Checklist for Running Networking Services


As computer security issues increase with the rising onslaught of computer crackers and viruses, operating systems (such as Fedora or Red Hat Linux) are moving toward more security rather than more ease-of-use. Simply installing server software isn't enough to get the service up and running.

If a service isn’t working, check the following items to hunt down the problem:

  1. Is the software package(s) installed? Each network service is represented by one or more software packages. Use the command rpm –qc packagename to find configuration files, and the command rpm –qd packagename to find documentation. If you did a personal desktop or workstation install, most network server software may not be installed on your computer at all. Check Table C-1 to see which package(s) is needed for a service to work. (There might be other package dependencies as well, to which you will be alerted when you try to install the package.) Then use the rpm command to install the software from the installation DVD.

  2. Does the firewall permit access to the service? The Fedora Linux installation procedure lets you configure a firewall. If you choose the default firewall, most services will not be available outside your local computer. Refer to Chapter 14 for information on how to change your firewall configuration to open ports that provide the different services.

  3. Is the start-up script set up to automatically launch the service? Most network services are launched from start-up scripts that cause daemon processes to continuously listen to the network for requests for the service. See the “Networking Service Daemons” section for information on how to find start-up scripts and have them launch automatically.

  4. Is the configuration file created for the service? Even if the daemon process is listening for requests for a network service, one or more configuration files associated with the service must probably be set up before requests will be accepted. Table C-1 lists important configuration files for each type of server.

  5. Does the configuration file permit proper access to the service? Within the configuration file for a service, there might be several levels of permissions that a user must go through to get permission to the service. For example, a configuration file might allow access to the service from a particular host computer, but deny access to a particular user.

  6. Are there other restrictions to the service being shared? Some standard Linux security measures might block access to a service that is otherwise open to being shared. For example, you can share a Linux directory using NFS or FTP servers, but local file permissions might block access to the directory or files within the shared directory.

The rest of this appendix provides an overview of the daemon processes, start-up scripts, configuration files, and software packages that are associated with the networking services that come with Fedora Linux.




Red Hat Fedora Linux 3 Bible
Red Hat Fedora Linux 3 Bible
ISBN: 0764578723
EAN: 2147483647
Year: 2005
Pages: 286

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net