditionally, Linux kernel sources would be placed in
thus requiring root permissions for compilation.
However, working with administrator rights should be avoided when not needed. There is a src group that allows members to work in this directory, but working in
should be avoided nevertheless. By keeping the kernel sources in a personal directory, you get security on all counts: no files in
unknown to the packaging system, and no risk of misleading programs that read
/usr/src/linux when trying to gather information on the used kernel.
8.10.3. Configuring the Kernel
The next step consists of configuring the kernel according to your needs. The exact procedure depends on the goals.
When recompiling a more recent version of the kernel (possibly with an additional patch), the configuration will most likely be kept as close as possible to that proposed by Debian. In this case, and rather than reconfiguring everything from scratch, it is sufficient to copy the
file (the version is that of the kernel currently used, which can be found with the uname -r command) into a
.config file in the directory containing the kernel sources.
cp /boot/config-3.16.0-4-amd64

Unless you need to change the configuration, you can stop here and skip to
Раздел 8.10.4,
«Compiling and Building the Package»
. If you need to change it, on the other hand, or if you decide to reconfigure everything from scratch, you must take the time to configure your kernel.
There are various dedicated interfaces in the kernel source directory that can be used by calling the make
command, where
is one of the values described below.
make menuconfig compiles and executes a text-mode interface (this is where the libncurses5- dev package is required) which allows navigating the options available in a hierarchical structure. Pressing the Space key changes the value of the selected option, and Enter validates the button selected at the bottom of the screen; Select returns to the selected sub-menu; Exit closes the current screen and moves back up in the hierarchy; Help will display more detailed information on the role of the selected option. The arrow keys allow moving within the list of options and buttons. To exit the configuration program, choose Exit from the main menu. The program then offers to save the changes you've made; accept if you are satisfied with your choices.
Other interfaces have similar features, but they work within more modern graphical interfaces;
such as make xconfig which uses a Qt graphical interface, and make gconfig which uses
GTK+. The former requires libqt4-dev, while the latter depends on libglade2-dev and libgtk2.0- dev.
When using one of those configuration interfaces, it is always a good idea to start from a reasonable default configuration. The kernel provides such configurations in arch/arch/configs/*_defconfig and you can put your selected configuration in place with a command like make x86_64_defconfig (in the case of a 64-bit PC) or make i386_defconfig (in the case of a 32-bit PC).
TIP Dealing with outdated
When you provide a
.config file that has been generated with another (usually older) kernel version, you will have to update it. You can do so with make oldconfig, it will interactively ask you the questions corresponding to the new configuration options. If you want to use the default answer to all those questions you can use make olddefconfig. With make
oldnoconfig, it will assume a negative answer to all questions.
8.10.4. Compiling and Building the Package
NOTE Clean up before rebuilding
If you have already compiled once in the directory and wish to rebuild everything from scratch (for example because you substantially changed the kernel configuration), you will have to run make clean to remove the compiled files. make
distclean removes even more generated files, including your
.config file too, so make sure to backup it first.
Once the kernel configuration is ready, a simple make deb-pkg will generate up to 5 Debian packages: linux-image-
that contains the kernel image and the associated modules,
which contains the header files required to build external modules,
which contains the firmware files needed by some drivers (this
package might be missing when you build from the kernel sources provided by Debian), linux- image-
-dbg which contains the debugging symbols for the kernel image and its modules,
and linux-libc-dev which contains headers relevant to some user-space libraries like GNU
is defined by the concatenation of the upstream version (as defined by the variables
in the
), of the
configuration parameter, and of the
environment variable. The package version reuses the same version string with an appended revision that is regularly incremented (and stored in
), except if you override it with the
environment variable.
make deb-pkg LOCALVERSION=-falcot KDEB_PKGVERSION=$(make kernelversion)-1
ls ../*.deb
8.10.5. Compiling External Modules
Some modules are maintained outside of the official Linux kernel. To use them, they must be compiled alongside the matching kernel. A number of common third party modules are provided by Debian in dedicated packages, such as xtables-addons-source (extra modules for iptables) or oss4-source (Open Sound System, some alternative audio drivers).
These external packages are many and varied and we won't list them all here; the apt-cache
search source$ command can narrow down the search field. However, a complete list isn't particularly useful since there is no particular reason for compiling external modules except when you know you need it. In such cases, the device's documentation will typically detail the specific module(s) it needs to function under Linux.
For example, let's look at the xtables-addons-source package: after installation, a
of the module's sources is stored in
. While we could manually extract the tarball and build the module, in practice we prefer to automate all this using DKMS. Most modules offer the required DKMS integration in a package ending with a
-dkms suffix. In our case, installing xtables-addons-dkms is all that is needed to compile the kernel module for the current kernel provided that we have the linux-headers-* package matching the installed kernel. For instance, if you use linux-image-amd64, you would also install linux-headers-amd64.
sudo apt install xtables-addons-dkms
Setting up xtables-addons-dkms (2.6-1) ...
Loading new xtables-addons-2.6 DKMS files...
First Installation: checking all kernels...
Building only for 3.16.0-4-amd64

Building initial module for 3.16.0-4-amd64
Running module version sanity check.
- Original module
- No original module exists within this kernel
- Installation
- Installing to /lib/modules/3.16.0-4-amd64/updates/dkms/
DKMS: install completed.
sudo dkms status
xtables-addons, 2.6, 3.16.0-4-amd64, x86_64: installed
sudo modinfo xt_ACCOUNT
filename: /lib/modules/3.16.0-4-amd64/updates/dkms/xt_ACCOUNT.ko license: GPL
alias: ipt_ACCOUNT
author: Intra2net AG
description: Xtables: per-IP accounting for large prefixes
ALTERNATIVE module-assistant
Before DKMS, module-assistant was the simplest solution to build and deploy kernel modules. It can still be used, in particular for packages lacking DKMS integration: with a simple command like module-assistant auto-install xtables-addons (or m-
a a-i xtables-addons for short), the modules are compiled for the current kernel, put in a new Debian package, and that package gets installed on the fly.
8.10.6. Applying a Kernel Patch
Some features are not included in the standard kernel due to a lack of maturity or to some disagreement with the kernel maintainers. Such features may be distributed as patches that anyone is then free to apply to the kernel sources.
Debian distributes some of these patches in linux-patch-* or kernel-patch-* packages (for instance, linux-patch-grsecurity2, which tightens some of the kernel's security policies). These packages install files in the
To apply one or more of these installed patches, use the patch command in the sources directory then start compilation of the kernel as described above.

make clean
zcat /usr/src/kernel-patches/diffs/grsecurity2/grsecurity-3.0-3.17.1-201410250027.patch.gz | patch -p1
Note that a given patch may not necessarily work with every version of the kernel; it is possible for patch to fail when applying them to kernel sources. An error message will be displayed and give some details about the failure; in this case, refer to the documentation available in the
Debian package of the patch (in the
directory). In most cases, the maintainer indicates for which kernel versions their patch is intended.

8.11. Installing a Kernel
8.11.1. Features of a Debian Kernel Package
A Debian kernel package installs the kernel image (
), its configuration
) and its symbols table (
) in
. The symbols table helps developers understand the meaning of a kernel error message; without it, kernel “oopses”
(an “oops” is the kernel equivalent of a segmentation fault for user-space programs, in other words messages generated following an invalid pointer dereference) only contain numeric memory addresses, which is useless information without the table mapping these addresses to symbols and function names. The modules are installed in the
The package's configuration scripts automatically generate an initrd image, which is a mini- system designed to be loaded in memory (hence the name, which stands for “init ramdisk”) by the bootloader, and used by the Linux kernel solely for loading the modules needed to access the devices containing the complete Debian system (for example, the driver for SATA disks).
Finally, the post-installation scripts update the symbolic links
/initrd.img and
/initrd.img.old so that they point to the latest two kernels installed,
respectively, as well as the corresponding initrd images.
Most of those tasks are offloaded to hook scripts in the
directories. For instance, the integration with grub relies on
/etc/kernel/postinst.d/zz-update-grub and
/etc/kernel/postrm.d/zz-update-grub to call update-grub when kernels are installed or removed.
8.11.2. Installing with dpkg
Using apt is so convenient that it makes it easy to forget about the lower-level tools, but the easiest way of installing a compiled kernel is to use a command such as dpkg -i
package.deb is the name of a linux-image package such as linux-image-3.16.7- ckt4-falcot_1_amd64.deb
The configuration steps described in this chapter are basic and can lead both to a server system or a workstation, and it can be massively duplicated in semi-automated ways. However, it is not enough by itself to provide a fully configured system. A few pieces are still in need of configuration, starting with low-level programs known as the “Unix services”.
1   ...   9   10   11   12   13   14   15   16   ...   32

База данных защищена авторским правом ©nethash.ru 2019
обратиться к администрации

войти | регистрация
    Главная страница

загрузить материал