Copyright © 2007-2008 Osamu Aoki
This book is free; you may redistribute it and/or modify it under the terms of the GNU General Public License of any version compliant to the Debian Free Software Guidelines (DFSG).
Abstract
This Debian Reference (v2) (2009-01-17 17:51:59 UTC) is intended to provide a broad overview of the Debian system as a post-installation user's guide. It covers many aspects of system administration through shell-command examples for non-developers.
Table of Contents
List of Tables
This Debian Reference (version 2) (2009-01-17 17:51:59 UTC) is intended to provide a broad overview of Debian system administration as a post-installation user guide.
The target reader is someone who is willing to learn shell scripts but who is not ready to read all the C sources to figure out how the GNU/Linux system works.
All warranties are disclaimed. All trademarks are property of their respective trademark owners.
The Debian system itself is a moving target. This makes its documentation difficult to be current and correct. Although the current unstable version of Debian system was used as the basis for writing this, some contents may be already outdated by the time you read this.
Please treat this document as the secondary reference. This document does not replace any authoritative guides. The author and contributors do not take responsibility for consequences of errors, omissions or ambiguity in this document.
The Debian Project is an association of individuals who have made common cause to create a free operating system. It's distribution is characterized by:
Commitment to the software freedom: Debian Social Contract and Debian Free Software Guidelines (DFSG).
Internet based distributed volunteer effort: http://www.debian.org
Large number of pre-compiled high quality softwares.
Focus on stability and security with easy access to the security updates.
Focus on smooth upgrade to latest softwares with unstable and testing archives.
Large number of supported hardware architectures.
Free Software pieces in Debian come from GNU, Linux, BSD, X, Berkeley DB, ISC, Apache, Ghostscript, Common Unix Printing System , Samba, GNOME, KDE, Mozilla, OpenOffice.org, Vim, TeX, LaTeX, DocBook, Perl, Python, Tcl, Java, Ruby, PHP, MySQL and many more independent free software projects. Debian integrates this diversity of Free Software into one system.
Following guiding rules were followed while compiling this document:
don't explain in details what is well documented elsewhere (in the judgment of the author)
Provide overview and skip corner cases (Big Picture)
Keep It Short and Simple. (KISS)
Focus on non-GUI tools and consoles. (Use shell examples)
Do not reinvent the wheel. (Use pointers to the existing references)
Be objective. (Use popcon etc.)
I tried to elucidate hierarchical aspects and lower levels of the system.
You are required to seek help from (in approximate order of importance, starting with the most important sources):
the Debian site at http://www.debian.org for the general information,
the documentation under the /usr/share/doc/<package_name>
directory,
the Unix style manpage: "dpkg -L <package_name> |grep '/man/man.*/'
",
the GNU style info page: "dpkg -L <package_name> |grep '/info/'
",
the bug report: http://bugs.debian.org/<package_name>,
the Debian Wiki at http://wiki.debian.org/ for the moving and specific topics,
the HOWTOs from The Linux Documentation Project (TLDP) at http://tldp.org/ ,
the Single UNIX Specification from the Open Group's The UNIX System Home Page at http://www.unix.org/ , and
the free encyclopedia from Wikipedia at http://wikipedia.org/.
Note | |
---|---|
For detailed documentation, you may need to install the corresponding documentation package named with " |
This document refers to some command names followed by the number in parenthesis , such as bash
(1). This means that you are encouraged to obtain information from the manpage by typing the following on the shell command prompt:
$ man 1 bash
This document provides information through the following simplified presentation style with bash
(1) shell command examples and bullets:
# <command in root account> $ <command in user account>
<description of action>
These shell prompts distinguish account used and correspond to PS1='\$'
and PS2=' '
environment variables. These values are chosen for the sake of readability of this document and are not typical on actual installed system.
Note | |
---|---|
See the meaning of the |
The popcon data was presented as the objective measure for the popularity of each package. It was downloaded on 2009-01-18 and contains the total submission of 79097 reports over 91823 binary packages and 20 architectures.
Note | |
---|---|
Please note that the amd64 unstable archive contains only 24396 packages currently. The popcon data contains reports from many old system installations. |
The popcon number preceded with "V:" for "votes" is calculated by 100 * (the popcon submissions for the package executed recently on the PC)/(the total popcon submissions).
The popcon number preceded with "I:" for "installs" is calculated by 100 * (the popcon submissions for the package installed on the PC)/(the total popcon submissions).
Note | |
---|---|
The popcon figures should not be considered as absolute measures of the importance of packages. There are many factors which can skew statistics. For example, some system participating popcon may have mounted directories such as |
The package size data was also presented as the objective measure for each package. It is based on the "Installed-Size:" reported by "apt-cache show
" command (currently on amd64 architecture for the unstable
release). The reported size is in KB (unit for 1024 bytes).
Note | |
---|---|
A package with a small numerical package size may indicate that the package in the |
Please file bug reports on "debian-reference" package using reportbug
(1) if you find any issues. For simple spell errors and grammar corrections, you may alternatively edit the source text available as Debian Reference wiki page at http://wiki.debian.org/DebianReference and tell me to update the document.
Here are some interesting quotes from the Debian mailing list which may help enlighten new users:
"This is Unix. It gives you enough rope to hang yourself." --- Miquel van Smoorenburg <miquels at cistron.nl>
"Unix IS user friendly... It's just selective about who its friends are." --- Tollef Fog Heen <tollef at add.no>
I think learning a computer system is like learning a new foreign language. Although tutorial books and documentation are helpful, you have to practice it yourself. In order to help you get started smoothly, I will elaborate a few basic points.
The powerful design of Debian GNU/Linux comes from the Unix operating system, i.e., a multiuser, multitasking operating system. You must learn to take advantage of the power of these features and the similarities between Unix and GNU/Linux.
Don't shy away from Unix oriented texts and don't rely solely on GNU/Linux texts, as this will rob you of much useful information.
"Rute User's Tutorial and Exposition", in the Debian non-free archive as rutebook
package (popcon: I:0.2), provides a good online resource to the generic system administration.
Note | |
---|---|
If you have been using any Unix-like system for a while with command line tools, you probably know everything I explain here. Please use this as a reality check and refresher. |
Upon starting the system, you are presented with the character based login screen if you did not install X Window System with the display manager such as gdm
. Suppose your hostname is foo
, the login prompt looks like:
foo login:
If you did install a GUI environment such as Gnome of KDE, then you can get to a prompt by Ctrl-Alt-F1, and you can return to the GUI screen via Alt-F7 (see Virtual Consoles below for more information).
Following what you selected during the installation process, you type your username, e.g. penguin
, and press the Enter-key, then type your password and press the Enter-key again.
Note | |
---|---|
Following the Unix tradition, the username and password of the Debian system are case sensitive. The username is usually chosen only from the lowercase. |
Now you are in the shell. The shell interprets your commands. The system starts with the greeting message stored in /etc/motd
(Message Of The Day) and with the command prompt as:
Debian GNU/Linux lenny/sid foo tty1 foo login: penguin Password: Last login: Sun Apr 22 09:29:34 2007 on tty1 Linux snoopy 2.6.20-1-amd64 #1 SMP Sun Apr 15 20:25:49 UTC 2007 x86_64 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. foo:~$
Here, the main part of the greeting message can be customized by editing the /etc/motd.tail
file. The first line is generated from the system information using "uname -snrvm
".
If you installed X Window System with a display manager such as Gnome's gdm
by selecting "Desktop environment" task during the installation, you will be presented with the graphical login screen upon starting your system. You type your username and your password to login to the non-privileged user account. Use tab to navigate between username and password, or use the mouse and primary click.
You can gain the shell prompt under X by starting a x-terminal-emulator
program such as gnome-terminal
, rxvt
or xterm
. Under the Gnome Desktop environment, clicking "Applications" -> "Accessories" -> "Terminal" does the trick.
You can also see the section below Section 2.1.6, “Virtual consoles”.
Under some other Desktop systems (like fluxbox
), there may be no obvious starting point for the menu. If this happens, just try (right) clicking the center of the screen and hope for a menu to pop-up.
The root account is also called superuser or privileged user. From this account, you can perform the following system administration activities:
read, write, and remove any files on the system irrespective of their file permissions
set file ownership and permission of any files on the system
set the password of any non-privileged users on the system
login to any accounts without their passwords
This unlimited power of root account requires you to be considerate and responsible when using it.
Note | |
---|---|
The file permission of the file (including hardware devices such as CD-ROM etc. which are just another file for the Debian system) may render them unusable or inaccessible by non-root users. Although the use of root account is a quick way to test this kind of situation, the resolution of this situation should be done through proper setting of the access permission and the group. |
Warning | |
---|---|
Never share the root password with others. |
Here are a few basic methods to gain the root shell prompt by using the root password:
At the character based login prompt, you simply type root
.
Under the Gnome Desktop environment, click "Applications" -> "Accessories" -> "Root Terminal".
From any user shell prompt, type "su -l
". (This does not preserve the environment of the current user)
From any user shell prompt, type "su
". (This preserves most of the environment of the current user)
When your desktop menu does not start GUI system administration tools automatically with the appropriate privilege, you can start them from the root shell prompt of the X terminal emulator, such as gnome-terminal
, rxvt
, or xterm
. See Section 2.1.4, “The root shell prompt”.
Warning | |
---|---|
Never start the X server under the root account by typing in |
Warning | |
---|---|
Never run untrusted remote GUI program under X window when critical information is displayed since it may eavesdrop your X screen. |
In the default Debian system, there are six switchable VT100-like character consoles available to start the command shell directly on the Linux host. Unless you are in a GUI environment, you can switch between the virtual consoles by pressing the Left-Alt-key
and one of the F1
--F6
keys simultaneously. Each character console allows independent login to the account and offers the multiuser environment. This multiuser environment is a great Unix feature, and very addictive.
If you are under the X Window System, you gain access to the character console 1 by pressing Ctrl-Alt-F1
key, i.e., the left-Ctrl-key
, the left-Alt-key
, and the F1-key
are pressed together. You can get back to the X Window System, normally running on the virtual console 7, by pressing Alt-F7
.
You can alternatively change to another virtual console, e.g. to the console 1, by the command:
# chvt 1
You type Ctrl-D
, i.e., the left-Ctrl-key
and the d-key
pressed together, at the command prompt to close the shell activity. If you are at the character console, you will return to the login prompt with this. Even though these control characters are referred as "control D" with the upper case, you do not need to press the Shift-key. The short hand expression, ^D
, is also used for Ctrl-D
. Alternately, you can type "exit".
If you are at x-terminal-emulator
, you can close x-terminal-emulator
window with this.
Just like any other modern OS where the file operation involves caching data in memory for improved performance, the Debian system needs the proper shutdown procedure before power can safely be turned off. This is to maintain the integrity of files, by forcing all changes in memory to be written to disk. If the software power control is available, the shutdown procedure automatically turns off power of the system. (Otherwise, you may have to press power button for few seconds after the shutdown procedure.)
Under the normal multiuser mode, use following from the root command prompt to shutdown the system:
# shutdown -h now
Under the single-user mode, use following from the root command prompt to shutdown the system:
# poweroff -i -f
Alternatively, you may type Ctrl-Alt-Delete
(The left-Ctrl-key
, the left-Alt-Key
, and the Delete
are pressed together) to shutdown if /etc/inittab
contains "ca:12345:ctrlaltdel:/sbin/shutdown -t1 -a -h now
" in it. See manpage for inittab
(5) for details.
When the screen goes berserk after doing some funny things such as "cat <some-binary-file>
", type "reset
" at the command prompt. You may not be able to see the command echoed as you type. You may also issue "clear
" to clean up the screen.
Although even the minimal installation of the Debian system without any desktop environment tasks provides the basic Unix functionality, it is a good idea to install few additional commandline and curses based character terminal packages such as mc
and vim
with aptitude
for beginners to get started. From the shell prompt as root:
# aptitude update ... # aptitude install mc vim sudo ...
If you already had these packages installed, nothing will be installed.
Table 2.1. List of interesting text-mode program packages.
package |
popcon |
size |
description |
---|---|---|---|
|
V:10, I:25 |
6328 |
A text-mode full-screen file manager |
|
V:12, I:29 |
1736 |
Unix text editor Vi IMproved, a programmers text editor (standard version) |
|
V:16, I:89 |
828 |
Unix text editor Vi IMproved, a programmers text editor (compact version) |
|
V:4, I:9 |
8176 |
GNU project Emacs, the Lisp based extensible text editor (version 21) |
|
V:2, I:4 |
10992 |
GNU project Emacs, the Lisp based extensible text editor (version 22) |
|
V:20, I:85 |
1968 |
Text-mode WWW browsers |
|
V:3, I:5 |
564 |
The Unix style cut-and-paste on the text console (daemon) |
It may be a good idea to read some informative documentations.
Table 2.2. List of informative documentation packages.
package |
popcon |
size |
description |
---|---|---|---|
|
I:84 |
376 |
Debian Project documentation, (Debian FAQ) and other documents |
|
I:3 |
2732 |
Debian Policy Manual and related documents |
|
I:1.4 |
1308 |
Guidelines and information for Debian developers |
|
I:1.0 |
644 |
Debian New Maintainers' Guide |
|
I:0.4 |
2544 |
History of the Debian Project |
|
I:20 |
1190 |
Debian FAQ |
|
I:83 |
8616 |
Linux HOWTOs and FAQ (text) |
|
I:1.2 |
62564 |
Linux HOWTOs and FAQ (html) |
|
I:0.4 |
964 |
The Linux System Administrators' Guide |
|
I:0.2 |
8264 |
Linux: Rute User's Tutorial and Exposition (non-free) |
You can install some of these packages by issuing the following command from the root shell prompt:
# aptitude install package_name
If you do not want to use your main user account for the following training activities, you can create a training user account, e.g. fish
. Type at root shell prompt:
# adduser fish
answer all the questions
This will create a new account named as fish
. After your practice, you can remove this user account and its home directory by:
# deluser --remove-home fish
For the typical single user workstation such as the desktop Debian system on the laptop PC, it is common to deploy simple configuration of sudo
(8) as follows to let the non-privileged user, e.g. penguin
, to gain administrative privilege just with his user password (not with the root password).
# echo "penguin ALL=(ALL) ALL" >> /etc/sudoers
Since the sudo
(8) command normally use normal user's environment variables to execute commands and normal user's "$PATH" variable is set to "/usr/local/bin:/usr/bin:/bin:/usr/games
" by the system default, you should also adjust "$PATH" variable as:
$ echo 'PATH=$PATH:/usr/sbin:/sbin' >> ~/.bashrc
This trick should only be used for the single user workstation which you administer and where you are the only user.
Warning | |
---|---|
Do not set up accounts of regular users on multiuser workstation like this because it would be very bad for system security. |
Caution | |
---|---|
The password and the account of the |
Caution | |
---|---|
Administrative privilege in this context belongs to someone authorized to perform the system administration task on the workstation. Never give some manager in the Admin department of your company or your boss such privilege unless they are authorized and capable. |
Note | |
---|---|
For providing access privilege to limited devices and limited files, you should consider to use group to provide limited access instead of using the |
Note | |
---|---|
With more thoughtful and careful configuration, the |
Now you are ready to play with the Debian system without risks as long as you use the non-privileged user account.
This is because the Debian system is, even after the default installation, configured with the proper file permissions which prevent non-privileged users from damaging the system. Of course, there may still be some holes which can be exploited but those who worry about these issues should not be reading this section but should be reading Securing Debian Manual.
We will review basic Unix filesystem theory first. Then we will learn the Debian system with the easy way using Midnight Commander (MC) and with the proper Unix-like ways.
In GNU/Linux and other Unix-like operating systems, files are organized into directories. All files and directories are arranged in one big tree, the file hierarchy, rooted at /
. It's called a tree because if you draw the file system, it looks like a tree (upside down).
These files and directories can be spread out over several devices. The mount
(8) command serves to attach the file system found on some device to the big file tree. Conversely, the umount
(8) command will detach it again. On recent Linux kernels, mount
(8) operation can bind part of the file hierarchy somewhere else or can mount filesystem as shared, private, slave, or unbindable. Supported mount options for each filesystem are available in /share/doc/linux-doc-2.6.*/Documentation/filesystems/
.
Directories on Unix systems are called folders on some other systems. Please also note that there is no concept for drive such as A:
on any Unix system. There is one file system, and everything is included. This is a huge advantage compared to Windows, so consider yourself lucky.
Here are Unix file basics:
Filenames are case sensitive. That is, MYFILE
and MyFile
are different files.
The root directory is referred to as simply /
. Don't confuse this with the root user or the home directory for the root user: /root
. Note that both entities are commonly referred to as "root". The context of the usage should make it clear which is meant.
Every directory has a name which can contain any letters or symbols except /
. The root directory is an exception; its name is /
(pronounced "slash" or "the root directory") and it cannot be renamed.
Each file or directory is designated by a fully-qualified filename, absolute filename, or path, giving the sequence of directories which must be passed through to reach it. The three terms are synonymous.
All fully-qualified filenames begin with the /
directory, and there's a /
between each directory or file in the filename. The first /
is the top level directory, and the other /
's separate successive subdirectories, until we reach the last entry which is the name of the actual file. The words used here can be confusing. Take the following fully-qualified filename as an example: /usr/share/keytables/us.map.gz
. However, people will also refer to its basename us.map.gz
alone as a filename.
The root directory has a number of branches, such as /etc/
and /usr/
. These subdirectories in turn branch into still more subdirectories, such as /etc/init.d/
and /usr/local/
. The whole thing viewed collectively is called the directory tree. You can think of an absolute filename as a route from the base of the tree (/
) to the end of some branch (a file). You will also hear people talk about the directory tree as if it were a family tree: thus subdirectories have parents, and a path shows the complete ancestry of a file. There are also relative paths that begin somewhere other than the root directory. You should remember that the directory ../
refers to the parent directory. This also applies to other directory like structures, such as data structures or other tree hierarchical organized entities.
There's no special directory path name component that corresponds to a physical device, such as your hard disk. This differs from RT-11, CP/M, OpenVMS, MS-DOS, AmigaOS, and Microsoft Windows, where the path contains a device name such as C:\
. (However, directory entries do exist that refer to physical devices as a part of the normal filesystem. See Section 2.2.2, “Filesystem internals”.)
Note | |
---|---|
While you can use almost any letters or symbols in a file name, in practice it is a bad idea to do so. It is better to avoid any characters that often have special meanings on the command line, including spaces, tabs, newlines, and other special characters: |
Note | |
---|---|
The word path is used not only for fully-qualified filename as above but also for the command search path. The intended meaning is usually clear from the context. |
The detailed best practices for the file hierarchy are described in the Filesystem Hierarchy Standard (/usr/share/doc/debian-policy/fhs/fhs-2.3.txt.gz
and hier
(7)). You should remember the following facts as the starter:
Table 2.3. List of usage of key directories.
directory |
usage |
---|---|
|
A simple |
|
This is the place for the system wide configuration files. |
|
This is the place for the system log files. |
|
This is the directory which contains all the home directories for all non-privileged users. |
Following the Unix tradition, the Debian GNU/Linux system provides the filesystem under which physical data on harddisks and other storage devices reside, and the interaction with the hardware devices such as console screens and remote serial consoles are represented in an unified manner [under /dev/].
Each file, directory, named pipe (a way two programs can share data), or physical device on a Debian GNU/Linux system has a data structure called an inode which describes its associated attributes such as the user who owns it (owner), the group that it belongs to, the time last accessed, etc. If you are really interested, see /usr/include/linux/fs.h for the exact definition of struct inode
in the Debian GNU/Linux system. The idea of representing just about everything in the file system was a Unix innovation, and modern Linux kernels have developed this idea ever further. Now, even information about processes running in the computer can be found in the file system.
This abstract and unified representation of physical entities and internal processes is very powerful since this allows us to use the same command for the same kind of operation on many totally different devices. It is even possible to change the way the kernel works by writing data to special files that are linked to running processes.
All of your files could be on one disk --- or you could have 20 disks, some of them connected to a different computer elsewhere on the network. You can't tell just by looking at the directory tree, and nearly all commands work just the same way no matter what physical device(s) your files are really on. [This is a good thing. Trust us.] Of course, methods do exist whereby you can tell what devices map to which physical or network devices. mount
with no arguments will show how storage is mapped to physical or network devices.
The filesystem permissions of Unix-like system are defined for three categories of affected users:
the user who owns the file (u),
other users in the group which the file belongs to (g), and
all other users (o) also referred to as "world" and "everyone".
For the file, each corresponding permission allows:
read (r): to examine contents of the file,
write (w): to modify the file, and
execute (x): to run the file as a command.
For the directory, each corresponding permission allows:
read (r): to list contents of the directory,
write (w): to add or remove files in the directory, and
execute (x): to access files in the directory.
Here, execute permission on the directory means not only to allow reading of files in its directory but also to allow viewing their attributes, such as the size and the modification time.
To display permission information (and more) for files and directories, ls
(1) is used. When ls
invoked with the -l
option, it displays the following information in the order given:
the type of file (first character)
the file's access permissions (the next nine characters, consisting of three characters each for user, group, and other in this order)
the number of hard links to the file
the name of the user who owns the file
the name of the group which the file belongs to
the size of the file in characters (bytes)
the date and time of the file (mtime)
the name of the file.
Table 2.4. List of the first character of "ls -l" output
character |
meaning |
---|---|
|
normal file |
|
directory |
|
symlink |
|
character device node |
|
block device node |
|
named pipe |
|
socket |
To change the owner of the file, chown
(1) is used from the root account. To change the group of the file, chgrp
(1) is used from the file's owner or root account. To change file and directory access permissions, chmod
(1) is used from the file's owner or root account. Basic syntax to manipulate foo
file is:
# chown <newowner> foo # chgrp <newgroup> foo # chmod [ugoa][+-=][rwxXst][,...] foo
For example, in order to make a directory tree to be owned by a user foo
and shared by a group bar
, issue the following commands from the root account:
# cd /some/location/ # chown -R foo:bar . # chmod -R ug+rwX,o=rX .
There are three more special permission bits:
set user ID (s or S instead of user's x),
set group ID (s or S instead of group's x), and
sticky bit (t or T instead of other's x).
Here the output of ls -l
for these bits is capitalized if execution bits hidden by these outputs are unset.
Setting set user ID on an executable file allows a user to execute the executable file with the owner ID of the file (for example root). Similarly, setting set group ID on an executable file allows a user to execute the executable file with the group ID of the file (for example root). Because these settings can cause security risks, enabling them requires extra caution.
Setting set group ID on a directory enables the BSD-like file creation scheme where all files created in the directory belong to the group of the directory.
Setting the sticky bit on a directory prevents a file in the directory from being removed by a user who is not the owner of the file. In order to secure the contents of a file in world-writable directories such as /tmp
or in group-writable directories, one must not only set write permission off for the file but also set the sticky bit on the directory. Otherwise, the file can be removed and a new file can be created with the same name by any user who has write access to the directory.
Here are a few interesting examples of the file permissions.
$ ls -l /etc/passwd /etc/shadow /dev/ppp /usr/sbin/exim4 crw------- 1 root root 108, 0 2007-04-29 07:00 /dev/ppp -rw-r--r-- 1 root root 1427 2007-04-16 00:19 /etc/passwd -rw-r----- 1 root shadow 943 2007-04-16 00:19 /etc/shadow -rwsr-xr-x 1 root root 700056 2007-04-22 05:29 /usr/sbin/exim4 $ ls -ld /tmp /var/tmp /usr/local /var/mail /usr/src drwxrwxrwt 10 root root 4096 2007-04-29 07:59 /tmp drwxrwsr-x 10 root staff 4096 2007-03-24 18:48 /usr/local drwxrwsr-x 4 root src 4096 2007-04-27 00:31 /usr/src drwxrwsr-x 2 root mail 4096 2007-03-28 23:33 /var/mail drwxrwxrwt 2 root root 4096 2007-04-29 07:11 /var/tmp
There is an alternative numeric mode to describe file permissions in chmod
(1) commands. This numeric mode uses 3 to 4 digit wide octal (radix=8) numbers.
Table 2.5. The numeric mode for file permissions in chmod(1) commands.
digit |
meaning |
---|---|
1st optional digit |
sum of set user ID (=4), set group ID (=2), and sticky bit (=1) |
2nd digit |
sum of read (=4), write (=2), and execute (=1) permissions for user |
3rd digit |
ditto for group |
4th digit |
ditto for other |
This sounds complicated but it is actually quite simple. If you look at the first few (2-10) columns from "ls -l
" command output and read it as a binary (radix=2) representation of file permissions ("-" being "0" and "rwx" being "1"), the last 3 digit of the numeric mode value should make sense as an octal (radix=8) representation of file permissions to you. For example, try:
$ touch foo bar $ chmod u=rw,go=r foo $ chmod 644 bar $ ls -l foo bar -rw-r--r-- 1 penguin penguin 17 2007-04-29 08:22 bar -rw-r--r-- 1 penguin penguin 12 2007-04-29 08:22 foo
Tip | |
---|---|
If you need to access information displayed by " |
What permissions are applied to a newly created file or directory is restricted by the umask
shell built-in command. See dash
(1), bash
(1), and builtins
(7).
(file permission) = (requested file permission) & ~(umask value)
Table 2.6. The umask value examples.
umask |
usage |
file permission created |
directory permission created |
---|---|---|---|
0022 |
writable only by the user |
|
|
0002 |
writable by the group |
|
|
The Debian system uses a user private group (UPG) scheme as its default. A UPG is created whenever a new user is added to the system. A UPG has the same name as the user for which it was created and that user is the only member of the UPG. UPGs makes it is safe to set umask to 0002 since every user has their own private group. (In some Unix variants, it is quite common to setup all normal users belonging to a single users
group and is good idea to set umask to 0022 for security in such cases.)
In order to make the group permission to be applied to a particular user, that user needs to be made a member of the group using "sudo vigr
".
Note | |
---|---|
Alternatively, you may dynamically add users to groups during the authentication process by adding " |
The hardware devices are just another kind of file on the Debian system. If you have problems accessing devices such as CD-ROM and USB memory stick from a user account, you should make that user a member of the relevant group.
Some notable system-provided groups allow their members to access particular files and devices without root
privilege.
Table 2.7. List of example system-provided groups for file access.
group |
accessible files and devices |
---|---|
dialout |
Full and direct access to serial ports. (reconfigure modem, dial anywhere, etc.) |
dip |
"Dialup IP", enough to run |
cdrom |
CD-ROM, DVD+/-RW drives. |
audio |
An audio device. |
video |
A video device. |
scanner |
Scanner(s). |
adm |
System monitoring logs. |
staff |
Some directories for junior administrative work: |
Some notable system provided groups allow their members to execute particular commands without root
privilege.
Table 2.8. List of notable system provided groups for particular command executions.
group |
accessible commands |
---|---|
sudo |
execute sudo without their password. |
lpadmin |
execute commands to add, modify, and remove printers from printer databases. |
plugdev |
execute pmount(1) for removable devices such as USB memories. |
For the full listing of the system provided users and groups, see the recent version of the "Users and Groups" (/usr/share/doc/base-passwd/users-and-groups.html) document provided by the base-passwd
package.
See manpages of passwd
(5), group
(5), shadow
(5), group
(5), vipw
(8), vigr
(8), and pam_group
(8) for the management commands of the user and group system.
There are three types of timestamps for a GNU/Linux file.
Table 2.9. List of types of timestamps.
type |
meaning |
---|---|
mtime |
the file modification time ( |
ctime |
the file status change time ( |
atime |
the last file access time ( |
Note that ctime is not file creation time.
Overwriting a file will change all of the mtime, ctime, and atime attributes of the file.
Changing permission or owner of a file will change the ctime and atime attributes of the file.
Reading a file will change the atime of the file.
Note that even simply reading a file on the Debian system will normally cause a file write operation to update atime information in the inode. Mounting a filesystem with the noatime
option will let the system skip this operation and will result in faster file access for the read. This is often recommended for laptops, because it reduces hard drive activity and saves power. See mount
(8).
Use touch
(1) command to change timestamps of existing files.
For timestamps, the ls
command outputs different strings under the modern English locale (en_US.UTF-8
) from under the old one (C
).
$ LANG=en_US.UTF-8 ls -l foo -rw-r--r-- 1 penguin penguin 3 2008-03-05 00:47 foo $ LANG=C ls -l foo -rw-r--r-- 1 penguin penguin 3 Mar 5 00:47 foo
There are two methods of associating a file foo
with a different filename bar
.
a hard link is a duplicate name for an existing file ("ln foo bar
"),
a symbolic link, or "symlink", is a special file that points to another file by name ("ln -s foo bar
").
See the following example for the changes in link counts and the subtle differences in the result of the rm
command.
$ echo "Original Content" > foo $ ls -li foo 2398521 -rw-r--r-- 1 penguin penguin 17 2007-04-29 08:15 foo $ ln foo bar # hard link $ ln -s foo baz # symlink $ ls -li foo bar baz 2398521 -rw-r--r-- 2 penguin penguin 17 2007-04-29 08:15 bar 2398538 lrwxrwxrwx 1 penguin penguin 3 2007-04-29 08:16 baz -> foo 2398521 -rw-r--r-- 2 penguin penguin 17 2007-04-29 08:15 foo $ rm foo $ echo "New Content" > foo $ ls -li foo bar baz 2398521 -rw-r--r-- 1 penguin penguin 17 2007-04-29 08:15 bar 2398538 lrwxrwxrwx 1 penguin penguin 3 2007-04-29 08:16 baz -> foo 2398540 -rw-r--r-- 1 penguin penguin 12 2007-04-29 08:17 foo $ cat bar Original Content $ cat baz New Content
The hardlink can be made within the same file system and shares the same inode number which the "-i
" option with ls
command reveals.
The symlink always has nominal file access permissions of "rwxrwxrwx
", as shown in the above example, with the effective access permissions dictated by the permissions of the file that it points to.
Caution | |
---|---|
It is generally good idea not to create complicated symbolic links or hardlinks at all unless you have a very good reason. It may cause nightmares where the logical combination of the symbolic links results in loops in the filesystem. |
Note | |
---|---|
It is generally preferable to use symbolic links rather than hardlinks unless you have a good reason for using a hardlink. |
The ".
" directory links to the directory that it appears in, thus the link count of any new directory starts at 2. The "..
" directory links to the parent directory, thus the link count of the directory increases with the addition of new subdirectories.
If you are just moving to Linux from Windows, it will soon become clear how well-designed the file-name linking of Unix is, compared with the nearest Windows equivalent of "shortcuts". Because it is implemented in the file system, applications can't see any difference between a linked file and the original. In the case of hardlinks, there really is no difference.
A named pipe is a file that acts like a pipe. You put something into the file, and it comes out the other end. Thus it's called a FIFO, or First-In-First-Out: the first thing you put in the pipe is the first thing to come out the other end.
If you write to a named pipe, the process which is writing to the pipe doesn't terminate until the information being written is read from the pipe. If you read from a named pipe, the reading process waits until there is something to read before terminating. The size of the pipe is always zero --- it does not store data, it just links two processes like the shell "|
". However, since this pipe has a name, the two processes don't have to be on the same command line or even be run by the same user. Pipes were a very influential innovation of Unix.
You can try it by doing the following:
$ cd; mkfifo mypipe $ echo "hello" >mypipe & # put into background [1] 8022 $ ls -l mypipe prw-r--r-- 1 penguin penguin 0 2007-04-29 08:25 mypipe $ cat mypipe hello [1]+ Done echo "hello" >mypipe $ ls mypipe mypipe $ rm mypipe
Sockets are used extensively by all the Internet communication, databases, and the operating system itself. It is similar to the named pipe (FIFO) and allows processes to exchange information even between different computers. For the socket, those processes do not need to be running at the same time nor to be running as the children of the same ancestor process. This is the endpoint for the inter process communication (IPC). The exchange of information may occur over the network between different hosts. The two most common ones are the Internet socket and the Unix domain socket.
Tip | |
---|---|
" |
Device files refer to physical or virtual devices on your system, such as your hard disk, video card, screen, or keyboard. An example of a virtual device is the console, represented by /dev/console
.
Table 2.10. The device types.
device type |
meaning |
---|---|
character device |
This can be accessed one character at a time, that is, the smallest unit of data which can be written to or read from the device is a character (byte). |
block device |
This must be accessed in larger units called blocks, which contain a number of characters. Your hard disk is a block device. |
You can read and write device files, though the file may well contain binary data which may be an incomprehensible-to-humans gibberish. Writing data directly to these files is sometimes useful for the troubleshooting of hardware connections. For example, you can dump a text file to the printer device /dev/lp0
or send modem commands to the appropriate serial port /dev/ttyS0
. But, unless this is done carefully, it may cause a major disaster. So be cautious.
Note | |
---|---|
For the normal access to a printer, use the |
The device node number are displayed by executing ls
as:
$ ls -l /dev/hda /dev/ttyS0 /dev/zero brw-rw---- 1 root cdrom 3, 0 2007-04-29 07:00 /dev/hda crw-rw---- 1 root dialout 4, 64 2007-04-29 07:00 /dev/ttyS0 crw-rw-rw- 1 root root 1, 5 2007-04-29 07:00 /dev/zero
Here,
/dev/hda
has the major device number 3 and the minor device number 0. This is read/write accessible by the user who belongs to disk
group,
/dev/ttyS0
has the major device number 4 and the minor device number 64. This is read/write accessible by the user who belongs to dialout
group, and
/dev/zero
has the major device number 1 and the minor device number 5. This is read/write accessible by anyone.
In the Linux 2.6 system, the filesystem under /dev
is automatically populated by the udev
(7) mechanism.
There are some special device files.
Table 2.11. List of special device files.
device file |
action |
response |
---|---|---|
|
read |
it returns "end-of-file (EOF) character". |
|
write |
it is a bottomless data dump pit. |
|
read |
it returns "the |
|
read |
it returns random characters from a true random number generator, delivering real entropy. (slow) |
|
read |
it returns random characters from a cryptographically secure pseudorandom number generator. |
|
write |
it returns the disk-full (ENOSPC) error. |
These are frequently used in conjunction with the shell redirection (see Section 2.5.5, “Typical command sequences and shell redirection”).
The procfs and sysfs mounted on /proc
and /sys
are the pseudo-filesystem and expose internal data structures of the kernel to the userspace. In other word, these entries are virtual, meaning that they act as a convenient window into the operation of the operating system.
The directory /proc
contains (among other things) one subdirectory for each process running on the system, which is named after the process ID (PID).
System utilities that access process information, such as ps
, get their information from this directory structure.
The directories under /proc/sys/
contain interface to change certain kernel parameters at run time. (You may do the same through specialized command sysctl
(8) or its preload/configuration file /etc/sysctrl.conf
.)
Note | |
---|---|
The Linux kernel may complain "Too many open files". You can fix avoid this by executing " |
People frequently panic when they notice one file in particular - /proc/kcore
- which is generally huge. This is (more or less) a copy of the contents of your computer's memory. It's used to debug the kernel. It is a virtual file that points to computer memory, so don't worry about its size.
The directory under /sys
contains exported kernel data structures, their attributes, and the linkages between them. It also contains interface to change certain kernel parameters at run time.
See proc.txt(.gz)
, sysfs.txt(.gz)
and other related documents in the Linux kernel documentation (/usr/share/doc/linux-doc-2.6.*/Documentation/filesystems/*) provided by the linux-doc-2.6.*
package.
Midnight Commander (MC) is a GNU "Swiss army knife" for the Linux console and other terminal environments. This gives newbie a menu driven console experience which is much easier to learn than standard Unix commands.
You may need to install the Midnight Commander package which is titled mc.
sudo aptitude install mc
Use the mc command to explore the Debian system. This is the best way to learn. Please explore few interesting locations just using the cursor keys and Enter key:
/etc
and its subdirectories.
/var/log
and its subdirectories.
/usr/share/doc
and its subdirectories.
/sbin
and /bin
In order to make MC to change working directory upon exit and cd to the frequently used directories, I suggest to modify ~/.bashrc
to include:
. /usr/share/mc/bin/mc.sh
See mc
(1) (under the "-P
" option) for the reason. (If you do not understand what exactly I am talking here, you can do this later.)
MC can be started by:
$ mc
MC takes care of all file operations through its menu, requiring minimal user effort. Just press F1 to get the help screen (see next paragraph if this doesn't work). You can play with MC just by pressing cursor-keys and function-keys.
In some consoles such as gnome-terminal
, key strokes of function-keys may be stolen by the console program. You can disable these features by "Edit" -> "Keyboard Shortcuts" for gnome-terminal
. In particular, consider removing the mapping of F1 to Gnome Terminal Help; doing so will allow F1 to show Midnight Commander help.
If you encounter character encoding problem which displays garbage characters, adding "-a
" to MC's command line may help prevent problems.
If this doesn't clear up your display problems with MC, see Section 10.6.6, “The terminal configuration”.
The default is two directory panels containing file lists. Another useful mode is to set the right window to "information" to see file access privilege information, etc. Following are some essential keystrokes. With the gpm
daemon running, one can use a mouse, too. (Make sure to press the shift-key to obtain the normal behavior of cut and paste in MC.)
Table 2.12. The key bindings of MC.
key |
key binding |
---|---|
|
Help menu |
|
Internal file viewer |
|
Internal editor |
|
Activate pull down menu |
|
Exit Midnight Commander |
|
Move between two windows |
|
Mark file for a multiple-file operation such as copy |
|
Delete file (be careful---set MC to safe delete mode) |
Cursor keys |
Self-explanatory |
Any cd
command will change the directory shown on the selected screen.
Ctrl-Enter
or Alt-Enter
will copy a filename to the command line. Use this with the cp
or mv
command together with command-line editing.
Alt-Tab
will show shell filename expansion choices.
One can specify the starting directory for both windows as arguments to MC; for example, mc /etc /root
.
Esc
+ n-key
== Fn
(i.e., Esc
+ 1
= F1
, etc.; Esc
+ 0
= F10
)
Pressing Esc
before the key has the same effect as pressing the Alt
and the key together.; i.e., type Esc
+ c
for Alt-C
. Esc
is called meta-key and sometimes noted as "M-
"
The internal editor has an interesting cut-and-paste scheme. Pressing F3
marks the start of a selection, a second F3
marks the end of selection and highlights the selection. Then you can move your cursor. If you press F6, the selected area will be moved to the cursor location. If you press F5, the selected area will be copied and inserted at the cursor location. F2
will save the file. F10
will get you out. Most cursor keys work intuitively.
This editor can be directly started on a file:
$ mc -e filename_to_edit $ mcedit filename_to_edit
This is not a multi-window editor, but one can use multiple Linux consoles to achieve the same effect. To copy between windows, use Alt-F<n> keys to switch virtual consoles and use "File->Insert file" or "File->Copy to file" to move a portion of a file to another file.
This internal editor can be replaced with any external editor of choice.
Also, many programs use the environment variables EDITOR
or VISUAL
to decide which editor or viewer to use. If you are uncomfortable with vim
or nano
initially, you may set these to mcedit
by adding these lines to ~/.bashrc
:
... export EDITOR=mcedit export VISUAL=mcedit ...
I do recommend setting these to vim
if possible.
If you are uncomfortable with vim
, you can keep using mcedit
for most system maintenance tasks.
Very smart viewer. This is a great tool for searching words in documents. I always use this for files in the /usr/share/doc
directory. This is the fastest way to browse through masses of Linux information. This viewer can be directly started like so:
$ mc -v path/to/filename_to_view $ mcview path/to/filename_to_view
Press Enter on a file, and the appropriate program will handle the content of the file (see Section 10.5.11, “Customizing program to be started”). This is a very convenient MC feature.
Table 2.13. The reaction to the enter key in MC.
file type |
reaction to enter key |
---|---|
executable file |
Execute command |
man file |
Pipe content to viewer software |
html file |
Pipe content to web browser |
|
Browse its contents as if subdirectory |
In order to allow these viewer and virtual file features to function, viewable files should not be set as executable. Change their status using the chmod
command or via the MC file menu.
MC can be used to access files over the Internet using FTP. Go to the menu by pressing F9
, then type "p
" to activate the FTP virtual filesystem. Enter a URL in the form "username:passwd@hostname.domainname
", which will retrieve a remote directory that appears like a local one.
Try "http.us.debian.org/debian
" as the URL and browse the Debian archive.
Although MC enables you to do almost everything, it is very important for you to learn how to use the command line tools invoked from the shell prompt and become familiar with the Unix-like work environment.
You can select your login shell with the chsh
command.
Table 2.14. List of shell programs.
package |
popcon |
size |
POSIX shell |
description |
---|---|---|---|---|
|
V:87, I:99 |
1300 |
Yes |
The GNU Bourne Again SHell. (de facto standard) |
|
V:11, I:83 |
736 |
No |
TENEX C Shell, an enhanced version of Berkeley csh. |
|
V:3, I:13 |
236 |
Yes |
The Debian Almquist Shell. Good for shell script. |
|
V:2, I:5 |
12504 |
Yes |
The standard shell with many enhancements. |
|
V:0.3, I:1.3 |
464 |
Yes |
A public domain version of the Korn shell. |
|
V:0.4, I:1.5 |
400 |
No |
OpenBSD C Shell, a version of Berkeley csh. |
|
V:0.3, I:1.1 |
836 |
Yes |
Stand-alone shell with built-in commands. (Not meant for standard |
|
V:0.3, I:1.5 |
2540 |
Yes |
The real, AT&T version of the Korn shell. |
|
V:0.08, I:0.5 |
204 |
No |
An implementation of the AT&T Plan 9 shell. |
|
V:0.02, I:0.14 |
232 |
Yes |
Policy-compliant Ordinary SHell. A |
|
V:0.02, I:0.06 |
304 |
No |
An extensible shell based on the AT&T Plan 9 shell: |
In this tutorial chapter, the interactive shell always means bash
.
You can customize bash
behavior by ~/.bashrc
. For example, I added followings to ~/.bashrc
:
# CD upon exiting MC . /usr/share/mc/bin/mc.sh # set CDPATH to good one CDPATH=.:/usr/share/doc:~/Desktop/src:~/Desktop:~ export CDPATH PATH="${PATH}":/usr/sbin:/sbin # set PATH so it includes user's private bin if it exists if [ -d ~/bin ] ; then PATH=~/bin:"${PATH}" fi export PATH EDITOR=vim export EDITOR
Tip | |
---|---|
You can find more |
In the Unix-like environment, there are few key strokes which have special meanings. Please note that on a normal Linux character console, only the left-hand Ctrl
and Alt
keys work as expected. Here are few notable key strokes to remember.
Table 2.15. List of key bindings for bash.
key |
key binding |
---|---|
|
Erase line before cursor. |
|
Erase a character before cursor. |
|
Terminate input. (exit shell if you are using shell) |
|
Terminate a running program. |
|
Temporarily stop program by moving it to the background job |
|
Halt output to screen. |
|
Reactivate output to screen. |
|
Reboot/halt the system, see manpage for |
|
Meta-key for Emacs and the similar UI. |
|
Start command history search under |
|
Start incremental command history search under |
|
Complete input of the filename to the command line under |
|
Input |
Tip | |
---|---|
The terminal feature of |
The Unix style mouse operations are based on the 3 button mouse system.
Table 2.16. The Unix style mouse operations.
action |
response |
---|---|
Left-click-and-drag mouse |
Select and copy to the clipboard. |
Left-click |
Select the start of selection. |
Right-click |
Select the end of selection and copy to the clipboard. |
Middle-click |
Paste clipboard at the cursor. |
The center wheel on the modern wheel mouse is considered middle mouse button and can be used for middle-click. Clicking left and right mouse buttons together serves as the middle-click under the 2 button mouse system situation. In order to use a mouse in the Linux character console, you need to have gpm
running as daemon.
The less
program is the enhanced pager (file content browser). Hit "h
" for help. It can do much more than more
. This less
command can be supercharged by executing eval $(lesspipe)
or eval $(lessfile)
in the shell startup script. See more in /usr/share/doc/lessf/LESSOPEN
. The -R
option allows raw character output and enables ANSI color escape sequences. See less
(1).
You should become proficient in one of the variants of Vim or Emacs programs which are popular in the Unix-like system.
I think getting used to Vim commands is the right thing to do, since Vi-editor is always there in the Linux/Unix world. (Actually, original vi
or new nvi
are the programs you find everywhere. I chose Vim instead for newbie since it offers you help through F1
key while it is similar enough and more powerful.)
If you chose either Emacs or XEmacs instead as your choice of the editor, that is another good choice indeed, particularly for programming. Emacs has a plethora of other features as well, including functioning as a newsreader, directory editor, mail program, etc.. When used for programming or editing shell scripts, it intelligently recognizes the format of what you are working on, and tries to provide assistance. Some people maintain that the only program they need on Linux is Emacs. Ten minutes learning Emacs now can save hours later. Having the gnu Emacs manual for reference when learning Emacs is highly recommended.
All these programs usually come with tutoring program for you to learn them by practice. Start Vim by typing "vim
" and press F1-key. You should at least read the first 35 lines. Then do the online training course by moving cursor to |tutor|
and pressing Ctrl-]
.
Note | |
---|---|
Good editors, such as Vim and Emacs, can be used to handle UTF-8 and other exotic encoding texts correctly with proper option in the x-terminal-emulator on X under UTF-8 locale with proper font settings. Please refer to their documentation on multibyte text. |
Debian comes with a number of different editors. We recommend to install the vim
package, as mentioned above.
Debian provides unified access to the system default editor via command /usr/bin/editor
so other programs (e.g., reportbug
(1)) can invoke it. You can change it by:
$ sudo update-alternatives --config editor
The choice /usr/bin/vim.basic
is the recommendation for newbies by the author. This supports syntax highlighting.
Tip | |
---|---|
Many programs use the environment variables " |
You can customize vim
behavior by ~/.vimrc
. For example, I use:
" ------------------------------- " Local configuration " set nocompatible set nopaste set pastetoggle=<f2> syn on if $USER == "root" set nomodeline set noswapfile else set modeline set swapfile endif " filler to avoid the line above being recognized as a modeline " filler " filler
The output of the shell command may roll off your screen and may be lost forever. It is good practice to log shell activities into the file for you to review them later. This kind of record is essential when you perform any system administration tasks.
The basic method of recording the shell activity is to run it under the script
(1) command.
$ script Script started, file is typescript
do whatever shell commands ...
press Ctrl-D
to exit script
.
$ vim typescript
See Section 10.2.3, “Recording the shell activities cleanly” .
Let's learn the basic Unix commands. Here I use "Unix" in its generic sense. Any Unix clone OSs usually offer the equivalent commands. The Debian system is no exception. Do not worry if some commands do not work as you wish now. If alias
is used in the shell, its corresponding command outputs are different. These examples are not meant to be executed in this order.
Try all the following commands from the non-privileged user account:
Table 2.17. List of basic Unix commands.
command |
description |
---|---|
|
Display name of current/working directory. |
|
Display current user name. |
|
Display current user identity (name, uid, gid, and associated groups). |
|
Display a type of file for the file <foo>. |
|
Display a file location of command |
|
, , |
|
Display information on command |
|
Find commands related to |
|
, , |
|
Display one line explanation on command |
|
Display explanation on command |
|
Display rather long explanation on command |
|
List contents of directory. (non-dot files and directories) |
|
List contents of directory. (all files and directories) |
|
List contents of directory. (almost all files and directories, i.e., skip " |
|
List all contents of directory with detail information. |
|
List all contents of directory with inode number and detail information. |
|
List all directories under the current directory. |
|
Display file tree contents. |
|
List open status of file |
|
List files opened by PID= |
|
Make a new directory |
|
Remove a directory |
|
Change directory to the directory |
|
Change directory to the root directory. |
|
Change directory to the current user's home directory. |
|
Change directory to the absolute path directory |
|
Change directory to the parent directory. |
|
Change directory to the home directory of the user |
|
Change directory to the previous directory. |
|
Display contents of |
|
Create a empty file |
|
Copy a existing file |
|
Remove a file |
|
Rename an existing file |
|
Move an existing file |
|
Move an existing file |
|
Make an existing file |
|
Make an existing file |
|
Make an existing file |
|
find matching filenames using shell |
|
find matching filenames using shell |
|
Find a "<pattern>" in all of the files ending with " |
|
Display process information using full screen. Type " |
|
Display information on all the running processes using BSD style output. |
|
Display information on all the running processes using Unix system-V style output. |
|
Display all processes running |
|
Display information on all the running processes with ASCII art output. |
|
Kill a process identified by the process ID: <1234>. |
|
Compress |
|
Decompress |
|
Compress |
|
Decompress |
|
Extract files from |
|
Extract files from gzipped |
|
Extract files from |
|
Archive contents of folder |
|
Archive contents of folder |
|
Archive contents of folder |
|
Display contents of compressed |
|
Create a file |
|
Append the decompressed content of |
Note | |
---|---|
Unix has a tradition to hide filenames which start with " |
Note | |
---|---|
For |
Note | |
---|---|
The default pager of the bare bone Debian system is |
Note | |
---|---|
The " |
Please traverse directories and peek into the system using the above commands as training. If you have questions on any of the console commands, please make sure to read the manual page. For example, these commands are the good start:
$ man man $ man bash $ man builtins $ man grep $ man ls
The style of man pages may be a little hard to get used to, because they are rather terse, particularly the older, very traditional ones. But once you get used to it, you come to appreciate their succinctness.
Please note that many Unix-like commands including ones from GNU and BSD will display brief help information if you invoke them in one of the following ways (or without any arguments in some cases):
$ <commandname> --help $ <commandname> -h
Now you have some feel on how to use the Debian system. Let's look deep into the mechanism of the command execution in the Debian system. Here, I have simplified reality for the newbie. See manpages for bash
(1) for the exact explanation.
A simple command is a sequence of
variable assignments (optional)
command name
arguments (optional)
redirections (optional: >
, >>
, <
, <<
, etc.)
control operator (optional: &&
, ||
; <newline> , ;
, &
, (
, )
)
The values of some environment variables change the behavior of some Unix commands.
The default values of environment variables are initially set by the PAM system and then some of them may be reset by some application programs:
the display manager such as gdm
, and
the shell in its start up codes bash_profile
and .bashrc
.
The full locale value given to LANG
variable consists of 3 parts: xx_YY.ZZZZ
.
For the language codes and country codes, see pertinent description in the info gettext
.
For the codeset on the modern Debian system, you should always set it to UTF-8
unless you specifically want to use the historic one with good reason and background knowledge.
For fine details of the locale configuration, see: Section 9.3, “The locale” .
Note | |
---|---|
The " |
Table 2.19. List of locale recommendations.
Language (area) |
locale recommendation |
---|---|
English(USA) |
|
English(Great_Britain) |
|
French(France) |
|
German(Germany) |
|
Italian(Italy) |
|
Spanish(Spain) |
|
Catalan(Spain) |
|
Swedish(Sweden) |
|
Portuguese(Brasil) |
|
Russian(Russia) |
|
Chinese(P.R._of_China) |
|
Chinese(Taiwan_R.O.C.) |
|
Japanese(Japan) |
|
Korean(Republic_of_Korea) |
|
Vietnamese(Vietnam) |
|
Typical command execution uses a shell line sequence like the following:
$ date Sun Jun 3 10:27:39 JST 2007 $ LANG=fr_FR.UTF-8 date dimanche 3 juin 2007, 10:27:33 (UTC+0900)
Here, the program date
is executed in the foreground job. The environment variable "LANG
" is:
Most command executions usually do not have preceding environment variable definition. For the above example, you can alternatively execute:
$ LANG=fr_FR.UTF-8 $ date dimanche 3 juin 2007, 10:27:33 (UTC+0900)
As you can see here, the output of command is affected by the environment variable to produce French output. If you want the environment variable to be inherited to the subprocesses (e.g., when calling shell script), you need to "export" it instead by using:
$ export LANG
Tip | |
---|---|
When filing a bug report, running the command under " |
See locale
(5) and locale
(7) for LANG
and related environment variables.
Note | |
---|---|
I recommend you to configure the system environment just by the |
When you type a command into the shell, the shell searches the command in the list of directories contained in the PATH
environment variable. The value of the PATH
environment variable is also called the shell's search path.
In the default Debian installation, the PATH
environment variable of user accounts may not include /sbin/
. For example, The ifconfig
command needs to be issued with full path as /sbin/ifconfig
.
You can change the PATH
environment variable by ~/.bash_profile
or ~/.bashrc
files.
Many commands stores user specific configuration in the home directory and changes their behavior by their contents. The home directory is identified by the environment variable: HOME
:
Table 2.20. List of HOME values.
situation |
value of |
---|---|
program run by the init process (daemon) |
|
program run from the normal root shell |
|
program run from the normal user shell |
|
program run from the normal user GUI desktop menu |
|
program run as root with " |
|
program run as root with " |
|
Some commands take arguments. Arguments starting with "-
" or "--
" are called options and control the behavior of the command.
$ date Mon Oct 27 23:02:09 CET 2003 $ date -R Mon, 27 Oct 2003 23:02:40 +0100
Here the command-line argument "-R
" changes the date
command behavior to output RFC-2822 compliant date string.
Often you want a command to work with a group of files without typing all of them. The filename expansion pattern using the shell glob, (sometimes referred as wildcards), facilitate this need.
Table 2.21. The shell glob patterns.
shell glob pattern |
match |
---|---|
|
This matches filename (segment) not started with " |
|
This matches filename (segment) started with " |
|
This matches exactly one character. |
|
This matches exactly one character with any character enclosed in brackets. |
|
This matches exactly one character with any character between " |
|
This matches exactly one character other than any character enclosed in brackets (excluding " |
For example, try the following and think for yourself:
$ mkdir junk; cd junk; .[^.]*touch 1.txt 2.txt 3.c 4.h .5.txt ..6.txt $ echo *.txt 1.txt 2.txt $ echo * 1.txt 2.txt 3.c 4.h $ echo *.[hc] 3.c 4.h $ echo .* . .. .5.txt ..6.txt $ echo .*[^.]* .5.txt ..6.txt $ echo [^1-3]* 4.h $ cd ..; rm -rf junk
See "man 7 glob
" for more.
Note | |
---|---|
Unlike normal filename expansion by the shell, the shell pattern " |
Note | |
---|---|
BASH can be tweaked to change its glob behavior with its shopt builtin options such as dotglob, noglob, nocaseglob, nullglob, nocaseglob, extglob, etc. See |
Each command returns its exit status as the return value.
Table 2.22. Command exit code.
command exit state |
numeric return value |
logical return value |
---|---|---|
|
|
TRUE |
|
|
FALSE |
Thus:
$ [ 1 = 1 ] ; echo $? 0 $ [ 1 = 2 ] ; echo $? 1
Note | |
---|---|
Please note that, in the logical context for the shell, success is treated as the logical TRUE which has 0 (zero) as its value. This is somewhat non-intuitive and needs to be reminded here. |
Let's try to remember following shell command idioms.
Table 2.23. The shell command idioms.
command idiom (type in one line) |
effects |
---|---|
|
The |
|
The standard output of |
|
Both standard output and standard error of |
|
The |
|
The |
|
The |
|
Redirect standard output of |
|
Redirect standard error of |
|
Redirect standard output of |
|
Redirect standard error of |
|
Redirect both standard output and standard error of |
|
Redirect standard input of |
|
Redirect standard input of |
|
Redirect standard input of |
The Debian system is a multi-tasking system. Background jobs allow users to run multiple programs in a single shell. The management of the background process involves the shell built-ins: jobs
, fg
, bg
, and kill
. Please read the sections of the bash(1) manpage under "SIGNALS", and "JOB CONTROL", and the builtins
(1) manpage.
Let's try simple examples of redirection:
$ </etc/motd pager
$ pager </etc/motd
$ pager /etc/motd
$ cat /etc/motd | pager
Although all 4 examples display the same thing, the last example runs an extra cat
command and wastes resources with no reason.
The shell allows you to open files using the exec
built-in with an arbitrary file descriptor.
$ echo Hello >foo $ exec 3<foo 4>bar # open files $ cat <&3 >&4 # redirect stdin to 3, stdout to 4 $ exec 3<&- 4>&- # close files $ cat bar Hello
Here, "n<&-
" and "n>&-
" mean to close the file descriptor "n".
The file descriptor 0-2 are predefined:
Table 2.24. The predefined file descriptors.
device |
description |
file descriptor |
---|---|---|
|
standard input |
0 |
|
standard output |
1 |
|
standard error |
2 |
You can set an alias for the frequently used command. For example:
$ alias la='ls -la'
Now, la
works as a short hand for "ls -la
" which lists all files in the long listing format.
You can list any existing aliases:
$ alias
You can identity exact path or identity of the command using type
command. For example:
$ type ls ls is hashed (/bin/ls) $ type la la is aliased to ls -la $ type echo echo is a shell builtin $ type file file is /usr/bin/file
Here ls
was recently searched while file
was not, thus ls
is "hashed", i.e., the shell has an internal record for the quick access to the location of the ls
command.
Tip | |
---|---|
In Unix-like work environment, text processing is done by piping text through chains of standard text processing tools. This was another crucial Unix innovation.
There are few standard text processing tools which are used very often on the Unix-like system.
cat
(1) concatenates files and outputs the whole content.
tac
(1) concatenates files and outputs in reverse.
cut
(1) selects parts of lines and outputs.
head
(1) outputs the first part of files.
tail
(1) outputs the last part of files.
sort
(1) sorts lines of text files.
uniq
(1) removes duplicate lines from a sorted file.
tr
(1) translates or deletes characters.
diff
(1) compares files line by line.
Basic regular expression (BRE) is used:
grep
(1) matches text with the pattern.
ed
(1) is a primitive line editor.
sed
(1) is a stream editor.
vim
(1) is a screen editor.
emacs
(1) is a screen editor. (somewhat extended BRE)
Extended regular expression (ERE) is used:
egrep
(1) matches text with pattern.
awk
(1) does simple text processing.
tcl
does every conceivable type of text processing: re_syntax
(3). Often used with tk
.
perl
(1) does text processing, is capable of network programming, and much more. perlre
(1).
pcregrep
(1) from the pcregrep
package matches text with Perl Compatible Regular Expressions (PCRE) pattern.
python
with re
module does every conceivable text processing. See /usr/share/doc/python/html/index.html
.
If you are not sure what exactly these commands do, please use "man command
" to figure it out by yourself.
Note | |
---|---|
Sort order and range expression are locale dependent. If you wish to obtain traditional behavior for a command, use C locale instead of UTF-8 ones by prepnding command with " |
Note | |
---|---|
Perl regular expressions ( |
Regular expressions are used in many text processing tools. They are analogous to the shell globs, but they are both more complicated and more powerful.
The regular expression describes the matching pattern and is made up of text characters and metacharacters.
The metacharacter is just a character with a special meaning. There are 2 major styles, BRE and ERE, depending on the text tools as described above.
Table 2.25. The metacharacters for BRE and ERE.
BRE |
ERE |
The meaning of the regular expression |
---|---|---|
|
|
common metacharacters |
|
|
BRE only " |
|
|
ERE only non-" |
|
|
This matches the non-metacharacter " |
|
|
This sequence matches the literal character " |
|
|
This matches any character including newline. |
|
|
This matches the beginning of a string. |
|
|
This matches the end of a string. |
|
|
This matches the beginning of a word. |
|
|
This matches the end of a word. |
|
|
This character list matches any of the characters " |
|
|
This negated character list matches any of the characters except " |
|
|
This matches zero or more regular expressions identified by " |
|
|
This matches one or more regular expressions identified by " |
|
|
This matches zero or one regular expressions identified by " |
|
|
This matches one of the regular expressions identified by " |
|
|
This matches one of the regular expressions identified by " |
The regular expression of emacs
is basically BRE but has been extended to treat "+
"and "?
" as the metacharacters as in ERE. Thus, there are no needs to quote them with "\
" in the regular expression of emacs
.
For example, grep
can be used to perform the text search using the regular expression:
$ egrep 'GNU.*LICENSE|Yoyodyne' /usr/share/common-licenses/GPL GNU GENERAL PUBLIC LICENSE GNU GENERAL PUBLIC LICENSE Yoyodyne, Inc., hereby disclaims all copyright interest in the program
Tip | |
---|---|
For the replacement expression, following characters have special meanings:
Table 2.26. The replacement expression.
character |
meaning |
---|---|
|
This represents what the regular expression matched. (use |
|
This represents what the n-th _bracketed_ regular expression matched. ("n" being number) |
For Perl replacement string, $n
is used instead of \n
and &
has no special meaning.
For example:
$ echo zzz1abc2efg3hij4 | \ sed -e 's/\(1[a-z]*\)[0-9]*\(.*\)$/=&=/' zzz=1abc2efg3hij4= $ echo zzz1abc2efg3hij4 | \ sed -e 's/\(1[a-z]*\)[0-9]*\(.*\)$/\2===\1/' zzzefg3hij4===1abc $ echo zzz1abc2efg3hij4 | \ perl -pe 's/(1[a-z]*)[0-9]*(.*)$/$2===$1/' zzzefg3hij4===1abc $ echo zzz1abc2efg3hij4 | \ perl -pe 's/(1[a-z]*)[0-9]*(.*)$/=&=/' zzz=&=
Here please pay extra attention to the style of the bracketed regular expression and how the matched strings are used in the text replacement process on different tools.
These regular expressions can be used for the cursor movements and the text replacement actions in the editors too.
The back slash "\
" at the end of line in the shell commandline escapes newline as a white space character and continues shell command line input to the next line.
Please read all the related manual pages to learn these commands.
Let's consider a text file called DPL
in which some pre-2004 Debian project leader's names and their initiation days are listed in a space-separated format.
Ian Murdock August 1993 Bruce Perens April 1996 Ian Jackson January 1998 Wichert Akkerman January 1999 Ben Collins April 2001 Bdale Garbee April 2002 Martin Michlmayr March 2003
Tip | |
---|---|
See "A Brief History of Debian" for the latest Debian leadership history. |
Awk is frequently used to extract data from these types of files.
$ awk '{ print $3 }' <DPL # month started August April January January April April March $ awk '($1=="Ian") { print }' <DPL # DPL called Ian Ian Murdock August 1993 Ian Jackson January 1998 $ awk '($2=="Perens") { print $3,$4 }' <DPL # When Perens started April 1996
Shells such as Bash can be also used to parse this kind of file:
$ while read first last month year; do echo $month done <DPL
same output as the first Awk example.
Here, read
built-in command uses the characters in $IFS (internal field separators) to split lines into words.
If you change IFS to ":
", you can parse /etc/passwd
with shell nicely:
$ oldIFS="$IFS" # save old value $ IFS=":" $ while read user password uid gid rest_of_line; do if [ "$user" = "osamu" ]; then echo "$user's ID is $uid" fi done < /etc/passwd osamu's ID is 1000 $ IFS="$oldIFS" # restore old value
(If Awk is used to do the equivalent, use "FS=":"
" to set the field separator.)
IFS is also used by the shell to split results of parameter expansion, command substitution, and arithmetic expansion. These do not occur within double or single quoted words. The default value of IFS is <space>, <tab>, and <newline> combined.
Be careful about using this shell IFS tricks. Strange things may happen, when shell interprets some parts of the script as its input.
$ IFS=":," # use ":" and "," as IFS $ echo IFS=$IFS, IFS="$IFS" # echo is a Bash built-in IFS= , IFS=:, $ date -R # just a command output Sat, 23 Aug 2003 08:30:15 +0200 $ echo $(date -R) # sub shell --> input to main shell Sat 23 Aug 2003 08 30 36 +0200 $ unset IFS # reset IFS to the default $ echo $(date -R) Sat, 23 Aug 2003 08:30:50 +0200
The following scripts will do nice things as a part of a pipe.
Table 2.27. The script snippets for piping commands.
script snippet (type in one line) |
effect |
---|---|
|
find all files under |
|
print 1 to 100 |
|
run command repeatedly with each item from pipe as its argument (see Section 10.5.9, “Repeating a command looping over files”) |
|
split white-space-separated items from pipe into lines |
|
merge all lines from pipe into a line |
|
extract lines from pipe containing <regex_pattern> |
|
extract lines from pipe not containing <regex_pattern> |
|
extract third field from pipe separated by " |
|
extract third field from pipe separated by whitespaces |
|
extract third field from pipe separated by tab |
|
remove backspace and expand tabs to spaces |
|
expand tabs |
|
sort and remove duplicates |
|
convert uppercase to lowercase |
|
concatenate lines into one line |
|
remove CR |
|
add " |
|
remove " |
|
print the second line |
|
print the first 2 lines |
|
print the last 2 lines |
When using the shell interactive mode becomes too complicated, please consider to write a shell script (see: Section 13.1, “The shell script”).
The following execution of perl
(1) one liner command will replace all instances of FROM_REGEX with TO_TEXT in all of the files <target_file> ...:
$ perl -i -p -e 's/FROM_REGEX/TO_TEXT/g;' <target_file> ...
"-i
" is for "in-place editing", "-p
" is for "implicit loop over <target_file> ...". If the substitution is complex, you can make recovery from errors easier by using the parameter "-i.bak
" instead of "-i
"; this will keep each original file, adding ".bak
" as a file extension.
Note | |
---|---|
Although this is somewhat waste of the resource, this is used frequently to change file contents across the whole directly with minimal typing. |
You can do the similar with ed
(1) command too.
$ ed <target_file> <<EOF ,s/FROM_REGEX/TO_TEXT/g w q EOF
Here, the ed
commands are practically the same command as the vi
command-mode command.
Table 2.28. The comparison of ed vs perl for in-place editing.
command |
type |
argument |
regex |
script |
---|---|---|---|---|
|
lighter and faster |
works on one file |
BRE |
read from |
|
heavier and slower |
works on multiple files |
ERE |
can be as a part of the argument |
Debian is a volunteer organization which builds consistent distributions of pre-compiled binary packages of free software and distributes them from its archive.
The Debian archive is offered by many remote mirror sites for access through HTTP and FTP methods. It is also available as CD-ROM/DVD.
The Debian package management system, when used properly, offers the user to install consistent sets of binary packages to the system from the archive. Currently, there are 24396 packages available for the amd64 architecture.
The Debian package management system has a rich history and many choices for the front end user program and back end archive access method to be used. Currently, we recommend aptitude
as the main front end program for the Debian package management activity.
Table 3.1. List of Debian package management tools
package |
popcon |
size |
description |
---|---|---|---|
|
V:23, I:98 |
9808 |
terminal-based package manager (current standard, front-end for |
|
V:85, I:99 |
5216 |
Advanced Packaging Tool, front-end for dpkg providing "http", "ftp", and "file" archive access methods ( |
|
V:6, I:94 |
884 |
tool for selecting tasks for installation on Debian system (front-end for |
|
V:5, I:82 |
2192 |
terminal-based package manager (previous standard, front-end for |
|
V:85, I:99 |
7340 |
package management system for Debian |
|
V:0.10, I:0.5 |
136 |
older ftp method for dselect |
|
V:20, I:52 |
5952 |
graphical package manager (Gnome front-end for |
|
V:0.2, I:1.4 |
604 |
graphical package manager (Gnome front-end for |
|
V:5, I:14 |
1496 |
graphical package manager (KDE front-end for |
|
V:49, I:99 |
456 |
APT utility programs: |
|
V:3, I:6 |
264 |
package change history notification tool |
|
V:1.6, I:2 |
436 |
lists critical bugs before each APT installation |
|
V:1.8, I:8 |
172 |
APT package searching utility -- command-line interface |
|
V:0.18, I:0.9 |
92 |
recursively lists package dependencies |
Note | |
---|---|
The annoying bug #411123 for the mixed use of |
Here are some key points for package configuration on the Debian system:
The manual configuration by the system administrator is respected. In other words, the package configuration system makes no intrusive configuration for the sake of convenience.
Each package comes with its own configuration script with standardized user interface called debconf
(7) to help initial installation process of the package.
Debian Developers try their best to make your upgrade experience flawless with package configuration scripts.
Full functionalities of packaged software are available to the system administrator. But ones with security risks are disabled in the default installation.
If you manually activate a service with some security risks, you are responsible for the risk containment.
Esoteric configuration may be manually enabled by the system administrator. This may creates interference with popular generic helper programs for the system configuration.
Warning | |
---|---|
Do not install packages from random mixture of suites. It will likely break the package consistency which requires deep system management knowledge, such as compiler ABI, library version, interpreter features, etc. |
The newbie Debian system administrator should stay with the stable
release of Debian while applying only security updates. I mean that some of the valid actions are better avoided, as a precaution, until you understand the Debian system very well:
Do not include testing
or unstable
in /etc/apt/sources.list
,
Do not mix standard Debian with other non-Debian archives such as Ubuntu in /etc/apt/sources.list
,
Do not create /etc/apt/preferences
,
Do not change default behavior of package management tools through configuration files without knowing their full impacts,
Do not install random packages by "dpkg -i <random_package>
",
Do not ever install random packages by "dpkg --force-all -i <random_package>
",
Do not erase or alter files in /var/lib/dpkg/
, or
Do not overwrite system files by installing software programs directly compiled from source. (Install them into /usr/local
or /opt
.)
The non-compatible effects caused by above actions to the Debian package management system may leave your system unusable.
The serious Debian system administrator who runs mission critical servers, should use extra precautions:
Do not install any packages including security updates from Debian without thoroughly testing them with your particular configuration under safe conditions. (Although Debian has been offering an extremely stable system for a long time, you as the system administrator are responsible for your system in the end.)
Despite my warnings above, I know many readers of this document wish to run the "testing
" or "unstable
" suites of Debian as their main Desktop system since they work very well for self-administered Desktop environments. Because they are updated frequently, they offer the latest features.
Caution | |
---|---|
For your production server, the " |
It takes no more than simply setting the distribution string in the /etc/apt/sources.list
to the suite: "testing
" or "unstable
"; or the codename: "squeeze
" or "sid
". This will let you live the life of eternal upgrades.
The use of "testing
" or "unstable
" is a lot of fun but comes with some risks. Even though the "unstable
" suite of Debian system looks very stable for most of the times, there have been some package problems on the "testing
" and "unstable
" suite of Debian system and a few of them were not so trivial to resolve. It may be quite painful for you. Sometimes, you may have a broken package or missing functionality for a few weeks.
Here are some ideas to ensure quick and easy recovery from bugs in Debian packages:
make the system dual bootable by installing the "stable
" suite of Debian system to another partition.
make the installation CD handy for the rescue boot.
consider installing apt-listbugs
to check the Debian Bug Tracking System (BTS) information before the upgrade.
learn the package system infrastructure enough to work around the problem.
create a chroot or similar environment and run the latest system in it in advance. (optional)
(If you can not do any one of these precautionary actions, you are probably not ready for the "testing
" and "unstable
" suites.)
Enlightenment with the following will save a person from the eternal karmic struggle of upgrade hell and let him reach Debian nirvana.
Let's look into the Debian archive from a system user's perspective.
Tip | |
---|---|
Official policy of the Debian archive is defined at Debian Policy Manual, Chapter 2 - The Debian Archive. |
For the typical HTTP access, the archive is specified in the /etc/apt/sources.list
file as, e.g. for the current "stable
" == "lenny
" system:
deb http://ftp.XX.debian.org/debian/ lenny main contrib non-free deb-src http://ftp.XX.debian.org/debian/ lenny main contrib non-free deb http://security.debian.org/ lenny/updates main contrib deb-src http://security.debian.org/ lenny/updates main contrib
Please note "ftp.XX.debian.org
" must be replaced with appropriate mirror site URL for your location, for USA "ftp.us.debian.org
", which can be found in the list of Debian worldwide mirror sites. The status of these servers can be checked at Debian Mirror Checker site.
Here, I tend to use codename "lenny
" instead of suite name "stable
" to avoid surprises when the next "stable
" is released.
The meaning of this is described in "man 5 sources.list
" and key points are:
The "deb
" line defines for the binary packages.
The "deb-src
" line defines for the source packages.
The 1st argument is the root URL of the Debian archive.
The 2nd argument is the distribution: either the suite name or the codename.
The 3rd and following arguments are the list of valid archive component names of the Debian archive.
The "deb-src
" lines can safely be omitted (or commented out by placing "#" at the start of the line) if it is just for aptitude
which does not access source related meta data. It will speed up the updates of the archive meta data. The URL can be "http://
", "ftp://
", "file://
", ....
Tip | |
---|---|
If " |
Here are the lists of URL of the Debian archive sites and suite or codename used in the configuration file:
Table 3.2. Lists of Debian archive sites.
archive URL |
suite (codename) |
purpose |
---|---|---|
|
stable (lenny) release |
|
|
testing (squeeze) release |
|
|
unstable (sid) release |
|
|
experimental pre-release (optional, only for developer) |
|
|
Updates for the next stable point release (optional) |
|
|
Security updates for stable release (important) |
|
|
Security updates for testing release (important) |
|
|
Compatible updates for spam filter and IM clients, etc. |
|
|
Non-compatible updates for spam filter, IM clients, etc. |
|
|
Newer backported packages for lenny. (non-official, optional) |
Tip | |
---|---|
For the Debian system with the " |
Caution | |
---|---|
Only pure |
Caution | |
---|---|
You should basically list only one of " |
Each Debian archive consists of 3 components. Components are alternatively called categories in "Debian Policy" or areas in "Debian Social Contract". The component is grouped by the compliance to "The Debian Free Software Guidelines " (DFSG):
Table 3.3. The lists of Debian archive components.
component |
number of packages |
criteria |
---|---|---|
|
23809 |
The package is fully compliant to DSFG and does not depend the |
|
211 |
The package is compliant to the DSFG but depends on the |
|
376 |
The package is not compliant to the DSFG but distributable and useful. |
Here the number of packages in the above is for the amd64 architecture. Strictly speaking, only the main
component archive shall be considered the Debian system.
The Debian archive organization can be studied best by pointing your browser to the each archive URL appended with dists
or pool
.
The distribution is referred by two ways, the suite or codename. The word distribution is alternatively used as the synonym to the suite in many documentations. The relationship between the suite and the codename can be summarized as:
Table 3.4. The relationship between suite and codename.
Timing |
suite = " |
suite =" |
suite =" |
---|---|---|---|
after the " |
codename = " |
codename = " |
codename = " |
after the " |
codename = " |
codename = " |
codename = " |
The history of codenames are described in Debian FAQ: 6.3.1 Which other codenames have been used in the past?
In the stricter Debian archive terminology, the word "section" is specifically used for the categorization of packages by the application area. (Although, the word "main section" may sometimes be used to describe the Debian archive section which provides the main component.)
Every time a new upload is done by the Debian developer (DD) to the "unstable
" archive (via incoming processing), DD is required to ensure uploaded packages to be compatible with the latest set of packages in the latest "unstable
" archive.
If DD breaks this compatibility intentionally for important library upgrade etc, there is usually announcement to the debian-devel mailing list etc.
Before a set of packages are moved by the Debian archive maintenance script from the "unstable
" archive to the "testing
" archive, the archive maintenance script not only checks the maturity (about 10 days old) and the status of the RC bug reports for the packages but also tries to ensure them to be compatible with the latest set of packages in the "testing
" archive. This process makes the "testing
" archive very current and usable.
Through the gradual archive freeze process led by the release team, the "testing
" archive will be matured to make it completely consistent and bug free with some manual interventions. Then the new "stable
" release is created by assigning the codename for the old "testing
" archive to the new "stable
" archive and creating the new codename for the new "testing
" archive. The initial contents of the new "testing
" archive is exactly the same as that of the newly released "stable
" archive.
Both the "unstable
" and the "testing
" archives may suffer temporary glitches due to:
broken package upload to the archive (mostly for "unstable
"),
delay of accepting the new packages to the archive (mostly for "unstable
"),
archive synchronization timing issue (both for "testing
" and "unstable
"),
manual intervention to the archive such as package removal (more for "testing
"), etc.
So if you ever decide to use these archives, you should be able to fix or work around these kinds of glitches.
Tip | |
---|---|
When tracking the " |
See Debian Policy Manual for definition of:
"Sections",
"Priorities",
"Base system", and
The Debian system offers a consistent set binary packages through its versioned binary dependency declaration mechanism through the control file fields. Here is a bit over simplified definition for them.
Table 3.5. List of package dependencies.
dependency |
meaning |
---|---|
Depends |
This declares an absolute dependency and all of the packages listed in this field must be installed at the same time or in advance. |
Pre-Depends |
This is like Depends, except that it requires completed installation of the listed packages in advance. |
Recommends |
This declares a strong, but not absolute, dependency. Most users would not want the package unless all of the packages listed in this field are installed. |
Suggests |
This declares a weak dependency. Many users of this package may benefit from installing packages listed in this field but can have reasonable functions without them. |
Enhances |
This declares a week dependency like Suggests but works in the opposite direction. |
Conflicts |
This declares an absolute incompatibility. All of the packages listed in this field must be removed to install this package. |
Replaces |
This is declared when files installed by this package replace files in the listed packages. |
Provides |
This is declared when this package provide all of the files and functionality in the listed packages. |
Note | |
---|---|
Please note that defining, Provides, Conflicts and Replaces simultaneously to an virtual package is the sane configuration. This ensures that only one real package providing this virtual package can be installed at any one time. |
The official definition including source dependency can be found in the Policy Manual: Chapter 7 - Declaring relationships between packages.
The simplified event flow of the update is:
The local copy of package archive metadata is updated by the remote one(s) as: fetch -> reconstruct
The simplified event flow of the upgrade (safe-upgrade, full-upgrade, upgrade, and dist-upgrade) and the install are:
APT system makes decision on candidate version which is usually the latest available version. (See Section 3.7.3, “Tweaking candidate version” for exception.)
The system administrator makes choice such as upgrade of the entire system or install several new packages with candidate version.
Selected binary packages are processed as: fetch -> unpack -> preinst -> install -> postinst
The package removal process has 2 distinct stages and the simplified event flow of them are:
remove : remove all installed files except configuration files as: prerm -> remove -> postrm
purge : purge all installed files completely including configuration files as: prerm -> purge -> postrm
Here, I intentionally skipped technical details for the sake of big picture.
You should read the fine official documentation. The first document to read is the Debian specific /usr/share/doc/<package_name>/README.Debian
. Other documentation in /usr/share/doc/<package_name>/
should be consulted too. If you set shell as previously discussed, type:
$ cd <package_name> $ pager README.Debian $ mc
You may need to install the corresponding documentation package named with "-doc
" suffix for detailed information.
If you are experiencing problems with a specific package, make sure to check out these sites first:
Table 3.6. List of key web site to resolving problems with a specific package.
site |
command |
---|---|
Home page of the Debian bug tracking system (BTS) |
|
The bug report of a known package name. |
|
The bug report of known bug number. |
|
Search Google with search words including "site:debian.org".
When you file a bug report, please use reportbug
command.
Aptitude is the current preferred package management tool for the Debian system. It can be used as the commandline alternative to apt-get
/ apt-cache
and also as the full screen interactive package management tool.
For the package management operation which involves package installation or updates package metadata, you need to have root privilege.
Here are package management operations with commandline using aptitude
(8) and apt-get
(8) /apt-cache
(8).
Table 3.7. Package management operations with commandline using aptitude and apt-get / apt-cache.
|
|
description |
---|---|---|
" |
" |
Update package archive metadata. |
" |
" |
Install candidate version of " |
" |
" |
Install candidate version of installed packages without removing any other packages. |
" |
" |
Install candidate version of installed packages while removing other packages if needed. |
" |
" |
Remove " |
N/A |
" |
Remove auto-installed packages which is no longer required. |
" |
" |
Purge " |
" |
" |
Clear out the local repository of retrieved package files completely. |
" |
" |
Clear out the local repository of retrieved package files for outdated packages. |
" |
" |
Display detailed information about " |
" |
" |
Search packages which match <regex>. |
" |
N/A |
Explain the reason why <regex> matching packages should be installed. |
" |
N/A |
Explain the reason why <regex> matching packages can not be installed. |
Although it is now safe to mix different package tools on the Debian system, it is best to continue using aptitude
as much as possible.
The difference between "safe-upgrade
" and "full-upgrade
" only appears when new versions of packages stand in different dependency relationships from old versions of those packages. The "aptitude safe-upgrade
" command will never install new packages nor remove installed packages.
The "aptitude why <regex>
" can list more information by "aptitude -v why <regex>
". Similar information can be obtained by "apt-cache rdepends <package>
".
When aptitude
command is started in the commandline mode and faces some issues such as package conflicts, you can switch to the full screen interactive mode by pressing "e
"-key later at the prompt.
You may provide command options right after "aptitude
".
Table 3.8. Notable command options for "aptitude".
command option |
effects |
---|---|
|
simulate the result of the command. |
|
download only but no install/upgrade. |
|
show brief explanations before the automatic installations and removals. |
See aptitude
(8) and the "User's Manual" /usr/share/doc/aptitude/README
for more.
Tip | |
---|---|
The |
For the interactive package management, you start aptitude
in interactive mode from the console shell prompt as:
$ sudo aptitude -u Password:
This will update the local copy of the archive information and display the package list in the full screen with menu. Aptitude places its configuration at $HOME/.aptitude/config
.
Tip | |
---|---|
If you want to use root's configuration instead of user's one, use " |
Note | |
---|---|
|
Notable key strokes to browse status of packages and to set "planned action" on them in this full screen mode are:
Table 3.9. List of key bindings for aptitude.
key |
key binding |
---|---|
|
Menu |
|
Display help for keystroke (more complete listing) |
|
Display User's Manual |
|
Update package archive information |
|
Mark the package for the upgrade or the install |
|
Mark the package for the remove (keep conffiles) |
|
Mark the package for the purge (remove conffiles) |
|
Place the package on hold |
|
Mark all upgradable packages (function as dist-upgrade) |
|
Start downloading and installing selected packages |
|
Quit current screen and save changes |
|
Quit current screen and discard changes |
|
View information about a package |
|
View a package's changelog |
|
Change the limit for the displayed packages |
|
Search for the first match |
|
Repeat the last search |
The file name specification of the command line and the menu prompt after pressing "l
" and "/
" take the aptitude regex as described below. For the input to the menu prompt and argument to "aptitude search
" command, "~n
" is prepended to match the package name with the pattern if the input does not start with "~
" character.
Tip | |
---|---|
You need to press " |
In the interactive full screen mode of aptitude
(8), packages in the package list are displayed like this by default:
idA libsmbclient -2220kB 3.0.25a-1 3.0.25a-2
Here, this line means from the left as:
The "current state" flag (the first letter)
The "planned action" flag (the second letter)
The "automatic" flag (the third letter)
The package name
The change in disk space usage attributed to "planned action".
The current version of the package.
The candidate version of the package.
Tip | |
---|---|
The full list of flags are given at the bottom of Help screen shown by pressing " |
The candidate version is chosen according to the current local policy and preferences (see apt_preferences
(5)).
Several types of package views are available under the menu "Views":
Table 3.10. Views for aptitude.
view |
categorization |
status |
---|---|---|
Package View |
See Table 3.11, “The categorization of standard aptitude views. ”. (default) |
Good |
Audit Recommendations |
Packages which are recommended by some installed packages but not yet installed are listed. |
Good. |
Flat Package List |
Packages are listed without categorization (for use with regex). |
Good |
Debtags Browser |
Packages are categorized according to their debtags entries. |
Very usable |
Categorical Browser |
Packages are categorized according to their category. |
Deprecated (Use debtags!) |
Note | |
---|---|
Please help us improving tagging packages with debtags! |
The standard "Package View" categorizes packages somewhat like dselect
with few extra features. For switching distribution to a newer one can be achieved basically by
Table 3.11. The categorization of standard aptitude views.
category |
organization |
---|---|
"Upgradable Packages" |
Organized as section --> component --> package |
"New Packages" |
, , |
"Installed Packages" |
, , |
"Not Installed Packages" |
, , |
"Obsolete and Locally Created Packages" |
, , |
"Virtual Packages" |
You can pick a particular package from a set of packages with the same function. |
"Tasks" |
You can cherry pick particular packages from a set of packages of a task. |
Aptitude offers several options for you to search packages using its regex formula:
"aptitude search '<aptitude_regex>'
" to list their installation status, package name and short description.
"aptitude show '<package_name>'
" to list their installation detailed description.
limit view to matching packages: Type "l
" in the full screen mode.
search the first found package: type "/
" in the full screen mode. "n
" for find-next, "\
" for backward search.
Here, the string for <package_name> is treated as the exact string match to the package name unless it is started explicitly with "~
" to be the regex formula.
The aptitude regex formula is mutt-like extended ERE (see: Section 2.6.2, “Regular expressions”) and the meanings of the aptitude
specific special match rule extensions are as below:
Table 3.12. List of the aptitude regex formula.
meaning of the extended match rule |
regex formula |
---|---|
match on package name |
|
match on description |
|
match on task name |
|
match on debtag |
|
match on maintainer |
|
match on package section |
|
match on package version |
|
match archive |
|
match origin |
|
match priority |
|
match essential packages |
|
match virtual packages |
|
match new packages |
|
match with pending action |
|
match installed packages |
|
match installed packages with A-mark (auto installed package) |
|
match installed packages without A-mark (administrator selected package) |
|
match installed and upgradable packages |
|
match removed but not purged packages |
|
match removed, purged or can-be-removed packages |
|
match with broken relation |
|
match broken depends/predepends/conflict packages |
|
match packages whose control files define relation <type> to the <term> package |
|
match packages whose control files define broken relation <type> to the <term> package |
|
match packages to which the <term> package defines relation <type> |
|
match packages to which the <term> package defines broken relation <type> |
|
match packages to which some other installed packages depend on |
|
match packages to which no other installed packages depend on |
|
match packages to which some other installed packages depend or recommend on |
|
match <term> package with filtered version |
|
match all packages (true) |
|
match no packages (false) |
|
Here,
regex part is the same ERE as the one used in typical Unix-like text tools using "^
", ".*
", "$
" etc. as in egrep
(1), awk
(1) and perl
(1).
relation <type> is one of (depends, predepends, recommends, suggests, conflicts, replaces, provides).
the default relation type is "depends".
Tip | |
---|---|
When <regex_pattern> is a null string, place " |
Short cuts:
"~P<term>
" == "~Dprovides:<term>
"
"~C<term>
" == "~Dconflicts:<term>
"
"...~W term
" == "(...|term)
"
Users familiar with mutt
will pick up quickly, as mutt was the inspiration for the expression syntax. See "SEARCHING, LIMITING, AND EXPRESSIONS" in the "User's Manual" /usr/share/doc/aptitude/README
.
Note | |
---|---|
With the " |
The selection of a package in aptitude
not only pulls in packages which are defined in its "Depends:
" list but also defined in the "Recommends:
" list if the menu "F10
-> Options -> Dependency handling" is set accordingly. These auto installed packages are removed automatically if they are no longer needed under aptitude
.
Note | |
---|---|
Before the " |
You can check package activity history in the log files.
Table 3.13. The log files for package activities.
file |
content |
---|---|
|
Log of |
|
Log of generic APT activity. |
|
Log of |
In reality, it is not so easy to get meaningful understanding quickly out from these logs. See Section 10.2.8, “Recording changes in configuration files” for easier way.
Aptitude has advantages over other APT based packaging systems (apt-get, apt-cache, synaptic, ...):
aptitude
removes unused auto installed packages automatically using its own extra layer of package state file (/var/lib/aptitude/pkgstates
). (For new "lenny
", other APT does the same.)
aptitude
makes it easy to resolve package conflicts and to add recommended packages.
aptitude
makes it easy to keep track of obsolete software by listing under "Obsolete and Locally Created Packages".
aptitude
gives a log of its history in /var/log/aptitude
.
aptitude
offers access to all versions of the package if available.
aptitude
includes a fairly powerful regex based system for searching particular packages and limiting the package display.
aptitude
in the full screen mode has su
functionality embedded and can be run from normal user until you really need administrative privileges.
For the old "etch
" release version, synaptic
also gives you the history log; apt-get
did not but you can rely on the log of dpkg
.
Anyway, aptitude
is nice for interactive console use.
Here are few examples of aptitude
(8) operations.
The following command lists packages with regex matching names.
$ aptitude search '~n(pam|nss).*ldap' p libnss-ldap - NSS module for using LDAP as a naming service p libpam-ldap - Pluggable Authentication Module allowing LDAP interfaces
This is quite handy for you to find the exact name of a package.
The regex "~dipv6
" in the "New Flat Package List" view with "l
" prompt, limits view to packages with the matching description and let you browse their information interactively.
You can purge all remaining configuration files of removed packages:
# aptitude search '~c'
check results
# aptitude purge '~c'
You may want to do the similar in the interactive mode for fine grained control.
You provide the regex "~c
" in the "New Flat Package List" view with "l
" prompt. This limits the package view only to regex matched packages, i.e., "removed but not purged". All these regex matched packages can be shown by pressing "[
" at top level headings.
Then you press "_
" at top level headings such as "Installed Packages". Only regex matched packages under the heading are marked to be purged by this. You can exclude some packages to be purged by pressing "=
" interactively for each of them.
This technique is quite handy and works for many other command keys.
Here is how I tidy auto/manual install status for packages (after using non-aptitude package installer etc.):
Start aptitude
in interactive mode as root.
Type "u
", "U
", "f
" and "g
" to update and upgrade package list and packages.
Type "l
" to enter the package tree limit as "~i(~R~i|~Rrecommends:~i)
" and type "M
" over "Installed Packages
" as auto installed.
Type "l
" to enter the package tree limit as "~prequired|~pimportant|~pstandard|~E
" and type "m
" over "Installed Packages
" as manual installed.
Type "l
" to enter the package tree limit as "~i!~M
" and remove unused package by typing "-
" over each of them after exposing them by typing "[
" over "Installed Packages
".
Type "l
" to enter the package tree limit as "~i
" and type "m
" over "Tasks
" as manual installed.
Exit aptitude
.
Start "apt-get -s autoremove|less
" as root to check what are not used.
Restart aptitude
in interactive mode and mark needed packages as "m
".
Restart "apt-get -s autoremove|less
" as root to recheck REMOVED contain only expected packages.
Start "apt-get autoremove|less
" as root to autoremove unused packages.
The "m
" action over "Tasks
" is an optional one to prevent mass package removal situation in future.
Note | |
---|---|
When moving to a new release etc, you should consider to perform a clean installation of new system even though Debian is upgradable as described below. This provides you a chance to remove garbages collected and exposes you to the best combination of latest packages. Of course, you should make a full backup of system to a safe place (see Section 11.1.6, “Backup and recovery”) before doing this. I recommend to make a dual boot configuration using different partition to have the smoothest transition. |
You can perform system wide upgrade to a newer release by changing contents of the /etc/apt/sources.list
file pointing to a new release and running the "aptitude update; aptitude dist-upgrade
" command.
To upgrade from "stable
" to "testing
" or "unstable
", you replace "lenny
" in the /etc/apt/sources.list
example of Section 3.1.4, “Debian archive basics” with "squeeze
" or "sid
".
In reality, you may face some complications due to some package transition issues, mostly due to package dependencies. The larger the difference of the upgrade, the more likely you face larger troubles. For the transition from the old "stable
" archive to the new "stable
" after its release, you can read its new Release Notes and follow the exact procedure described in it to minimize troubles.
When you decide to move from "stable
" to "testing
" before its formal release, there are no Release Notes to help you. The difference between "stable
" and "testing
" could have grown quite large after the previous "stable
" release and makes upgrade situation complicated.
You should make some precautionary moves while gathering latest information from mailing list and using common senses:
read previous "Release Notes".
back up entire system (especially data and configuration information).
have bootable media handy for broken bootloader.
inform users on the system well in advance.
record upgrade activity with the script
(1) command.
apply "unmarkauto" to essential packages, e.g., "aptitude unmarkauto vim
", to prevent removal.
minimize installed packages to reduce chance of package conflicts, e.g., remove desktop task packages.
remove the /etc/apt/preferences
file. (disable apt-pinning)
try to upgrade step wise: "oldstable
" --> "stable
" --> "testing
" --> "unstable
".
update the /etc/apt/sources.list
file to point to new archive only and run "aptitude update
".
install, optionally, new core packages first, e.g., "aptitude install perl
".
run the "aptitude dist-upgrade -s
" command to assess impact.
run the "aptitude dist-upgrade
" command.
Caution | |
---|---|
It is not wise to skip major Debian release when upgrading between " |
Caution | |
---|---|
In previous "Release Notes", GCC, Linux Kernel, initrd-tools, Glibc, Perl, APT tool chain, etc. have required some special attention for system wide upgrade. |
For daily upgrade in "unstable
", see Section 3.4.3, “Safeguard for package problems”.
Here are list of other package management operations for which aptitude
is too high-level or lacks required functionalities.
Table 3.14. List of advanced package management operations.
action |
command |
---|---|
list status of an installed package for the bug report. |
" |
list the contents of an installed package. |
" |
list the manpages for an installed package. |
" |
list installed packages which have matching file name. |
" |
list packages in archive which have matching file name. |
" |
list the contents of matching packages in archive. |
" |
reconfigure the exact package . |
" |
reconfigure the exact package with the most detailed question. |
" |
reconfigure packages from the full screen menu. |
" |
audit system for partially installed packages. |
" |
configures all partially installed packages. |
" |
show available version, priority, and archive information of a binary package. |
" |
show available version, archive information of a package. |
" |
show source package information of a binary package. |
" |
install required packages to build package. |
" |
download a source. (from standard archive) |
" |
download a source packages. (from other archive) |
" |
build a source tree from a set of source packages (*.tar.gz *.diff.gz). |
" |
build package(s) from a local source tree. |
" |
build a kernel package from a kernel source tree. |
" |
build a kernel package from a kernel source tree with initramfs enabled. |
" |
install a local package to the system. |
" |
install local package(s) to the system. |
" |
save |
" |
set |
" |
Caution | |
---|---|
Use of lower level package tools such as " |
Please note:
All system configuration and installation commands require to be run from root.
Unlike aptitude
which uses regex (see: Section 2.6.2, “Regular expressions”), other package management commands use pattern like shell glob (see: Section 2.5.3, “Shell glob”).
apt-file
commands require apt-file
package and run "apt-file update
" in advance.
configure-debian
command requires configure-debian
package and runs dpkg-reconfigure
as its backend.
dpkg-reconfigure
command runs package scripts using debconf
as its backend.
"apt-get build-dep
", "apt-get source
" and "apt-cache showsrc
" commands require deb-src
entry in /etc/apt/sources.list
.
dget
, debuild
, and debi
commands require devscripts
package.
see (re)packaging procedure using "apt-get source
" in Section 3.7.8, “Port a package to the stable system”.
make-kpkg
command requires kernel-package
package (see Section 10.7, “The kernel”).
see Section 13.9, “Making Debian package” for general packaging.
Tip | |
---|---|
The source package format described here as a set of source packages (*.tar.gz *.diff.gz) is format 1.0 which is still popular. See more on |
The installation of debsums
package enables verification of installed package files against MD5sum values in the Packages
file with debsums
(1) command. See: Section 11.3.5, “The MD5 sum” for how MD5sum works.
Note | |
---|---|
Because MD5sum database may be tampered by the intruder, |
Many user prefer to follow the unstable release of the Debian system for its new features and packages. This makes the system more prone to be hit by the critical package bugs.
The installation of the apt-listbugs
package will provide safeguard to the critical bugs by checking Debian BTS automatically for critical bugs when upgrading with APT system.
The installation of the apt-listchanges
package will provide important news in NEWS.Debian when upgrading with APT system.
Although visiting Debian site http://packages.debian.org/ facilitates easy ways to search on the package meta data these days, let's look into more traditional ways.
The grep-dctrl
(1), grep-status
(1), and grep-available
(1) commands can be used to search any file which has the general format of a Debian package control file.
The "dpkg -S <file_name_pattern>
" can be used search package names which contain files with the matching name installed by dpkg
. But this overlooks files created by the maintainer scripts.
If you need to make more elaborate search on the dpkg meta data, you need to run "grep -e regex_pattern *
" command in the /var/lib/dpkg/info/
directory. This will let you identify:
the package name which installs, creates or modifies particular file which match pattern.
the package name which asks the installation query words which match pattern.
If you wish to look up package dependency recursively, you should use apt-rdepends
(8).
Let's learn how the Debian package management system works internally. This should help you to create your own solution to some package problems.
The meta data files are stored under the dist/
on each Debian mirror sites, e.g., ftp://ftp.us.debian.org/debian/
. Its archive structure can be browsed by the web browser. There are 6 types of key meta data:
Table 3.15. The content of the Debian archive meta data.
file |
location |
content |
---|---|---|
|
top of distribution |
archive description and integrity information |
|
top of distribution |
signature file for |
|
top of distribution |
list of all files for all the packages in the pertinent archive |
|
top of each distribution/component/architecture combination |
archive description |
|
top of each distribution/component/binary-architecture combination |
concatenated |
|
top of each distribution/component/source combination |
concatenated |
In the recent archive, these meta data are stored as the compressed and differential files to reduce network traffic.
Each suites of the Debian archive has a top level Release file, e.g., ftp://ftp.us.debian.org/debian/dists/unstable/Release
:
Origin: Debian Label: Debian Suite: unstable Codename: sid Date: Sat, 26 Jan 2008 20:13:58 UTC Architectures: alpha amd64 arm hppa hurd-i386 i386 ia64 m68k mips mipsel powerpc s390 sparc Components: main contrib non-free Description: Debian x.y Unstable - Not Released MD5Sum: e9f11bc50b12af7927d6583de0a3bd06 22788722 main/binary-alpha/Packages 43524d07f7fa21b10f472c426db66168 6561398 main/binary-alpha/Packages.gz ...
Note | |
---|---|
Here, you can find my rationale to use the "suite", "codeneme", and "components" in Section 3.1.4, “Debian archive basics”. The "distribution" is used when referring to both "suite" and "codeneme". |
The integrity of the top level Release
file is verified by cryptographic infrastructure called the secure apt.
The cryptographic signature file Release.gpg
is created from the authentic top level Release
file and the secret Debian archive key.
The public Debian archive signing key can be seeded into /etc/apt/trusted.gpg
:
automatically by installing the keyring with the latest base-files
package, or
manually by gpg
or apt-key
tool with the latest public archive key posted on the ftp-master.debian.org .
The secure APT system verifies the integrity of the downloaded top level Release
file cryptographically by this Release.gpg
file and the public Debian archive key in /etc/apt/trusted.gpg
.
The integrity of all the Packages
and Sources
files are verified by using MD5sum values in its top level Release
file. The integrity of all package files are verified by using MD5sum values in the Packages
and Sources
files. See debsums
(1) and Section 3.4.2, “Verify installed package files”.
Since the cryptographic signature verification is very CPU intensive process than the MD5sum value calculation, use of MD5sum value for each package while using cryptographic signature for the top level Release
file provides the good security with the performance (see: Section 11.3, “Data security infrastructure”).
Tip | |
---|---|
The archive level Release files are used for the rule of |
There are archive level Release files for all archive locations specified by "deb:
" line in /etc/apt/sources.list
, such as "ftp://ftp.us.debian.org/debian/dists/unstable/main/binary-amd64/Release
" or "ftp://ftp.us.debian.org/debian/dists/sid/main/binary-amd64/Release
":
Archive: unstable Component: main Origin: Debian Label: Debian Architecture: amd64
Caution | |
---|---|
For Archive stanza, suite names (" |
For some archives, such as "experimental
", "volatile-sloppy
", and "lenny-backports
", which contain packages which should not be installed automatically, there is an extra line, e.g., "ftp://ftp.us.debian.org/debian/dists/experimental/main/binary-amd64/Release
":
Archive: experimental Component: main Origin: Debian Label: Debian NotAutomatic: yes Architecture: amd64
Please note that for normal archives without "NotAutomatic: yes
", the default Pin-Priority value is 500, while for special archives with "NotAutomatic: yes
", the default Pin-Priority value is 1 (see apt_preferences
(5) and Section 3.7.3, “Tweaking candidate version”).
When APT tools, such as aptitude
, apt-get
, synaptic
, apt-file
, auto-apt
..., are used, we need to update the local copies of the meta data containing the Debian archive information. These local copies have file names corresponding to the specified distribution
component
and architecture
names in the /etc/apt/sources.list
(see: Section 3.1.4, “Debian archive basics”) under the /var/lib/apt/lists
directory as:
ftp.us.debian.org_debian_dists_<distribution>_Release
ftp.us.debian.org_debian_dists_<distribution>_Release.gpg
ftp.us.debian.org_debian_dists_<distribution>_<section>_binary-<architecture>_Packages
ftp.us.debian.org_debian_dists_<distribution>_<section>_source_Sources
/var/cache/apt/apt-file/ftp.us.debian.org_debian_dists_<distribution>_Contents-<architecture>.gz
(for apt-file
)
First 4 are shared by all the pertinent APT commands and updated from command line by "apt-get update
" and "aptitude update
". The Packages
meta data are updated if there is the deb
line in /etc/apt/sources.list
. The Sources
meta data are updated if there is the deb-src
line in /etc/apt/sources.list
.
The Packages
and Sources
meta data contain "Filename:
" stanza pointing to the file location of the binary and source packages. Currently, they are located under the pool/
directory tree for the improved transition over the releases.
The local copies of Packages
meta data can be interactively searched with the help of aptitude
. The specialized search command grep-dctrl
(1) can search the local copies of Packages
and Sources
meta data.
The local copyies of Contents-<architecture> files can be updated by "apt-file update
" and location is different from other 4 files. See apt-file
(1). (The auto-apt
uses different location for local caching of Contents-<architecture>.gz
as default.)
In addition to the remotely fetched meta data, the APT tool after "lenny
" stores its locally generated installation state information in the /var/lib/apt/extended_states
which is used only by all APT tools to track all auto installed packages.
In addition to the remotely fetched meta data, the aptitude
command stores its locally generated installation state information in the /var/lib/aptitude/pkgstates
which is used only by it.
All the remotely fetched packages via APT mechanism are stored in the /var/cache/apt/packages
until they are cleaned.
The Debian package files has particular name structures:
Table 3.16. The name structures of the Debian packages.
entity |
name structure |
---|---|
The binary package (a.k.a deb) |
<package-name>_<epoch>:<upstream-version>-<debian.version>-<architecture>.deb |
The binary package for the debian-installer (a.k.a udeb) |
<package-name>_<epoch>:<upstream-version>-<debian.version>-<architecture>.udeb |
The source package (upstream source) |
<package-name>_<epoch>:<upstream-version>-<debian.version>.tar.gz |
The source package (Debian changes) |
<package-name>_<epoch>:<upstream-version>-<debian.version>.diff.gz |
The source package (description) |
<package-name>_<epoch>:<upstream-version>-<debian.version>.dsc |
where,
Table 3.17. The usable characters for each component in the Debian package names.
component |
usable characters (regex) |
required |
---|---|---|
<package-name> |
|
required |
<epoch>: |
|
optional |
<upstream-version> |
|
required |
<debian.version> |
|
optional |
Note | |
---|---|
You can check package version order by |
Note | |
---|---|
The debian-installer (d-i) uses |
The dpkg
is the lowest level tool for the Debian package management. This is very powerful and needs to be used with care.
The fetched package is processed by dpkg
in the following order:
unpack the deb file ("ar -x
" equivalent)
preinst using debconf
install the package content to the system ("tar -x
" equivalent)
postinst using debconf
The debconf
system provides standardized user interaction with i18n and l17n supports.
Here dpkg
creates following files under /var/lib/dpkg/info/
directory : While installing package called <package_name>
, dpkg
creates several files and execute scripts.
Table 3.18. The notable files for dpkg.
file |
contents |
---|---|
|
list of user modifiable files. |
|
list of files and directories installed by the package. |
|
list of MD5 hash values for files installed by the package. |
|
package script run before the package installation. |
|
package script run after the package installation. |
|
package script run before the package removal. |
|
package script run after the package removal. |
|
package script for |
|
the alternative information used by the |
|
the availability information for all the package. |
|
the diversions information used by the |
|
the status information for all the packages. |
|
the first-generation backup of the |
|
the second-generation backup and older ones of the |
The last file status
is also used by the tools such as "dpkg
", "select update
" and "apt-get -u dselect-upgrade
".
The specialized search command grep-dctrl
(1) can search the local copies of status
and available
meta data.
Tip | |
---|---|
In the debian-installer environment, the |
The Debian system has mechanism to install somewhat overlapping programs peacefully using update-alternatives
(8). For example, to make the command vi
select to run vim
while installing both vim
and nvi
:
$ ls -l $(type -p vi) lrwxrwxrwx 1 root root 20 2007-03-24 19:05 /usr/bin/vi -> /etc/alternatives/vi $ sudo update-alternatives --display vi ... $ sudo update-alternatives --config vi Selection Command ----------------------------------------------- 1 /usr/bin/vim *+ 2 /usr/bin/nvi Enter to keep the default[*], or type selection number: 1
The Debian alternatives system keeps its selection as symlinks in /etc/alternatives/
. The selection process uses corresponding file in /var/lib/dpkg/alternatives/
.
Stat overrides provided by the dpkg-statoverride
(8) command are a way to tell dpkg
(1) to use a different owner or mode for a file when a package is installed. If "--update
" is specified and file exists, it is immediately set to the new owner and mode.
Note | |
---|---|
I use the word file here, but in reality this can be any filesystem object that |
Caution | |
---|---|
The direct alteration of owner or mode for a file owned by the package using |
File diversions provided by the dpkg-divert
(8) command are a way of forcing dpkg
(1) not to install a file into its default location, but to a diverted location. The use of dpkg-divert
is meant for the package maintenance scripts. Its use by the system administrator is deprecated.
When running "unstable
" system, the administrator is expected to recover from broken package management situation.
Caution | |
---|---|
Some methods described here are high risk actions. You have been warned! |
If a desktop GUI program experienced instability after significant upstream version upgrade, you should suspect interferences with old local configuration files created by it. If it is stable under newly created user account, this hypothesis is confirmed. (This is a bug of packaging and usually avoided by the packager.)
To recover stability, you should move corresponding local configuration files and restart the GUI program. You may need to read old configuration file contents to recover configuration information later. (Do not erase them too quickly.)
Archive level package management systems, such as aptitude
(8) or apt-get
(1), will not even try to install packages with overlapped files using package dependencies (see Section 3.1.5, “Package dependencies”).
Errors by the package maintainer or deployment of inconsistently mixed source of archives (see Section 3.7.2, “Packages from mixed source of archives”) by the system administrator may create situation with incorrectly defined package dependencies. When you install a package with overlapped files using aptitude
(8) or apt-get
(1) under such situation, dpkg
(1) which unpacks package ensures to return error to the calling program without overwriting existing files.
Caution | |
---|---|
The use of third party packages introduces significant system risks via maintainer scripts which are run with root privilege and can do anything to your system. The |
You can work around such broken installation by removing the old offending package, <old-package>
, first:
$ sudo dpkg -P <old-package>
When a command in the package script returns error for some reason and the script exits with error, the package management system aborts their action and ends up with partially installed packages. When a package contains bugs in its removal scripts, the package may become impossible to remove and quite nasty.
For the package script problem of "<package_name>
", you should look for:
/var/lib/dpkg/info/<package_name>.preinst
/var/lib/dpkg/info/<package_name>.postinst
/var/lib/dpkg/info/<package_name>.prerm
/var/lib/dpkg/info/<package_name>.postrm
You edit the offending part of the script from the root:
to prepend with ": #
" or,
to append with "|true
".
Then configures all partially installed packages by:
# dpkg --configure -a
Since dpkg
is very low level package tool, it can function under the very bad situation such as unbootable system without network connection. Let's assume foo
package was broken and needs to be replaced.
You may still find cached copies of older version of foo
package in /var/cache/apt/archives/
which is bug free. (If not, you can download it from archve of http://snapshot.debian.net/ or copy it from package cache of a functioning machine.)
If you can boot the system, you may install it by:
# dpkg -i /path/to/foo_<old_version>_<arch>.deb
Tip | |
---|---|
If system breakage is minor, you may alternatively downgrade the whole system as Section 3.7.5, “Emergency downgrading” using the higher level APT system. |
If your system is unbootable from harddisk, you should seek other ways to boot it. For example, you can:
boot the system using the debian-installer CD in rescue mode,
mount the unbootable system on the harddisk to /target
,
install older version of foo
package by:
# dpkg --root /target -i /path/to/foo_<old_version>_<arch>.deb
This second example works even if the dpkg
command on the harddisk is broken.
Tip | |
---|---|
Any linux system started by another system on harddisk, live linux CD, bootable USB-key drive, or netboot can be used similarly to rescue broken system. |
If attempting to install a package this way fails due to some dependency violations and you really need to do this as the last resort, you can override dependency using dpkg
's --ignore-depends
, --force-depends
and other options. If you do this, you need to make serious effort to restore proper dependency later. See dpkg
(8) for details.
Note | |
---|---|
When your system is seriously broken, you should make a full backup of system to a safe place (see Section 11.1.6, “Backup and recovery”) and should perform a clean installation. This is less time consuming and produces better results in the end. |
If /var/lib/dpkg/status
becomes corrupt for any reason, the Debian system loses package selection data and suffers severely. Look for the old /var/lib/dpkg/status
file at /var/lib/dpkg/status-old
or /var/backups/dpkg.status.*
.
Keeping /var/backups/
in a separate partition may be a good idea since this directory contains lots of important system data.
If everything is gone, I recommend to make fresh re-install after making backup of the system in such serious breakage though. You can still recover some information from directories in /usr/share/doc/
to guide your new installation.
... reinstall minimal (desktop) system ... place old system at /path/to/old/system/ # cd /path/to/old/system/usr/share/doc # ls -1 >~/ls1.txt # cd /usr/share/doc # ls -1 >>~/ls1.txt # cd # sort ls1.txt | uniq | less
Then you will be presented with missing package names. (There may be some non-package names such as "texmf
".)
You can seek packages which satisfy your needs with aptitude
from the package description or from the list under "Tasks".
When you encounter more than 2 similar packages and wonder which one to install without "trial and error" efforts, you can use some common sense. I consider following points are good indications of preferred packages.
essential: yes > no
component: main > contrib > non-free
priorities: required > important > standard > optional > extra
task: package listed in task such as desktop
package selected by the dependency package (e.g., python2.4
by python
)
popcon: higher in the vote and install number
changelog: regular updates by the maintainer
BTS: No RC bugs (no critical, no grave, and no serious bugs)
BTS: responsive maintainer to bug reports
BTS: higher number of the recently fixed bugs
BTS: lower number of remaining non-wishlist bugs
Debian being a volunteer project with distributed development model, its archive contains many packages with different focus and quality. You must make your own decision what to do with them.
Caution | |
---|---|
Installing packages from mixed source of archives is not supported by the official Debian distribution except for officially supported particular combinations of archives such as " |
Here is an example of operations to include specific newer upstream version packages found in "unstable
" while tracking "testing
" for single occasion:
change the /etc/apt/sources.list
file temporarily to single "unstable
" entry
run "aptitude update
"
run "aptitude install <package-name>
"
recover the original /etc/apt/sources.list
file for "testing
"
run "aptitude update
"
You do not create the /etc/apt/preferences
file nor need to worry about apt-pinning with this manual approach. But this is very cumbersome.
Caution | |
---|---|
When using mixed source of archives, you must ensure compatibility of packages by yourself since the Debian does not guarantee it. If package incompatibility exists, you may break system. You must be able to judge these technical requirements. The use of mixed source of random archives is completely optional operation and its use is not something I encourage you to use. |
General rules for installing packages from different archives are:
non-binary packages ("Architecture: all
") are safer to install.
documentation packages: no special requirements
interpreter program packages: compatible interpreter must be available
completely statically linked binary packages are safe to install.
binary packages (non "Architecture: all
") usually face many road blocks and unsafe to install.
Note | |
---|---|
Except to avoid broken package for a short term, installing binary packages from officially unsupported archives is generally bad idea. This is true even if you use apt-pinning (see Section 3.7.3, “Tweaking candidate version”). You should consider chroot or similar techniques (see Section 10.8, “The chroot”) to run programs from different archives. |
Without the /etc/apt/preferences
file, APT system choses the latest available version as the candidate version using the version string. This is the normal state and most recommended usage of APT system. All officially supported combinations of archives do not require the /etc/apt/preferences
file since some archives which should not be used as the automatic source of upgrades are marked as NotAutomatic and dealt properly.
Tip | |
---|---|
The version string comparison rule can be verified with, e.g., " |
When you install packages from mixed source of archives (see Section 3.7.2, “Packages from mixed source of archives”) regularly, you can automate these complicated operations by creating the /etc/apt/preferences
file with proper entries and tweaking the package selection rule for candidate version as described in apt_preferences
(5). This is called apt-pinning.
Warning | |
---|---|
Use of apt-pinning by a novice user is sure call for major troubles. You must avoid using apt-pinning except when you absolutely need it. |
Caution | |
---|---|
When using apt-pinning, you must ensure compatibility of packages by yourself since the Debian does not guarantee it. The apt-pinning is completely optional operation and its use is not something I encourage you to use. |
Caution | |
---|---|
Archive level Release files (see Section 3.5.3, “Archive level Release files”) are used for the rule of |
Note | |
---|---|
Even if you do not create the |
Here is a simplified explanation of apt-pinning technique. Each package has its Pin-Priority value based on the entries in the /etc/apt/preferences
file or the default values.
Table 3.19. List of essential default Pin-Priority values.
Pin-Priority |
description |
---|---|
990 |
default value for package from the target release archive |
500 |
default value for package from the normal archive |
100 |
default value for package from the installed package |
1 |
default value for package from the NotAutomatic archive |
APT system normally choses highest Pin-Priority upgrading package from the available resources defined in the /etc/apt/sources.list
file as the candidate version. This version restriction for upgrading is dropped to enable downgrading if the Pin-Priority of package is larger than 1000 (see Section 3.7.5, “Emergency downgrading”).
The target release can be set:
by /etc/apt/apt.conf
, e.g., "APT::Default-Release "stable";
" line in it, or
by "-t
" option argument, e.g., "apt-get install -t testing some-package
".
The archive level Release file (see Section 3.5.3, “Archive level Release files”) of NotAutomatic archive contains "NotAutomatic: yes
".
Caution | |
---|---|
Although cryptic to read, you should test Pin-Priority situation of your |
The Pin-Priority values of <package> from multiple sources are shown by the output of "apt-cache policy <package>
":
a line started with "Package pin:
" lists the package version of pin if association just with <package> is defined, e.g., "Package pin: 0.190
",
no line with "Package pin:
" exists if no association just with <package> is defined,
the Pin-Priority value associated just with <package> is listed right side of all version strings, e.g., "0.181 700
",
0 is listed right side of all version strings if no association just with <package> is defined, e.g., "0.181 0
", and
the Pin-Priority values of archives (defined as "Package: *
" in the /etc/apt/preferences
file) are listed left side of all archive paths, e.g., "200 http://backports.org etch-backports/main Packages
".
Here is an example of apt-pinning technique to include specific newer upstream version packages found in "unstable
" regularly upgraded while tracking "testing
". You list all required archives in the /etc/apt/sources.list
file as:
deb http://ftp.us.debian.org/debian/ testing main contrib non-free deb http://ftp.us.debian.org/debian/ unstable main contrib non-free deb http://security.debian.org/ testing/updates main contrib
and set the /etc/apt/preferences
file as:
Package: * Pin: release a=testing Pin-Priority: 500 Package: * Pin: release a=unstable Pin-Priority: 200
When you wish to install a package named "<package-name>
" with its dependencies from "unstable
" archive under this configuration, you issue the following command which switches target release with "-t
" option (Pin-Priority of "unstable
" becomes 990.):
$ sudo aptitude install -t unstable <package-name>
With this configuration, usual execution of "aptitude upgrade
" and "aptitude dist-upgrade
" will upgrade packages which were installed from "testing
" archive using current "testing
" archive and packages which were installed from "unstable
" archive using current "unstable
" archive.
Caution | |
---|---|
Be careful not to remove " |
Tip | |
---|---|
I usually edit the |
Tip | |
---|---|
If " |
If you wish to track particular packages in "unstable
" automatically without initial "-t unstable
" installation, you must create the /etc/apt/preferences
file and explicitly lists all those packages at the top of it as:
Package: <package-1> Pin: release a=unstable Pin-Priority: 700 Package: <package-2> Pin: release a=unstable Pin-Priority: 700 ...
These will set Pin-Priority value for each specific package. For example, in order to track the latest "unstable
" version of this "Debian Reference" in English, you should have following entries in the /etc/apt/preferences
file:
Package: debian-reference-en Pin: release a=unstable Pin-Priority: 700 Package: debian-reference-common Pin: release a=unstable Pin-Priority: 700
Tip | |
---|---|
This apt-pinning technique is valid even when you are tracking " |
Here is another example of apt-pinning technique to include specific newer upstream version packages found in "experimental
" while tracking "unstable
". You list all required archives in the /etc/apt/sources.list
file as:
deb http://ftp.us.debian.org/debian/ unstable main contrib non-free deb http://ftp.us.debian.org/debian/ experimental main contrib non-free deb http://security.debian.org/ testing/updates main contrib
The default Pin-Priority value for "experimental
" archive is always 1 since it is NotAutomatic archive (see Section 3.5.3, “Archive level Release files”). There is no need to set Pin-Priority value in the /etc/apt/preferences
file to use experimental archive unless you wish to track particular packages automatically.
There are The debian-volatile Project and http://backports.org archives which provide updgrade packages for "stable
".
Warning | |
---|---|
Do not use all packages available in the NotAutomatic archives such as " |
Caution | |
---|---|
http://backports.org is a non-Debian archive, although its packages are signed by Debian developers. |
Caution | |
---|---|
Archive level Release files (see Section 3.5.3, “Archive level Release files”) are used for the rule of |
Here is an example of apt-pinning technique to include specific newer upstream version packages found in "lenny-backports
" while tracking "lenny
" and "volatile
". You list all required archives in the /etc/apt/sources.list
file as:
deb http://ftp.us.debian.org/debian/ lenny main contrib non-free deb http://security.debian.org/ lenny/updates main contrib deb http://volatile.debian.org/debian-volatile/ lenny/volatile main contrib non-free deb http://volatile.debian.org/debian-volatile/ lenny/volatile-sloppy main contrib non-free deb http://backports.org/debian/ lenny-backports main contrib non-free
The default Pin-Priority value for http://backports.org archive and "volatile-sloppy
" are always 1 since they are NotAutomatic archive (see Section 3.5.3, “Archive level Release files”). There is no need to set Pin-Priority value explicitly in the /etc/apt/preferences
file just to use for http://backports.org and "volatile-sloppy
" archive unless you wish to track packages automatically for next upgrading.
So whenever you wish to install a package named "<package-name>
" with its dependency from "lenny-backports
" archive, you use following command while switching target release with "-t
" option:
$ sudo aptitude install -t lenny-backports <package-name>
If you wish to upgrade particular packages, you must create the /etc/apt/preferences
file and explicitly lists all packages in it as:
Package: <package-1> Pin: release o=Backports.org archive Pin-Priority: 700 Package: <package-2> Pin: release o=volatile.debian.org Pin-Priority: 700 ...
Alternatively, with the /etc/apt/preferences
file as:
Package: * Pin: release a=stable , o=Debian Pin-Priority: 500 Package: * Pin: release a=lenny, o=volatile.debian.org Pin-Priority: 500 Package: * Pin: release a=lenny-backports, o=Backports.org archive Pin-Priority: 200 Package: * Pin: release a=lenny-sloppy, o=volatile.debian.org Pin-Priority: 200
execution of "aptitude upgrade
" and "aptitude dist-upgrade
" will upgrade packages which were installed from "stable
" archive using current "stable
" archive and packages which were installed from other archives using current corresponding archive for all archives in the /etc/apt/sources.list
file.
Caution | |
---|---|
Downgrading is not officially supported by the Debian by design. It should be done only as a part of emergency recovery process. Despite of this situation, it is known to work well in many incidents. For critical systems, You should backup all important data on the system after the recovery operation and re-install the new system from the scratch. |
You may be lucky to downgrade from newer archive to older archive to recover from broken system upgrade by manipulating candidate version (see: Section 3.7.3, “Tweaking candidate version”). This is lazy alternative to tedious actions of many "dpkg -i <broken-package>_<old-version>.deb
" commands (see Section 3.6.4, “Rescue using the dpkg command”).
For downgrading system tracking "unstable
" to "testing
", change the /etc/apt/sources.list
file from:
deb http://ftp.us.debian.org/debian/ sid main contrib non-free
to:
deb http://ftp.us.debian.org/debian/ squeeze main contrib
and set the /etc/apt/preferences
file as:
Package: * Pin: release a=testing Pin-Priority: 1010
Then run "aptitude dist-upgrade
" to force downgrading of packages across the system. You should remove this special /etc/apt/preferences
file after the downgrading.
Although the maintainer name listed in /var/lib/dpkg/available
and /usr/share/doc/package_name/changelog
provide some information on "who is behind the packaging activity", the actual uploader of the package is somewhat obscure. The who-uploads
(1) in devscripts
package identifies the actual uploader of Debian source packages.
If you are to compile a program from source to replace the Debian package, it is best to make it into a real local debianized package (*.deb
) and use private archive.
If you chose to compile a program from source and to install them under /usr/local
instead, you may need to use equivs
as a last resort to satisfy the missing package dependency.
Package: equivs Priority: extra Section: admin Description: Circumventing Debian package dependencies This is a dummy package which can be used to create Debian packages, which only contain dependency information.
For partial upgrades of the "stable
" system, rebuilding a package within its environment using the source package is desirable. This avoids massive package upgrades due to their dependencies. First, add the following entries to the /etc/apt/sources.list
of a "stable
" system:
deb-src http://http.us.debian.org/debian unstable main contrib non-free
Then get the required packages and the source to be downloaded and compiled by:
# aptitude update # aptitude dist-upgrade # aptitude install fakeroot devscripts build-essential $ apt-get build-dep foo $ apt-get source foo $ cd foo*
adjust package if needed.
$ dch -i
bump package version, e.g. one appended with "+bp1
".
$ debuild $ cd .. # debi foo*.changes
Since mirroring whole subsection of Debian archive wastes disk space and network bandwidth, deployment of a local proxy server for APT is desirable consideration when you administer many systems on LAN. APT can be configure to use web (http) proxy server such as squid
(see Section 7.5, “Other network application servers”) as described in apt.conf
(5) and in /usr/share/doc/apt/examples/configure-index.gz
. The http_proxy
environment variable can be used to override proxy server setting in the /etc/apt/apt.conf
file.
There are proxy tools specially for Debian archive. You should check BTS before using them.
Table 3.20. List of the proxy tools specially for Debian archive
package |
popcon |
size |
description |
URL links |
---|---|---|---|---|
|
V:0.2, I:0.2 |
3632 |
caching proxy server for Debian archive files (compiled OCaml program) |
|
|
V:0.5, I:0.6 |
428 |
Debian archive proxy and partial mirror builder (Python program) |
|
|
V:0.3, I:0.6 |
312 |
Caching proxy for Debian package and source files (Perl program) |
|
|
V:0.09, I:0.13 |
680 |
aching proxy for distribution of software packages (compiled C++ program) |
|
|
V:0.15, I:0.2 |
1173 |
bittorrent proxy for downloading Debian packages (Python program) |
Here is an example for creating a small public package archive compatible with the modern secure APT system (see Section 3.5.2, “Top level Release file and authenticity”). Let's assume few things:
Account name: foo
Host name: www.example.com
Required packages: apt-utils
, gnupg
, and other packages.
URL: http://www.example.com/~foo/
displays /home/foo/public_html/index.html
Architecture of packages: amd64
One time setup of APT archive on your server system:
Create Foo's archive key on server system:
$ ssh foo@www.example.com $ gpg --gen-key ... $ gpg -K ... sec 1024D/3A3CB5A6 2008-08-14 uid Foo Bar (ARCHIVE KEY) <foo@www.example.com> ssb 2048g/6856F4A7 2008-08-14 $ gpg --export -a 3A3CB5A6 >foo.public.key
New Foo's archive key is 3A3CB5A6
Publish foo.public.key
file.
Create Foo's archive skeleton:
$ umask 022 $ mkdir -p ~/public_html/debian/pool/main $ mkdir -p ~/public_html/debian/dists/unstable/main/binary-amd64 $ mkdir -p ~/public_html/debian/dists/unstable/main/source $ cd ~/public_html/debian $ cat > dists/unstable/main/binary-amd64/Release << EOF Archive: unstable Version: 4.0 Component: main Origin: Foo Label: Foo Architecture: amd64 EOF $ cat > dists/unstable/main/source/Release << EOF Archive: unstable Version: 4.0 Component: main Origin: Foo Label: Foo Architecture: source EOF $ cat >aptftp.conf <<EOF APT::FTPArchive::Release { Origin "Foo"; Label "Foo"; Suite "unstable"; Codename "sid"; Architectures "amd64"; Components "main"; Description "Foo's public archive"; }; EOF $ cat >aptgenerate.conf <<EOF Dir::ArchiveDir "."; Dir::CacheDir "."; TreeDefault::Directory "pool/"; TreeDefault::SrcDirectory "pool/"; Default::Packages::Extensions ".deb"; Default::Packages::Compress ". gzip bzip2"; Default::Sources::Compress "gzip bzip2"; Default::Contents::Compress "gzip bzip2"; BinDirectory "dists/unstable/main/binary-amd64" { Packages "dists/unstable/main/binary-amd64/Packages"; Contents "dists/unstable/Contents-amd64"; SrcPackages "dists/unstable/main/source/Sources"; }; Tree "dists/unstable" { Sections "main"; Architectures "amd64 source"; }; EOF
Repetitive update of APT archive contents on your server system:
Place all package files into ~foo/public_html/debian/pool/main/
by executing "dupload -t foo changes_file
" in client while having ~/.dupload.conf
containing:
$cfg{'foo'} = { fqdn => "www.example.com", method => "scpb", incoming => "/home/foo/public_html/debian/pool/main", # The dinstall on ftp-master sends emails itself dinstall_runs => 1, }; $cfg{'foo'}{postupload}{'changes'} = " echo 'cd public_html/debian ; apt-ftparchive generate -c=aptftp.conf aptgenerate.conf; apt-ftparchive release -c=aptftp.conf dists/unstable >dists/unstable/Release ; rm -f dists/unstable/Release.gpg ; gpg -u 3A3CB5A6 -bao dists/unstable/Release.gpg dists/unstable/Release'| ssh foo@www.example.com 2>/dev/null ; echo 'Package archive created!'";
The postupload hook script initiated by dupload
(1) creates updated archive files for each upload.
You can add this small public archive to the apt-line of your client system:
$ sudo bash # echo "deb http://www.example.com/~foo/debian/ unstable main" \ >> /etc/apt/sources.list # apt-key add foo.public.key
Tip | |
---|---|
If the archive is located on the local file system, you can use " |
To make a local copy of the package and debconf selection states:
# dpkg --get-selections '*' > selection.dpkg # debconf-get-selections > selection.debconf
Here, '*' makes selection.dpkg
to include package entries for "purge" too.
You can transfer these 2 files to another computer, and install there with:
# dselect update # debconf-set-selections < myselection.debconf # dpkg --set-selections < myselection.dpkg # apt-get -u dselect-upgrade # or dselect install
If you are thinking about managing many cluster of servers with practically the same configuration, you should consider to use specialized package such as fai
to manage the whole system.
The alien
command enables the conversion of binary packages provided in Red Hat rpm
, Stampede slp
, Slackware tgz
, and Solaris pkg
file formats into a Debian deb
package. If you want to use a package from another Linux distribution than the one you have installed on your system, you can use alien
to convert it to your preferred package format and install it. alien
also supports LSB packages.
The original package needs to be statically linked or its library dependency needs to be satisfied manually. So use this command with great care.
The current .deb
package contents can be extracted without using the dpkg
command on any unix-like environment using standard ar
and tar
commands.
# ar x /path/to/dpkg_<version>_<arch>.deb # ls total 24 -rw-r--r-- 1 osamu osamu 1320 2007-05-07 00:11 control.tar.gz -rw-r--r-- 1 osamu osamu 12837 2007-05-07 00:11 data.tar.gz -rw-r--r-- 1 osamu osamu 4 2007-05-07 00:11 debian-binary # mkdir control # mkdir data # tar xvzf control.tar.gz -C control # tar xvzf data.tar.gz -C data
You can also browse package content using the mc
command.
You should read:
manpages for aptitude
(8), "dpkg
", "man 8 tasksel
", "man 8 apt-get
", "man 8 apt-config
", "man 8 apt-key
", "man 5 sources.list
", "man 5 apt.conf
", and "man 5 apt_preferences
";
"/usr/share/doc/apt-doc/guide.html/index.html
" and "/usr/share/doc/apt-doc/offline.html/index.html
" from the apt-doc
package;
Read /usr/share/doc/aptitude/html/en/index.html
from the aptitude-doc-en
package.
The official and detailed secondary information on the Debian archive are given by:
The tutorial for building of a Debian package for the common Debian user is given by:
It is wise for you as the system administrator to know roughly how the Debian system is started and configured. Although the exact details are in the source files of the packages installed and their documentations, it is a bit overwhelming for most of us.
I did my best to provide a quick overview of the key points of the Debian system and their configuration for your reference, based on the current and previous knowledge of mine and others. Since the Debian system is a moving target, the situation over the system may have been changed. Before making any changes to the system, you should refer to the latest documentation for each package.
The computer system undergoes several phases of boot strap processes from the power-on event until it offers the fully functional operating system (OS) to the user.
For simplicity, I will limit discussion to the typical PC platform with the default installation.
The typical boot strap process is like a four-stage rocket. Each stage rocket hands over the system control to the next stage one. Here each stage corresponds to:
Stage 1: the BIOS
Stage 2: the boot loader
Stage 3, the mini-Debian system
Stage 4: the normal Debian system
Of course, these can be configured differently. For example, if you compiled your own kernel, you may be skipping the step with the mini-Debian system. So please do not assume this is the case for your system until you check it yourself.
Note | |
---|---|
For non-legacy PC platform such as the SUN or the Macintosh system, the BIOS on ROM and the partition on the disk may be quite different (Section 10.3.1, “Partition configuration”). Please seek the platform specific documentations elsewhere for such a case. |
The BIOS is the 1st stage of the boot process which is started by the power-on event. The BIOS resides on the read only memory (ROM) from the particular memory address to which the program counter of CPU is initialized by the power-on event.
This BIOS performs the basic initialization of the hardware (POST: power on self test) and hands the system control to the next step which you provide. The BIOS is usually provided with the hardware.
The BIOS startup screen usually indicates what key(s) to press to enter the BIOS setup screen to configure the BIOS behavior. Popular keys used are F1, F2, F10, Esc, Ins, and Del. If your BIOS startup screen is hidden by a nice graphics screen, you may press some keys such as Esc to disable this. These keys are highly dependent on the hardware.
The hardware location and the priority of the code started by the BIOS can be selected from the BIOS setup screen. Typically, the first few sectors of the first found selected device (hard disk, floppy disk, CD-ROM, ...) are loaded to the memory and this initial code is executed. This initial code can be:
the boot loader code,
the kernel code of the stepping stone OS such as FreeDOS, or
the kernel code of the target OS if it fits in this small space.
Typically, the system is booted from the specified partition of the primary hard disk partition. The first sector of the hard disk contain the master boot record (MBR). The disk partition information including the boot selection is recorded at the end of this MBR. The first boot loader code executed from the BIOS for the hard disk occupies the rest of this MBR.
The boot loader is the 2nd stage of the boot process which is started by the BIOS. It loads the system kernel image and the initrd image to the memory and hands control over to them. This initrd image is the root filesystem image and its support depends on the bootloader used.
The Debian system normally uses the Linux kernel as the default system kernel. The initrd image for the current 2.6 Linux kernel is technically the initramfs (initial RAM filesystem) image. The initramfs image is a gzipped cpio archive of files in the root filesystem.
The default install of the Debian system places first-stage GRUB boot loader code into the MBR for the PC platform. There are many boot loaders and configuration options available.
Table 4.1. List of boot loaders.
bootloader |
package |
popcon |
size |
initrd |
description |
---|---|---|---|---|---|
grub |
V:18, I:91 |
1884 |
Supported |
This is smart enough to understand disk partitions and file systems such as vfat, ext3, .... (etch default) |
|
grub-pc |
V:0.9, I:1.9 |
3952 |
Supported |
This is smart enough to understand disk partitions and file systems such as vfat, ext3, .... (new for lenny) |
|
grub-rescue-pc |
V:0.05, I:0.4 |
2476 |
Supported |
This is GRUB 2 bootable rescue images (CD and floppy) (PC/BIOS version) |
|
lilo |
V:1.0, I:4 |
1192 |
Supported |
This relies on the sector locations of data on the hard disk. (Old) |
|
syslinux |
V:1.4, I:7 |
144 |
Supported |
This understands the ISO9660 file system. This is used by the boot CD. |
|
syslinux |
V:1.4, I:7 |
144 |
Supported |
This understands the MSDOS file system (FAT). This is used by the boot floppy. |
|
loadlin |
V:0.02, I:0.12 |
140 |
Supported |
New system is started from the FreeDOS/MSDOS system. |
|
mbr |
V:1.3, I:7 |
96 |
Not supported |
This is free software which substitutes MSDOS MBR. This only understands disk partitions. |
For GRUB Legacy, the menu configuration file is located at /boot/grub/menu.lst
. For example, it has entries like:
title Debian GNU/Linux root (hd0,2) kernel /vmlinuz root=/dev/hda3 ro initrd /initrd.img
For GRUB 2, the menu configuration file is located at /boot/grub/grub.cfg
. It is automatically generated by /usr/sbin/update-grub
using templates from /etc/grub.d/*
and settings from /etc/default/grub
. For example, it has entries like:
menuentry "Debian GNU/Linux" { set root=(hd0,3) linux /vmlinuz root=/dev/hda3 initrd /initrd.img }
For these examples, these GRUB parameters mean:
Table 4.2. The meaning of GRUB parameters.
GRUB parameter |
meaning |
---|---|
|
Use 3rd partition on boot disk by setting it as |
|
Use kernel located at |
|
Use initrd/initramfs image located at " |
Note | |
---|---|
The value of the partition number used by GRUB legacy program is one less than normal one used by Linux kernel and utility tools. GRUB 2 program fixes this problem. |
Tip | |
---|---|
UUID (see Section 10.3.2, “Accessing partition using UUID”) may be used to identify a block special device instead of its file name such as " |
Tip | |
---|---|
You can start a boot loader from another boot loader using techniques called chain loading. |
Note | |
---|---|
Having bootable rescue media (CD or floppy) created from images in the |
See "info grub
" and grub-install
(8).
The mini-Debian system is the 3rd stage of the boot process which is started by the boot loader. It runs the system kernel with its root filesystem on the memory. It is an optional preparatory stage of the boot process.
Note | |
---|---|
The term "the mini-Debian system" is coined by the author to describe this 3rd stage boot process for this document. This system is commonly referred as the initrd or initramfs system. Similar system on the memory is used by the Debian Installer. |
The /init
script is executed as the first program in this root filesystem on the memory. It is a shell script program which initializes the kernel in user space and hands control over to the next stage. This mini-Debian system offers flexibility to the boot process such as adding kernel modules before the main boot process or mounting the root file system as an encrypted one.
You can interrupt this part of the boot process to gain root shell by providing "break=init
" etc. to the kernel boot parameter. See the /init
script for more break conditions. This shell environment is sophisticated enough to make a good inspection of your machine's hardware.
Commands available in this mini-Debian system are stripped down ones and mainly provided by a GNU tool called busybox
.
Caution | |
---|---|
You need to use " |
The normal Debian system is the 4th stage of the boot process which is started by the mini-Debian system. The system kernel for the mini-Debian system continues to run in this environment. The root filesystem is switched from the one on the memory to the one on the real harddisk filesystem.
The /sbin/init
program is executed as the first program and performs the main boot process. The Debian normally uses the traditional sysvinit scheme with the sysv-rc
package. See man 8 init
, man 5 inittab
, and /usr/share/doc/sysv-rc/README.runlevels.gz
for the exact explanation. Following is a simplified overview of this main boot process:
The Debian system goes into runlevel N (none) to initialize the system by following the /etc/inittab
description.
The Debian system goes into runlevel S to initialize the system under the single-user mode to complete hardware initialization etc.
The Debian system switches itself to one of the specified multi-user runlevels (2 to 5) to start the system services.
The initial runlevel used for multi-user mode is specified with the "init=
" kernel boot parameter or in the "initdefault" line of this /etc/inittab
. The Debian system as installed starts at the runlevel 2.
All scripts executed by the init system are located in the directory /etc/init.d/
.
Tip | |
---|---|
For alternative boot mechanism to the |
Each runlevel uses a directory for its configuration and has specific meaning:
Table 4.3. List of runlevels and meanings.
runlevel |
directory |
meaning |
---|---|---|
|
none |
System bootup (NONE). There is no |
|
|
Halt the system. |
|
|
Single-user mode on boot. The lower case |
|
|
Single-user mode switched from multi-user mode. |
|
|
Multi-user mode. |
|
|
,, |
|
|
,, |
|
|
,, |
|
|
Reboot the system. |
|
|
Valid multi-user mode but not normally used. |
|
|
,, |
|
|
,, |
You can change the runlevel from the console to, e.g., 4 by:
$ sudo telinit 4
Caution | |
---|---|
The Debian system does not pre-assign any special meaning differences among the runlevels between 2 and 5. The system administrator on the Debian system may change this. (I.e., Debian is not RedHat nor SOLARIS nor HP-UX nor ...) |
Caution | |
---|---|
The Debian system does not populate directories for the runlevels between 7 and 9 when the package is installed. Traditional Unix variants don’t use these runlevels. |
The names of the symlinks in the runlevel directories have the form S<2-digit-number><original-name>
or K<2-digit-number><original-name>
. The 2-digit-number is used to determine the order in which to run the scripts. 'S' is for 'Start' and 'K' is for 'Kill'.
When init
or telinit
commands change the runlevel to <n>:
the script names starting with a K
in /etc/rc<n>.d/
are executed in alphabetical order with the single argument stop
. (killing services)
the script names starting with an S
in /etc/rc<n>.d/
are executed in alphabetical order with the single argument start
. (starting services)
For example, if you had the links S10sysklogd
and S20exim4
in a runlevel directory, S10sysklogd
would run before S20exim4
.
Warning | |
---|---|
It is not advisable to make any changes to symlinks in |
For example, let's set up runlevel system somewhat like Redhat system, i.e.:
to start the system in runlevel=3 as the default,
not to start gdm
in runlevel=(0,1,2,6), and
to start gdm
in runlevel=(3,4,5).
The easy way is to use editor on the /etc/inittab
file to change starting runlevel and use user friendly runlevel management tools such as sysv-rc-conf
or bum
to edit the runlevel. If you are to use command line only, here is how you do it (after the default installation of gdm
package and selecting it to be the choice of display manager):
# cd /etc/rc2.d ; mv S21gdm K21gdm # cd /etc ; perl -i -p -e 's/^id:.:/id:3:/' inittab
Please note the /etc/X11/default-display-manager
file is checked when starting the display manager daemons: xdm
, gdm
, kdm
, and wdm
.
Note | |
---|---|
You can still start X from any console shell with the |
The default parameter for each init script in /etc/init.d/
is given by the corresponding file in /etc/default/
which contains environment variable assignments only. The choice of directory name is specific to the Debian system. It is roughly the equivalent of the /etc/sysconfig
directory found in Red Hat and other distributions.
For example, /etc/default/hotplug
can be used to control how /etc/init.d/hotplug
works. The /etc/default/rcS
file can be used to customize boot-time defaults for motd
, sulogin
, etc.
If you cannot get the behavior you want by changing such variables then you may modify the init scripts themselves: they are all configuration files.
The kernel maintains the system hostname. The initscript /etc/init.d/hostname.sh
sets the system hostname at boot time (using the hostname
command) to the name stored in /etc/hostname
. This file should contain only the system hostname, not a fully qualified domain name.
To print out the current hostname run hostname
without an argument.
Network interfaces are initialized under single-user mode on boot by the initscript /etc/init.d/ifupdown-clean
and /etc/init.d/ifupdown
. See Chapter 6, Network setup for how to configure them.
Many network services (see Chapter 7, Network applications) are started directly as daemon processes at boot time, e.g., /etc/rc2.d/S20exim4
(for RUNLEVEL=2) which is a symlink to /etc/init.d/exim4
.
Some network services can be started on demand using the super-server, inetd
(or its equivalents). The inetd
is started at boot time by /etc/rc2.d/S20inetd
(for RUNLEVEL=2) which is a symlink to /etc/init.d/inetd
. Essentially, inetd
allows one running daemon to invoke several others, reducing load on the system.
Whenever a request for service arrives, its protocol and service are identified by looking them up in the databases in /etc/protocols
and /etc/services
. inetd
then looks up a normal Internet service in the /etc/inetd.conf
database, or a Sun-RPC based service in /etc/rpc.conf
.
For system security, make sure to disable unused services in /etc/inetd.conf
. Sun-RPC services need to be active for NFS and other RPC-based programs.
Sometimes, inetd
does not start the intended server directly but starts the TCP wrapper, tcpd
, with the intended server name as its argument in /etc/inetd.conf
. In this case, tcpd
runs the appropriate server program after logging the request and doing some additional checks using /etc/hosts.deny
and /etc/hosts.allow
.
If you have problems with remote access in a recent Debian system, comment out "ALL: PARANOID" in /etc/hosts.deny
if it exists. (But you must be careful on security risks involved with this kind of action.)
For details, see inetd
(8), inetd.conf
(5), protocols
(5), services
(5), tcpd
(8), hosts_access
(5), and hosts_options
(5).
For more information on Sun-RPC, see rpcinfo
(8), portmap
(8), and /usr/share/doc/portmap/portmapper.txt.gz
.
The system message can be customized by /etc/syslog.conf
for both the log file and on-screen display. See syslogd
(8) and syslog.conf
(5). See also Section 10.2.2, “Log analyzer”.
The kernel message can be customized by /etc/init.d/klogd
for both the log file and on-screen display. Set KLOGD="-c 3"
in this script and run /etc/init.d/klogd restart
. See klogd
(8).
You may directly change the error message level by:
# dmesg -n3
Here:
Table 4.4. List of kernel error levels.
error level value |
error level name |
meaning |
---|---|---|
0 |
KERN_EMERG |
system is unusable |
1 |
KERN_ALERT |
action must be taken immediately |
2 |
KERN_CRIT |
critical conditions |
3 |
KERN_ERR |
error conditions |
4 |
KERN_WARNING |
warning conditions |
5 |
KERN_NOTICE |
normal but significant condition |
6 |
KERN_INFO |
informational |
7 |
KERN_DEBUG |
debug-level messages |
For Linux kernel 2.6, the udev system provides mechanism for the automatic hardware discovery and initialization (see udev
(7)). Upon discovery of each device by the kernel, the udev system starts a user process which uses information from the sysfs filesystem (see Section 2.2.12, “procfs and sysfs”), loads required kernel modules supporting it using the modprobe
(8) program (see Section 4.5.11, “The kernel module initialization”), and creates corresponding device nodes.
The name of device nodes can be configured by files in /etc/udev/rules.d/
(see /usr/share/doc/udev/writing_udev_rules/index.html
).
Since the udev system is somewhat a moving target, I leave details to other documentations and describe the minimum information here.
The modprobe
(8) program enables us to configure running Linux kernel from user process by adding and removing kernel modules. The udev system (see Section 4.5.10, “The udev system”) automates its invocation to help the kernel module initialization.
Non-hardware modules and special hardware driver modules, such as:
TUN/TAP modules providing virtual Point-to-Point network device (TUN) and virtual Ethernet network device (TAP),
netfilter modules providing netfilter firewall capabilities (iptables
(8), Section 6.8, “Netfilter”),
watchdog timer driver modules
need to be pre-loaded by listing them in the /etc/modules
file (see modules
(5)).
The configuration files for the modprobe
(8) program are located under the /etc/modprobes.d/
directory as explained in modprobe.conf
(5). (If you want to avoid some kernel modules to be auto-loaded, consider to blacklist them in the /etc/modprobes.d/blacklist
file.)
The /lib/modules/<version>/modules.dep
file generated by the depmod
(8) program describes module dependencies used by the modprobe
(8) program.
The modinfo
(8) program shows information about a Linux Kernel module.
The lsmod
(8) program nicely formats the contents of the /proc/modules
, showing what kernel modules are currently loaded.
Tip | |
---|---|
You can identify exact hardware on your system. See Section 10.6.3, “The hardware identification”. |
Tip | |
---|---|
You may configure hardware at boot time to activate expected hardware features. See Section 10.6.4, “The hardware configuration”. |
Tip | |
---|---|
You can add support for your device by recompiling kernel. See Section 10.7, “The kernel”. |
Normal Unix authentication is provided by the pam_unix.so
method under the PAM (Pluggable Authentication Modules). Its 3 important configuration files, with ":
" separated entries, are:
Table 5.1. The 3 important configuration files for pam_unix.o.
file |
permission |
user |
group |
description |
---|---|---|---|---|
|
|
|
|
The (sanitized) user account information. |
|
|
|
|
The secure user account information. |
|
|
|
|
The group information. |
The /etc/passwd
file contains:
... user1:x:1000:1000:User1 Name,,,:/home/user1:/bin/bash user2:x:1001:1001:User2 Name,,,:/home/user2:/bin/bash ...
As explained in man 5 passwd
, each ":
" separated entry of this file means:
login name
password specification entry
numerical user ID
numerical group ID
user name or comment field
user home directory
optional user command interpreter
The second entry of /etc/passwd
was used for the encrypted password entry. After the introduction of /etc/shadow
, this entry is used for the password specification entry.
Table 5.2. The second entry content of /etc/passwd.
content |
meaning |
---|---|
(empty) |
passwordless account |
x |
the encrypted password is in the |
* |
no login for this account |
! |
no login for this account |
The /etc/shadow
file contains:
... user1:$1$Xop0FYH9$IfxyQwBe9b8tiyIkt2P4F/:13262:0:99999:7::: user2:$1$vXGZLVbS$ElyErNf/agUDsm1DehJMS/:13261:0:99999:7::: ...
As explained in man 5 shadow
, each ":
" separated entry of this file means:
login name
encrypted password. The initial "$1$
" indicates use of the MD5 encryption. The "*" indicate no login.
days since Jan 1, 1970 that password was last changed
days before password may be changed
days after which password must be changed
days before password is to expire that user is warned
The /etc/group
file contains:
... group1:x:20:user1,user2 ...
As explained in man 5 shadow
, each ":
" separated entry of this file means:
group name
encrypted password (not really used)
numerical group ID.
"," separated list of user names.
The /etc/gshadow
file provides the similar function as the /etc/shadow
file for the /etc/group
file but is not really used.
Note | |
---|---|
The actual group membership of a user may be dynamically added if "auth optional pam_group.so" line is added to |
Note | |
---|---|
The |
Here are few notable commands to manage account information:
Table 5.3. List of commands to manage account information.
command |
function |
---|---|
|
browse account information of |
|
browse shadowed account information of |
|
browse group information of |
|
manage password for the account |
|
set one-time password for the account activation |
|
manage password aging information |
You may need to have the root privilege for some functions to work. See man 3 crypt
for the password and data encryption.
Note | |
---|---|
On the system set up with PAM and NSS as the Debian alioth machine, the content of the local |
When creating an account during your system installation or with the passwd
(1) command, you should choose a good password which consists of 6 to 8 characters including one or more characters from each of the following sets (per the passwd
(1) manpage):
lower case alphabetics
digits 0 through 9
punctuation marks
Warning | |
---|---|
Do not chose guessable words for the password. |
There are independent tools to generate encrypted password with salt:
Table 5.4. List of tools to generate password.
package |
popcon |
size |
command |
function |
---|---|---|---|---|
|
V:9, I:89 |
336 |
|
over-featured front end to the |
|
V:28, I:89 |
2348 |
|
compute password hashes (OpenSSL). |
Modern Unix-like systems such as the Debian system provide PAM (Pluggable Authentication Modules) and NSS (Name Service Switch) mechanism to the local system administrator to configure his system. The role of these can be summarizes as:
PAM offers a flexible authentication mechanism used by the application software thus involves password data exchange.
NSS offers a flexible name service mechanism which is frequently used by the C library to obtain the user and group name for programs such as ls
and id
.
These PAM and NSS systems need to be configured consistently.
The notable packages of PAM and NSS systems are:
Table 5.5. List of notable PAM and NSS systems.
package |
popcon |
size |
description |
---|---|---|---|
|
V:87, I:99 |
972 |
Pluggable Authentication Modules for PAM |
|
V:0.7, I:4 |
388 |
Pluggable Authentication Module allowing LDAP interfaces |
|
V:0.17, I:1.3 |
116 |
Pluggable Authentication Module to enable cracklib support |
|
V:88, I:99 |
11468 |
GNU C Library: Shared libraries which also provides "Name Service Switch" service |
|
I:56 |
144 |
NSS module for Multicast DNS name resolution |
|
I:4 |
304 |
NSS module for using LDAP as a naming service |
|
V:0.09, I:0.15 |
316 |
NSS module for using LDAP as a naming service (new folk of |
Note | |
---|---|
You can see more extensive and current list by " |
Note | |
---|---|
PAM is the most basic way to initialize environment variables for each program with the system wide default value. |
Here are few notable configuration files accessed by the PAM:
Table 5.6. List of configuration files accessed by the PAM.
configuration file |
function |
---|---|
|
set up PAM configuration for the |
|
set up NSS configuration with the entry for each service. See manpage of |
|
accessed by |
|
accessed by |
|
accessed by |
|
accessed by |
|
accessed by |
|
accessed by |
|
accessed by |
|
accessed by |
|
accessed by |
The limitation of the password selection is implemented by the PAM modules, pam_unix.so
and pam_cracklib.so
and configuring them with arguments.
The modern centralized system management can be deployed using the centralized Lightweight Directory Access Protocol (LDAP) server to administer many Unix-like and non-Unix-like systems on the network. The open source implementation of the Lightweight Directory Access Protocol is OpenLDAP Software.
The LDAP server provides the account information through the use of PAM and NSS with libpam-ldap
and libnss-ldap
packages for the Debian system. Several actions are required to enable this (I have not used this setup and based purely on secondary information. Please read this in this context.):
You set up a centralized LDAP server by running program such as stand-alone LDAP daemon, slapd
.
You change the PAM configuration files in the /etc/pam.d/
directory to use pam_ldap.so
instead of the default pam_unix.so
.
You change the NSS configuration in the /etc/nsswitch.conf
file to use ldap
instead of the default (compat
or file
).
Debian uses /etc/pam_ldap.conf
as libpam-ldap
's configuration file and /etc/pam_ldap.secret
as the file to store the password of the rootbinddn.
You must make libpam-ldap
to use SSL (or TLS) connection for the security of password.
You may make libnss-ldap
to use SSL (or TLS) connection using /etc/libnss-ldap.conf
to ensure integrity of data at the cost of the LDAP network overhead.
You should run nscd
locally to cache any LDAP search results in order to reduce the LDAP network traffic.
See documentations in /usr/share/doc/libpam-doc/html/
offered by libpam-doc
package and "info libc 'Name Service Switch'
" offered by glibc-doc
package.
Similarly, you can set up alternative centralized systems with:
NIS or NIS+ with the traditional Unix systems.
winbind with Windows NT and SAMBA.
This is the famous phrase at the bottom of the old "info su
" page by Richard M. Stallman. Not to worry: the current su
in Debian uses PAM, so that one can restrict the ability to use su
to root
group by enabling the line with pam_wheel.so
in /etc/pam.d/su
.
Note | |
---|---|
See Section 10.5.15, “Alt-SysRq” for restricting the kernel SAK feature. |
sudo
is a program designed to allow a sysadmin to give limited root privileges to users and log root activity. sudo
requires only an ordinary user's password. Install sudo
package and activate it by setting options in /etc/sudoers
. See configuration example at /usr/share/doc/sudo/examples/sudoers
.
My usage of sudo
for the single user system (see Section 2.1.12, “sudo configuration”) is aimed to protect myself from my own stupidity. Personally, I consider using sudo
a better alternative to using the system from the root account all the time. For example, following will change the owner of <some_file> to <my_name>:
$ sudo chown <my_name> <some_file>
Of course if you know the root password (as self-installed Debian users do), any command can be run under root from any user's account using "su -c
".
Security-Enhanced Linux (SELinux)is a framework to tighten privilege model tighter than the ordinary Unix-like security model with the mandatory access control (MAC) policies. The root power may be restricted under some conditions.
The Internet super-server, inetd
, is started at boot time by /etc/rc2.d/S20inetd
(for RUNLEVEL=2
), which is a symlink to /etc/init.d/inetd
. Essentially, inetd
allows one running daemon to invoke several others, reducing load on the system.
Whenever a request for service arrives, its protocol and service are identified by looking them up in the databases in /etc/protocols
and /etc/services
. inetd
then looks up a normal Internet service in the /etc/inetd.conf
database, or a Sun-RPC based service in /etc/rpc.conf
.
For system security, make sure to disable unused services in /etc/inetd.conf
. Sun-RPC services need to be active for NFS and other RPC-based programs.
Sometimes, inetd
does not start the intended server directly but starts the tcpd
TCP/IP daemon wrapper program with the intended server name as its argument in /etc/inetd.conf
. In this case, tcpd
runs the appropriate server program after logging the request and doing some additional checks using /etc/hosts.deny
and /etc/hosts.allow
.
If you have problems with remote access in a recent Debian system, comment out "ALL: PARANOID" in /etc/hosts.deny
if it exists.
For details, see inetd
(8), inetd.conf
(5), protocols
(5), services
(5), tcpd
(8), hosts_access
(5), and hosts_options
(5).
For more information on Sun-RPC, see rpcinfo
(8), portmap
(8), and /usr/share/doc/portmap/portmapper.txt.gz
.
There are also non-PAM based access control available for atd
and cron
.
The information here may not be sufficient for your security needs but it should be a good start.
Many popular transportation layer services communicate messages including password authentication in the plain text. It is very bad idea to transmit password in the plain text over the wild Internet where it can be intercepted. You can run these services over "Transport Layer Security" (TLS) or its predecessor, "Secure Sockets Layer" (SSL) to secure entire communication including password by the encryption.
Table 5.7. List of insecure and secure services and ports.
insecure service name |
port |
secure service name |
port |
---|---|---|---|
www (http) |
80 |
https |
443 |
smtp (mail) |
25 |
ssmtp (smtps) |
465 |
ftp-data |
20 |
ftps-data |
989 |
ftp |
21 |
ftps |
990 |
telnet |
23 |
telnets |
992 |
imap2 |
143 |
imaps |
993 |
pop3 |
110 |
pop3s |
995 |
ldap |
389 |
ldaps |
636 |
The encryption costs CPU time. As a CPU friendly alternative, you can keep communication in plain text while securing just password with the secure authentication protocol such as "Authenticated Post Office Protocol" (APOP) for POP and "Challenge-Response Authentication Mechanism MD5" (CRAM-MD5) for SMTP and IMAP. (For sending mail messages over the Internet to your mail server from your mail client, it is recently popular to use new message submission port 587 instead of traditional SMTP port 25 to avoid port 25 blocking by the network provider while authenticating yourself with CRAM-MD5.)
The Secure Shell (ssh
) program (OpenSSH SSH client) and sshd
program (OpenSSH SSH daemon) provide secure encrypted communications between two untrusted hosts over an insecure network with the secure authentication. This SSH can be used to tunnel the insecure protocol communication such as POP and X securely over the Internet with the port forwarding feature.
The client tries to authenticate itself using host-based authentication, public key authentication, challenge-response authentication, or password authentication. The use of public key authentication enables the remote password-less login. See man 1 ssh
, man 8 sshd
, and Section 7.4, “The remote access server and utility (SSH)”.
Even when you run secure services such as "Secure Shell" (SSH) and "Point-to-point tunneling protocol" (PPTP) servers, there are still chances for the break-ins using brute force password guessing attack etc. from the Internet. Use of the firewall policy (see Section 6.8, “Netfilter”) together with the following secure tools may improve the security situation.
Table 5.8. List of tools to provide extra security measures.
package |
popcon |
description |
---|---|---|
|
V:0.13, I:0.3 |
small port-knock daemon |
|
V:1.3, I:1.7 |
an utility to help sysadmins thwart ssh hackers |
|
V:2, I:2 |
bans IPs that cause multiple authentication errors |
|
V:0.01, I:0.05 |
locks out remote attackers trying password guessing |
To prevent people to access your machine with root privilege, you need to:
prevent physical access to the hard disk.
lock BIOS and prevent booting from the removable media.
set password for GRUB interactive session.
lock GRUB menu from editing.
With physical access to hard disk, resetting the password is relatively easy;
move the hard disk to a PC with CD bootable BIOS.
boot system with a rescue media (Debian boot disk, Knopix CD, GRUB CD, ...).
mount root partition with read-write access.
edit /etc/passwd
in the root partition and make the second entry for root
account empty.
If you have the edit access to the GRUB menu entry (see Section 4.3, “Stage 2: the boot loader”) for grub-rescue-pc
) at the boot time, it is even easier:
boot system with the kernel parameter changed to something like "root=/dev/hda6 rw init=/bin/sh
".
edit /etc/passwd
and make the second entry for root
account empty.
reboot system.
The root shell of the system is now accessible without password.
Note | |
---|---|
Once you have root shell access, you can compromise password for all user accounts using brute force password cracking tools such as |
The only reasonable software solution to avoid all these concerns is to use software encrypted root partition (or /etc
partition) using dm-crypt and initramfs (see Section 10.4, “Data encryption tips”). You always need password to boot the system, though.
This section will address TCP/IP network setup for the mobile PC which moves around different networks. (For the non-mobile PC, the debian-installer should have taken care your network setup and there are almost nothing for us to play with.)
You should install the resolvconf
package for the mobile PC. This package provides framework to solve conflicts of the host address resolution between different network configuration scripts when network configuration changes. Read more on /usr/share/doc/resolvconf/README.Debian
.
For the fixed location server machine, you can do without the resolvconf
package and keep your system simple.
In this document, we focus on Debian-specific issues. For a general guide to GNU/Linux networking, read the Linux Network Administrators Guide.
Let's review the basic network infrastructure of the modern Debian system.
The naming for the domain name is a tricky one for the normal workstation PC users. The PC workstation may be mobile one hopping around the network or located behind the NAT firewall inaccessible from the Internet. For such case, you may not want the domain name to be a valid domain name to avoid name collision.
According to rfc2606, "invalid
" seems to be a choice for the top level domain (TLD) to construct domain names that are sure to be invalid from the Internet.
The mDNS network discovery protocol (Apple Bonjour / Apple Rendezvous, Avahi on Debian) uses "local" as the pseudo-top-level domain. Microsoft also seem to promote "local" for the TLD of local area network.
Other popular choices for the invalid TLD seem to be "localdomain
", "lan
", "localnet
", or "home
" according to my incoming mail analysis.
The hostname resolution is currently supported by the NSS (Name Service Switch) mechanism too. The flow of this resolution is:
The /etc/nsswitch.conf
file with stanza like "hosts: files dns
" dictates the hostname resolution order. (This replaces the old functionality of the "order
" stanza in /etc/host.conf
.)
The files
method is invoked first. If the hostname is found in the /etc/hosts
file, it returns all valid addresses for it and exits. (The /etc/host.conf
file contains "multi on
".)
The dns
method is invoked. If the hostname is found by the query to the Internet Domain Name System (DNS) identified by the /etc/resolv.conf
file, it returns all valid addresses for it and exits.
The /etc/hosts
file associates IP addresses with hostnames:
127.0.0.1 localhost 127.0.1.1 <host_name>.<domain_name> <host_name> # The following lines are desirable for IPv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters ff02::3 ip6-allhosts
Here the <host_name> in this matches the own hostname defined in the /etc/hostname
. The <domain_name> in this is the fully qualified domain name (FQDN) of this host.
Tip | |
---|---|
I sometimes use bogus domain name for <domain_name>, such as " |
The /etc/resolv.conf
is a static file if the resolvconf
package is not installed. If installed, it is a symbolic link. Either way, it contains information that initialize the resolver routines. If the DNS is found at IP="192.168.11.1
", it contains:
nameserver 192.168.11.1
The resolvconf
package makes this /etc/resolv.conf
into a symbolic link and manages its contents by the hook scripts automatically.
The hostname resolution via Multicast DNS (using Zeroconf, aka Apple Bonjour / Apple Rendezvous) which effectively allows name resolution by common Unix/Linux programs in the ad-hoc mDNS domain "local
", can be provided by installing the libnss-mdns
package. The /etc/nsswitch.conf
file should have stanza like "hosts: files mdns4_minimal [NOTFOUND=return] dns mdns4
" to enable this functionality.
The network interface name, e.g. eth0
, is assigned to each hardware in the Linux kernel through the user space configuration mechanism, udev
(see: Section 4.5.10, “The udev system”), as it is found. The network interface name is referred as physical interface in the manpage of ifup
(8) and interfaces
(5).
In order to ensure each network interface to be named persistently for each reboot using MAC address etc., there is a record file "/etc/udev/rules.d/70-persistent-net.rules
". This file is automatically generated by the "/lib/udev/write_net_rules
" program, probably run by the "persistent-net-generator.rules
" rules file. You can modify it to change naming rule.
Caution | |
---|---|
When editing the " |
Let us be reminded of the IPv4 32 bit address ranges in each class reserved for use on the local area networks (LANs) by rfc1918. These addresses are guaranteed not to conflict with any addresses on the Internet proper.
Table 6.1. List of network address ranges.
Class |
network addresses |
net mask |
net mask /bits |
# of subnets |
---|---|---|---|---|
A |
10.x.x.x |
255.0.0.0 |
/8 |
1 |
B |
172.16.x.x -- 172.31.x.x |
255.255.0.0 |
/16 |
16 |
C |
192.168.0.x -- 192.168.255.x |
255.255.255.0 |
/24 |
256 |
Note | |
---|---|
If one of these addresses is assigned to a host, then that host must not access the Internet directly but must access it through a gateway that acts as a proxy for individual services or else does Network Address Translation(NAT). The broadband router usually performs NAT for the consumer LAN environment. |
The ifupdown
package and its associated packages are the de facto standard for the Debian networking infrastructure. Its configuration file is the /etc/network/interfaces
(/e/n/i
)file and its typical contents are:
auto lo iface lo inet loopback auto eth0 iface eth0 inet dhcp
Tip | |
---|---|
There are independent automatic network configuration tools for mobile desktop users on laptops (see Section 6.5.1, “Automatic network configuration”). |
Table 6.2. List of network configuration tools.
packages |
popcon |
size |
type |
function |
---|---|---|---|---|
|
V:59, I:99 |
228 |
config::ifupdown |
Standardized level to bring up and down the network (Debian specific) |
|
V:0.5, I:1.1 |
332 |
, , |
Manage the wired network automatically |
|
V:0.06, I:0.2 |
124 |
, , |
Network testing script to enhance " |
|
V:0.01, I:0.10 |
100 |
, , |
Set routing metrics for a network interface. |
|
V:0.09, I:0.5 |
492 |
, , |
Mapping script to enhance " |
|
V:0.02, I:0.10 |
80 |
, , |
Mapping scripts to enhance " |
|
V:0.01, I:0.05 |
216 |
, , |
Zugschlus' interface scripts for ifupdown's manual method |
|
V:30, I:43 |
1540 |
config::NetworkManager |
NetworkManager (daemon): Manage the network automatically |
|
V:21, I:39 |
1968 |
, , |
NetworkManager (GNOME frontend) |
|
V:1.7, I:4 |
2380 |
, , |
NetworkManager (KDE frontend) |
|
V:0.5, I:0.7 |
1828 |
config::wicd |
Wired and wireless network manager |
|
V:20, I:99 |
1356 |
config::Netfilter |
Administration tools for packet filtering and NAT |
|
V:42, I:69 |
984 |
config::iproute2 |
IPv6 and other advanced network configuration: |
|
V:0.2, I:0.9 |
180 |
, , |
Rename network interfaces based on various static criteria: |
|
V:2, I:10 |
228 |
, , |
Display or change Ethernet device settings: |
|
V:33, I:99 |
124 |
test::iproute2 |
Tools to test network reachability of a remote host by hostname or IP address |
|
V:2, I:35 |
72 |
, , |
Tools to test network reachability of a remote host specified by the ARP address |
|
V:0.5, I:2 |
108 |
, , |
Tools to trace the network path to a remote host |
|
V:68, I:99 |
888 |
config::net-tools |
The NET-3 networking toolkit (IPv4 network configuration): |
|
V:0.05, I:0.14 |
192 |
test::net-tools |
Tools to test network reachability of a remote host by hostname or IP address (legacy, GNU) |
|
V:0.5, I:2 |
64 |
, , |
Tools to test network reachability of a remote host specified by the ARP address (legacy) |
|
V:13, I:98 |
196 |
, , |
Tools to trace the network path to a remote host (legacy, console) |
|
V:48, I:92 |
608 |
config::low-level |
DHCP client |
|
V:32, I:49 |
824 |
, , |
Client support for WPA and WPA2 (IEEE 802.11i) |
|
V:9, I:29 |
352 |
, , |
Tools for manipulating Linux Wireless Extensions |
|
V:7, I:24 |
1100 |
, , |
PPP/PPPoE connection with |
|
V:0.5, I:5 |
200 |
config::helper |
Configuration helper for PPPoE connection |
|
V:0.4, I:3 |
900 |
, , |
Configuration helper for plain PPP connection with |
|
V:0.4, I:1.9 |
352 |
, , |
PPP connection with |
|
V:6, I:82 |
120 |
test::low-level |
Tools to trace the network path to a remote host (curses) |
|
V:0.4, I:1.9 |
176 |
, , |
Tools to trace the network path to a remote host (curses and GTK+) |
|
V:4, I:45 |
1766 |
, , |
Tools for common network information operations (GNOME) |
|
V:6, I:29 |
3768 |
, , |
Network mapper / port scanner (console) |
|
V:0.19, I:0.7 |
1232 |
, , |
Network mapper / port scanner (GTK+) |
|
V:0.15, I:0.9 |
1992 |
, , |
Network mapper / port scanner (KDE) |
|
V:3, I:21 |
728 |
, , |
Network traffic analyzer (console) |
|
V:1.8, I:10 |
1604 |
, , |
Network traffic analyzer (GTK+) |
|
V:0.6, I:3 |
284 |
, , |
Network traffic analyzer (console) |
|
V:0.08, I:0.4 |
432 |
, , |
Tool to produce a summarization of the connections from |
|
V:0.7, I:1.0 |
1092 |
, , |
Flexible network intrusion detection system |
|
V:1.1, I:2 |
15600 |
, , |
display network usage in web browser |
|
V:12, I:91 |
388 |
, , |
Network clients provided with BIND: |
|
V:0.5, I:8 |
96 |
, , |
Checks DNS zone information using nameserver lookups |
|
V:0.13, I:0.6 |
88 |
, , |
Tool to trace a chain of DNS servers to the source |
There are 2 types of low level networking programs for Linux networking system (see Section 6.6.1, “Iproute2 commands”).
Old net-tools
programs (ifconfig
(8), ...) are from the Linux NET-3 networking system. Most of these are obsolete now.
New Linux iproute2 programs (ip
(8), ...) are the current Linux networking system.
Although most hardware devices are supported by the Debian system, there are some network devices which require DSFG non-free external hardware drivers to support them. Please see Section 10.7.7, “Non-free hardware drivers”.
The typical network connection method and connection path for a PC can be summarized as:
Table 6.3. List of network connection types and connection paths.
PC |
connection method |
connection path |
---|---|---|
Serial port ( |
PPP |
<=> modem <=> POTS <=> dial-up access point <=> ISP |
Ethernet port ( |
PPPoE/DHCP/Static |
<=> BB-modem <=> BB service <=> BB access point <=> ISP |
Ethernet port ( |
DHCP/Static |
<=> LAN <=> BB-router with network address translation (NAT) (<=> BB-modem ...) |
Here is the summary of configuration script for each connection method:
Table 6.4. List of network connection configurations.
connection method |
configuration |
backend package(s) |
---|---|---|
PPP |
|
|
PPP (alternative) |
|
|
PPPoE |
|
|
DHCP |
described in |
|
static IP (IPv4) |
described in |
|
static IP (IPv6) |
described in |
|
The network connection acronyms mean:
Table 6.5. List of network connection acronyms.
acronym |
meaning |
---|---|
The plain old telephone service |
|
BB |
The broadband |
BB-service |
E.g., the digital subscriber line (DSL), the cable TV, or the fiber to the premises (FTTP). |
BB-modem |
E.g., the DSL modem, the cable modem, or the optical network terminal (ONT). |
The local area network |
|
The wide area network |
|
The dynamic host configuration protocol |
|
The point-to-point protocol |
|
The point-to-point protocol over Ethernet |
|
The Internet service provider |
Note | |
---|---|
The WAN connection services via cable TV are generally served by DHCP or PPPoE. The ones by ADSL and FTTP are generally served by PPPoE. You have to consult your ISP for exact configuration requirements of the WAN connection. |
Note | |
---|---|
When BB-router is used to create home LAN environment, PCs on LAN are connected to the WAN via BB-router with network address translation (NAT). For such case, PC's network interfaces on the LAN are served by static IP or DHCP from the BB-router. BB-router must be configured to connect the WAN following the instruction by your ISP. |
Caution | |
---|---|
The connection test method described in this section are meant for testing purposes. It is not meant to be used directly for the daily network connection. You are advised to use them via the |
The typical modern home and small business network, i.e. LAN, are connected to the WAN(Internet) using some consumer grade broadband router. The LAN behind this router is usually served by the dynamic host configuration protocol (DHCP) server running on the router.
Just install the dhcp3-client
package for the Ethernet served by the dynamic host configuration protocol (DHCP).
No special action is needed for the Ethernet served by the static IP.
The configuration script pppconfig
will configure the PPP connection interactively just by selecting:
the telephone number,
the ISP user name,
the ISP password,
the port speed,
the modem communication port, and
the authentication method.
The configuration files are:
Table 6.6. List of configuration files for the PPP connection with pppconfig.
file |
function |
---|---|
|
The |
|
The |
|
The general execution parameter for |
|
Authentication data for the PAP (still used) |
|
Authentication data for the CHAP (more secure) |
Caution | |
---|---|
The "<isp_name>" value of "provider" is assumed if |
You can test configuration using lower level network configuration tools:
$ sudo pon <isp_name> ... $ sudo poff <isp_name>
See /usr/share/doc/ppp/README.Debian.gz
for more information.
A different approach to using pppd
is to run it from wvdial
which comes in the wvdial
package. Instead of pppd
running chat
to dial in and negotiate the connection, wvdial
does the dialing and initial negotiating and then starts pppd
to do the rest.
The configuration script wvdialconf
will configure the PPP connection interactively just by selecting:
the telephone number,
the ISP user name, and
the ISP password.
The wvdial
succeeds in making the connection in most cases and maintains authentication data list automatically.
The configuration files are:
Table 6.7. List of configuration files for the PPP connection with wvdialconf.
file |
function |
---|---|
|
The |
|
The |
|
The general execution parameter for |
|
Authentication data for the PAP (still used) |
|
Authentication data for the CHAP (more secure) |
You can test configuration using lower level network configuration tools:
$ sudo wvdial ... $ sudo killall wvdial
See manpages of wvdial(1), wvdial.conf(5) for more information.
When your ISP serves you with PPPoE connection and you decide to connect your PC directly to the WAN, the network of your PC must be configured with the PPPoE. The PPPoE stand for PPP over Ethernet. The configuration script pppoeconf
will configure the PPPoE connection interactively.
The configuration files are:
Table 6.8. List of configuration files for the PPPoE connection with pppoeconf.
file |
function |
---|---|
|
The |
|
The general execution parameter for |
|
Authentication data for the PAP (still used) |
|
Authentication data for the CHAP (more secure) |
You can test configuration using lower level network configuration tools:
$ sudo /sbin/ifconfig eth0 up $ sudo pon dsl-provider ... $ sudo poff dsl-provider $ sudo /sbin/ifconfig eth0 down
See /usr/share/doc/pppoeconf/README.Debian
for more information.
The ifupdown
package provides the standardized framework for the high level network configuration in the Debian system. In this section, we learn the basic network configuration with ifupdown
with simplified introduction and many typical examples.
The ifupdown
package contains 2 commands: ifup
(8) and ifdown
(8). They offer high level network configuration dictated by the configuration file /e/n/i.
Table 6.9. List of basic network configuration commands with ifupdown.
command |
action |
---|---|
|
To bring up a network interface |
|
To bring down a network interface |
Note | |
---|---|
There is no command |
Warning | |
---|---|
Do not use low level configuration tools such as |
The key syntax of /etc/network/interfaces
(/e/n/i
as its acronym in the following text) as explained in the manpage interfaces
(5) can be summarized as:
Table 6.10. List of stanzas in /e/n/i
stanza |
meaning |
---|---|
" |
To start interface <interface_name> upon start of the system. |
" |
, , |
" |
To start interface <interface_name> when the kernel detects a hotplug event from the interface. |
Lines started with " |
To define the network configuration <config_name>. |
Lines started with " |
To define mapping value of <config_name> for the matching <interface_name>. |
A line starting with a hash " |
To be ignored as comments. (end-of-line comments are not supported) |
A line ending with a backslash " |
To extend the configuration to the next line. |
Lines started with iface
stanza has the following syntax:
iface <config_name> <address_family> <method_name> <option1> <value1> <option2> <value2> ...
For the basic configuration, the mapping
stanza is not used and you use the network interface name as the network configuration name. (See Section 6.4.5, “The mapping stanza”).
The following configuration entry in the /e/n/i
file brings up the loopback network interface lo
upon booting the system (via auto
stanza).
auto lo iface lo inet loopback
This one always exists in the /e/n/i
file.
After prepairing the system by Section 6.2.1, “The DHCP connection with the Ethernet”, the network interface served by the DHCP is configured by creating the configuration entry in the /e/n/i
file as:
allow-hotplug eth0 iface eth0 inet dhcp hostname "mymachine"
When the Linux kernel detects the physical interface eth0
, the allow-hotplug
stanza will cause ifup to bring up the interface and the iface
stanza will cause ifup
to use DHCP to configure the interface.
The network interface served by the static IP is configured by creating the configuration entry in the /e/n/i
file as, e.g.,:
allow-hotplug eth0 iface eth0 inet static address 192.168.11.100 netmask 255.255.255.0 broadcast 192.168.11.255 gateway 192.168.11.1 dns-domain lan dns-nameservers 192.168.11.1
When the Linux kernel detects the physical interface eth0
, the allow-hotplug
stanza will cause ifup to bring up the interface and the iface
stanza will cause ifup
to use the static IP to configure the interface.
Here, I assumed:
IP address range of the LAN network: 192.168.11.0
- 192.168.11.255
IP address of the gateway: 192.168.11.1
IP address of the PC: 192.168.11.100
The resolvconf
package is installed.
The domain name as "lan
".
The DNS server at: 192.168.11.1
When the resolvconf
package is not installed, DNS related configuration needs to be done manually by editing the /etc/resolv.conf
as:
nameserver 192.168.11.1 domain lan
Caution | |
---|---|
The IP addresses used in the above example are not meant to be copied literally. You have to adjust IP numbers to your actual network configuration. |
The wireless LAN (WLAN for short) provides the fast wireless connectivity through the spread-spectrum communication of unlicensed radio bands based on the set of standards called IEEE 802.11.
The WLAN interfaces are almost like normal Ethernet interfaces but require some network ID and encryption key data to be provided when they are initialized. The higher level network tools are exactly the same as the Ethernet except the interface names are a bit different like ath0
, wlan0
, ath0
, wifi0
, ... depending on the kernel drivers used.
Here are some keywords to remember for the WLAN:
Table 6.11. List of acronyms for WLAN.
acronym |
full word |
meaning |
---|---|---|
NWID |
Network ID |
The 16 bit network ID used by pre-802.11 network. Very much deprecated. |
(E)SSID |
(Extended) Service Set Identifier |
The network name of the Wireless Access Points (APs) interconnected to form an integrated 802.11 wireless LAN. Domain ID. |
WEP, (WEP2) |
The 1st generation 64-bit (128-bit) wireless encryption standard with 40-bit key. Deprecated. |
|
WPA |
The 2nd generation wireless encryption standard (most of 802.11i), compatible with WEP. |
|
WPA2 |
The 3rd generation wireless encryption standard (full 802.11i), non-compatible with WEP. |
The actual choice of protocol is usually limited by the wireless router you deploy.
You need to install the wireless-tools
package to support the WLAN with the old WEP. (Your consumer grade router may still be using. Insecure infrastructure but better than nothing.)
Caution | |
---|---|
Please note that your network traffic on WLAN may be sniffed by others. |
In case of the DHCP served IP on WLAN connection, the /e/n/i
file entry should be:
allow-hotplug eth0 iface eth0 inet dhcp wireless-essid Home wireless-key1 0123-4567-89ab-cdef wireless-key2 12345678 wireless-key3 s:password wireless-defaultkey 2 wireless-keymode open
See more on /usr/share/doc/wireless-tools/README.Debian
.
You need to install the wpasupplicant
package to support the WLAN with the new WPA/WPA2.
In case of the DHCP served IP on WLAN connection, the /e/n/i
file entry should be:
allow-hotplug ath0 iface ath0 inet dhcp wpa-ssid homezone # hexadecimal psk is encoded from a plaintext passphrase wpa-psk 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
See more on /usr/share/doc/wpasupplicant/README.modes.gz
.
You need to configure the PPP connection first as described before (see Section 6.2.3, “The PPP connection with pppconfig”). Then, add the /e/n/i
file entry for the primary PPP device ppp0
as:
iface ppp0 inet ppp provider <isp_name>
You need to configure the alternative PPP connection with wvdial
first as described before (see Section 6.2.4, “The alternative PPP connection with wvdialconf”). Then, add the /e/n/i
file entry for the primary PPP device ppp0
as:
iface ppp0 inet wvdial
For PC connected directly to the WAN served by the PPPoE, you need to configure system with the PPPoE connection as described before (see Section 6.2.5, “The PPPoE connection with pppoeconf”). Then, add the /e/n/i
file entry for the primary PPPoE device eth0
as:
allow-hotplug eth0 iface eth0 inet manual pre-up /sbin/ifconfig eth0 up up ifup ppp0=dsl down ifdown ppp0=dsl post-down /sbin/ifconfig eth0 down # The following is used internally only iface dsl inet ppp provider dsl-provider
The /etc/network/run/ifstate
file stores the intended network configuration states for all the currently active network interfaces managed by the ifupdown
package are listed. Unfortunately, even if the ifupdown
system fails to bring up the interface as intended, the /etc/network/run/ifstate
file lists it active.
The output of the ifconfig
(8) command without any arguments or with the interface name as its argument provides the actual network configuration state. If the interface does not have the second line as:
inet addr:192.168.11.2 Bcast:192.168.11.255 Mask:255.255.255.0
it can not be used as a part of IPV4 network.
Note | |
---|---|
For the Ethernet device connected to the PPPoE, the output of the |
When you try to reconfigure the interface, e.g. eth0
, you must disable it first with the "sudo ifdown eth0
" command. This will remove the entry of eth0
from the /etc/network/run/ifstate
file. (This may result in some error message if eth0
is not active or it is configured improperly previously. So far, it seems to be safe to do this for the simple single user work station at any time.)
You are now free to rewrite the /e/n/i
contents as needed to reconfigure the network interface, eth0
.
Then, you can reactivate eth0
with the "sudo ifup eth0
" command.
Tip | |
---|---|
You can (re)initialize the network interface simply by " |
The ifupdown-extra
package provides the easy network connection test for use with the ifupdown
package:
the network-test
(1) command from the shell, and
the automatic scripts run for each ifup
command execution.
The network-test
command frees you from the execution of cumbersome low level commands to analyze the network problem.
The automatic scripts are installed in /etc/network/*/
and:
check the network cable connection,
check duplicate use of IP address,
setup system's static routes based on the /etc/network/routes
definition,
check if network gateway is reachable, and
record results in the /var/log/syslog
file.
This syslog record is quite useful for administration of the network problem on the remote system.
Tip | |
---|---|
The automatic behavior of the |
The functionality of the ifupdown
package can be improved beyond what was described in Section 6.3, “The basic network configuration with ifupdown” with the advanced knowledge.
The functionalities described here are completely optional. I, being lazy and minimalist, rarely bother to use these.
Caution | |
---|---|
If you could not set up network connection by information in Section 6.3, “The basic network configuration with ifupdown”, you will make situation worse by using information below. |
The ifplugd
package is older automatic network configuration tool which can manage only Ethernet connections. This solves unplugged/replugged Ethernet cable issues for mobile PC etc.. If you have NetworkManager or Wicd (see Section 6.5.1, “Automatic network configuration”) installled, you do not need this package.
This package runs daemon and replaces auto or allow-hotplug functionalities (see Table 6.10, “ List of stanzas in /e/n/i ”) and starts interfaces upon their connection to the network.
Here is how to use the ifplugd
package for the internal Ethernet port, e.g. eth0
:
Remove stanza in /e/n/i
: "auto eth0
" or "allow-hotplug eth0
",
Keep stanza in /e/n/i
: "iface eth0 inet ...
" and "mapping ...
",
Install the ifplugd
package,
Run "sudo dpkg-reconfigure ifplugd
", and
Put eth0
as the "static interfaces to be watched by ifplugd".
Now, the network reconfiguration works as you desire:
Quick boot process without the long DHCP timeout.
No funny activated interface without proper IPv4 address (see Section 6.3.12, “The network configuration state of ifupdown”).
Upon finding the Ethernet cable, the interface is brought up.
Upon some time after unplugging the Ethernet cable, the interface is brought down automatically.
Upon plugging in another Ethernet cable, the interface will be brought up under the new network environment.
Tip | |
---|---|
The arguments for the |
The ifmeric
package enables us to manipulate metrics of routes a posteriori even for DHCP.
The following will set the eth0
interface preferred over the wlan0
interface:
Install the ifmetric
package, and
Add an option line with "metric 0
" just below the "iface eth0 inet dhcp
" line.
Add an option line with "metric 1
" just below the "iface wlan0 inet dhcp
" line.
The metric 0 means the highest priority route and is the default one. The larger metric value means lower priority routes. The IP address of the active interface with the lowest metric value becomes the originating one. See ifmetric
(8).
A single physical Ethernet interface can be configured as multiple virtual interfaces with different IP addresses. Usually the purpose is to connect an interface to several IP subnetworks. For example, IP address based virtual web hosting by a single network interface is one such application.
For example, let's suppose that
a single Ethernet interface on your host is connected to a Ethernet hub (not to the broadband router),
the Ethernet hub is connected to both the Internet and LAN network,
the Internet and LAN network by a single Ethernet interface with the Ethernet hub,
the LAN network uses subnet 192.168.0.x/24
,
your host uses DHCP served IP address with the physical interface eth0
for the Internet, and
your host uses 192.168.0.1
with the virtual interface eth0:0
for the LAN,
then following stanzas in /e/n/i
will configure your network:
iface eth0 inet dhcp metric 0 iface eth0:0 inet static address 192.168.0.1 netmask 255.255.255.0 network 192.168.0.0 broadcast 192.168.0.255 metric 1
Caution | |
---|---|
Although this configuration example with network address translation (NAT) using netfilter/iptables (see Section 6.8, “Netfilter”) can provide cheap router for the LAN with only single interface, there is no real firewall capability with such set up. You should use 2 physical interfaces with NAT to secure the local network from Internet. |
The ifupdown
package offers advanced network configuration using the network configuration name and the network interface name. I use slightly different terminology from one used in the manpage of ifup
(8) and interfaces
(5).
Table 6.12. List of terminology for network devices.
manpage terminology |
my terminology |
explanation |
examples in the following text |
---|---|---|---|
physical interface name |
network interface name |
A name given by the Linux kernel (using |
|
logical interface name |
network configuration name |
A name token following |
|
Basic network configuration commands in Section 6.3.2, “The basic syntax of /etc/network/interfaces” require the network configuration name token of the iface
stanza to match the network interface name in the /e/n/i
.
Advanced network configuration commands enables separation of the network configuration name and the network interface name in the /e/n/i
:
Table 6.13. List of advanced network configuration commands with ifupdown.
command |
action |
---|---|
|
To bring up a network interface |
|
To bring down a network interface |
|
To bring up a network interface |
|
To bring down a network interface |
We skipped explaining the mapping
stanza in the /e/n/i
in Section 6.3.2, “The basic syntax of /etc/network/interfaces” to avoid complication. This stanza has the following syntax:
mapping <interface_name_glob> script <script_name> map <script_input1> map <script_input2> map ...
This provides advanced feature to the /e/n/i
file by automating the choice of the configuration with the mapping script specified by <script_name>
.
When the "<interface_name_glob>
" matches "eth0
", the execution of
$ sudo ifup eth0
will produce the execution of:
$ sudo ifup eth0=$(echo -e '<script_input1> \n <script_input2> \n ...' | <script_name> eth0)
to configure eth0
automatically. Here, lines with "map
" are optional and can be repeated.
Note | |
---|---|
The glob for |
Here is how to switch manually among several network configurations without rewriting the /e/n/i
file as in Section 6.3.13, “The basic network reconfiguration” .
For all the network configuration you need to access, you create a single /e/n/i
file, e.g,:
auto lo iface lo inet loopback iface config1 inet dhcp hostname "mymachine" iface config2 inet static address 192.168.11.100 netmask 255.255.255.0 broadcast 192.168.11.255 gateway 192.168.11.1 dns-domain lan dns-nameservers 192.168.11.1 iface pppoe inet manual pre-up /sbin/ifconfig eth0 up up ifup ppp0=dsl down ifdown ppp0=dsl post-down /sbin/ifconfig eth0 down # The following is used internally only iface dsl inet ppp provider dsl-provider iface pots inet ppp provider provider
Please note the network configuration name which is the token after iface
does not use the token for the network interface name. Also, there are no auto
stanza nor allow-hotplug
stanza to start the network interface eth0
automatically upon events.
Now you are ready to switch the network configuration.
Let's move your PC to a LAN served by the DHCP. You bring up the network interface (the physical interface) eth0
by assigning the network configuration name (the logical interface name) config1
to it:
$ sudo ifup eth0=config1 Password: ...
The interface eth0
is up, configured by DHCP and connected to LAN.
$ sudo ifdown eth0=config1 ...
The interface eth0
is down and disconnected from LAN.
Let's move your PC to a LAN served by the static IP. You bring up the network interface eth0
by assigning the network configuration name config2
to it:
$ sudo ifup eth0=config2 ...
The interface eth0
is up, configured with static IP and connected to LAN. The additional parameters given as dns-*
configures /etc/resolv.conf
contents. This /etc/resolv.conf
is better manged if the resolvconf
package is installed.
$ sudo ifdown eth0=config2 ...
The interface eth0
is down and disconnected from LAN, again.
Let's move your PC directly connected to BB-modem connected to the PPPoE served service. You bring up the network interface eth0
by assigning the network configuration name pppoe
to it:
$ sudo ifup eth0=pppoe ...
The interface eth0
is up, configured with PPPoE connection directly to the ISP.
$ sudo ifdown eth0=pppoe ...
The interface eth0
is down and disconnected, again.
Let's move your PC to a location without LAN or BB-modem but with POTS and modem. You bring up the network interface ppp0
by assigning the network configuration name pots
to it:
$ sudo ifup ppp0=pots ...
The interface ppp0
is up and connected to the Internet with PPP.
$ sudo ifdown ppp0=pots ...
The interface ppp0
is down and disconnected from the Internet.
You should check the /etc/network/run/ifstate
file for the current network configuration state of the ifupdown
system.
Warning | |
---|---|
You may need to adjust numbers at the end of |
The ifupdown
system automatically runs scripts installed in /etc/network/*/
while exporting environment variables to scripts:
Table 6.14. List of environment variables passed by the ifupdown system
environment variable |
value passed |
---|---|
|
physical name (interface name) of the interface being processed. |
|
logical name (configuration name) of the interface being processed. |
|
address family of the interface. |
|
method of the interface. (e.g., "static") |
|
"start" if run from |
|
as per MODE, but with finer granularity, distinguishing the pre-up, post-up, pre-down and post-down phases. |
|
indicates whether " |
|
the command search path: |
|
the value for the corresponding option under the |
Here, each environment variable name, IF_<OPTION>
, is created from the name for the corresponding option by prepending "IF_
", converting the case to the upper case, replacing hyphens to underscores, and discarding non-alphanumeric characters.
The ifupdown-extra
package (see Section 6.3.14, “The ifupdown-extra package”) uses these environment variables to extend the functionality of the ifupdown
package. The ifmetric
package (see Section 6.4.2, “The ifmetric”) installs the /etc/network/if-up.d/ifmetric
script which sets the metric via the IF_METRIC
variable. The guessnet
package (see Section 6.4.8, “Mapping with guessnet”), which provides simple and powerful framework for the auto-selection of the network configuration via the mapping mechanism, also uses these.
Note | |
---|---|
For more specific examples of custom network configuration scripts using these environment variables, you should check example scripts in |
Instead of manually choosing configuration as described in Section 6.4.6, “The manually switchable network configuration”, you can use the mapping mechanism described in Section 6.4.5, “The mapping stanza” to select network configuration automatically with custom scripts.
The guessnet-ifupdown
(8) command provided by the guessnet
package is designed to be used as a mapping script and provides powerful framework to enhance the ifupdown
system.
you list test condition as the value for guessnet
options for each network configuration under iface
stanza.
mapping will chose the iface
with first non-ERROR result as the network configuration.
This dual usage of the /e/n/i
file by the mapping script, guessnet-ifupdown
, and the original network configuration infrastructure, ifupdown
, does not cause negative impacts since guessnet
options only export extra environment variables to scripts run by the ifupdown
system. See details in guessnet-ifupdown
(8).
Note | |
---|---|
When multiple |
There are independent automatic network configuration tools, such as NetworkManager (NM) (network-manager
and associated packages) and Wicd (wicd
package) which manage network connection via daemon independen of the ifupdown
package. They allow easy management of wireless connections with nice GUI user interfaces.
Caution | |
---|---|
These automatic network configuration tools are aimed primarily for mobile desktop users on laptops and is not intended for usage on servers. |
The configuration of NM is described in /usr/share/doc/network-manager/README.Debian
. Essentially:
Make desktop user, e.g. foo
, belong to group "netdev
".
"sudo adduser foo netdev
"
Keep configuration of /e/n/i
as simple as:
auto lo iface lo inet loopback auto eth0 iface eth0 inet dhcp
"sudo /etc/init.d/network-manager restart
"
Note | |
---|---|
Only interfaces which are not listed in |
Caution | |
---|---|
NM may not be compatible with esoteric configurations of |
The configuration of Wicd is described in /usr/share/doc/wicd/README.Debian
. Essentially:
Make configuration in /e/n/i
only as:
auto lo iface lo inet loopback
The capability of default GUI network configuration tools for each desktop tends to be limited to basic configurations such as static IP or DHCP. They actually overwrite contents of /e/n/i
file behind you. Please check how they change e/n/i file by yourself.
Caution | |
---|---|
They may not understand complicated advanced configuration done manually in |
Iproute2 commands offer complete low-level network configuration capabilities. Here is a translation table from obsolete net-tools commands to new iproute2 commands.
Table 6.15. Translation table from obsolete net-tools commands to new iproute2 commands.
net-tools |
iproute2 |
manipulation |
---|---|---|
|
|
ARP or NDISC cache entry. |
|
|
protocol (IP or IPv6) address on a device. |
|
|
multicast address. |
|
|
tunnel over IP. |
|
|
routing table entry. |
|
|
name network interfaces based on MAC addresses. |
|
|
Ethernet device settings. |
See ip
(8) and IPROUTE2 Utility Suite Howto.
You may use the lower level network commands as follows safely since they do not change network configuration:
Table 6.16. List of lower level network commands.
command |
effects |
---|---|
" |
displays the status of active interfaces (IPv4) |
" |
display all the routing table in numerical addresses (IPv4) |
" |
displays the current content of the ARP cache tables (IPv4) |
" |
displays the link status of active interfaces (IPv4/v6) |
" |
displays the link and address status of active interfaces (IPv4/v6) |
" |
displays the routing table (IPv4/v6) |
" |
displays the current content of the ARP cache tables (IPv4/v6) |
" |
display ppp daemon log |
" |
check Internet connection to yahoo.com |
" |
check who registered yahoo.com in the domains database |
" |
trace Internet connection to |
" |
trace Internet connection to |
" |
check example.com DNS records by |
" |
check packet filter |
" |
find all open ports |
" |
find listening ports |
" |
find listening TCP ports (numeric) |
" |
check DNS zone information of |
Tip | |
---|---|
Some of these lower level network configuration tools reside in |
Generic network optimization is beyond the scope of this documentation. I will touch only subjects pertinent to the consumer grade connection.
Table 6.17. List of network optimization tools.
packages |
popcon |
size |
description |
---|---|---|---|
|
V:0.8, I:5 |
108 |
displays bandwidth usage information on an network interface |
|
V:0.3, I:2 |
208 |
Internet Protocol bandwidth measuring tool |
|
V:0.2, I:1.8 |
204 |
writes a sources.list file based on bandwidth tests |
|
V:0.19, I:1.0 |
88 |
InterFace STATistics Monitoring |
|
V:0.2, I:0.7 |
188 |
portable bandwidth monitor and rate estimator |
|
V:0.14, I:0.8 |
84 |
script that quickly measures network device throughput |
|
V:0.13, I:0.8 |
96 |
Empirical stochastic bandwidth tester |
|
V:0.15, I:0.7 |
152 |
small and simple console-based bandwidth monitor |
|
V:0.07, I:0.4 |
52 |
console-based Ethernet statistics monitor |
|
V:0.03, I:0.14 |
156 |
a bandwidth analysis tool |
The Maximum Transmission Unit (MTU) value can be determined experimentally with ping
(8) with "-M do
" option which sends ICMP packets with data size starting from 1500 (with offset of 28 bytes for the IP+ICMP header) and finding the largest size without IP fragmentation. For example:
$ ping -c 1 -s $((1500-28)) -M do www.debian.org PING www.debian.org (194.109.137.218) 1472(1500) bytes of data. From 192.168.11.2 icmp_seq=1 Frag needed and DF set (mtu = 1454) --- www.debian.org ping statistics --- 0 packets transmitted, 0 received, +1 errors
... try 1454 instead of 1500
The ping
(8) command succeed
This process is Path MTU (PMTU) discovery (RFC1191)and the tracepath
(8) command can automate this.
Tip | |
---|---|
The above example with PMTU value of 1454 is for my previous FTTH provider which used Asynchronous Transfer Mode (ATM) as its backbone network and served its clients with the PPPoE. The actual PMTU value depends on your environment, e.g., 1500 for the my new FTTH provider. |
Table 6.18. Basic guide lines of the optimal MTU value
network environment |
MTU |
rationale |
---|---|---|
Dial-up link (IP: PPP) |
576 |
standard |
Ethernet link (IP: DHCP or fixed) |
1500 |
standard and default |
Ethernet link (IP: PPPoE) |
1492 (=1500-8) |
2 bytes for PPP header and 6 bytes for PPPoE header |
Ethernet link (ISP's backbone: ATM, IP: DHCP or fixed) |
1462 (=48*31-18-8) |
author's speculation: 18 for Ethernet header, 8 for SAR trailer. |
Ethernet link (ISP's backbone: ATM, IP: PPPoE) |
1454 (=48*31-8-18-8) |
see "Optimal MTU configuration for PPPoE ADSL Connections" for rationale. |
In addtion to these basic guide lines, you should know:
Any use of tunneling methods (VPN etc.) may reduce optimal MTU further by their overheads.
The MTU value should not exceed the experimentally determined PMTU value.
The bigger MTU value is generally better when other limitations are met.
Here are examples for setting the MTU value from its default 1500 to 1454.
For the DHCP (see Section 6.3.4, “The network interface served by the DHCP”), you can replace pertinent iface
stanza lines in the /e/n/i
with, e.g.,:
iface eth0 inet dhcp hostname "mymachine" pre-up /sbin/ifconfig $IFACE mtu 1454
For the static IP (see Section 6.3.5, “The network interface with the static IP”), you can replace pertinent iface
stanza lines in the /e/n/i
with, e.g.,:
iface eth0 inet static address 192.168.11.100 netmask 255.255.255.0 broadcast 192.168.11.255 gateway 192.168.11.1 mtu 1454 dns-domain lan dns-nameservers 192.168.11.1
For the direct PPPoE (see Section 6.2.5, “The PPPoE connection with pppoeconf”), you can replace pertinent mtu
line in the /etc/ppp/peers/dsl-provider
with:
mtu 1454
The maximum segment size (MSS) is used as an alternative measure of packet size. The relationship between MSS and MTU are:
MSS = MTU - 40 for IPv4
MSS = MTU - 60 for IPv6
Note | |
---|---|
The |
The TCP throughput can be maximized by adjusting TCP buffer size parameters as described in "TCP Tuning Guide" and "TCP tuning" for the modern high-bandwidth and high-latency WAN. So far, the current Debian default settings serve well even for my LAN connected by the fast 100M bps FTTP service.
Netfilter provides infrastructure for stateful firewall and network address translation (NAT) with Linux kernel modules (see Section 4.5.11, “The kernel module initialization”).
Table 6.19. List of firewall tools.
packages |
popcon |
size |
description |
---|---|---|---|
|
V:20, I:99 |
1356 |
administration tools for netfilter |
|
V:0.15, I:0.9 |
156 |
Tool to continuously monitor netfilter state. (similar to |
|
V:0.8, I:2 |
40 |
Shoreline Firewall, netfilter configuration file generator (recommended for |
|
V:0.07, I:0.2 |
492 |
Shoreline Firewall, netfilter configuration file generator (Perl-based, recommended for |
|
I:0.9 |
356 |
Shoreline Firewall, netfilter configuration file generator (shell-based, alternative for |
|
V:0.3, I:0.5 |
612 |
Simple set of init script to configure netfilter (old) |
Main user space program of netfilter is iptables
(8). You can manually configure netfilter interactively from shell, save its state with iptables-save
(8), and restore it via init script with iptables-restore
(8) upon system reboot.
Configuration helper scripts such as shorewall ease this process.
See documentation at http://www.netfilter.org/documentation/ (or in /usr/share/doc/iptables/html/
):
Tip | |
---|---|
Although these were written for Linux 2.4, both |
There are many web browser packages to access remote contents with Hypertext Transfer Protocol (HTTP).
Table 7.1. List of web browsers.
package |
popcon |
size |
description |
---|---|---|---|
|
V:31, I:59 |
3960 |
Web browser (X) (unbranded Firefox) |
|
V:3, I:6 |
35436 |
Web browser (X) (unbranded Mozilla browser) |
|
V:11, I:45 |
32 |
Web browser (X) (Gnome HIG compliant browser) |
|
V:1.2, I:2 |
1732 |
Web browser (X) (Gnome browser) |
|
V:11, I:21 |
6056 |
Web browser (X) (KDE browser) |
|
V:20, I:85 |
1968 |
Web browser (text) |
|
V:4, I:25 |
44 |
, , |
|
V:2, I:6 |
1444 |
, , |
|
V:2, I:9 |
1372 |
, , |
|
V:1.0, I:4 |
3280 |
, , |
You may be able to use following special URL strings for some browsers to confirm their settings.
"about:
"
"about:config
"
"about:plugins
"
Debian offers many free browser plugin packages in the main component which can handle not only Java (software platform) and Flash but also MPEG, MPEG2, MPEG4, DivX, Windows Media Video (.wmv), QuickTime (.mov), MP3 (.mp3), Ogg/Vorbis files, DVDs, VCDs, etc. Debian also offers helper programs to install non-free browser plugin packages as contrib or non-free components.
Table 7.2. List of browser plugin packages.
package |
popcon |
size |
component |
description |
---|---|---|---|---|
|
V:0.6, I:0.8 |
204 |
main |
Java plugin using Hotspot JIT |
|
V:0.6, I:1.8 |
104 |
main |
Java plugin using the gij runtime |
|
I:4 |
NOT_FOUND |
non-free |
Java plugin for Sun's Java SE 5.0 (i386 only) |
|
I:6 |
NOT_FOUND |
non-free |
Java plugin for Sun's Java SE 6 (i386 only) |
|
V:5, I:9 |
244 |
main |
Flash plugin based on libswfdec |
|
V:0.6, I:1.7 |
180 |
main |