echo "2007" > /dev/null
Years are going by... so does my age...! wish i could execute "chage -E never mj0vy"
In a way, 2007 was good for me...! Atleast i have started blogging. This year i could really catch up with linux to some extend...! Nothing more to say..!
Lets get into the matter,
Last week me and my friend Gigith were checking the mask flag in setfacl command...! we did some experimentation and finally came up with a good solution.
I assume you all know how to do basic things with setfacl.
i am starting by creating an empty file
#touch /myfile
Note: touch is used to update the timestamp of a file.
#chmod 750 /myfile
I have given the permission for group as read and write ( 4 + 1 )
I am granting full permission for the user tux in that file.
#setfacl -m u:redhat:rwx /myfile
Now the mask of the file would be assigned the maximum value , is rwx(7), but still the owning group's permission would still be read and write only.
#chmod 700 /myfile
Now i negated the permission of group from that file, resulting in the change of mask value from rw to null. But the important thing to note here is that, the owning groups permission would still be 5(r-x), as it was the permission given at the beginning of this setfacl testing operation. But the effective permission of the owning group and the named user would be the permission common between the owning group and the mask. So here, the effective permission would be - - - for both the owning group and named user.
Here the owning group is the group affiliated to /myfile and the named user is the user tux.
Note: whenever the setfacl command is invoked on the file /myfile, the mask is again changed to its maximum value.
Monday, December 31, 2007
Monday, December 3, 2007
file: DRAG me into CD/RW :)
Its high time we must bid bye-byes to cdrecord and growisofs...!
Until yesterday were were using the ISO9660 filesystem for burning the CDs and DVDs. But from now, its an oblivion.... welcome UDF.. Universal Disk Format..!
UDF lets us write datas incrementally to a mounted filessytem.
For this to work you should have the udftools package installed on your system, one blank cdrw, distribution of linux with a 2.6 kernel ( i tested in RHEL 5.0 ).
you can get the udftools package from here
here we goooooooo
Step 1:
Insert the blank cdrw into the drive and using the cdrwtool command which
we got from the udftools package, we are doing to blank the cdrw first..
Assuming your cd-burner is connected as secondary master..(/dev/hdc)
#cdrwtool -d /dev/hdc -t 4 -l 3 -q
( man cdrwtool )
this would blank the cdrw. Please be patient, it might take SOME time..!
Step 2:
We need to associate the blank formatted media with a packet device using the command pktsetup.
#pktsetup dragme /dev/hdc
Step 3:
Now we need to format the media with the udf filesystem,
#mkudffs --media-type=cdrw --udfrev=0x0150 /dev/pktcdvd/dragme
Step 4:
Now we need to make a mountpoint, let me give it as /drag-n-drop
#mkdir /drag-n-drop
#mount -t udf -o rw /dev/pktcdvd/dragme /drag-n-drop
#chmod 777 /drag-n-drop
(If you want local uses also to drag-n-drop something into it)
Now try some drag and dropping into that mountpoint
Now about the unmounting,
Its always safe to sync before unmouting,
So,
#sync
#umount /dev/pktcdvd/dragme
Then we can release the device /dev/pktcdvd/dragme from the packet device association.
#pktsetup -d /dev/pktcdvd/dragme
NOTE: Its always good to mount the packet device with noatime mount option if you want to ignore the number of rewrites in your media.
Now if you want to mount this media in other machine,
make a packet device with pktsetup and associate it with the device of your cd-drive
#pktsetup dragger /dev/hdd
This will map /dev/pktcdvd/dragger with /dev/hdd
Now you can mount the packet device and use it
#mount -t udf /dev/pktcdvd/dragger /mnt
~mj0vy
Until yesterday were were using the ISO9660 filesystem for burning the CDs and DVDs. But from now, its an oblivion.... welcome UDF.. Universal Disk Format..!
UDF lets us write datas incrementally to a mounted filessytem.
For this to work you should have the udftools package installed on your system, one blank cdrw, distribution of linux with a 2.6 kernel ( i tested in RHEL 5.0 ).
you can get the udftools package from here
here we goooooooo
Step 1:
Insert the blank cdrw into the drive and using the cdrwtool command which
we got from the udftools package, we are doing to blank the cdrw first..
Assuming your cd-burner is connected as secondary master..(/dev/hdc)
#cdrwtool -d /dev/hdc -t 4 -l 3 -q
( man cdrwtool )
this would blank the cdrw. Please be patient, it might take SOME time..!
Step 2:
We need to associate the blank formatted media with a packet device using the command pktsetup.
#pktsetup dragme /dev/hdc
Step 3:
Now we need to format the media with the udf filesystem,
#mkudffs --media-type=cdrw --udfrev=0x0150 /dev/pktcdvd/dragme
Step 4:
Now we need to make a mountpoint, let me give it as /drag-n-drop
#mkdir /drag-n-drop
#mount -t udf -o rw /dev/pktcdvd/dragme /drag-n-drop
#chmod 777 /drag-n-drop
(If you want local uses also to drag-n-drop something into it)
Now try some drag and dropping into that mountpoint
Now about the unmounting,
Its always safe to sync before unmouting,
So,
#sync
#umount /dev/pktcdvd/dragme
Then we can release the device /dev/pktcdvd/dragme from the packet device association.
#pktsetup -d /dev/pktcdvd/dragme
NOTE: Its always good to mount the packet device with noatime mount option if you want to ignore the number of rewrites in your media.
Now if you want to mount this media in other machine,
make a packet device with pktsetup and associate it with the device of your cd-drive
#pktsetup dragger /dev/hdd
This will map /dev/pktcdvd/dragger with /dev/hdd
Now you can mount the packet device and use it
#mount -t udf /dev/pktcdvd/dragger /mnt
~mj0vy
Wednesday, November 21, 2007
LOG ME IN....!
This article just illustrates the use of the expect command used for automatic logging to a remote machine
without using the complex ssh key pair exchange and all...!
Make sure you have the expect package installed in your machine...
lets try for telnet login...
make a file by name telnetme
$vi telnetme
#!/usr/bin/expect
eval spawn telnet 10.0.0.27
set timeout 30
expect login:
send " username\r"
expect password:
send " password\r"
interact
Now set execute permission to the script and copy it to any of the directories in your PATH variable
For SSH Login theres a little change...
I am here making a file by nane sshme
$vi sshme
#!/usr/bin/expect
eval spawn ssh 10.0.0.27
set timeout 30
expect password:
send " password\r"
interact
NOTE: change the italicised strings with appropriate username and password
It is recommended that you give read permission only to the user who is using this script , otherwise all users could read the plain password entered
PS: Please extend the features of expect if someone knows it...
without using the complex ssh key pair exchange and all...!
Make sure you have the expect package installed in your machine...
lets try for telnet login...
make a file by name telnetme
$vi telnetme
#!/usr/bin/expect
eval spawn telnet 10.0.0.27
set timeout 30
expect login:
send "
expect password:
send "
interact
Now set execute permission to the script and copy it to any of the directories in your PATH variable
For SSH Login theres a little change...
I am here making a file by nane sshme
$vi sshme
#!/usr/bin/expect
eval spawn ssh 10.0.0.27
set timeout 30
expect password:
send "
interact
NOTE: change the italicised strings with appropriate username and password
It is recommended that you give read permission only to the user who is using this script , otherwise all users could read the plain password entered
PS: Please extend the features of expect if someone knows it...
Friday, October 26, 2007
#mv cds DVD
Hollaaaaaaaa....
Yesterday i was trying to make a DVD out of my 5 RHEL 5.0 CDs. During the process i ended up losing my two plain DVD's.
But the most interesting thing is that i finally found the solution :). And i thought i must publish it cause i dont want
any other person to have the same difficulties i encountered.
alrights, lets get started...
I am creating a directory to copy all the RHEL 5.0 CDs
#mkdir /tmp/RHEL5_DVD
Loop mount the individual ISO images to any directory
#mount -o loop /path/to/iso1.iso /mnt
then copy the first CD contents to /tmp/RHEL5_DVD
#cd /mnt
#cp -r * /tmp/RHEL5_DVD
make sure you copied the .discinfo file also
#cp .discinfo /tmp/RHEL5_DVD
now unmount /mnt and mount the second iso.
#mount -o loop /path/to/iso2.iso /mnt
then copy all the rpm files inside /mnt/Server to /tmp/RHEL5_DVD/Server
#cp /mnt/Server/*.rpm /tmp/RHEL5_DVD/Server
we need to append the contents of the TRANS.TBL file found inside /mnt/Server to that inside /tmp/RHEL5_DVD/Server
#cat /mnt/Server/TRANS.TBL >> /tmp/RHEL5_DVD/Server/TRANS.TBL
NOTE:We are going to make a single TRANS.TBL file with all the TRANS.TBL files inside every isos.
Do the same thing for third, fourth and fifth iso files.
while copying the fifth iso file's contents, you should copy the rpm files under /mnt/VT/ to /tmp/RHEL5_DVD/VT
and append the TRANS.TBL file found under /mnt/Server/VT to /tmp/RHEL5_DVD/VT/TRANS.TBL
Now edit the .discinfo file inside the directory /tmp/RHEL5_DVD
to change the fourth line from 1 to 1,2,3,4,5
NOTE: If you miss any cd number, then installation would prompt you to insert that cd.
So you must include all the cd numbers correctly!
Now we must create the ISO image of the /tmp/RHEL5_DVD directory.
Free some 3 GB space in your HDD as the entire build would make an iso file of size
no less than 2.6 GB.
#cd /tmp/RHEL5_DVD
I assume you are creating the iso image inside /DVD directory.
#mkisofs -o /DVD/rhel5dvd.iso -b isolinux/isolinux.bin -c isolinux/boot.cat
-no-emul-boot -boot-load-size 4 -boot-info-table -J -r .
NOTE the . at the end of the previous command which specifies the current directory.
the -b flag to mkisofs command specifies the path and filename of the boot
image to be used when making the bootable iso.
the -c flag specifies the path and filename of the boot
catalog.
Now to burn the DVD, use the growisofs command.
#growisofs -dvd-compat -Z /dev/dvdwriter-hdc=/DVD/rhel5dvd.iso
NOTE: dd (disk duplicator) command can also be used to burn the iso image.
#dd if=/DVD/rhel5dvd.iso of=/dev/dvdwriter-hdc obs=32k seek=0
(plain DVDs and DVD burners are not that cheap here in my locality.. :D)
consult the man page of dd for more information.
make changes to the DVD device. I have plugged the DVD as secondary master in
my desktop PC.
the = sign used in the growisofs command finalized the DVD disc.
linuxly yours....
~mj0vy
Yesterday i was trying to make a DVD out of my 5 RHEL 5.0 CDs. During the process i ended up losing my two plain DVD's.
But the most interesting thing is that i finally found the solution :). And i thought i must publish it cause i dont want
any other person to have the same difficulties i encountered.
alrights, lets get started...
I am creating a directory to copy all the RHEL 5.0 CDs
#mkdir /tmp/RHEL5_DVD
Loop mount the individual ISO images to any directory
#mount -o loop /path/to/iso1.iso /mnt
then copy the first CD contents to /tmp/RHEL5_DVD
#cd /mnt
#cp -r * /tmp/RHEL5_DVD
make sure you copied the .discinfo file also
#cp .discinfo /tmp/RHEL5_DVD
now unmount /mnt and mount the second iso.
#mount -o loop /path/to/iso2.iso /mnt
then copy all the rpm files inside /mnt/Server to /tmp/RHEL5_DVD/Server
#cp /mnt/Server/*.rpm /tmp/RHEL5_DVD/Server
we need to append the contents of the TRANS.TBL file found inside /mnt/Server to that inside /tmp/RHEL5_DVD/Server
#cat /mnt/Server/TRANS.TBL >> /tmp/RHEL5_DVD/Server/TRANS.TBL
NOTE:We are going to make a single TRANS.TBL file with all the TRANS.TBL files inside every isos.
Do the same thing for third, fourth and fifth iso files.
while copying the fifth iso file's contents, you should copy the rpm files under /mnt/VT/ to /tmp/RHEL5_DVD/VT
and append the TRANS.TBL file found under /mnt/Server/VT to /tmp/RHEL5_DVD/VT/TRANS.TBL
Now edit the .discinfo file inside the directory /tmp/RHEL5_DVD
to change the fourth line from 1 to 1,2,3,4,5
NOTE: If you miss any cd number, then installation would prompt you to insert that cd.
So you must include all the cd numbers correctly!
Now we must create the ISO image of the /tmp/RHEL5_DVD directory.
Free some 3 GB space in your HDD as the entire build would make an iso file of size
no less than 2.6 GB.
#cd /tmp/RHEL5_DVD
I assume you are creating the iso image inside /DVD directory.
#mkisofs -o /DVD/rhel5dvd.iso -b isolinux/isolinux.bin -c isolinux/boot.cat
-no-emul-boot -boot-load-size 4 -boot-info-table -J -r .
NOTE the . at the end of the previous command which specifies the current directory.
the -b flag to mkisofs command specifies the path and filename of the boot
image to be used when making the bootable iso.
the -c flag specifies the path and filename of the boot
catalog.
Now to burn the DVD, use the growisofs command.
#growisofs -dvd-compat -Z /dev/dvdwriter-hdc=/DVD/rhel5dvd.iso
NOTE: dd (disk duplicator) command can also be used to burn the iso image.
#dd if=/DVD/rhel5dvd.iso of=/dev/dvdwriter-hdc obs=32k seek=0
(plain DVDs and DVD burners are not that cheap here in my locality.. :D)
consult the man page of dd for more information.
make changes to the DVD device. I have plugged the DVD as secondary master in
my desktop PC.
the = sign used in the growisofs command finalized the DVD disc.
linuxly yours....
~mj0vy
Sunday, September 9, 2007
Encrypted File Systems
The need to encrypt filesystems is to make ur data more secure and safe.
The whole steps include
1) Creating a partition with the fdisk utility ( pre-requisite :-( )
2) Selecting a cipher.
3) Setting up a loop device using the losetup command.
4) Detaching the loop back device
5) Mouting the parition
alright... lets get started..!
let me assume u have created the partition /dev/hda7
first of all we need to shred the partition
#shred -n 1 /dev/hda7
this command would overwrite /dev/hda7 only once!
-OR-
we can use the dd command to overwrite the device..
#dd if=/dev/urandom of=/dev/hda7 bs=1M
Now we need to select a cipher for the encyption
u can list the available ciphers by cat /proc/crypto
here i am using the serpent cipher
make sure u have got the serpent cipher modules inbuilt in ur kernel!
otherwise try
#modprobe serpent
#modprobe cryptoloop ( to setup the loop device described in the next step )
the next step is to setup a loop device using the losetup command.
#losetup -e serpent /dev/loop0 /dev/hda7
It prompts u for a passphrase. DONOT forget the passphrase as its not easy to change
the passphrase as it is hashed to create the encryption key.
Now create a filesystem on the loopback device and mount it.
#mke2fs -j /dev/loop0
#mkdir /cryptfs
#mount -t ext3 /dev/loop0 /cryptfs
once we have mounted the partition, we can then detach the
loop back device frm the partition.
#umount /cryptfs
#losetup -d /dev/loop0
Now mount the partition,
#mount -o encryption=serpent /dev/hda7 /cryptfs
the passphrase which we have given during the loop device setup will be asked
and u need to enter it correctly to mount the device.
The whole steps include
1) Creating a partition with the fdisk utility ( pre-requisite :-( )
2) Selecting a cipher.
3) Setting up a loop device using the losetup command.
4) Detaching the loop back device
5) Mouting the parition
alright... lets get started..!
let me assume u have created the partition /dev/hda7
first of all we need to shred the partition
#shred -n 1 /dev/hda7
this command would overwrite /dev/hda7 only once!
-OR-
we can use the dd command to overwrite the device..
#dd if=/dev/urandom of=/dev/hda7 bs=1M
Now we need to select a cipher for the encyption
u can list the available ciphers by cat /proc/crypto
here i am using the serpent cipher
make sure u have got the serpent cipher modules inbuilt in ur kernel!
otherwise try
#modprobe serpent
#modprobe cryptoloop ( to setup the loop device described in the next step )
the next step is to setup a loop device using the losetup command.
#losetup -e serpent /dev/loop0 /dev/hda7
It prompts u for a passphrase. DONOT forget the passphrase as its not easy to change
the passphrase as it is hashed to create the encryption key.
Now create a filesystem on the loopback device and mount it.
#mke2fs -j /dev/loop0
#mkdir /cryptfs
#mount -t ext3 /dev/loop0 /cryptfs
once we have mounted the partition, we can then detach the
loop back device frm the partition.
#umount /cryptfs
#losetup -d /dev/loop0
Now mount the partition,
#mount -o encryption=serpent /dev/hda7 /cryptfs
the passphrase which we have given during the loop device setup will be asked
and u need to enter it correctly to mount the device.
Saturday, September 8, 2007
COPY FROM LINUX TO M$ and vice-versa
SAMBA:
------
Samba acts as a fileserver for windows/linux using the SMB protocol
(Server Message Block), SMB is sometimes referred to as CIFS (Common Internet
File System).
Server Side:
------------
The directory to be shared from a linux server has to be given a sharename.
Clients access server's directory by referring to this sharename.
We can have user level access list and host level access list in samba.
Those users to whom server is granting access shuld be a unix server user
as well, and those users shuld be converted to samba users by giving them a
seperate samba password also. The samba users password database is located
inside /etc/samba directory in the name smbpasswd.
ie, /etc/samba/smbpasswd
Eg:
There is a directory in the server named /backups.
These directory needs to be shared to clients which use windows OS.
First of all we need to give /backups a sharename, by which the windows clients
access our /backups. Let it be UNIXBAKUP.
We are planning to give access to this share only for windows clients
192.168.0.3 and 192.168.0.2 only.
More over, they shuld be granted access if and only if they login as users
jack or jane.
Open the samba configuration file using an editor,
-------------------------------------
#vi /etc/samba/smb.conf
[UNIXBAKUP]
comment = Share for windows clients
path = /backups
valid users = jane jack
hosts allow = 192.168.0.3 192.168.0.2
writeable = yes
create mask = 0765
-------------------------------------
Now we need to add the allowed users
#useradd jane
#useradd jack
#passwd -l jack ; passwd -l jane
this is done to lock their unix password
Now we need to convert these unix users to samba users.
#smbpasswd -a jane
now u will be prompted for a password.
this step only adds the user to the samba password database.
we need to allow this user to use our samba server.
#smbpasswd -e jane
same way add the user jack also.
now we need to give permission to users jane and jack the write permission in
our share
#chmod 777 /backups
#/etc/init.d/smb start
#chkconfig smb on
to make our samba server persistent across reboots.
now we can test whether our samba configuration is correct or not with the
command testparm
#testparm
if any errors are there it will be reported.
--------------------------------------------
Client Side: (in 192.168.0.2 and 192.168.0.3)
------------
#smbclient //sambaserveraddress/sharename -U username
here
#smbclient //192.168.0.4/UNIXBAKUP -U jane/jack
enter the password
u will be put into a samba shell
smb: \>
now u are inside 192.168.0.4's /backups directory
frm here if u want to get some files, frm with in samba shell issue
smb: \>mget filename
file is now copied frm samba server to the client directory frm where we logged into the samba server.
instead if u want to put some files frm the folder where u logged into the
samba server, issue
smb: \>mput file-frm-the-client
smb: \>ls
you will be listed with the file u have just copied frm client to the
samba server.
Using GUI:
------------
Take run in KDE/Gnome and try
smb://sambaserverip
then u will be prompted for the samba username and password!
In M$ Windows u can access the Linux samba share by taking Start>Run and issuing
\\sambaserverip
upon opening any directory u will be asked the samba username and password...!
------
Samba acts as a fileserver for windows/linux using the SMB protocol
(Server Message Block), SMB is sometimes referred to as CIFS (Common Internet
File System).
Server Side:
------------
The directory to be shared from a linux server has to be given a sharename.
Clients access server's directory by referring to this sharename.
We can have user level access list and host level access list in samba.
Those users to whom server is granting access shuld be a unix server user
as well, and those users shuld be converted to samba users by giving them a
seperate samba password also. The samba users password database is located
inside /etc/samba directory in the name smbpasswd.
ie, /etc/samba/smbpasswd
Eg:
There is a directory in the server named /backups.
These directory needs to be shared to clients which use windows OS.
First of all we need to give /backups a sharename, by which the windows clients
access our /backups. Let it be UNIXBAKUP.
We are planning to give access to this share only for windows clients
192.168.0.3 and 192.168.0.2 only.
More over, they shuld be granted access if and only if they login as users
jack or jane.
Open the samba configuration file using an editor,
-------------------------------------
#vi /etc/samba/smb.conf
[UNIXBAKUP]
comment = Share for windows clients
path = /backups
valid users = jane jack
hosts allow = 192.168.0.3 192.168.0.2
writeable = yes
create mask = 0765
-------------------------------------
Now we need to add the allowed users
#useradd jane
#useradd jack
#passwd -l jack ; passwd -l jane
this is done to lock their unix password
Now we need to convert these unix users to samba users.
#smbpasswd -a jane
now u will be prompted for a password.
this step only adds the user to the samba password database.
we need to allow this user to use our samba server.
#smbpasswd -e jane
same way add the user jack also.
now we need to give permission to users jane and jack the write permission in
our share
#chmod 777 /backups
#/etc/init.d/smb start
#chkconfig smb on
to make our samba server persistent across reboots.
now we can test whether our samba configuration is correct or not with the
command testparm
#testparm
if any errors are there it will be reported.
--------------------------------------------
Client Side: (in 192.168.0.2 and 192.168.0.3)
------------
#smbclient //
here
#smbclient //192.168.0.4/UNIXBAKUP -U jane/jack
enter the password
u will be put into a samba shell
smb: \>
now u are inside 192.168.0.4's /backups directory
frm here if u want to get some files, frm with in samba shell issue
smb: \>mget filename
file is now copied frm samba server to the client directory frm where we logged into the samba server.
instead if u want to put some files frm the folder where u logged into the
samba server, issue
smb: \>mput
smb: \>ls
you will be listed with the file u have just copied frm client to the
samba server.
Using GUI:
------------
Take run in KDE/Gnome and try
smb://sambaserverip
then u will be prompted for the samba username and password!
In M$ Windows u can access the Linux samba share by taking Start>Run and issuing
\\sambaserverip
upon opening any directory u will be asked the samba username and password...!
Manage Logical Volumes
LVM Creation:
-------------
Create a linux partition, make it a LVM by toggling the linux partitions id to
8e.
Convert it to a physical volume by issuing the command
#pvcreate devicename
Then, make the volume group in that physical volume,
#vgcreate vgname devicename
Then make logical volumes in the volume group,
#lvcreate -L sizeM -n lvname vgname
Make a linux filesystem in the logical volume,
#mkfs.ext3 /dev/vgname/lvname
This device is a softlink to the device /dev/mapper/vgname-lvname
Then mount that logical volume,
#mount /dev/vgname/lvname
LVM Resizing:
-------------
LVM format 2.0 is now implemented which supports online resizing of filesystems.
check the current size of the filesystem by 'df -h'
Extend the above created logical volume BY X MB,
#lvextend -L +XM /dev/vgname/lvname
we are doing it without unmounting the filesystem
Now to make the extension effective, issue
#resize2fs /dev/vgname/lvname
now recheck the filesystem size by 'df -h',
now the filesystem will be extended by X MB.
Now if u want to reduce the logical volume TO X MB,
u must first umount the device, online reducing of logical volumes cannot be done..!
#umount
then u need to scan the filesystem for integrity.
#e2fsck -f /dev/vgname/lvname
now resize the filesystem
#resize2fs /dev/vgname/lvname X MB
then reduce the volume with lvreduce and mount it..
#lvreduce -L XM /dev/vgname/lvname
#mount /dev/vgname/lvname
-------------
Create a linux partition, make it a LVM by toggling the linux partitions id to
8e.
Convert it to a physical volume by issuing the command
#pvcreate devicename
Then, make the volume group in that physical volume,
#vgcreate vgname
Then make logical volumes in the volume group,
#lvcreate -L size
Make a linux filesystem in the logical volume,
#mkfs.ext3 /dev/
This device is a softlink to the device /dev/mapper/vgname-lvname
Then mount that logical volume,
#mount /dev/
LVM Resizing:
-------------
LVM format 2.0 is now implemented which supports online resizing of filesystems.
check the current size of the filesystem by 'df -h'
Extend the above created logical volume BY X MB,
#lvextend -L +XM /dev/
we are doing it without unmounting the filesystem
Now to make the extension effective, issue
#resize2fs /dev/
now recheck the filesystem size by 'df -h',
now the filesystem will be extended by X MB.
Now if u want to reduce the logical volume TO X MB,
u must first umount the device, online reducing of logical volumes cannot be done..!
#umount
then u need to scan the filesystem for integrity.
#e2fsck -f /dev/vgname
now resize the filesystem
#resize2fs /dev/vgname
then reduce the volume with lvreduce and mount it..
#lvreduce -L XM /dev/vgname
#mount /dev/vgname
Wednesday, September 5, 2007
init-->xinetd
this is how we can convert the init based service ftp to an xinetd service..
1) First of all we need to make FTP not to listen on port 21 by making 'listen=NO' in
/etc/vsftpd/vsftpd.conf.
2) Then, make a file named ftp inside /etc/xinetd.d
the contents of /etc/xinetd.d/ftp should look like this
service ftp
{
disable = no
socket_type = stream
wait = no
user = root
server = /usr/sbin/vsftpd
server_args = /etc/vsftpd/vsftpd.conf
nice = 10
flags = IPv4
}
3) then restart the xinetd service by
#/etc/init.d/xinetd restart
#chkconfig xinetd on
now if u 'nmap localhost', u can see that the port 21 is now open...!
1) First of all we need to make FTP not to listen on port 21 by making 'listen=NO' in
/etc/vsftpd/vsftpd.conf.
2) Then, make a file named ftp inside /etc/xinetd.d
the contents of /etc/xinetd.d/ftp should look like this
service ftp
{
disable = no
socket_type = stream
wait = no
user = root
server = /usr/sbin/vsftpd
server_args = /etc/vsftpd/vsftpd.conf
nice = 10
flags = IPv4
}
3) then restart the xinetd service by
#/etc/init.d/xinetd restart
#chkconfig xinetd on
now if u 'nmap localhost', u can see that the port 21 is now open...!
Tuesday, September 4, 2007
Services - XINETD and INIT
Services in Linux:
------------------
Services in linux are classified into TWO.
XINETD and INIT based services.
XINETD is itself an INIT based service.
All INIT based services are invoked by the command,
#/etc/init.d/service start
XINETD services' configuration file resides in /etc/xinetd.d directory.
All the services are made persistent across reboots by
#chkconfig servicename on , for all init based services.
#chkconfig xinetd on , for all xinetd based services.
XINETD services: e(X)tended (I)(N)tern(E)(T) services (D)aemon
--------------------------------------------------------------
xinetd service is called a super server as it serves as the daemon for a number of seperate services.
For all the services which use xinetd, we need to start the xinetd daemon only. xinetd services' configuration files can be found at /etc/xinetd.d/servicename
All the xinetd services are having the same syntax facilitating the administration of xinetd services very easy.
Extensive logging and fine grained access control can be implemented with xinetd
Xinetd service forks process ids only when a client requests the service.
Only one process is necessary to invoke process ids for individual xinetd services, ie the xinetd super daemon itself.
Logging based on hostname are not supported in XINETD
INIT based services:
--------------------
INIT based services are having individual configuration files under
/etc/service/servicename.
Their starting scripts are placed under /etc/init.d/servicename.
Each individual services can be started by
#/etc/init.d/servicename start
and to sum up... the more the processes .. the lesser the performance of the machine..
so it is advisable to have more xinetd based services than init based ones..!
------------------
Services in linux are classified into TWO.
XINETD and INIT based services.
XINETD is itself an INIT based service.
All INIT based services are invoked by the command,
#/etc/init.d/
XINETD services' configuration file resides in /etc/xinetd.d directory.
All the services are made persistent across reboots by
#chkconfig servicename
#chkconfig xinetd on , for all xinetd based services.
XINETD services: e(X)tended (I)(N)tern(E)(T) services (D)aemon
--------------------------------------------------------------
xinetd service is called a super server as it serves as the daemon for a number of seperate services.
For all the services which use xinetd, we need to start the xinetd daemon only. xinetd services' configuration files can be found at /etc/xinetd.d/service
All the xinetd services are having the same syntax facilitating the administration of xinetd services very easy.
Extensive logging and fine grained access control can be implemented with xinetd
Xinetd service forks process ids only when a client requests the service.
Only one process is necessary to invoke process ids for individual xinetd services, ie the xinetd super daemon itself.
Logging based on hostname are not supported in XINETD
INIT based services:
--------------------
INIT based services are having individual configuration files under
/etc/
Their starting scripts are placed under /etc/init.d/
Each individual services can be started by
#/etc/init.d/
and to sum up... the more the processes .. the lesser the performance of the machine..
so it is advisable to have more xinetd based services than init based ones..!
Monday, September 3, 2007
INODES,LINKS
Inode Table:
All files in linux are having an inode number which is residing inside the inode table of a partition. For every partition there is an inode table, so an inode number will be unique for a partition, and thats the reason why we cannot hardlink between two partitions. Inode number contains a file's uid, gid, access time, modification time, change time and size of the file. inode number DOESNT hold a file's NAME. we can retrieve the contents of a file even if the file is deleted unless and until the inode number corresponding to that file is overwritten.
The inode number can be viewed with the -i switch with the 'ls' command..!
$ls -i filename
softlinks:
softlinks are similar to shortcuts in Microsoft Windows. softlinks' size is determined by the number of characters in the absolute path to the original file it is linking to. Softlinks are apparently having full permissions. Soft links are effective as we can link files among different partitions. If the orignal file is removed ( or renamed )the soft links become dead, meaning softlinks refer only to the NAME of the original file. Soft links will be having a different inode number frm the original file. Soft links cannot be touched (means... their timestamps cannot be updated).
hardlinks:
hardlinks are pointers to the inode number of a file. hardlink will be having the same inode number as that of the original file. The contents will be there in the hardlink if we delete the original file as hardlink points to the same inode number in the inode table. We cannot hardlink between two partitions. same way... we cannot hardlink a directory. if some updates are done in the original file, it is reflected to hardlinks also as the updates are done in the inode number. Hardlink is not at all an overhead as they are pointers to the same inode number.
All files in linux are having an inode number which is residing inside the inode table of a partition. For every partition there is an inode table, so an inode number will be unique for a partition, and thats the reason why we cannot hardlink between two partitions. Inode number contains a file's uid, gid, access time, modification time, change time and size of the file. inode number DOESNT hold a file's NAME. we can retrieve the contents of a file even if the file is deleted unless and until the inode number corresponding to that file is overwritten.
The inode number can be viewed with the -i switch with the 'ls' command..!
$ls -i filename
softlinks:
softlinks are similar to shortcuts in Microsoft Windows. softlinks' size is determined by the number of characters in the absolute path to the original file it is linking to. Softlinks are apparently having full permissions. Soft links are effective as we can link files among different partitions. If the orignal file is removed ( or renamed )the soft links become dead, meaning softlinks refer only to the NAME of the original file. Soft links will be having a different inode number frm the original file. Soft links cannot be touched (means... their timestamps cannot be updated).
hardlinks:
hardlinks are pointers to the inode number of a file. hardlink will be having the same inode number as that of the original file. The contents will be there in the hardlink if we delete the original file as hardlink points to the same inode number in the inode table. We cannot hardlink between two partitions. same way... we cannot hardlink a directory. if some updates are done in the original file, it is reflected to hardlinks also as the updates are done in the inode number. Hardlink is not at all an overhead as they are pointers to the same inode number.
Sunday, September 2, 2007
SSL - Concepts Simplified...!?!!!
Secure Socket Layer:
--------------------
The Secure Socket Layer protocol was first introduced by Netscape to ensure secure transations between
webservers and browsers. The protocol uses a third party Certificate Authority (CA) to identify the both end
of the transactions
SSL philosophy:
---------------
1. Client using some browser requests a secure page (https://www.gmail.com)
2. www.gmail.com sends its public key with its certificate
signed by (Thawte Consulting Pty Limited) (dated: 02/09/2007, 20:48)
3. Our browser checks that the certificate was issued by a trusted party (Thawte here), that the certificate is
still valid and the certificate is related to site we just contacted (www.gmail.com here).
4. The Browser then uses the public key send by www.gmail.com to encrypt some random symmetric
encryption key and sends it to www.gmail.com along with the encrypted URL requested as well as other
encrypted data.
5. www.gmail.com decrypts the encrypted symmetric key send by the browser (in step 4) with its private key and uses this
symmetric key to decrypt the URL and http data.
6. www.gmail.com sends back the requested html data encrypted with the symmetric encrytion key send by the
browser in step 4.
7. Our browser decrypts the http data and html document using symmetric key and displays the information.
With this symmetric key the further communication between www.gmail.com and our browser takes place.
Here asymmetric encryption machanism is taking place between browser and www.gmail.com.
Our browser encrypted some key with public key of www.gmail.com and www.gmail.com on recieval of
this encrypted key, decrypted it with its private key. This mechanisms works with public/private key pairs.
This way www.gmail.com sends its public key to every browser requesting its first page and SSL mechanism
undergoes like the above 7 steps.
--------------------
The Secure Socket Layer protocol was first introduced by Netscape to ensure secure transations between
webservers and browsers. The protocol uses a third party Certificate Authority (CA) to identify the both end
of the transactions
SSL philosophy:
---------------
1. Client using some browser requests a secure page (https://www.gmail.com)
2. www.gmail.com sends its public key with its certificate
signed by (Thawte Consulting Pty Limited) (dated: 02/09/2007, 20:48)
3. Our browser checks that the certificate was issued by a trusted party (Thawte here), that the certificate is
still valid and the certificate is related to site we just contacted (www.gmail.com here).
4. The Browser then uses the public key send by www.gmail.com to encrypt some random symmetric
encryption key and sends it to www.gmail.com along with the encrypted URL requested as well as other
encrypted data.
5. www.gmail.com decrypts the encrypted symmetric key send by the browser (in step 4) with its private key and uses this
symmetric key to decrypt the URL and http data.
6. www.gmail.com sends back the requested html data encrypted with the symmetric encrytion key send by the
browser in step 4.
7. Our browser decrypts the http data and html document using symmetric key and displays the information.
With this symmetric key the further communication between www.gmail.com and our browser takes place.
Here asymmetric encryption machanism is taking place between browser and www.gmail.com.
Our browser encrypted some key with public key of www.gmail.com and www.gmail.com on recieval of
this encrypted key, decrypted it with its private key. This mechanisms works with public/private key pairs.
This way www.gmail.com sends its public key to every browser requesting its first page and SSL mechanism
undergoes like the above 7 steps.
vsFTPd configuration in RHEL 5.0
FTP:
conf file: /etc/vsftpd/vsftpd.conf
Unlike SSH we are having two files to allow/deny users via FTP ( in SSH we did it in the main configuration file itself by AllowUsers/DenyUsers)
The main file for denial is /etc/vsftpd/ftpusers
The other file is /etc/vsftpd/user_list
But if we need to make our FTP check user_list file we need to say it in the main configuration file, like
userlist_enable=YES
If, userlist_enable=NO, ftp doesnt check user_list file
The behaviour of user_list depends upon the declaration inside the vsftpd.conf file
if its declared like,
userlist_deny=YES , those usernames inside user_list is denied even without prompting for a password
if its declared like,
userlist_deny=NO, those in user_list are ONLY allowed to login.
Whatever the behaviour of user_list, FTP searches for ftpusers file for users that are DENIED!
conf file: /etc/vsftpd/vsftpd.conf
Unlike SSH we are having two files to allow/deny users via FTP ( in SSH we did it in the main configuration file itself by AllowUsers/DenyUsers)
The main file for denial is /etc/vsftpd/ftpusers
The other file is /etc/vsftpd/user_list
But if we need to make our FTP check user_list file we need to say it in the main configuration file, like
userlist_enable=YES
If, userlist_enable=NO, ftp doesnt check user_list file
The behaviour of user_list depends upon the declaration inside the vsftpd.conf file
if its declared like,
userlist_deny=YES , those usernames inside user_list is denied even without prompting for a password
if its declared like,
userlist_deny=NO, those in user_list are ONLY allowed to login.
Whatever the behaviour of user_list, FTP searches for ftpusers file for users that are DENIED!
ipv4 to ipv6 and vice-versa...
its been quite a some time that i have started thinking abt switching to ipv6 frm ipv4.... and finally im into configuring an ipv6 dhcp server...
as i was not that good at ipv6... wat i did was to convert the ipv4 addresses to ipv6 using a kool sexy tool available with Red Hat Enterprise editions... 'ipv6calc'
and here it goes...
i need to conver the ipv4 address 172.24.0.7 to ipv6... lets do it now..
$ipv6calc --in ipv4addr 172.24.0.7 --action conv6to4 --out ipv6addr
it will output the ipv6 equivalent of 172.24.0.7
and it will be..
2002:ac18:7::
suppose u want to convert this ipv6 address back to ipv4...
here it goes...
$ipv6calc --in ipv6addr 2002:ac18:7:: --action conv6to4 --out ipv4addr
172.24.0.7
have happy conversions..! :d
~mj0vy
:wq
as i was not that good at ipv6... wat i did was to convert the ipv4 addresses to ipv6 using a kool sexy tool available with Red Hat Enterprise editions... 'ipv6calc'
and here it goes...
i need to conver the ipv4 address 172.24.0.7 to ipv6... lets do it now..
$ipv6calc --in ipv4addr 172.24.0.7 --action conv6to4 --out ipv6addr
it will output the ipv6 equivalent of 172.24.0.7
and it will be..
2002:ac18:7::
suppose u want to convert this ipv6 address back to ipv4...
here it goes...
$ipv6calc --in ipv6addr 2002:ac18:7:: --action conv6to4 --out ipv4addr
172.24.0.7
have happy conversions..! :d
~mj0vy
:wq
Sunday, May 6, 2007
me is serious now..
i wasnt able to log into blogger for quite a sometime ... finally fixed the problem... upgraded to firefox 2.0 and did some tweaking.. now i have foxmarks installed...
well.... today.. 6th of may 2007... me going to start a fresh linux session.... in desperate need to garner some advanced knowledge... will come with all in the blogs frm today onwards...
~mj0vy
:wq
well.... today.. 6th of may 2007... me going to start a fresh linux session.... in desperate need to garner some advanced knowledge... will come with all in the blogs frm today onwards...
~mj0vy
:wq
Tuesday, March 27, 2007
theres no patch for human stupidity...!?!!!
hemmmmmmmmmm,
something new is happening with my computer, bought a new DVD-RW and plugged in to my box...!?!!!
well... realized the fact that i could even dload the youtube videos. But still, a remorse that i cannot concentrate on wat i am learning. i need a constant source of motivation.....
it looks a bit jokin that everyday i end up telling abt my drawbacks... and i am not improving...!
will come up with more in the next edition...!
~mj0vy
:wq
something new is happening with my computer, bought a new DVD-RW and plugged in to my box...!?!!!
well... realized the fact that i could even dload the youtube videos. But still, a remorse that i cannot concentrate on wat i am learning. i need a constant source of motivation.....
it looks a bit jokin that everyday i end up telling abt my drawbacks... and i am not improving...!
will come up with more in the next edition...!
~mj0vy
:wq
Wednesday, March 7, 2007
Apache TOMCAT
just have a read abt Apache and TOMCAT and how they could work together to get good web contents.....
Apahe is a webserver. Tomcat is a java servlet container (J2EE compliant servlet container). Tomcat can independantely work as a webserver, it can be integrated with other webservers like Apache, IIS and NES servers. It facilitates a surface for java programs to run in co-operation with a webserver.
will come up with more soon.......
~mj0vy
:wq
Apahe is a webserver. Tomcat is a java servlet container (J2EE compliant servlet container). Tomcat can independantely work as a webserver, it can be integrated with other webservers like Apache, IIS and NES servers. It facilitates a surface for java programs to run in co-operation with a webserver.
will come up with more soon.......
~mj0vy
:wq
Sunday, February 25, 2007
undestanding what i understood was wrong...!?!!!
its quite amazing to understand that some files work just the opposite wat it was intended once we change the labels...
i was referring to the FTP configuration file, some days back only i got the real usage of the user_list file..
first of all we need to enable FTP service to read the user_list file
userlist_enable=YES
userlist_deny=YES # means that the users inside the vsftpd.user_list are denied, which is the default
userlist_deny=NO # means that the users inside the vsftpd.user_list are only allowed to login via FTP
anyways.. nice to understand that even at this later stage...!?!!!
~sreejith anujan....
i was referring to the FTP configuration file, some days back only i got the real usage of the user_list file..
first of all we need to enable FTP service to read the user_list file
userlist_enable=YES
userlist_deny=YES # means that the users inside the vsftpd.user_list are denied, which is the default
userlist_deny=NO # means that the users inside the vsftpd.user_list are only allowed to login via FTP
anyways.. nice to understand that even at this later stage...!?!!!
~sreejith anujan....
Wednesday, February 21, 2007
never mkfs an extended partition...!?!!!
i know im on the beginning stages of experience...
and one did happen yday when i tried to mkfs an extended parition... it did try making a filesystem but ended up showing a Segmentation Fault ... and when i reinstalled ...it was gone....
i made a 32 GB extended partition with no logical volumes in it.. it was made as such... and then i tried..
#mke2fs /dev/hda4
it did show me a message... something like its the full harddisk and am i sure abt the filesystem creation...something like that... i simply pressed the 'y' key and proceeded with the process...
and at last.. a Segmentation Fault...
anyways... put the first installation CD and performed an NFS installation...
shell scripting on the process..........
will be out with it soooon..........
~mj0vy
:wq
and one did happen yday when i tried to mkfs an extended parition... it did try making a filesystem but ended up showing a Segmentation Fault ... and when i reinstalled ...it was gone....
i made a 32 GB extended partition with no logical volumes in it.. it was made as such... and then i tried..
#mke2fs /dev/hda4
it did show me a message... something like its the full harddisk and am i sure abt the filesystem creation...something like that... i simply pressed the 'y' key and proceeded with the process...
and at last.. a Segmentation Fault...
anyways... put the first installation CD and performed an NFS installation...
shell scripting on the process..........
will be out with it soooon..........
~mj0vy
:wq
Monday, February 19, 2007
dig mj0vy.blogspot.com
well...
configured my pc as a DNS server... leaving me with all kinds of confusions...
i made two zone files... mkfs.zone and reverse.zone for the domain mkfs.com
initially moved the named.local and localhost.zone in /var/named to reverse.zone and mkfs.zone respectievely... making them symlinks to the files inside /var/named/chroot/var/named
it didnt work out...
then i moved the files into /var/named/chroot/var/named and named them as such... reverse.zone and mkfs.zone... and it worked kool..
but.. i think /etc/named.conf fils specifies the zone files to be placed inside /var/named directory only.....
i cant understand myself wat exactly is happening....!!!
anyways... will come with the scripting references soon.............
~mj0vy
:wq
configured my pc as a DNS server... leaving me with all kinds of confusions...
i made two zone files... mkfs.zone and reverse.zone for the domain mkfs.com
initially moved the named.local and localhost.zone in /var/named to reverse.zone and mkfs.zone respectievely... making them symlinks to the files inside /var/named/chroot/var/named
it didnt work out...
then i moved the files into /var/named/chroot/var/named and named them as such... reverse.zone and mkfs.zone... and it worked kool..
but.. i think /etc/named.conf fils specifies the zone files to be placed inside /var/named directory only.....
i cant understand myself wat exactly is happening....!!!
anyways... will come with the scripting references soon.............
~mj0vy
:wq
sreejith chrooted
DNS atlast worked fine here in nascent...
did the same thing which i did last week before leaving to blore..
at times linux behaves strangely... indeed strange...
just copied the zone files to /var/named/chroot/var/named and made symlinks to them inside /var/named... exactly wat i did last week...
anyways..its working fine now... and one more thing.........
never use sendmail with IP.... always use hostnames... that wat i think now...
mail mj0vy@mkfs.tux.com
~mj0vy
:wq
did the same thing which i did last week before leaving to blore..
at times linux behaves strangely... indeed strange...
just copied the zone files to /var/named/chroot/var/named and made symlinks to them inside /var/named... exactly wat i did last week...
anyways..its working fine now... and one more thing.........
never use sendmail with IP.... always use hostnames... that wat i think now...
mail mj0vy@mkfs.tux.com
~mj0vy
:wq
Sunday, February 18, 2007
localhost localdomain
im back....
was at blore...
i know i am not homesick... rather i am trivandrum sick...or am i kerala sick?
blore sucks big time...
yeah u could kill time roaming around... but with the kinda traffic and polution rates... i felt like hell...
unless u are very much interested in female anatomy ...u will lose urself at blore...
and to the matter... im into blogging after a gap...
trying to reestablish as a perseverant student...
want to complete the basics of shell scripting...
will be starting a series on shell scripting frm tomorrow onwards... its just a starting..... everything needs a start... no????
~mj0vy
was at blore...
i know i am not homesick... rather i am trivandrum sick...or am i kerala sick?
blore sucks big time...
yeah u could kill time roaming around... but with the kinda traffic and polution rates... i felt like hell...
unless u are very much interested in female anatomy ...u will lose urself at blore...
and to the matter... im into blogging after a gap...
trying to reestablish as a perseverant student...
want to complete the basics of shell scripting...
will be starting a series on shell scripting frm tomorrow onwards... its just a starting..... everything needs a start... no????
~mj0vy
Subscribe to:
Posts (Atom)