488890
21
Verklein
Vergroot
Pagina terug
1/450
Pagina verder
openSUSE
www.suse.com12.1
December19,2011 Reference
Reference
Copyright © 2006– 2011 Novell, Inc. and contributors. All rights reserved.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section
being this copyright notice and license. A copy of the license version 1.2 is included in the section
entitled “GNU Free Documentation License”.
For Novell trademarks, see the Novell Trademark and Service Mark list http://www.novell
.com/company/legal/trademarks/tmlist.html. Linux* is a registered trademark of
Linus Torvalds. All other third party trademarks are the property of their respective owners. A trademark
symbol (®, etc.) denotes a Novell trademark; an asterisk (*) denotes a third party trademark.
All information found in this book has been compiled with utmost attention to detail. However, this
does not guarantee complete accuracy. Neither Novell, Inc., SUSE LINUX Products GmbH, the authors,
nor the translators shall be held liable for possible errors or the consequences thereof.
Contents
About This Guide ix
Part I Installation and Deployment 1
1 Installation with YaST 3
1.1 Choosing the Installation Media . . . . . . . . . . . . . . . . . . . 3
1.2 Choosing the Installation Method . . . . . . . . . . . . . . . . . . . 5
1.3 The Installation Workow . . . . . . . . . . . . . . . . . . . . . . 8
1.4 System Start-Up for Installation . . . . . . . . . . . . . . . . . . . 9
1.5 The Boot Screen . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.6 Welcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.7 Installation Mode . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.8 Clock and Time Zone . . . . . . . . . . . . . . . . . . . . . . . 16
1.9 Desktop Selection . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.10 Suggested Partitioning . . . . . . . . . . . . . . . . . . . . . . . 17
1.11 Create New User . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.12 Installation Settings . . . . . . . . . . . . . . . . . . . . . . . . 25
1.13 Performing the Installation . . . . . . . . . . . . . . . . . . . . . 29
1.14 Conguration of the Installed System . . . . . . . . . . . . . . . . 30
1.15 Graphical Login . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2 Remote Installation 37
2.1 Installation Scenarios for Remote Installation . . . . . . . . . . . . . 37
2.2 Setting Up the Server Holding the Installation Sources . . . . . . . . . 46
2.3 Preparing the Boot of the Target System . . . . . . . . . . . . . . . 55
2.4 Booting the Target System for Installation . . . . . . . . . . . . . . . 65
2.5 Monitoring the Installation Process . . . . . . . . . . . . . . . . . 68
3 Advanced Disk Setup 73
3.1 Using the YaST Partitioner . . . . . . . . . . . . . . . . . . . . . 73
3.2 LVM Conguration . . . . . . . . . . . . . . . . . . . . . . . . 81
3.3 Soft RAID Conguration . . . . . . . . . . . . . . . . . . . . . . 87
Part II System 91
4 32-Bit and 64-Bit Applications in a 64-Bit System Environment 93
4.1 Runtime Support . . . . . . . . . . . . . . . . . . . . . . . . . 93
4.2 Software Development . . . . . . . . . . . . . . . . . . . . . . 94
4.3 Software Compilation on Biarch Platforms . . . . . . . . . . . . . . 95
4.4 Kernel Specications . . . . . . . . . . . . . . . . . . . . . . . 96
5 Booting and Conguring a Linux System 97
6 The Boot Loader GRUB 99
6.1 Booting with GRUB . . . . . . . . . . . . . . . . . . . . . . . . 100
6.2 Conguring the Boot Loader with YaST . . . . . . . . . . . . . . . 110
6.3 Uninstalling the Linux Boot Loader . . . . . . . . . . . . . . . . . 116
6.4 Creating Boot CDs . . . . . . . . . . . . . . . . . . . . . . . . 117
6.5 The Graphical SUSE Screen . . . . . . . . . . . . . . . . . . . . 118
6.6 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . 119
6.7 For More Information . . . . . . . . . . . . . . . . . . . . . . 120
7 Special System Features 121
7.1 Information about Special Software Packages . . . . . . . . . . . . 121
7.2 Virtual Consoles . . . . . . . . . . . . . . . . . . . . . . . . . 128
7.3 Keyboard Mapping . . . . . . . . . . . . . . . . . . . . . . . . 129
7.4 Language and Country-Specic Settings . . . . . . . . . . . . . . . 129
8
Dynamic Kernel Device Management with udev 135
8.1
The /dev Directory . . . . . . . . . . . . . . . . . . . . . . . 135
8.2
Kernel uevents and udev . . . . . . . . . . . . . . . . . . . . 136
8.3 Drivers, Kernel Modules and Devices . . . . . . . . . . . . . . . . 136
8.4 Booting and Initial Device Setup . . . . . . . . . . . . . . . . . . 137
8.5
Monitoring the Running udev Daemon . . . . . . . . . . . . . . . 138
8.6
Inuencing Kernel Device Event Handling with udev Rules . . . . . . . 139
8.7 Persistent Device Naming . . . . . . . . . . . . . . . . . . . . . 146
8.8
Files used by udev . . . . . . . . . . . . . . . . . . . . . . . . 147
8.9 For More Information . . . . . . . . . . . . . . . . . . . . . . 147
Part III Services 149
9 Basic Networking 151
9.1 IP Addresses and Routing . . . . . . . . . . . . . . . . . . . . . 154
9.2 IPv6—The Next Generation Internet . . . . . . . . . . . . . . . . 157
9.3 Name Resolution . . . . . . . . . . . . . . . . . . . . . . . . 167
9.4 Conguring a Network Connection with YaST . . . . . . . . . . . . 168
9.5 NetworkManager . . . . . . . . . . . . . . . . . . . . . . . . 189
9.6 Conguring a Network Connection Manually . . . . . . . . . . . . . 192
9.7 smpppd as Dial-up Assistant . . . . . . . . . . . . . . . . . . . . 208
10 SLP Services in the Network 211
10.1 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
10.2 Activating SLP . . . . . . . . . . . . . . . . . . . . . . . . . . 212
10.3 SLP Front-Ends in openSUSE . . . . . . . . . . . . . . . . . . . . 212
10.4 Installation over SLP . . . . . . . . . . . . . . . . . . . . . . . 212
10.5 Providing Services via SLP . . . . . . . . . . . . . . . . . . . . . 213
10.6 For More Information . . . . . . . . . . . . . . . . . . . . . . 214
11 The Domain Name System 215
11.1 DNS Terminology . . . . . . . . . . . . . . . . . . . . . . . . 215
11.2 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
11.3 Conguration with YaST . . . . . . . . . . . . . . . . . . . . . . 216
11.4 Starting the BIND Name Server . . . . . . . . . . . . . . . . . . 227
11.5 The /etc/named.conf Conguration File . . . . . . . . . . . . . . . 228
11.6 Zone Files . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
11.7 Dynamic Update of Zone Data . . . . . . . . . . . . . . . . . . . 237
11.8 Secure Transactions . . . . . . . . . . . . . . . . . . . . . . . 237
11.9 DNS Security . . . . . . . . . . . . . . . . . . . . . . . . . . 239
11.10 For More Information . . . . . . . . . . . . . . . . . . . . . . 239
12 DHCP 241
12.1 Conguring a DHCP Server with YaST . . . . . . . . . . . . . . . . 242
12.2 DHCP Software Packages . . . . . . . . . . . . . . . . . . . . . 246
12.3 The DHCP Server dhcpd . . . . . . . . . . . . . . . . . . . . . 246
12.4 For More Information . . . . . . . . . . . . . . . . . . . . . . 250
13 Time Synchronization with NTP 251
13.1 Conguring an NTP Client with YaST . . . . . . . . . . . . . . . . 251
13.2 Manually Conguring ntp in the Network . . . . . . . . . . . . . . 256
13.3 Dynamic Time Synchronization at Runtime . . . . . . . . . . . . . . 257
13.4 Setting Up a Local Reference Clock . . . . . . . . . . . . . . . . . 257
14 Sharing File Systems with NFS 259
14.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
14.2 Installing NFS Server . . . . . . . . . . . . . . . . . . . . . . . 260
14.3 Conguring NFS Server . . . . . . . . . . . . . . . . . . . . . . 260
14.4 Conguring Clients . . . . . . . . . . . . . . . . . . . . . . . . 270
14.5 For More Information . . . . . . . . . . . . . . . . . . . . . . 273
15 Samba 275
15.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
15.2 Installing a Samba Server . . . . . . . . . . . . . . . . . . . . . 277
15.3 Starting and Stopping Samba . . . . . . . . . . . . . . . . . . . 277
15.4 Conguring a Samba Server . . . . . . . . . . . . . . . . . . . . 277
15.5 Conguring Clients . . . . . . . . . . . . . . . . . . . . . . . . 284
15.6 Samba as Login Server . . . . . . . . . . . . . . . . . . . . . . 285
15.7 For More Information . . . . . . . . . . . . . . . . . . . . . . 286
16 The Apache HTTP Server 287
16.1 Quick Start . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
16.2 Conguring Apache . . . . . . . . . . . . . . . . . . . . . . . 289
16.3 Starting and Stopping Apache . . . . . . . . . . . . . . . . . . . 304
16.4 Installing, Activating, and Conguring Modules . . . . . . . . . . . . 307
16.5 Getting CGI Scripts to Work . . . . . . . . . . . . . . . . . . . . 315
16.6 Setting Up a Secure Web Server with SSL . . . . . . . . . . . . . . 317
16.7 Avoiding Security Problems . . . . . . . . . . . . . . . . . . . . 325
16.8 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . 327
16.9 For More Information . . . . . . . . . . . . . . . . . . . . . . 328
17 Setting up an FTP server with YaST 331
17.1 Starting the FTP server . . . . . . . . . . . . . . . . . . . . . . 332
17.2 FTP General Settings . . . . . . . . . . . . . . . . . . . . . . . 333
17.3 FTP Performance Settings . . . . . . . . . . . . . . . . . . . . . 334
17.4 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . 334
17.5 Expert Settings . . . . . . . . . . . . . . . . . . . . . . . . . 335
17.6 For more information . . . . . . . . . . . . . . . . . . . . . . 335
Part IV Mobility 337
18 Mobile Computing with Linux 339
18.1 Laptops . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
18.2 Mobile Hardware . . . . . . . . . . . . . . . . . . . . . . . . 346
18.3 Cellular Phones and PDAs . . . . . . . . . . . . . . . . . . . . . 347
18.4 For More Information . . . . . . . . . . . . . . . . . . . . . . 348
19 Power Management 349
19.1 Power Saving Functions . . . . . . . . . . . . . . . . . . . . . . 349
19.2 Advanced Conguration and Power Interface (ACPI) . . . . . . . . . . 350
19.3 Rest for the Hard Disk . . . . . . . . . . . . . . . . . . . . . . 356
19.4 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . 357
19.5 For More Information . . . . . . . . . . . . . . . . . . . . . . 359
20 Wireless LAN 361
20.1 WLAN Standards . . . . . . . . . . . . . . . . . . . . . . . . . 361
20.2 Operating Modes . . . . . . . . . . . . . . . . . . . . . . . . 362
20.3 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . 363
20.4 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
20.5 Conguration with YaST . . . . . . . . . . . . . . . . . . . . . . 365
20.6 Tips and Tricks for Setting Up a WLAN . . . . . . . . . . . . . . . 373
20.7 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . 375
20.8 For More Information . . . . . . . . . . . . . . . . . . . . . . 377
21 Using NetworkManager 379
21.1 Use Cases for NetworkManager . . . . . . . . . . . . . . . . . . 379
21.2 Enabling NetworkManager . . . . . . . . . . . . . . . . . . . . 380
21.3 Conguring Network Connections . . . . . . . . . . . . . . . . . 380
21.4 Using KNetworkManager . . . . . . . . . . . . . . . . . . . . . 384
21.5 Using GNOME NetworkManager Applet . . . . . . . . . . . . . . . 387
21.6 NetworkManager and VPN . . . . . . . . . . . . . . . . . . . . 390
21.7 NetworkManager and Security . . . . . . . . . . . . . . . . . . . 391
21.8 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . 393
21.9 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . 394
21.10 For More Information . . . . . . . . . . . . . . . . . . . . . . 395
22 Using Tablet PCs 397
22.1 Installing Tablet PC Packages . . . . . . . . . . . . . . . . . . . . 398
22.2 Conguring Your Tablet Device . . . . . . . . . . . . . . . . . . . 399
22.3 Using the Virtual Keyboard . . . . . . . . . . . . . . . . . . . . 399
22.4 Rotating Your Display . . . . . . . . . . . . . . . . . . . . . . . 399
22.5 Using Gesture Recognition . . . . . . . . . . . . . . . . . . . . 400
22.6 Taking Notes and Sketching with the Pen . . . . . . . . . . . . . . 403
22.7 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . 404
22.8 For More Information . . . . . . . . . . . . . . . . . . . . . . 406
23 Copying and Sharing Files 407
23.1 Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
23.2 Access Methods . . . . . . . . . . . . . . . . . . . . . . . . . 409
23.3 Accessing Files Using a Direct Connection . . . . . . . . . . . . . . 410
23.4 Accessing Files on Different OS on the Same Computer . . . . . . . . 412
23.5 Copying Files between Linux Computers . . . . . . . . . . . . . . . 413
23.6 Copying Files between Linux and Windows Computers with SSH . . . . . 420
23.7 Sharing Files between Linux Computers . . . . . . . . . . . . . . . 422
23.8 Sharing Files between Linux and Windows with Samba . . . . . . . . . 425
23.9 For More Information . . . . . . . . . . . . . . . . . . . . . . 428
A An Example Network 429
B GNU Licenses 431
B.1 GNU General Public License . . . . . . . . . . . . . . . . . . . . 431
B.2 GNU Free Documentation License . . . . . . . . . . . . . . . . . 434
About This Guide
This manual gives you a general understanding of openSUSE®. It is intended mainly
for system administrators and home users with basic system administration knowledge.
Check out the various parts of this manual for a selection of applications needed in ev-
eryday life and in-depth descriptions of advanced installation and conguration scenarios.
Advanced Deployment Scenarios
Learn how to deploy openSUSE from a remote location and become acquainted
with complex disk setup scenarios.
Managing and Updating Software
Understand how to install or remove software with either YaST or using the com-
mand line, how to use the 1-Click Install feature, and how to keep your system up-
to-date.
Administration
Learn how to congure and upgrade openSUSE, how to administrate your system
in text mode, and get to know some important utilities for Linux administrators.
System
Get an introduction to the components of your Linux system and a deeper under-
standing of their interaction.
Services
Learn how to congure the various network and le services that come with
openSUSE.
Mobility
Get an introduction to mobile computing with openSUSE, get to know the various
options for wireless computing and power management.
Many chapters in this manual contain links to additional documentation resources.
These include additional documentation that is available on the system, as well as
documentation available on the Internet.
For an overview of the documentation available for your product and the latest docu-
mentation updates, refer to http://www.novell.com/documentation/
opensuse114 or to the following section.
1 Available Documentation
We provide HTML and PDF versions of our books in different languages. The following
manuals for users and administrators are available on this product:
Start-Up (↑Start-Up)
Guides you step-by-step through the installation of openSUSE from DVD, or from
an ISO image, gives short introductions to the GNOME and KDE desktops including
some key applications running on it. Also gives an overview of LibreOfce and
its modules for writing texts, working with spreadsheets, or creating graphics and
presentations.
Reference (page 1)
Gives you a general understanding of openSUSE and covers advanced system ad-
ministration tasks. It is intended mainly for system administrators and home users
with basic system administration knowledge. It provides detailed information about
advanced deployment scenarios, administration of your system, the interaction of
key system components and the set-up of various network and le services open-
SUSE offers.
Security Guide (↑Security Guide)
Introduces basic concepts of system security, covering both local and network se-
curity aspects. Shows how to make use of the product inherent security software
like AppArmor (which lets you specify per program which les the program may
read, write, and execute) or the auditing system that reliably collects information
about any security-relevant events.
System Analysis and Tuning Guide (↑System Analysis and Tuning Guide)
An administrator's guide for problem detection, resolution and optimization. Find
how to inspect and optimize your system by means of monitoring tools and how
to efciently manage resources. Also contains an overview of common problems
and solutions and of additional help and documentation resources.
Virtualization with KVM (↑Virtualization with KVM)
This manual offers an introduction to setting up and managing virtualization with
KVM (Kernel-based Virtual Machine) on openSUSE. Also shows how to manage
VM Guests with libvirt and QEMU.
x Reference
Find HTML versions of most product manuals in your installed system under /usr/
share/doc/manual or in the help centers of your desktop. Find the latest documen-
tation updates at http://www.novell.com/documentation where you can
download PDF or HTML versions of the manuals for your product.
2 Feedback
Several feedback channels are available:
Bugs and Enhancement Requests
To report bugs for a product component, or to submit enhancement requests, please
use https://bugzilla.novell.com/. For documentation bugs, submit a
bug against the component Documentation for the respective product.
If you are new to Bugzilla, you might nd the following articles helpful:
http://en.opensuse.org/openSUSE:Submitting_bug_reports
http://en.opensuse.org/openSUSE:Bug_reporting_FAQ
User Comments
We want to hear your comments and suggestions about this manual and the other
documentation included with this product. Use the User Comments feature at the
bottom of each page in the online documentation or go to http://www.novell
.com/documentation/feedback.html and enter your comments there.
3 Documentation Conventions
The following typographical conventions are used in this manual:
/etc/passwd: directory names and lenames
placeholder: replace placeholder with the actual value
PATH: the environment variable PATH
ls, --help: commands, options, and parameters
About This Guide xi
user: users or groups
Alt, Alt + F1: a key to press or a key combination; keys are shown in uppercase as
on a keyboard
File, File > Save As: menu items, buttons
Dancing Penguins (Chapter Penguins, ↑Another Manual): This is a reference to a
chapter in another manual.
4 About the Making of This Manual
This book is written in Novdoc, a subset of DocBook (see http://www.docbook
.org). The XML source les were validated by xmllint, processed by xsltproc,
and converted into XSL-FO using a customized version of Norman Walsh's stylesheets.
The nal PDF is formatted through XEP from RenderX. The open source tools and the
environment used to build this manual are available in the package susedoc that is
shipped with openSUSE.
5 Source Code
The source code of openSUSE is publicly available. Refer to http://en.opensuse
.org/Source_code for download links and more information.
6 Acknowledgments
With a lot of voluntary commitment, the developers of Linux cooperate on a global
scale to promote the development of Linux. We thank them for their efforts—this dis-
tribution would not exist without them. Furthermore, we thank Frank Zappa and Pawar.
Special thanks, of course, goes to Linus Torvalds.
Have a lot of fun!
Your SUSE Team
xii Reference
Part I. Installation and
Deployment
1
Installation with YaST
Install your openSUSE® system with YaST, the central tool for installation and con-
guration of your system. YaST guides you through the installation process and the basic
conguration of your system. During the installation and conguration process, YaST
analyzes both your current system settings and your hardware components and proposes
installation settings based on this analysis. By default, YaST displays an overview of
all installation steps on the left hand side of the window and provides online help texts
for each step. Click Help to view the help text.
If you are a rst-time user of openSUSE, you might want to follow the default YaST
proposals in most parts, but you can also adjust the settings as described here to ne-
tune your system according to your preferences. Many parts of the basic system con-
guration, such as user accounts or system language, can also be modied after the in-
stallation process.
1.1 Choosing the Installation Media
When installing openSUSE, choose from several media available either online or in
the retail box:
DVD-retail
One DVD containing the openSUSE distribution for 32bit and 64bit systems. The
second medium contains proprietary add-on software.
This installation option does not require any network access for installation, nor
do you need to set up external repositories to install the full openSUSE. You can,
Installation with YaST 3
however, make the contents of the DVD available on an installation server and
make them available all across your network.
DVD-download
One DVD5, available via download for 32bit or 64bit systems.
Choose this installation option if you want a fully-edged openSUSE system. Be-
yond the downloading of the DVD ISO, there is no network connection required
to make use of this installation option. Once the medium has been fully downloaded
and the physical medium created, you can go ahead with the installation. You can
also make the contents of the DVDs available on an installation server and make
them available all across your network.
KDE4/GNOME LiveCD
The LiveCD versions, available via download, include the KDE4 or GNOME
desktops together with the most popular applications for 32-bit or 64-bit systems.
Choose this medium option for a rst look at openSUSE. The LiveCD version runs
on your computer using RAM without touching your hard drive and no installation
is needed. However, you can also install openSUSE from the running live system.
There is no network connection required beyond the mere downloading of the
medium.
TIP: Booting the LiveCD from an USB Stick
Live CD iso images can also be used as boot images for USB sticks. Create
a bootable USB stick by using the command-line program dd with the fol-
lowing syntax:
dd if=ISO_IMAGE of=USB_STICK_DEVICE bs=4M
dd is available on Linux and MacOS by default. A Microsoft Windows*
version can be downloaded from http://www.chrysocome.net/dd.
Warning: Using this dd command will erase all data on the USB device!
Mini CD
The Mini CD contains the minimal Linux system needed to run the installation.
The installation system itself and the installation data are loaded from a network
source. To install from a network providing SLP, please start the installation as
described in Section 1.2.1, “Installing from a Network Server Using SLP” (page 7).
4 Reference
To install from a HTTP, FTP, NFS, or SMB server, follow the instructions in
Section 1.2.2, “Installing from a Network Source without SLP” (page 7).
IMPORTANT: Add-On CDs—Installing Additional Software
Although add-on CDs (extensions or third-party products) cannot be used as
stand-alone installation media, they can be embedded as additional software
sources during the installation. Currently CDs with additional languages and
non open source software are available as add-on CDs for openSUSE. Refer to
Section 1.7.1, Add-On Products” (page 14) for more information.
1.2 Choosing the Installation Method
After having selected the installation medium, determine the suitable installation method
and boot option that best matches your needs:
Installing from the openSUSE Media
Choose this option if you want to perform a stand-alone installation and do not
want to rely on a network to provide the installation data or the boot infrastructure.
The installation proceeds exactly as outlined in Section 1.3, “The Installation
Workow” (page 8).
Installing from the LiveCD
In order to install from a LiveCD, boot the live system from CD. In the running
system, launch the installation routine by clicking on the Install icon on the desktop.
Phase one of the installation will be carried out in a window on the desktop. It is
not possible to update an existing system with a LiveCD, you can only perform a
new installation (with automatic conguration).
Installing from a Network Server
Choose this option if you have an installation server available in your network or
want to use an external server as the source of your installation data. This setup
can be congured to boot from physical media (Floppy, CD/DVD, or hard disk)
or congured to boot via network using PXE/BOOTP. Refer to Section 1.2.1,
“Installing from a Network Server Using SLP” (page 7), Section 1.2.2, “Installing
from a Network Source without SLP” (page 7), or Chapter 2, Remote Installation
(page 37) for details.
Installation with YaST 5
Installing with openSUSE 12.1 Installer from Windows
Choose this installation option if you prefer a smooth transition from using Windows
to using Linux. openSUSE 12.1 Installer allows you to boot into the
openSUSE installation right from a running Windows by modifying the Windows
boot loader. This installation option is only available from the DVD media. Refer
to Section 1.2.3, “Installing with the openSUSE 12.1 Installer from
Windows” (page 8) for details.
openSUSE supports several different boot options from which you can choose, depending
on the hardware available and on the installation scenario you prefer. Booting from the
openSUSE media or using openSUSE 12.1 Installer are the most straightfor-
ward options, but special requirements might call for special setups:
Table 1.1
Boot Options
DescriptionBoot Option
This is the easiest boot option. This option can be used if the
system has a local DVD-ROM drive that is supported by Linux.
DVD
openSUSE 12.1 Installer is installed under Microsoft Windows
and makes it possible to boot directly into the installation
openSUSE 12.1
Installer
Booting over the network must be supported by the system's BIOS
or rmware, and a boot server must be available in the network.
PXE or BOOTP
This task can also be handled by another openSUSE system. See
http://en.opensuse.org/SDB:PXE_boot
_installation for more information.Refer to Chapter 2,
Remote Installation (page 37) for more information.
openSUSE installation can also be booted from the hard disk. To
do this, copy the kernel (linux) and the installation system
Hard Disk
(initrd) from the directory /boot/architecture/ on the
installation media to the hard disk and add an appropriate entry
to the existing boot loader of a previous openSUSE installation.
6 Reference
TIP: Booting from DVD on UEFI machines
►amd64 em64t: DVD1 can be used as a boot medium for machines equipped
with UEFI (Unied Extensible Firmware Interface). Refer to your vendor's doc-
umentation for specic information. If booting fails, try to enable CSM (Com-
patibility Support Module) in your rmware.
1.2.1 Installing from a Network Server Using
SLP
If your network setup supports OpenSLP and your network installation source has been
congured to announce itself via SLP (described in Section 2.2, “Setting Up the Server
Holding the Installation Sources” (page 46)), boot the system, press F4 in the boot
screen and select SLP from the menu.
The installation program congures the network connection with DHCP and retrieves
the location of the network installation source from the OpenSLP server. If the automatic
DHCP network conguration fails, you are prompted to enter the appropriate parameters
manually. The installation then proceeds as described below with the exception of the
network conguration step that is needed prior to adding additional repositories. This
step is not needed as the network is already congured and active at this point.
1.2.2 Installing from a Network Source
without SLP
If your network setup does not support OpenSLP for the retrieval of network installation
sources, boot the system and press F4 in the boot screen to select the desired network
protocol (NFS, HTTP, FTP, or SMB/CIFS). Provide the server's address and the path
to the installation media.
The installation program automatically congures the network connection with DHCP.
If this conguration fails, you are prompted to enter the appropriate parameters manu-
ally. The installation retrieves the installation data from the source specied. The instal-
lation then proceeds as described below with the exception of the network conguration
step needed prior to adding additional repositories. This step is not needed as the network
is already congured and active at this point.
Installation with YaST 7
1.2.3
Installing with the openSUSE 12.1
Installer from Windows
openSUSE 12.1 Installer is a Microsoft Windows application that prepares
your computer to directly boot into the openSUSE installation without having to adjust
BIOS settings. It is only available on DVD media. To use the installer, insert the
openSUSE media under Windows. The openSUSE 12.1 Installer setup automati-
cally starts (if not, run openSUSE11_2_LOCAL.exe from the DVD). Choose a
language for the installation and follow the instructions on the screen. The language
you choose here is also precongured to be used for the openSUSE installation.
On the next reboot, the Microsoft Windows boot loader launches. Choose openSUSE
12.1 Installer to start the openSUSE installation. In order to proceed with the installation,
you will be prompted to insert the installation media. The installation proceeds as de-
scribed below. When Microsoft Windows is booted again, openSUSE 12.1
Installer is automatically uninstalled.
TIP: Installing openSUSE alongside Microsoft Windows
openSUSE can easily be installed alongside Microsoft Windows. Carry out the
installation as described below—an existing Windows installation will automat-
ically be detected and a dual boot option will be installed. If Windows covers
the whole installation disk, the installation routine will make a proposal to
shrink an existing Windows partition in order to make room for the openSUSE.
Please read Section 1.10.1.1, “Resizing a Windows Partition” (page 19) prior to
the installation for detailed information.
1.3 The Installation Workow
The openSUSE installation is split into three main parts: preparation, installation, and
conguration. During the preparation phase you congure some basic parameters such
as language, time, desktop type, users, passwords, hard disk setup and installation scope.
In the non-interactive installation phase the software is installed and the system is pre-
pared for the rst boot. Upon nishing the installation the machine reboots into the
newly installed system and starts the nal system conguration. You can choose whether
8 Reference
to do a fully automatic or a manual conguration. In this stage, network and Internet
access, as well as hardware components such as printers, are set up.
1.4 System Start-Up for Installation
You can install openSUSE from local installation sources, such as the openSUSE CDs
or DVD, or from network source of an FTP, HTTP, NFS, or SMB server. Any of these
approaches requires physical access to the system to install as well as user interaction
during the installation. The installation procedure is basically the same regardless of
the installation source. Any exceptions are sufciently highlighted in the following
workow description.
1.5 The Boot Screen
The boot screen displays a number of options for the installation procedure. Boot from
Hard Disk boots the installed system and is selected by default, because the CD is often
left in the drive. Select one of the other options with the arrow keys and press Enter to
boot it. The relevant options are:
Installation
The normal installation mode. All modern hardware functions are enabled. In case
the installation fails, see F5Kernel (page 11) for boot options that disable poten-
tially problematic functions.
Rescue System
Starts a minimal Linux system without a graphical user interface. For more infor-
mation, see Section “Using the Rescue System” (Appendix A, Help and Trou-
bleshooting, ↑Start-Up). This option is not available on LiveCDs.
Check Installation Media
This option is only available when you install from media created from downloaded
ISOs. In this case it is recommended to check the integrity of the installation
medium. This option starts the installation system before automatically checking
the media. In case the check was successful, the normal installation routine starts.
If a corrupt media is detected, the installation routine aborts.
Installation with YaST 9
Firmware Test
Starts a BIOS checker that validates ACPI and other parts of your BIOS. This option
is not available on the LiveCDs.
Memory Test
Tests your system RAM using repeated read and write cycles. Terminate the test
by rebooting. For more information, see Section “Fails to Boot” (Appendix A, Help
and Troubleshooting, ↑Start-Up). This option is not available on the LiveCDs.
Figure 1.1
The Boot Screen
Use the function keys indicated in the bar at the bottom of the screen to change the
language, screen resolution, installation source or to add an additional driver from your
hardware vendor:
F1Help
Get context-sensitive help for the active element of the boot screen. Use the arrow
keys to navigate, Enter to follow a link, and Esc to leave the help screen.
F2Language
Select the display language and a corresponding keyboard layout for the installation.
The default language is English (US).
10 Reference
F3Video Mode
Select various graphical display modes for the installation. Select Text Mode if the
graphical installation causes problems.
F4Source
Normally, the installation is performed from the inserted installation medium. Here,
select other sources, like FTP or NFS servers. If the installation is deployed on a
network with an SLP server, select an installation source available on the server
with this option. Find information about SLP in Chapter 10, SLP Services in the
Network (page 211).
F5Kernel
If you encounter problems with the regular installation, this menu offers to disable
a few potentially problematic functions. If your hardware does not support ACPI
(advanced conguration and power interface) select No ACPI to install without
ACPI support. No local APIC disables support for APIC (Advanced Programmable
Interrupt Controllers) which may cause problems with some hardware. Safe Settings
boots the system with the DMA mode (for CD/DVD-ROM drives) and power
management functions disabled.
If you are not sure, try the following options rst: Installation—ACPI Disabled or
Installation—Safe Settings. Experts can also use the command line (Boot Options)
to enter or change kernel parameters.
F6Driver
Press this key to notify the system that you have an optional driver update for
openSUSE. With File or URL, load drivers directly before the installation starts.
If you select Yes, you are prompted to insert the update disk at the appropriate point
in the installation process.
F7Arch
If you install from an installation medium supporting 32bit and 64bit architectures
and have a processor with 64-bit support, select whether to install a 64-bit or 32-
bit system. By default, a 64-bit system is installed on a computer with 64-bit support.
To install a 32-bit system, press F7 then select 32bit.
TIP: Using IPv6 during the Installation
By default you can only assign IPv4 network addresses to your machine. To
enable IPv6 during installation, enter one of the following parameters at the
Installation with YaST 11
bootprompt: ipv6=1 (accept IPv4 and IPv6) or ipv6only=1 (accept IPv6
only).
After starting the installation, openSUSE loads and congures a minimal Linux system
to run the installation procedure. To view the boot messages and copyright notices
during this process, press Esc. On completion of this process, the YaST installation
program starts and displays the graphical installer.
TIP: Installation without a Mouse
If the installer does not detect your mouse correctly, use Tab for navigation,
arrow keys to scroll, and Enter to conrm a selection. Various buttons or selec-
tion elds contain a letter with an underscore. Use Alt + Letter to select a button
or a selection directly instead of navigating there with the Tab button.
1.6 Welcome
Start the installation of openSUSE by choosing your language. Changing the language
will automatically preselect a corresponding keyboard layout. Override this proposal
by selecting a different keyboard layout from the drop-down menu. The language se-
lected here is also used to assume a time zone for the system clock. This setting—along
with the selection of secondary languages to install on your system—can be modied
later in the Installation Summary, described in Section 1.12, “Installation Settings”
(page 25). For information about language settings in the installed system, see Chap-
ter 11, Changing Language and Country Settings with YaST (↑Start-Up).
Read the license agreement that is displayed beneath the language and keyboard selection
thoroughly. Use License Translations... to access translations. If you agree to the terms,
click Next to proceed with the installation. If you do not agree to the license agreement
click Abort to terminate the installation.
12 Reference
Figure 1.2
Welcome
1.7 Installation Mode
After a system analysis (where YaST probes for storage devices and tries to nd other
installed systems on your machine) the available installation modes are displayed. This
step is skipped when installing from a LiveCD, since this medium only supports a new
installation with automatic conguration.
New installation
Select this option to start a new installation from scratch.
Update
Select this option to update an existing installation to a newer version. For more
information about system updates, see Chapter 16, Upgrading the System and
System Changes (↑Start-Up).
Installation with YaST 13
Figure 1.3
Installation Mode
By default, the automatic conguration is used when performing a new installation. In
this mode the system automatically congures your hardware and the network, so the
installation is performed with minimal user interaction. If necessary, you can change
every conguration that is set up later in the installed system using YaST. Uncheck
Use Automatic Conguration if you prefer a manual conguration during the installation.
Check Include Add-On Products from Separate Media to include add-on products
during the installation. An add-on product can include extensions, third-party products
or additional software for your system such as support for additional languages.
Click Next to proceed. If you selected to include an add-on product, proceed with Sec-
tion 1.7.1, “Add-On Products” (page 14), otherwise skip the next section and advance
to Section 1.8, “Clock and Time Zone” (page 16).
1.7.1 Add-On Products
Add-on products can be installed either from a local source (CD, DVD, or directory)
or from a network source (HTTP, FTP, NFS, CIFS,...). When installing from a network
source, you need to congure the network rst (unless you are performing a network
installation— in this case the existing network conguration is used). Choose Yes, Run
14 Reference
the Network Setup and proceed as described in Section 1.7.1.1, “Network Setup”
(page 15). If the add-on product is available locally, select No, Skip the Network Setup.
Click Next and specify the product source. Source types available are CD, DVD, Hard
Disk, USB Mass Storage, a Local Directory or a Local ISO Image (if no network was
congured). If the add-on product is available on removable media, the system automat-
ically mounts the media and reads its contents. If the add-on product is available on
hard disk, choose Hard Disk to install from an unmounted hard drive, or Local Direc-
tory/Local ISO Image to install from the local le system. Add-on products may be
delivered as a repository or as a set of rpm les. In the latter case, check Plain RPM
Directory. Whenever a network is available, you can choose from additional remote
sources such as HTTP, SLP, FTP, etc. It is also possible to specify a URL directly.
Check Download Repository Description Files to download the les describing the
repository now. If unchecked, they will be downloaded once the installation starts.
Proceed with Next and insert a CD or DVD if required. Depending on the product's
content it may be necessary to accept additional license agreements.
It is also possible to congure add-on products later. Using add-on products on the in-
stalled system is described in Chapter 8, Installing Add-On Products (↑Start-Up).
1.7.1.1 Network Setup
When invoking the network setup, YaST scans for available network cards. If more
than one network card is found, you must choose the card to congure from the list.
If an ethernet network adapter is not already connected, a warning will open. Make
sure the network cable is plugged in and choose Yes, Use It. If your network is equipped
with a DHCP server, choose Automatic Address Setup (via DHCP). To manually set
up the network choose Static Address Setup and specify IP Address, Netmask, Default
Gateway IP, and the DNS Server IP.
Some networks require the use of a proxy server to access the Internet. Tick the check
box Use Proxy for Accessing the Internet and enter the appropriate specications. Click
Accept to perform the network setup. The installation procedure will continue with the
add-on products or repositories setup as described in Section 1.7.1, “Add-On Products”
(page 14).
Installation with YaST 15
1.8 Clock and Time Zone
In this dialog, select your region and time zone. Both are preselected according to the
selected installation language. To change the preselected values, either use the map or
the drop down lists for Region and Time Zone. When using the map, point the cursor
at the rough direction of your region and left-click to zoom. Now choose your country
or region by left-clicking. Right-click to return to the world map.
Figure 1.4
Clock and Time Zone
To set up the clock, choose whether the Hardware Clock is Set to UTC. If you run an-
other operating system on your machine, such as Microsoft Windows, it is likely your
system uses local time instead. If you only run Linux on your machine, set the hardware
clock to UTC and have the switch from standard time to daylight saving time performed
automatically.
If a network is already congured, the time is automatically synced via Network Time
Protocol (NTP) with a time server. Click Change to either alter the NTP settings or to
Manually set the time. See Chapter 13, Time Synchronization with NTP (page 251) for
more information on conguring the NTP service. When nished, click Accept to
continue the installation.
16 Reference
1.9 Desktop Selection
In openSUSE, you can choose from various desktops. The major ones, KDE and
GNOME, are powerful graphical desktop environments similar to Windows. This step
is skipped when installing from a LiveCD, since this medium is already precongured
to either use KDE or GNOME.
If you prefer a different desktop, choose Other for more options. The XFCE Desktop
and the LXDE Desktop are fast and lightweight desktop environments suitable for
modest hardware. With Minimal X Window, install a graphical window manager that
allows for running stand-alone X applications and console windows but does not provide
the usual integrated desktop functionality. In Minimal Server Selection (Text Mode),
only console terminals are available.
Figure 1.5
Desktop Selection
1.10 Suggested Partitioning
Dene a partition setup for openSUSE in this step. In most cases a reasonable scheme
that can be accepted without change is proposed. If a hard disk containing only Windows
Installation with YaST 17
FAT or NTFS partitions is selected as the installation target, YaST proposes to shrink
one of these partitions. Accept the proposal with Next and proceed with the installation.
Experienced users can also customize the proposal or apply their own partitioning
scheme.
The proposed partitioning is Partition Based by default. If you prefer an LVM Based
setup, check the respective option to automatically convert the proposal. Refer to Sec-
tion 3.2, “LVM Conguration” (page 81) for more information about the Logical
Volume Manager (LVM).
To make small changes in the proposal (like changing the le system type or encrypt
partitions), select Edit Partition Setup and adjust the settings. See Section 3.1, “Using
the YaST Partitioner” (page 73) for instructions.
Figure 1.6
Suggested Partitioning
1.10.1 Partitioning a Specic Disk
If your machine contains more than one hard disk and you want to restrict the partitioning
proposal to just one disk, choose Create Partition Setup and then select a specic disk
from the list. If the chosen hard disk does not contain any partitions yet, the whole hard
disk will be used for the proposal. Otherwise, you can choose which existing partition(s)
18 Reference
to utilize. To add a separate partition for you personal data check Propose a Separate
Home Partition. Instead of the default partition-based proposal, it is possible to Create
an LVM Based Proposal. Choose two times Next to proceed to the next step.
1.10.1.1 Resizing a Windows Partition
If the selected hard disk only contains a Windows FAT or NTFS partition, YaST offers
to delete or shrink this partition. If you select Delete Windows Completely, the Windows
partition is marked for deletion and the space is used for the installation of openSUSE.
WARNING: Deleting Windows
If you delete Windows, all data will be lost beyond recovery as soon as the
formatting starts.
To Shrink the Windows Partition, you need to interrupt the installation and boot Win-
dows to prepare the partition before shrinking it. For all Windows le systems, proceed
as follows:
1.
Deactivate a Virtual Memory le, if there is one.
2.
Run scandisk.
3.
Run defrag.
After these preparations, restart the openSUSE installation. When you turn to the parti-
tioning setup, proceed as before and select Shrink Windows Partition. After a quick
check of the partition, the dialog for resizing the Windows partition opens.
The bar graph shows how much disk space is currently occupied by Windows and how
much space is still available. To change the proposed settings use the slider or the input
elds to adjust the partition sizing.
Installation with YaST 19
Figure 1.7
Resizing the Windows Partition
If you leave this dialog by selecting Next, the settings are stored and you are returned
to the previous dialog. The actual resizing takes place later, before the hard disk is for-
matted.
IMPORTANT: Writing on NTFS Partitions
By default, the Windows uses the NTFS le system. openSUSE includes read
and write access to the NTFS le system, but this feature has a few limitations.
This means that you cannot read or write encrypted or compressed les. Fur-
thermore, the Windows le permissions are not honored at the moment. See
http://en.opensuse.org/SDB:NTFS for more information.
1.10.2 Custom Partitioning
Set up your own partitioning scheme by selecting Create Partition Setup and then
Custom Partitioning. The Expert Partitioner opens, displaying the current partition
setup. Expand the Hard Disks in the System View pane by clicking on the +, then click
on one of the listed hard disks. Now you can Add, Edit, Resize, or Delete partitions.
For more information about custom partitioning and conguring advanced features,
refer to Section 3.1, “Using the YaST Partitioner” (page 73)
20 Reference
1.11 Create New User
Create a local user in this step. Administrating local users is a suitable option for stand-
alone workstations. If setting up a client on a network with centralized user authentica-
tion, click Change and proceed with the Section 1.11.1, “Expert Settings” (page 23).
After entering the rst name and last name, either accept the proposal or specify a new
Username that will be used to log in. Finally, enter a password for the user. Reenter it
for conrmation (to ensure that you did not type something else by mistake). To provide
effective security, a password should be between ve and eight characters long. The
maximum length for a password is 72 characters. However, if no special security
modules are loaded, only the rst eight characters are used to discern the password.
Passwords are case-sensitive. Special characters (7-bit ASCII) and the digits 0 to 9 are
allowed. Other special characters like umlauts or accented characters are not allowed.
Passwords you enter are checked for weakness. When entering a password that is easy
to guess (such as a dictionary word or a name) you will see a warning. It is a good se-
curity practice to use strong passwords.
IMPORTANT: Username and Password
Remember both your username and the password because they are needed
each time you log in to the system.
Installation with YaST 21
Figure 1.8
Create New User
Three additional options are available:
Use this Password for the System Administrator
If checked, the same password you have entered for the user will be used for the
system administrator root. This option is suitable for stand-alone workstations
or machines in a home network that are administrated by a single user. When not
checked, you are prompted for a system administrator password in the next step of
the installation workow (see Section 1.11.2, “Password for the System Adminis-
trator root (page 24)).
Receive System Mail
Checking this box sends messages created by the system services to the user. These
are usually only sent to root, the system administrator. This option is useful for
the most frequently used account, because it is highly recommended to log in as
root only in special cases.
The mails sent by system services are stored in the local mailbox /var/spool/
mail/username, where username is the login name of the selected user. To
read e-mails after installation, you can use any e-mail client, for example KMail
or Evolution.
22 Reference
Automatic Login
This option automatically logs the current user in to the system when it starts. This
is mainly useful if the computer is operated by only one user.
WARNING: Automatic Login
With the automatic login enabled, the system boots straight into your desktop
with no authentication at all. If you store sensitive data on your system, you
should not enable this option as long as the computer can also be accessed by
others.
1.11.1 Expert Settings
Click Change in the Create User dialog to set up network authentication or, if present,
import users from a previous installation. Also change the password encryption type
in this dialog.
You can also add additional user accounts or change the user authentication method in
the installed system. For detailed information about user management, see Chapter 10,
Managing Users with YaST (↑Start-Up).
The default authentication method is Local (/etc/passwd). If a former version of open-
SUSE or another system using /etc/passwd is detected, you may import local users.
To do so, check Read User Data from a Previous Installation and click Choose. In the
next dialog, select the users to import and nish with OK.
Access to the following network authentication services can be congured:
LDAP
Users are administered centrally on an LDAP server for all systems in the network.
More information is available in Section “Conguring an LDAP Client with YaST”
(Chapter 4, LDAP—A Directory Service, ↑Security Guide).
NIS
Users are administered centrally on an NIS server for all systems in the network.
See Section “Conguring NIS Clients” (Chapter 3, Using NIS, ↑Security Guide)
for more information.
Installation with YaST 23
Windows Domain
SMB authentication is often used in mixed Linux and Windows networks. and
Section “Conguring a Linux Client for Active Directory” (Chapter 5, Active Di-
rectory Support, ↑Security Guide).
Along with user administration via LDAP and NIS, you can use Kerberos authentication.
To use it, select Set Up Kerberos Authentication. For more information on Kerberos,
refer to Chapter 6, Network Authentication with Kerberos (↑Security Guide).
1.11.2 Password for the System
Administrator root
If you have not chosen Use this Password for the System Administrator in the previous
step, you will be prompted to enter a Password for the System Administrator root.
Otherwise this conguration step is skipped.
root is the name of the superuser, or the administrator of the system. Unlike regular
users (who may or may not have permission to access certain areas or execute certain
commands on the system), root has unlimited access to change the system congura-
tion, install programs, and set up new hardware. If users forget their passwords or have
other problems with the system, root can help. The root account should only be
used for system administration, maintenance, and repair. Logging in as root for daily
work is rather risky: a single mistake could lead to irretrievable loss of system les.
For verication purposes, the password for root must be entered twice. Do not forget
the root password. Once entered, this password cannot be retrieved.
The root can be changed any time later in the installed system. To do so run YaST
and start Security and Users > User and Group Management.
WARNING: The root User
The user root has all the permissions needed to make changes to the system.
To carry out such tasks, the root password is required. You cannot carry out
any administrative tasks without this password.
24 Reference
1.12 Installation Settings
On the last step before the real installation takes place, you can alter installation settings
suggested by YaST and also review the settings you made so far. To modify the sugges-
tions, either click Change and select the category to change or click on one of the
headlines. After conguring any of the items presented in these dialogs, you are always
returned to the Installation Settings window, which is updated accordingly.
Figure 1.9
Installation Settings
TIP: Restoring the Default Settings
You can reset all changes to the defaults by clicking Change > Reset to Defaults.
YaST then shows the original proposal again.
1.12.1 Partitioning
Review and, if necessary, change the partition setup you congured earlier. Modifying
the partition setup opens the Expert Partitioner described in Section 3.1, “Using the
YaST Partitioner” (page 73).
Installation with YaST 25
1.12.2 Booting
YaST proposes a boot conguration for your system. Other operating systems found
on your computer, such as Microsoft Windows or other Linux installations, will auto-
matically be detected and added to the boot loader. However, openSUSE will be booted
by default. Normally, you can leave these settings unchanged. If you need a custom
setup, modify the proposal for your system. For information, see Section 6.2, “Cong-
uring the Boot Loader with YaST” (page 110). The boot method should only be changed
by experienced users.
1.12.3 Software
openSUSE contains a number of software patterns for various application purposes.
Click Software to start the pattern selection and modify the installation scope according
to your needs. Select your pattern from the list and see a pattern description in the right
part of the window. Each pattern contains a number of software packages needed for
specic functions (e.g. Multimedia or Ofce software). For a more detailed selection
based on software packages to install, select Details to switch to the YaST Software
Manager.
You can also install additional software packages or remove software packages from
your system at any later time with the YaST Software Manager. For more information,
refer to Chapter 5, Installing or Removing Software (↑Start-Up).
26 Reference
Figure 1.10
Software Selection and System Tasks
1.12.4 Locale Settings
Here you can change the system Language and Keyboard Layout you dened in the
rst step of the installation. It is also possible to add additional languages. To adjust
the system language settings, select Language. Select a language from the list. The
primary language is used as the system language. You can also adapt keyboard layout
and time zone to the primary language if the current settings differ. Details lets you
modify language settings for the user root, set UTF-8 support, or further specify the
language (e.g. select South African English).
Choose secondary languages to be able to switch to one of these languages at any time
without having to install additional packages. For more information, see Chapter 11,
Changing Language and Country Settings with YaST (↑Start-Up).
To change the keyboard layout, select Keyboard Layout. By default, the layout corre-
sponds to the language chosen for installation. Select the keyboard layout from the list.
Use the Test eld at the bottom of the dialog to check if you can enter special characters
of that layout correctly. Options to ne-tune various settings are available under Expert
Mode. When nished, click Accept to return to the installation summary.
Installation with YaST 27
1.12.5 Time Zone
Adjust time zone and clock settings here. Provided a network is congured, you can
also set up a Network Time Protocol (NTP) client that automatically synchronizes your
computer with a time server. This is the same conguration as shown earlier in Sec-
tion 1.8, “Clock and Time Zone” (page 16).
1.12.6 User Settings
Change the current User settings and change or set the Root Password here. This is the
same conguration as shown earlier in Section 1.11, “Create New User” (page 21).
1.12.7 Default Runlevel
openSUSE can boot to different runlevels. Normally, there should be no need to change
anything here, but if necessary set the default runlevel with this dialog.
1.12.8 System
This dialog presents all the hardware information YaST could obtain about your com-
puter. When called, the hardware detection routine is started. Depending on your system,
this may take some time. Select any item in the list and click Details to see detailed
information about the selected item. Use Save to File to save a detailed list to either the
local le system or a oppy. Advanced users can also change the PCI ID setup and
Kernel Settings by choosing Kernel Settings.
1.12.9 Installation from Images
Installing from images considerably speeds up the installation. Images contain com-
pressed snapshots of installed systems matching your selection of patterns. Packages
not contained in the images deployed will be installed conventionally.
Unless your custom software selection does not match any of the available images, this
feature is Enabled by default. In case of problems, Disable it for debugging purposes.
28 Reference
1.12.10 Firewall
By default SuSEFirewall2 is enabled on all congured network interfaces. To globally
disable the rewall for this computer, click on Disable. If the rewall is enabled, you
may Open the SSH port in order to allow remote connections via secure shell.
1.13 Performing the Installation
After conguring all installation settings, click Install in the Installation Settings window
to start the installation. Some software may require a license conrmation. If your
software selection includes such software, license conrmation dialogs are displayed.
Click Accept to install the software package. When not agreeing to the license, click I
Disagree and the software package will not be installed. In the dialog that follows,
conrm with Install again.
The installation usually takes between 15 and 30 minutes, depending on the system
performance and the selected software scope. After having prepared the hard disk,
having saved and restored the user settings, and having deployed the installation images,
the software installation starts. During this procedure a slide show introduces the features
of openSUSE. Choose Details to switch to the installation log or Release Notes to read
important up-to-date information which was not available when the manuals were
printed.
NOTE: Release Notes
The release notes that can be viewed during this step are the ones printed on
the installation CD. A newer version may be available on the Internet. When
manually conguring network and Internet access, the latest version of the
release notes will be displayed at the end of the installation.
After the software installation has completed, the basic system is set up. Among others,
“Finishing the Basic Installation” includes installing the boot manager, initializing fonts
and more. Next YaST boots into the new Linux system to start the system conguration.
Installation with YaST 29
TIP: Existing SSH Host Keys
If you install openSUSE on a machine with existing Linux installations, the instal-
lation routine automatically imports the SSH host key with the most recent
access time from an existing installation.
1.14 Conguration of the Installed
System
The system is now installed, but not yet congured for use. The hardware, the network
and other services are not yet set up. If you follow the default installation path, the
system will be automatically congured. If you have deselected the Automatic Con-
guration, the manual system conguration starts.
1.14.1 Automatic System Conguration
Having rebooted, the system starts the Automatic Conguration. This routine attempts
to congure your network and Internet access and sets up your hardware. This process
does not need any interaction. You can change the settings made by Automatic Con-
guration at any time on the installed system with YaST. Continue with Section 1.15,
“Graphical Login” (page 35).
1.14.2 Manual System Conguration
Having rebooted, the system starts the manual conguration. If the conguration fails
at one of the steps of this stage, it restarts and continues from the last successful step.
1.14.2.1 Hostname and Domain Name
The hostname is the computer's name in the network. The domain name is the name of
the network. A hostname and domain are proposed by default. If your system is part
of a network, the hostname has to be unique in this network, whereas the domain name
has to be common to all hosts on the network.
30 Reference
In many networks, the system receives its name over DHCP. In this case it is not nec-
essary to modify the proposed hostname and domain name. Select Change Hostname
via DHCP instead. To be able to access your system using this hostname, even when
it is not connected to the network, select Assign Hostname to Loopback IP. Do n ot
enable this option when your machine provides network services. If you often change
networks without restarting the desktop environment (e.g. when switching between
different WLANs), do not enable this option either, because the desktop system may
get confused when the hostname in /etc/hosts changes.
To change hostname settings at any time after installation, use YaST Network Devices
> Network Settings. For more information, see Section 9.4.1, “Conguring the Network
Card with YaST” (page 169).
1.14.2.2 Network Conguration
If you are installing openSUSE on a laptop computer, Interfaces Controlled by Network-
Manager is enabled. NetworkManager is a tool that enables automatic connection with
minimal user intervention. It is ideal for WLAN and mobile computing. If you want to
use the traditional method without NetworkManager, click Disable NetworkManager.
Find detailed information about NetworkManager in Chapter 21, Using NetworkMan-
ager (page 379). If you are installing openSUSE on any other type of machine, the tra-
ditional method without NetworkManager is selected by default. This conguration
step also lets you congure the network devices of your system and make security set-
tings, for example, for a rewall or proxy.
The network can also be congured after the system installation has been completed.
If you skip it now, your system is left ofine unable to retrieve any available updates.
To congure your network connection later, select Skip Conguration and click Next.
The following network settings can be congured in this step:
General Network Settings
Enable or disable the use of NetworkManager as described above. Also change the
IPv6 support here. By default the IPv6 support is enabled. To disable it, click Dis-
able IPv6. For more information about IPv6, see Section 9.2, “IPv6—The Next
Generation Internet” (page 157).
Firewall
By default SuSEFirewall2 is enabled on all congured network interfaces. To
globally disable the rewall for this computer, click on Disable. If the rewall is
Installation with YaST 31
enabled, you may Open the SSH port in order to allow remote connections via secure
shell. To open the detailed rewall conguration dialog, click on Firewall. See
Section “Conguring the Firewall with YaST” (Chapter 13, Masquerading and
Firewalls, ↑Security Guide) for detailed information.
Network Interfaces
All network cards detected by YaST are listed here. If you have already set up a
network connection during the installation (as described in Section 1.7.1.1, “Network
Setup” (page 15)) the card used for this connection is listed as Congured. A click
on Network Interfaces opens the Network Settings dialog, where you can change
existing congurations, set up networks cards not congured yet, or add and con-
gure additional cards.
DSL Connections, ISDN Adapters, and Modems
If your computer is equipped with an internal DSL modem, an internal ADSL Fritz
Card, an ISDN card or a modem, clicking on the respective headline opens the
conguration dialog.
VNC Remote Administration
To enable remote administration of your machine via VNC, click VNC Remote
Administration. Choose Allow Remote Administration in the following dialog and
adjust your rewall settings accordingly.
Proxy
If you have a proxy server controlling the Internet access in your network, congure
the proxy URLs and authentication details in this dialog.
TIP: Resetting the Network Conguration to the Default Values
Reset the network settings to the original proposed values by clicking Change
> Reset to Defaults. This discards any changes made.
Test Internet Connection
After having congured a network connection, you can test it. For this purpose, YaST
establishes a connection to the openSUSE server and downloads the latest release notes.
Read them at the end of the installation process. A successful test is also a prerequisite
for the automatic addition of the default repositories and for updating online.
32 Reference
If you have multiple network interfaces, verify that the desired card is used to connect
to the Internet. If not, click Change Device.
To start the test, select Yes, Test Connection to the Internet and click Next. In the fol-
lowing dialog, view the progress of the test and the results. Detailed information about
the test process is available via View Logs. If the test fails, click Back to return to the
network conguration to correct your entries.
Proceed with Next. If the test was successful, the ofcial software repositories for
openSUSE and the update repository will be congured. Downloading the repository
data for the rst time may take some time.
If you do not want to test the connection at this point, select No, Skip This Test then
Next. This also skips downloading the release notes, and updating online. These steps
can be performed any time after the system has been initially congured.
1.14.2.3 Online Update
If an Internet connection has been established, and updates are available, select whether
to perform a YaST online update. If there are any patched packages available on the
servers, download and install them now to x known bugs or security issues. For detailed
instructions see Chapter 6, YaST Online Update (↑Start-Up). Directives on how to
perform an online update in the installed system are available at Section “Keeping the
System Up-to-date” (Chapter 5, Installing or Removing Software, ↑Start-Up) or Chap-
ter 6, YaST Online Update (↑Start-Up). This step is skipped if no updates are available
or no Internet connection has been established. Patches xing security issues and rec-
ommended patches applying to your installation are automatically preselected. Click
Accept to install them and Next to proceed with the system conguration.
IMPORTANT: Downloading Software Updates
The download of updates might take quite some time, depending on the
bandwidth of the Internet connection and the size of the update les. In case
the patch system itself is updated, the online update will restart and download
more patches after the restart. If the kernel was updated, the system will reboot
before completing the conguration.
Installation with YaST 33
1.14.2.4 New Local User
If no local user was created in step one, you can create one in this dialog. To create
more users, manage groups, modify defaults for new users and set up network authen-
tication, launch User Management. Refer to Chapter 10, Managing Users with YaST
(↑Start-Up) for more information about user management. To skip this step, click Next
without entering any data.
1.14.2.5 Release Notes
After completing the user authentication setup, YaST displays the release notes. Reading
them is recommended, because they contain important up-to-date information which
was not available when the manuals were printed. If you successfully tested the Internet
connection, read the most recent version of the release notes, as fetched from openSUSE's
servers. Use Miscellaneous > Release Notes in YaST or start the SUSE Help Center to
view the release notes after installation.
1.14.2.6 Hardware Conguration
At the end of the installation, YaST opens a dialog for the conguration of Graphics
Cards Printer . Click the individual components to start the hardware conguration.
For the most part, YaST detects and congures the devices automatically.
You can skip any peripheral devices and congure them later, as described in Chapter 13,
Setting Up Hardware Components with YaST (↑Start-Up). To skip the conguration,
select Skip Conguration and click Next.
TIP: Resetting Hardware Conguration to the Default Values
You can cancel any changes to the hardware conguration by clicking Change
> Reset to Defaults. YaST then shows the original proposal again.
1.14.2.7 Installation Completed
After a successful installation, YaST shows the Installation Completed dialog. In this
dialog, select whether to clone your newly installed system for AutoYaST. To clone
your system, select Clone This System for AutoYaST. The prole of the current system
is stored in /root/autoyast.xml.
34 Reference
AutoYaST is a system for installing one or more openSUSE systems automatically
without user intervention. AutoYaST installations are performed using a control le
with installation and conguration data. Finish the installation of openSUSE with Finish
in the nal dialog.
1.15 Graphical Login
openSUSE is now fully installed and congured. Unless you enabled the automatic
login function or customized the default runlevel, you should see the graphical login
on your screen in which to enter a username and password to log into the system. On
single user systems with automatic login enabled, the desktop starts automatically.
For a short introduction to the KDE or GNOME desktop environments, refer to the
Chapter 3, GNOME Quick Start (↑Start-Up) and the Chapter 2, KDE Quick Start (↑Start-
Up). These manuals can be accessed via the Help function in both KDE and GNOME.
Installation with YaST 35
2
Remote Installation
openSUSE® can be installed in different ways. As well as the usual media installation
covered in Chapter 1, Installation with YaST (page 3), you can choose from various
network-based approaches or even take a completely hands-off approach to the instal-
lation of openSUSE.
Each method is introduced by means of two short check lists: one listing the prerequisites
for this method and the other illustrating the basic procedure. More detail is then pro-
vided for all the techniques used in these installation scenarios.
NOTE
In the following sections, the system to hold your new openSUSE installation
is referred to as target system or installation target. The term repository (pre-
viously called “installation source”) is used for all sources of installation data.
This includes physical media, such as CD and DVD, and network servers dis-
tributing the installation data in your network.
2.1 Installation Scenarios for Remote
Installation
This section introduces the most common installation scenarios for remote installations.
For each scenario, carefully check the list of prerequisites and follow the procedure
outlined for this scenario. If in need of detailed instructions for a particular step, follow
the links provided for each one of them.
Remote Installation 37
2.1.1 Simple Remote Installation via
VNC—Static Network Conguration
This type of installation still requires some degree of physical access to the target system
to boot for installation. The installation itself is entirely controlled by a remote worksta-
tion using VNC to connect to the installation program. User interaction is required as
with the manual installation in Chapter 1, Installation with YaST (page 3).
For this type of installation, make sure that the following requirements are met:
Remote repository: NFS, HTTP, FTP, or SMB with working network connection.
Target system with working network connection.
Controlling system with working network connection and VNC viewer software or
Java-enabled browser (Firefox, Konqueror, Internet Explorer, Opera, etc.).
Physical boot medium (CD, DVD, or USB ash drive) for booting the target system.
Valid static IP addresses already assigned to the repository and the controlling system.
Valid static IP address to assign to the target system.
To perform this kind of installation, proceed as follows:
1
Set up the repository as described in Section 2.2, “Setting Up the Server Holding
the Installation Sources” (page 46). Choose an NFS, HTTP, or FTP network server.
For an SMB repository, refer to Section 2.2.5, “Managing an SMB Repository”
(page 53).
2
Boot the target system using a boot medium (DVD, CD, or USB ash drive) of the
openSUSE media kit. For more information about the openSUSE media kit, see
Section 1.1, “Choosing the Installation Media” (page 3).
3
When the boot screen of the target system appears, use the boot options prompt to
set the appropriate VNC options and the address of the repository. This is described
in detail in Section 2.4, “Booting the Target System for Installation” (page 65).
The target system boots to a text-based environment, giving the network address
and display number under which the graphical installation environment can be ad-
38 Reference
dressed by any VNC viewer application or browser. VNC installations announce
themselves over OpenSLP and if the rewall settings permit, they can be found using
Konqueror in service:/ or slp:/ mode.
4
On the controlling workstation, open a VNC viewing application or Web browser
and connect to the target system as described in Section 2.5.1, “VNC Installation”
(page 69).
5
Perform the installation as described in Chapter 1, Installation with YaST (page 3).
Reconnect to the target system after it reboots for the nal part of the installation.
6
Finish the installation.
2.1.2 Simple Remote Installation via
VNC—Dynamic Network Conguration
This type of installation still requires some degree of physical access to the target system
to boot for installation. The network conguration is made with DHCP. The installation
itself is entirely controlled from a remote workstation using VNC to connect to the in-
staller, but still requires user interaction for the actual conguration efforts.
For this type of installation, make sure that the following requirements are met:
Remote repository: NFS, HTTP, FTP, or SMB with working network connection.
Target system with working network connection.
Controlling system with working network connection and VNC viewer software or
Java-enabled browser (Firefox, Konqueror, Internet Explorer, or Opera).
Boot the target system using a boot medium (DVD, CD, or USB ash drive) of the
openSUSE media kit. For more information about the openSUSE media kit, see
Section 1.1, “Choosing the Installation Media” (page 3).
Running DHCP server providing IP addresses.
To perform this kind of installation, proceed as follows:
Remote Installation 39
1
Set up the repository as described in Section 2.2, “Setting Up the Server Holding
the Installation Sources” (page 46). Choose an NFS, HTTP, or FTP network server.
For an SMB repository, refer to Section 2.2.5, “Managing an SMB Repository”
(page 53).
2
Boot the target system using a boot medium (DVD, CD, or USB ash drive) of the
openSUSE media kit. For more information about the openSUSE media kit, see
Section 1.1, “Choosing the Installation Media” (page 3).
3
When the boot screen of the target system appears, use the boot options prompt to
set the appropriate VNC options and the address of the repository. This is described
in detail in Section 2.4, “Booting the Target System for Installation” (page 65).
The target system boots to a text-based environment, giving the network address
and display number under which the graphical installation environment can be ad-
dressed by any VNC viewer application or browser. VNC installations announce
themselves over OpenSLP and if the rewall settings permit, they can be found using
Konqueror in service:/ or slp:/ mode.
4
On the controlling workstation, open a VNC viewing application or Web browser
and connect to the target system as described in Section 2.5.1, “VNC Installation”
(page 69).
5
Perform the installation as described in Chapter 1, Installation with YaST (page 3).
Reconnect to the target system after it reboots for the nal part of the installation.
6
Finish the installation.
2.1.3 Remote Installation via VNC—PXE
Boot and Wake on LAN
This type of installation is completely hands-off. The target machine is started and
booted remotely. User interaction is only needed for the actual installation. This approach
is suitable for cross-site deployments.
To perform this type of installation, make sure that the following requirements are met:
Remote repository: NFS, HTTP, FTP, or SMB with working network connection.
40 Reference
TFTP server.
Running DHCP server for your network.
Target system capable of PXE boot, networking, and Wake on LAN, plugged in and
connected to the network.
Controlling system with working network connection and VNC viewer software or
Java-enabled browser (Firefox, Konqueror, Internet Explorer, or Opera).
To perform this type of installation, proceed as follows:
1
Set up the repository as described in Section 2.2, “Setting Up the Server Holding
the Installation Sources” (page 46). Choose an NFS, HTTP, or FTP network server
or congure an SMB repository as described in Section 2.2.5, “Managing an SMB
Repository” (page 53).
2
Set up a TFTP server to hold a boot image that can be pulled by the target system.
This is described in Section 2.3.2, “Setting Up a TFTP Server” (page 58).
3
Set up a DHCP server to provide IP addresses to all machines and reveal the location
of the TFTP server to the target system. This is described in Section 2.3.1, “Setting
Up a DHCP Server” (page 55).
4
Prepare the target system for PXE boot. This is described in further detail in Sec-
tion 2.3.5, “Preparing the Target System for PXE Boot” (page 64).
5
Initiate the boot process of the target system using Wake on LAN. This is described
in Section 2.3.7, “Wake on LAN” (page 65).
6
On the controlling workstation, open a VNC viewing application or Web browser
and connect to the target system as described in Section 2.5.1, “VNC Installation”
(page 69).
7
Perform the installation as described in Chapter 1, Installation with YaST (page 3).
Reconnect to the target system after it reboots for the nal part of the installation.
8
Finish the installation.
Remote Installation 41
2.1.4 Simple Remote Installation via
SSH—Static Network Conguration
This type of installation still requires some degree of physical access to the target system
to boot for installation and to determine the IP address of the installation target. The
installation itself is entirely controlled from a remote workstation using SSH to connect
to the installer. User interaction is required as with the regular installation described in
Chapter 1, Installation with YaST (page 3).
For this type of installation, make sure that the following requirements are met:
Remote repository: NFS, HTTP, FTP, or SMB with working network connection.
Target system with working network connection.
Controlling system with working network connection and working SSH client soft-
ware.
Boot the target system using a boot medium (DVD, CD, or USB ash drive) of the
openSUSE media kit. For more information about the openSUSE media kit, see
Section 1.1, “Choosing the Installation Media” (page 3).
Valid static IP addresses already assigned to the repository and the controlling system.
Valid static IP address to assign to the target system.
To perform this kind of installation, proceed as follows:
1
Set up the repository as described in Section 2.2, “Setting Up the Server Holding
the Installation Sources” (page 46). Choose an NFS, HTTP, or FTP network server.
For an SMB repository, refer to Section 2.2.5, “Managing an SMB Repository”
(page 53).
2
Boot the target system using a boot medium (DVD, CD, or USB ash drive) of the
openSUSE media kit. For more information about the openSUSE media kit, see
Section 1.1, “Choosing the Installation Media” (page 3).
3
When the boot screen of the target system appears, use the boot options prompt to
set the appropriate parameters for network connection, address of the repository,
42 Reference
and SSH enablement. This is described in detail in Section 2.4.2, “Using Custom
Boot Options” (page 66).
The target system boots to a text-based environment, giving the network address
under which the graphical installation environment can be addressed by any SSH
client.
4
On the controlling workstation, open a terminal window and connect to the target
system as described in Section 2.5.2.2, “Connecting to the Installation Program”
(page 71).
5
Perform the installation as described in Chapter 1, Installation with YaST (page 3).
Reconnect to the target system after it reboots for the nal part of the installation.
6
Finish the installation.
2.1.5 Simple Remote Installation via
SSH—Dynamic Network Conguration
This type of installation still requires some degree of physical access to the target system
to boot for installation and determine the IP address of the installation target. The instal-
lation itself is entirely controlled from a remote workstation using VNC to connect to
the installer, but still requires user interaction for the actual conguration efforts.
For this type of installation, make sure that the following requirements are met:
Remote repository: NFS, HTTP, FTP, or SMB with working network connection.
Target system with working network connection.
Controlling system with working network connection and working SSH client soft-
ware.
Physical boot medium (CD, DVD, or USB ash drive) for booting the target system.
Running DHCP server providing IP addresses.
To perform this kind of installation, proceed as follows:
Remote Installation 43
1
Set up the repository source as described in Section 2.2, “Setting Up the Server
Holding the Installation Sources” (page 46). Choose an NFS, HTTP, or FTP network
server. For an SMB repository, refer to Section 2.2.5, “Managing an SMB Repository”
(page 53).
2
Boot the target system using a boot medium (DVD, CD, or USB ash drive) of the
openSUSE media kit. For more information about the openSUSE media kit, see
Section 1.1, “Choosing the Installation Media” (page 3).
3
When the boot screen of the target system appears, use the boot options prompt to
pass the appropriate parameters for network connection, location of the installation
source, and SSH enablement. See Section 2.4.2, “Using Custom Boot Options”
(page 66) for detailed instructions on the use of these parameters.
The target system boots to a text-based environment, giving you the network address
under which the graphical installation environment can be addressed by any SSH
client.
4
On the controlling workstation, open a terminal window and connect to the target
system as described in Section 2.5.2.2, “Connecting to the Installation Program”
(page 71).
5
Perform the installation as described in Chapter 1, Installation with YaST (page 3).
Reconnect to the target system after it reboots for the nal part of the installation.
6
Finish the installation.
2.1.6 Remote Installation via SSH—PXE Boot
and Wake on LAN
This type of installation is completely hands-off. The target machine is started and
booted remotely.
To perform this type of installation, make sure that the following requirements are met:
Remote repository: NFS, HTTP, FTP, or SMB with working network connection.
TFTP server.
44 Reference
Running DHCP server for your network, providing a static IP to the host to install.
Target system capable of PXE boot, networking, and Wake on LAN, plugged in and
connected to the network.
Controlling system with working network connection and SSH client software.
To perform this type of installation, proceed as follows:
1
Set up the repository as described in Section 2.2, “Setting Up the Server Holding
the Installation Sources” (page 46). Choose an NFS, HTTP, or FTP network server.
For the conguration of an SMB repository, refer to Section 2.2.5, “Managing an
SMB Repository” (page 53).
2
Set up a TFTP server to hold a boot image that can be pulled by the target system.
This is described in Section 2.3.2, “Setting Up a TFTP Server” (page 58).
3
Set up a DHCP server to provide IP addresses to all machines and reveal the location
of the TFTP server to the target system. This is described in Section 2.3.1, “Setting
Up a DHCP Server” (page 55).
4
Prepare the target system for PXE boot. This is described in further detail in Sec-
tion 2.3.5, “Preparing the Target System for PXE Boot” (page 64).
5
Initiate the boot process of the target system using Wake on LAN. This is described
in Section 2.3.7, “Wake on LAN” (page 65).
6
On the controlling workstation, start an SSH client and connect to the target system
as described in Section 2.5.2, “SSH Installation” (page 70).
7
Perform the installation as described in Chapter 1, Installation with YaST (page 3).
Reconnect to the target system after it reboots for the nal part of the installation.
8
Finish the installation.
Remote Installation 45
2.2 Setting Up the Server Holding the
Installation Sources
Depending on the operating system running on the machine to use as the network instal-
lation source for openSUSE, there are several options for the server conguration. The
easiest way to set up an installation server is to use YaST on openSUSE 11.1 and
higher.
TIP
You can even use a Microsoft Windows machine as the installation server for
your Linux deployment. See Section 2.2.5, “Managing an SMB Repository”
(page 53) for details.
2.2.1 Setting Up an Installation Server Using
YaST
YaST offers a graphical tool for creating network repositories. It supports HTTP, FTP,
and NFS network installation servers.
1
Log in as root to the machine that should act as installation server.
2
Install the yast2-instserver package.
3
Start YaST > Miscellaneous > Installation Server.
4
Select the repository type (HTTP, FTP, or NFS). The selected service is started au-
tomatically every time the system starts. If a service of the selected type is already
running on your system and you want to congure it manually for the server, deac-
tivate the automatic conguration of the server service with Do Not Congure Any
Network Services. In both cases, dene the directory in which the installation data
should be made available on the server.
5
Congure the required repository type. This step relates to the automatic conguration
of server services. It is skipped when automatic conguration is deactivated.
46 Reference
Dene an alias for the root directory of the FTP or HTTP server on which the instal-
lation data should be found. The repository will later be located under
ftp://Server-IP/Alias/Name (FTP) or under
http://Server-IP/Alias/Name (HTTP). Name stands for the name of the
repository, which is dened in the following step. If you selected NFS in the previous
step, dene wild cards and export options. The NFS server will be accessible under
nfs://Server-IP/Name. Details of NFS and exports can be found in Chapter 14,
Sharing File Systems with NFS (page 259).
TIP: Firewall Settings
Make sure that the rewall settings of your server system allow trafc on
the ports for HTTP, NFS, and FTP. If they currently do not, enable Open Port
in Firewall or check Firewall Details rst.
6
Congure the repository. Before the installation media are copied to their destination,
dene the name of the repository (ideally, an easily remembered abbreviation of the
product and version). YaST allows providing ISO images of the media instead of
copies of the installation DVDs. If you want this, activate the relevant check box
and specify the directory path under which the ISO les can be found locally. De-
pending on the product to distribute using this installation server, it might be that
more add-on CDs or service pack CDs are required and should be added as extra
repositories. To announce your installation server in the network via OpenSLP, acti-
vate the appropriate option.
TIP
Consider announcing your repository via OpenSLP if your network setup
supports this option. This saves you from entering the network installation
path on every target machine. The target systems are just booted using the
SLP boot option and nd the network repository without any further con-
guration. For details on this option, refer to Section 2.4, “Booting the Target
System for Installation” (page 65).
7
Upload the installation data. The most lengthy step in conguring an installation
server is copying the actual installation media. Insert the media in the sequence re-
quested by YaST and wait for the copying procedure to end. When the sources have
been fully copied, return to the overview of existing repositories and close the con-
guration by selecting Finish.
Remote Installation 47
Your installation server is now fully congured and ready for service. It is automat-
ically started every time the system is started. No further intervention is required.
You only need to congure and start this service correctly by hand if you have deac-
tivated the automatic conguration of the selected network service with YaST as an
initial step.
To deactivate a repository, select the repository to remove then select Delete. The in-
stallation data are removed from the system. To deactivate the network service, use the
respective YaST module.
If your installation server needs to provide the installation data for more than one
product of the product version, start the YaST installation server module and select Add
in the overview of existing repositories to congure the new repository.
2.2.2 Setting Up an NFS Repository
Manually
Setting up an NFS source for installation is basically done in two steps. In the rst step,
create the directory structure holding the installation data and copy the installation
media over to this structure. Second, export the directory holding the installation data
to the network.
To create a directory to hold the installation data, proceed as follows:
1
Log in as root.
2
Create a directory that will later hold all installation data and change into this direc-
tory. For example:
mkdir install/product/productversion
cd install/product/productversion
Replace product with an abbreviation of the product name and productversion
with a string that contains the product name and version.
3
For each DVD contained in the media kit execute the following commands:
3a
Copy the entire content of the installation DVD into the installation server
directory:
48 Reference
cp -a /media/path_to_your_DVD_drive .
Replace path_to_your_DVD_drive with the actual path under which
your DVD drive is addressed. Depending on the type of drive used in your
system, this can be cdrom, cdrecorder, dvd, or dvdrecorder.
3b
Rename the directory to the DVD number:
mv path_to_your_DVD_drive DVDx
Replace x with the actual number of your DVD.
On openSUSE, you can export the repository with NFS using YaST. Proceed as follows:
1
Log in as root.
2
Start YaST > Network Services > NFS Server.
3
Select Start and Open Port in Firewall and click Next.
4
Select Add Directory and browse for the directory containing the installation sources,
in this case, productversion.
5
Select Add Host and enter the hostnames of the machines to which to export the in-
stallation data. Instead of specifying hostnames here, you could also use wild cards,
ranges of network addresses, or just the domain name of your network. Enter the
appropriate export options or leave the default, which works ne in most setups. For
more information about the syntax used in exporting NFS shares, read the exports
man page.
6
Click Finish. The NFS server holding the openSUSE repository is automatically
started and integrated into the boot process.
If you prefer manually exporting the repository via NFS instead of using the YaST NFS
Server module, proceed as follows:
1
Log in as root.
2
Open the le /etc/exports and enter the following line:
/productversion *(ro,root_squash,sync)
Remote Installation 49
This exports the directory /productversion to any host that is part of this net-
work or to any host that can connect to this server. To limit the access to this server,
use netmasks or domain names instead of the general wild card *. Refer to the
export man page for details. Save and exit this conguration le.
3
To add the NFS service to the list of servers started during system boot, execute the
following commands:
insserv /etc/init.d/nfsserver
4
Start the NFS server with rcnfsserver start. If you need to change the con-
guration of your NFS server later, modify the conguration le and restart the NFS
daemon with rcnfsserver restart.
Announcing the NFS server via OpenSLP makes its address known to all clients in
your network.
1
Log in as root.
2
Create the /etc/slp.reg.d/install.suse.nfs.reg conguration le
with the following lines:
# Register the NFS Installation Server
service:install.suse:nfs://$HOSTNAME/path_to_repository/DVD1,en,65535
description=NFS Repository
Replace path_to_repository with the actual path to the installation source
on your server.
3
Start the OpenSLP daemon with rcslpd start.
For more information about OpenSLP, refer to the package documentation located under
/usr/share/doc/packages/openslp/ or refer to Chapter 10, SLP Services
in the Network (page 211). More Information about NFS, refer to Chapter 14, Sharing
File Systems with NFS (page 259).
2.2.3 Setting Up an FTP Repository Manually
Creating an FTP repository is very similar to creating an NFS repository. An FTP
repository can be announced over the network using OpenSLP as well.
50 Reference
1
Create a directory holding the installation sources as described in Section 2.2.2,
“Setting Up an NFS Repository Manually” (page 48).
2
Congure the FTP server to distribute the contents of your installation directory:
2a
Log in as root and install the package vsftpd using the YaST software
management.
2b
Enter the FTP server root directory:
cd /srv/ftp
2c
Create a subdirectory holding the installation sources in the FTP root directory:
mkdir repository
Replace repository with the product name.
2d
Mount the contents of the installation repository into the change root environ-
ment of the FTP server:
mount --bind path_to_repository /srv/ftp/repository
Replace path_to_repository and repository with values matching
your setup. If you need to make this permanent, add it to /etc/fstab.
2e
Start vsftpd with vsftpd.
3
Announce the repository via OpenSLP, if this is supported by your network setup:
3a
Create the /etc/slp.reg.d/install.suse.ftp.reg conguration
le with the following lines:
# Register the FTP Installation Server
service:install.suse:ftp://$HOSTNAME/repository/DVD1,en,65535
description=FTP Repository
Replace repository with the actual name to the repository directory on
your server. The service: line should be entered as one continuous line.
3b
Start the OpenSLP daemon with rcslpd start.
Remote Installation 51
TIP: Conguring an FTP Server with YaST
If you prefer using YaST over manually conguring the FTP installation server,
refer to Chapter 17, Setting up an FTP server with YaST (page 331) for more in-
formation on how to use the YaST FTP server module.
2.2.4 Setting Up an HTTP Repository
Manually
Creating an HTTP repository is very similar to creating an NFS repository. An HTTP
repository can be announced over the network using OpenSLP as well.
1
Create a directory holding the installation sources as described in Section 2.2.2,
“Setting Up an NFS Repository Manually” (page 48).
2
Congure the HTTP server to distribute the contents of your installation directory:
2a
Install the Web server Apache as described in Section 16.1.2, “Installation”
(page 288).
2b
Enter the root directory of the HTTP server (/srv/www/htdocs) and
create the subdirectory that will hold the installation sources:
mkdir repository
Replace repository with the product name.
2c
Create a symbolic link from the location of the installation sources to the root
directory of the Web server (/srv/www/htdocs):
ln -s /path_to_repository /srv/www/htdocs/repository
2d
Modify the conguration le of the HTTP server (/etc/apache2/
default-server.conf) to make it follow symbolic links. Replace the
following line:
Options None
with
Options Indexes FollowSymLinks
52 Reference
2e
Reload the HTTP server conguration using rcapache2 reload.
3
Announce the repository via OpenSLP, if this is supported by your network setup:
3a
Create the /etc/slp.reg.d/install.suse.http.reg conguration
le with the following lines:
# Register the HTTP Installation Server
service:install.suse:http://$HOSTNAME/repository/DVD1/,en,65535
description=HTTP Repository
Replace repository with the actual path to the repository on your server.
The service: line should be entered as one continuous line.
3b
Start the OpenSLP daemon using rcslpd restart.
2.2.5 Managing an SMB Repository
Using SMB, you can import the installation sources from a Microsoft Windows server
and start your Linux deployment even with no Linux machine around.
To set up an exported Windows Share holding your openSUSE repository, proceed as
follows:
1
Log in to your Windows machine.
2
Create a new folder that will hold the entire installation tree and name it INSTALL,
for example.
3
Export this share according the procedure outlined in your Windows documentation.
4
Enter this share and create a subfolder, called product. Replace product with
the actual product name.
5
Enter the INSTALL/product folder and copy each DVD to a separate folder,
such as DVD1 and DVD2.
To use a SMB mounted share as a repository, proceed as follows:
Remote Installation 53
1
Boot the installation target.
2
Select Installation.
3
Press F4 for a selection of the repository.
4
Choose SMB and enter the Windows machine's name or IP address, the share name
(INSTALL/product/DVD1, in this example), username, and password.
After you hit Enter, YaST starts and you can perform the installation.
2.2.6 Using ISO Images of the Installation
Media on the Server
Instead of copying physical media into your server directory manually, you can also
mount the ISO images of the installation media into your installation server and use
them as a repository. To set up an HTTP, NFS or FTP server that uses ISO images in-
stead of media copies, proceed as follows:
1
Download the ISO images and save them to the machine to use as the installation
server.
2
Log in as root.
3
Choose and create an appropriate location for the installation data, as described in
Section 2.2.2, “Setting Up an NFS Repository Manually” (page 48), Section 2.2.3,
“Setting Up an FTP Repository Manually” (page 50), or Section 2.2.4, “Setting Up
an HTTP Repository Manually” (page 52).
4
Create subdirectories for each DVD.
5
To mount and unpack each ISO image to the nal location, issue the following
command:
mount -o loop path_to_isopath_to_repository/product/mediumx
Replace path_to_iso with the path to your local copy of the ISO image,
path_to_repository with the source directory of your server, product with
54 Reference
the product name, and mediumx with the type (CD or DVD) and number of media
you are using.
6
Repeat the previous step to mount all ISO images needed for your product.
7
Start your installation server as usual, as described in Section 2.2.2, “Setting Up an
NFS Repository Manually” (page 48), Section 2.2.3, “Setting Up an FTP Repository
Manually” (page 50), or Section 2.2.4, “Setting Up an HTTP Repository Manually”
(page 52).
To automatically mount the ISO images at boot time, add the respective mount entries
to /etc/fstab. An entry according to the previous example would look like the
following:
path_to_iso path_to_repository/productmedium auto loop
2.3 Preparing the Boot of the Target
System
This section covers the conguration tasks needed in complex boot scenarios. It contains
ready-to-apply conguration examples for DHCP, PXE boot, TFTP, and Wake on
LAN.
2.3.1 Setting Up a DHCP Server
There are two ways to set up a DHCP server. For openSUSE, YaST provides a graphical
interface to the process. Users can also manually edit the conguration les. For more
information about DHCP servers, see also Chapter 12, DHCP (page 241).
2.3.1.1 Setting Up a DHCP Server with YaST
To announce the TFTP server's location to the network clients and specify the boot
image le the installation target should use, add two declarations to your DHCP server
conguration.
Remote Installation 55
1
Log in as root to the machine hosting the DHCP server.
2
Install the yast2-dhcp-server package.
3
Start YaST > Network Services > DHCP Server.
4
Complete the setup wizard for basic DHCP server setup.
5
Select Expert Settings and select Yes when warned about leaving the start-up dia-
log.
6
In the Congured Declarations dialog, select the subnet in which the new system
should be located and click Edit.
7
In the Subnet Conguration dialog select Add to add a new option to the subnet's
conguration.
8
Select filename and enter pxelinux.0 as the value.
9
Add another option (next-server) and set its value to the address of the TFTP
server.
10
Select OK and Finish to complete the DHCP server conguration.
To congure DHCP to provide a static IP address to a specic host, enter the Expert
Settings of the DHCP server conguration module (Step 5 (page 56)) and add a new
declaration of the host type. Add the options hardware and fixed-address to
this host declaration and provide the appropriate values.
2.3.1.2 Setting Up a DHCP Server Manually
All the DHCP server needs to do, apart from providing automatic address allocation to
your network clients, is to announce the IP address of the TFTP server and the le that
needs to be pulled in by the installation routines on the target machine.
1
Log in as root to the machine hosting the DHCP server.
2
Append the following lines to a subnet conguration of your DHCP server's con-
guration le located under /etc/dhcpd.conf:
56 Reference
subnet 192.168.1.0 netmask 255.255.255.0 {
range dynamic-bootp 192.168.1.200 192.168.1.228;
# PXE related stuff
#
# "next-server" defines the tftp server that will be used
next-server ip_tftp_server:
#
# "filename" specifies the pxelinux image on the tftp server
# the server runs in chroot under /srv/tftpboot
filename "pxelinux.0";
}
Replace ip_of_the_tftp_server with the actual IP address of the TFTP
server. For more information about the options available in dhcpd.conf, refer to
the dhcpd.conf manual page.
3
Restart the DHCP server by executing rcdhcpd restart.
If you plan on using SSH for the remote control of a PXE and Wake on LAN installation,
explicitly specify the IP address DHCP should provide to the installation target. To
achieve this, modify the above mentioned DHCP conguration according to the follow-
ing example:
group {
# PXE related stuff
#
# "next-server" defines the tftp server that will be used
next-server ip_tftp_server:
#
# "filename" specifies the pxelinux image on the tftp server
# the server runs in chroot under /srv/tftpboot
filename "pxelinux.0";
host test {
hardware ethernet mac_address;
fixed-address some_ip_address;
}
}
The host statement introduces the hostname of the installation target. To bind the
hostname and IP address to a specic host, you must know and specify the system's
hardware (MAC) address. Replace all the variables used in this example with the actual
values that match your environment.
After restarting the DHCP server, it provides a static IP to the host specied, enabling
you to connect to the system via SSH.
Remote Installation 57
2.3.2 Setting Up a TFTP Server
Set up a TFTP server with YaST or set it up manually on any other Linux operating
system that supports xinetd and TFTP. The TFTP server delivers the boot image to the
target system once it boots and sends a request for it.
2.3.2.1 Setting Up a TFTP Server Using YaST
1
Log in as root.
2
Install the yast2-tftp-server package.
3
Start YaST > Network Services > TFTP Server and install the requested package.
4
Click Enable to make sure that the server is started and included in the boot routines.
No further action from your side is required to secure this. xinetd starts tftpd at boot
time.
5
Click Open Port in Firewall to open the appropriate port in the rewall running on
your machine. If there is no rewall running on your server, this option is not
available.
6
Click Browse to browse for the boot image directory. The default directory
/tftpboot is created and selected automatically.
7
Click Finish to apply your settings and start the server.
2.3.2.2 Setting Up a TFTP Server Manually
1
Log in as root and install the packages tftp and xinetd.
2
If unavailable, create /srv/tftpboot and /srv/tftpboot/pxelinux.cfg
directories.
3
Add the appropriate les needed for the boot image as described in Section 2.3.3,
“Using PXE Boot” (page 59).
58 Reference
4
Modify the conguration of xinetd located under /etc/xinetd.d to make sure
that the TFTP server is started on boot:
4a
If it does not exist, create a le called tftp under this directory with touch
tftp. Then run chmod 755 tftp.
4b
Open the le tftp and add the following lines:
service tftp
{
socket_type = dgram
protocol = udp
wait = yes
user = root
server = /usr/sbin/in.tftpd
server_args = -s /srv/tftpboot
disable = no
}
4c
Save the le and restart xinetd with rcxinetd restart.
2.3.3 Using PXE Boot
Some technical background information as well as PXE's complete specications are
available in the Preboot Execution Environment (PXE) Specication (http://www
.pix.net/software/pxeboot/archive/pxespec.pdf).
1
Change to the directory boot/<architecture>/loader of your installation
repository and copy the linux, initrd, message, biostest, and memtest
les to the /srv/tftpboot directory by entering the following:
cp -a linux initrd message biostest memtest /srv/tftpboot
2
Install the syslinux package directly from your installation DVDs with YaST.
3
Copy the /usr/share/syslinux/pxelinux.0 le to the /srv/tftpboot
directory by entering the following:
cp -a /usr/share/syslinux/pxelinux.0 /srv/tftpboot
Remote Installation 59
4
Change to the directory of your installation repository and copy the isolinux
.cfg le to /srv/tftpboot/pxelinux.cfg/default by entering the
following:
cp -a boot/<architecture>/loader/isolinux.cfg
/srv/tftpboot/pxelinux.cfg/default
5
Edit the /srv/tftpboot/pxelinux.cfg/default le and remove the lines
beginning with gfxboot, readinfo, and framebuffer.
6
Insert the following entries in the append lines of the default failsafe and apic
labels:
insmod=kernel module
By means of this entry, enter the network Kernel module needed to support
network installation on the PXE client. Replace kernel module with the
appropriate module name for your network device.
netdevice=interface
This entry denes the client's network interface that must be used for the network
installation. It is only necessary if the client is equipped with several network
cards and must be adapted accordingly. In case of a single network card, this
entry can be omitted.
install=nfs://ip_instserver/path_to_repository/DVD1
This entry denes the NFS server and the repository for the client installation.
Replace ip_instserver with the actual IP address of your installation
server. path_to_repository should be replaced with the actual path to
the repository. HTTP, FTP, or SMB repositories are addressed in a similar
manner, except for the protocol prex, which should read http, ftp, or smb.
IMPORTANT
If you need to pass other boot options to the installation routines, such
as SSH or VNC boot parameters, append them to the install entry.
An overview of parameters and some examples are given in Section 2.4,
“Booting the Target System for Installation” (page 65).
60 Reference
TIP: Changing Kernel and initrd Filenames
It is possible to use different lenames for Kernel and initrd images. This is
useful if you want to provide different operating systems from the same
boot server. However, you should be aware that only one dot is permitted
in the lenames that are provided by TFTP for the PXE boot.
An example /srv/tftpboot/pxelinux.cfg/default le follows. Adjust
the protocol prex for the repository to match your network setup and specify your
preferred method of connecting to the installer by adding the vnc and
vncpassword or the usessh and sshpassword options to the install entry.
The lines separated by \ must be entered as one continuous line without a line break
and without the \.
default harddisk
# default
label linux
kernel linux
append initrd=initrd ramdisk_size=65536 \
install=nfs://ip_instserver/path_to_repository/product/DVD1
# rescue
label rescue
kernel linux
append initrd=initrd ramdisk_size=65536 rescue=1
# bios test
label firmware
kernel linux
append initrd=biostest,initrd splash=silent install=exec:/bin/run_biostest
showopts
# memory test
label memtest
kernel memtest
# hard disk
label harddisk
localboot 0
implicit 0
display message
prompt 1
timeout 100
Remote Installation 61
Replace ip_instserver and path_to_repository with the values used in
your setup.
The following section serves as a short reference to the PXELINUX options used
in this setup. Find more information about the options available in the documentation
of the syslinux package located under /usr/share/doc/packages/
syslinux/.
2.3.4 PXELINUX Conguration Options
The options listed here are a subset of all the options available for the PXELINUX
conguration le.
DEFAULT kernel options...
Sets the default Kernel command line. If PXELINUX boots automatically, it acts
as if the entries after DEFAULT had been typed in at the boot prompt, except the
auto option is automatically added, indicating an automatic boot.
If no conguration le is present or no DEFAULT entry is present in the congu-
ration le, the default is the Kernel name “linux” with no options.
APPEND options...
Add one or more options to the Kernel command line. These are added for both
automatic and manual boots. The options are added at the very beginning of the
Kernel command line, usually permitting explicitly entered Kernel options to
override them.
LABEL label KERNEL image APPEND options...
Indicates that if label is entered as the Kernel to boot, PXELINUX should instead
boot image and the specied APPEND options should be used instead of the ones
specied in the global section of the le (before the rst LABEL command). The
default for image is the same as label and, if no APPEND is given, the default
is to use the global entry (if any). Up to 128 LABEL entries are permitted.
Note that GRUB uses the following syntax:
title mytitle
kernel my_kernelmy_kernel_options
initrd myinitrd
62 Reference
PXELINUX uses the following syntax:
label mylabel
kernel mykernel
append myoptions
Labels are mangled as if they were lenames and they must be unique after man-
gling. For example, the two labels “v2.6.30” and “v2.6.31” would not be distin-
guishable under PXELINUX because both mangle to the same DOS lename.
The Kernel does not have to be a Linux Kernel; it can be a boot sector or a COM-
BOOT le.
APPEND -
Append nothing. APPEND with a single hyphen as argument in a LABEL section
can be used to override a global APPEND.
LOCALBOOT type
On PXELINUX, specifying LOCALBOOT 0 instead of a KERNEL option means
invoking this particular label and causes a local disk boot instead of a Kernel boot.
DescriptionArgument
Perform a normal boot
0
Perform a local boot with the Universal Network Driver In-
terface (UNDI) driver still resident in memory
4
Perform a local boot with the entire PXE stack, including
the UNDI driver, still resident in memory
5
All other values are undened. If you do not know what the UNDI or PXE stacks
are, specify 0.
TIMEOUT time-out
Indicates how long to wait at the boot prompt until booting automatically, in units
of 1/10 second. The time-out is canceled as soon as the user types anything on the
keyboard, assuming the user will complete the command begun. A time-out of zero
disables the time-out completely (this is also the default). The maximum possible
time-out value is 35996 (just less than one hour).
Remote Installation 63
PROMPT flag_val
If flag_val is 0, displays the boot prompt only if Shift or Alt is pressed or Caps
Lock or Scroll Lock is set (this is the default). If flag_val is 1, always displays
the boot prompt.
F2 filename
F1 filename
..etc...
F9 filename
F10 filename
Displays the indicated le on the screen when a function key is pressed at the boot
prompt. This can be used to implement preboot online help (presumably for the
Kernel command line options). For backward compatibility with earlier releases,
F10 can be also entered as F0. Note that there is currently no way to bind lenames
to F11 and F12.
2.3.5 Preparing the Target System for PXE
Boot
Prepare the system's BIOS for PXE boot by including the PXE option in the BIOS boot
order.
WARNING: BIOS Boot Order
Do not place the PXE option ahead of the hard disk boot option in the BIOS.
Otherwise this system would try to reinstall itself every time you boot it.
2.3.6 Preparing the Target System for Wake
on LAN
Wake on LAN (WOL) requires the appropriate BIOS option to be enabled prior to the
installation. Also, note down the MAC address of the target system. This data is needed
to initiate Wake on LAN.
64 Reference
2.3.7 Wake on LAN
Wake on LAN allows a machine to be turned on by a special network packet containing
the machine's MAC address. Because every machine in the world has a unique MAC
identier, you do not need to worry about accidentally turning on the wrong machine.
IMPORTANT: Wake on LAN across Different Network Segments
If the controlling machine is not located in the same network segment as the
installation target that should be awakened, either congure the WOL requests
to be sent as multicasts or remotely control a machine on that network segment
to act as the sender of these requests.
2.4 Booting the Target System for
Installation
Basically, there are two different ways to customize the boot process for installation
apart from those mentioned under Section 2.3.7, “Wake on LAN” (page 65) and Sec-
tion 2.3.3, “Using PXE Boot” (page 59). You can either use the default boot options
and function keys or use the boot options prompt of the installation boot screen to pass
any boot options that the installation Kernel might need on this particular hardware.
2.4.1 Using the Default Boot Options
The boot options are described in detail in Chapter 1, Installation with YaST (page 3).
Generally, just selecting Installation starts the installation boot process.
If problems occur, use Installation—ACPI Disabled or Installation—Safe Settings. For
more information about troubleshooting the installation process, refer to Section “In-
stallation Problems” (Appendix A, Help and Troubleshooting, ↑Start-Up).
The menu bar at the bottom screen offers some advanced functionality needed in some
setups. Using the F keys, you can specify additional options to pass to the installation
routines without having to know the detailed syntax of these parameters (see Sec-
tion 2.4.2, “Using Custom Boot Options” (page 66)). A detailed description of the
available function keys is available at Section 1.5, “The Boot Screen” (page 9).
Remote Installation 65
2.4.2 Using Custom Boot Options
Using the appropriate set of boot options helps facilitate your installation procedure.
Many parameters can also be congured later using the linuxrc routines, but using the
boot options is easier. In some automated setups, the boot options can be provided with
initrd or an info le.
The following table lists all installation scenarios mentioned in this chapter with the
required parameters for booting and the corresponding boot options. Just append all of
them in the order they appear in this table to get one boot option string that is handed
to the installation routines. For example (all in one line):
install=xxx netdevice=xxx hostip=xxx netmask=xxx vnc=xxx vncpassword=xxx
Replace all the values xxx in this string with the values appropriate for your setup.
Table 2.1
Installation (Boot) Scenarios Used in This Chapter
Boot OptionsParameters Needed for
Booting
Installation Scenario
None neededNone: system boots auto-
matically
Chapter 1, Installation
with YaST (page 3)
Section 2.1.1, “Simple
Remote Installation via
install=(nfs,http,
ftp,smb)://path_to
_instmedia
Location of the instal-
lation server
VNC—Static Network
Conguration”
(page 38)
Network device
IP address
netdevice=some
_netdevice (only needed
Netmask
Gateway
if several network devices are
available)
VNC enablement
VNC password
hostip=some_ip
netmask=some
_netmask
gateway=ip_gateway
vnc=1
vncpassword=some
_password
66 Reference
Boot OptionsParameters Needed for
Booting
Installation Scenario
Section 2.1.2, “Simple
Remote Installation via
install=(nfs,http,
ftp,smb)://path_to
_instmedia
Location of the instal-
lation server
VNC—Dynamic Net-
work Conguration”
(page 39)
VNC enablement
VNC password
vnc=1
vncpassword=some
_password
Not applicable; process man-
aged through PXE and DHCP
Section 2.1.3, “Remote
Installation via
Location of the instal-
lation server
VNC—PXE Boot and Location of the TFTP
serverWake on LAN”
(page 40) VNC enablement
VNC password
Section 2.1.4, “Simple
Remote Installation via
install=(nfs,http,
ftp,smb)://path_to
_instmedia
Location of the instal-
lation server
SSH—Static Network
Conguration”
(page 42)
Network device
IP address
netdevice=some
_netdevice (only needed
Netmask
Gateway
if several network devices are
available)
SSH enablement
SSH password
hostip=some_ip
netmask=some
_netmask
gateway=ip_gateway
usessh=1
sshpassword=some
_password
Remote Installation 67
Boot OptionsParameters Needed for
Booting
Installation Scenario
Section 2.1.5, “Simple
Remote Installation via
install=(nfs,http,
ftp,smb)://path_to
_instmedia
Location of the instal-
lation server
SSH—Dynamic Net-
work Conguration”
(page 43)
SSH enablement
SSH password
usessh=1
sshpassword=some
_password
Not applicable; process man-
aged through PXE and DHCP
Section 2.1.6, “Remote
Installation via
Location of the instal-
lation server
SSH—PXE Boot and Location of the TFTP
serverWake on LAN”
(page 44) SSH enablement
SSH password
TIP: More Information about linuxrc Boot Options
Find more information about the linuxrc boot options used for booting a Linux
system at http://en.opensuse.org/SDB:Linuxrc.
2.5 Monitoring the Installation
Process
There are several options for remotely monitoring the installation process. If the proper
boot options have been specied while booting for installation, either VNC or SSH can
be used to control the installation and system conguration from a remote workstation.
68 Reference
2.5.1 VNC Installation
Using any VNC viewer software, you can remotely control the installation of openSUSE
from virtually any operating system. This section introduces the setup using a VNC
viewer application or a Web browser.
2.5.1.1 Preparing for VNC Installation
All you need to do on the installation target to prepare for a VNC installation is to
provide the appropriate boot options at the initial boot for installation (see Section 2.4.2,
“Using Custom Boot Options” (page 66)). The target system boots into a text-based
environment and waits for a VNC client to connect to the installation program.
The installation program announces the IP address and display number needed to connect
for installation. If you have physical access to the target system, this information is
provided right after the system booted for installation. Enter this data when your VNC
client software prompts for it and provide your VNC password.
Because the installation target announces itself via OpenSLP, you can retrieve the address
information of the installation target via an SLP browser without the need for any
physical contact to the installation itself, provided your network setup and all machines
support OpenSLP:
1
Start the KDE le and Web browser Konqueror.
2
Enter service://yast.installation.suse in the location bar. The target
system then appears as an icon in the Konqueror screen. Clicking this icon launches
the KDE VNC viewer in which to perform the installation. Alternatively, run your
VNC viewer software with the IP address provided and add :1 at the end of the IP
address for the display the installation is running on.
2.5.1.2 Connecting to the Installation Program
Basically, there are two ways to connect to a VNC server (the installation target in this
case). You can either start an independent VNC viewer application on any operating
system or connect using a Java-enabled Web browser.
Using VNC, you can control the installation of a Linux system from any other operating
system, including other Linux avors, Windows, or Mac OS.
Remote Installation 69
On a Linux machine, make sure that the package tightvnc is installed. On a Windows
machine, install the Windows port of this application, which can be obtained at the
TightVNC home page (http://www.tightvnc.com/download.html).
To connect to the installation program running on the target machine, proceed as follows:
1
Start the VNC viewer.
2
Enter the IP address and display number of the installation target as provided by the
SLP browser or the installation program itself:
ip_address:display_number
A window opens on your desktop displaying the YaST screens as in a normal local
installation.
Using a Web browser to connect to the installation program makes you totally indepen-
dent of any VNC software or the underlying operating system. As long as the browser
application has Java support enabled, you can use any browser (Firefox, Internet Ex-
plorer, Konqueror, Opera, etc.) to perform the installation of your Linux system.
To perform a VNC installation, proceed as follows:
1
Launch your preferred Web browser.
2
Enter the following at the address prompt:
http://ip_address_of_target:5801
3
Enter your VNC password when prompted to do so. The browser window now dis-
plays the YaST screens as in a normal local installation.
2.5.2 SSH Installation
Using SSH, you can remotely control the installation of your Linux machine using any
SSH client software.
70 Reference
2.5.2.1 Preparing for SSH Installation
Apart from installing the appropriate software package (OpenSSH for Linux and PuTTY
for Windows), you just need to pass the appropriate boot options to enable SSH for
installation. See Section 2.4.2, “Using Custom Boot Options” (page 66) for details.
OpenSSH is installed by default on any SUSE Linux–based operating system.
2.5.2.2 Connecting to the Installation Program
1
Retrieve the installation target's IP address. If you have physical access to the target
machine, just take the IP address the installation routine provides at the console after
the initial boot. Otherwise take the IP address that has been assigned to this particular
host in the DHCP server conguration.
2
At a command line, enter the following command:
ssh -X root@ip_address_of_target
Replace ip_address_of_target with the actual IP address of the installation
target.
3
When prompted for a username, enter root.
4
When prompted for the password, enter the password that has been set with the SSH
boot option. After you have successfully authenticated, a command line prompt for
the installation target appears.
5
Enter yast to launch the installation program. A window opens showing the normal
YaST screens as described in Chapter 1, Installation with YaST (page 3).
Remote Installation 71
3
Advanced Disk Setup
Sophisticated system congurations require specic disk setups. All common partitioning
tasks can be done with YaST. To get persistent device naming with block devices, use
the block devices below /dev/disk/by-id or /dev/disk/by-uuid. Logical
Volume Management (LVM) is a disk partitioning scheme that is designed to be much
more exible than the physical partitioning used in standard setups. Its snapshot func-
tionality enables easy creation of data backups. Redundant Array of Independent Disks
(RAID) offers increased data integrity, performance, and fault tolerance. openSUSE
also supports multipath I/O , and there is also the option to use iSCSI as a networked
disk.
3.1 Using the YaST Partitioner
With the expert partitioner, shown in Figure 3.1, “The YaST Partitioner” (page 74),
manually modify the partitioning of one or several hard disks. You can add, delete, re-
size, and edit partitions, as well as access the soft RAID, and LVM conguration.
WARNING: Repartitioning the Running System
Although it is possible to repartition your system while it is running, the risk
of making a mistake that causes data loss is very high. Try to avoid repartitioning
your installed system and always do a complete backup of your data before
attempting to do so.
Advanced Disk Setup 73
Figure 3.1
The YaST Partitioner
All existing or suggested partitions on all connected hard disks are displayed in the list
of Available Storage in the YaST Expert Partitioner dialog. Entire hard disks are listed
as devices without numbers, such as /dev/sda. Partitions are listed as parts of these
devices, such as /dev/sda1. The size, type, encryption status, le system, and mount
point of the hard disks and their partitions are also displayed. The mount point describes
where the partition appears in the Linux le system tree.
Several functional views are available on the lefthand System View. Use these views
to gather information about existing storage congurations, or to congure functions
like RAID, Volume Management, Crypt Files, or view lesystems with addi-
tional features, such as BTRFS, NFS, or TMPFS.
If you run the expert dialog during installation, any free hard disk space is also listed
and automatically selected. To provide more disk space to openSUSE®, free the needed
space starting from the bottom toward the top of the list (starting from the last partition
of a hard disk toward the rst). For example, if you have three partitions, you cannot
use the second exclusively for openSUSE and retain the third and rst for other operating
systems.
74 Reference
3.1.1 Partition Types
Every hard disk has a partition table with space for four entries. Every entry in the
partition table corresponds to a primary partition or an extended partition. Only one
extended partition entry is allowed, however.
A primary partition simply consists of a continuous range of cylinders (physical disk
areas) assigned to a particular operating system. With primary partitions you would be
limited to four partitions per hard disk, because more do not t in the partition table.
This is why extended partitions are used. Extended partitions are also continuous ranges
of disk cylinders, but an extended partition may be divided into logical partitions itself.
Logical partitions do not require entries in the partition table. In other words, an extended
partition is a container for logical partitions.
If you need more than four partitions, create an extended partition as the fourth partition
(or earlier). This extended partition should occupy the entire remaining free cylinder
range. Then create multiple logical partitions within the extended partition. The maxi-
mum number of logical partitions is 63, independent of the disk type. It does not matter
which types of partitions are used for Linux. Primary and logical partitions both function
normally.
3.1.2 Creating a Partition
To create a partition from scratch select Hard Disks and then a hard disk with free
space. The actual modication can be done in the Partitions tab:
1
Select Add and specify the partition type (primary or extended). Create up to four
primary partitions or up to three primary partitions and one extended partition.
Within the extended partition, create several logical partitions (see Section 3.1.1,
“Partition Types” (page 75)).
2
Specify the size of the new partition. You can either choose to occupy all the free
unpartitioned space, or enter a custom size.
3
Select the le system to use and a mount point. YaST suggests a mount point for
each partition created. To use a different mount method, like mount by label, select
Fstab Options.
Advanced Disk Setup 75
4
Specify additional le system options if your setup requires them. This is necessary,
for example, if you need persistent device names. For details on the available options,
refer to Section 3.1.3, “Editing a Partition” (page 76).
5
Click Finish to apply your partitioning setup and leave the partitioning module.
If you created the partition during installation, you are returned to the installation
overview screen.
3.1.3 Editing a Partition
When you create a new partition or modify an existing partition, you can set various
parameters. For new partitions, the default parameters set by YaST are usually sufcient
and do not require any modication. To edit your partition setup manually, proceed as
follows:
1
Select the partition.
2
Click Edit to edit the partition and set the parameters:
File System ID
Even if you do not want to format the partition at this stage, assign it a le system
ID to ensure that the partition is registered correctly. Possible values include
Linux, Linux swap, Linux LVM, and Linux RAID.
File System
To change the partition le system, click Format Partition and select le system
type in the File System list.
openSUSE supports several types of lesystems. BtrFS is the Linux lesystem
of choice because of its advanced features. It supports copy-on-write functional-
ity, creating snapshots, multi-device spanning, subvolumes, and other useful
techniques. ReiserFS, JFS, XFS, and Ext3 are journaling le systems. These
le systems are able to restore the system very quickly after a system crash,
utilizing write processes logged during the operation. Ext2 is not a journaling
le system, but it is adequate for smaller partitions because it does not require
much disk space for management.
Swap is a special format that allows the partition to be used as a virtual memory.
Create a swap partition of at least 256 MB. However, if you use up your swap
76 Reference
space, consider adding more memory to your system instead of adding more
swap space.
WARNING: Changing the le system
Changing the le system and reformatting partitions irreversibly deletes
all data from the partition.
Encrypt Device
If you activate the encryption, all data is written to the hard disk in encrypted
form. This increases the security of sensitive data, but reduces the system speed,
as the encryption takes some time to process. More information about the en-
cryption of le systems is provided in Chapter 10, Encrypting Partitions and
Files (↑Security Guide).
Mount Point
Specify the directory where the partition should be mounted in the le system
tree. Select from YaST suggestions or enter any other name.
Fstab Options
Specify various parameters contained in the global le system administration
le (/etc/fstab). The default settings should sufce for most setups. You
can, for example, change the le system identication from the device name to
a volume label. In the volume label, use all characters except / and space.
To get persistent devices names, use the mount option Device ID, UUID or
LABEL. In openSUSE, persistent device names are enabled by default.
If you prefer to mount the partition by its label, you need to dene one in the
Volume label text entry. For example, you could use the partition label HOME
for a partition intended to mount to /home.
If you intend to use quotas on the le system, use the mount option Enable
Quota Support. This must be done before you can dene quotas for users in the
YaST User Management module. For further information on how to congure
user quota, refer to Section “Managing Quotas” (Chapter 10, Managing Users
with YaST, ↑Start-Up).
3
Select Finish to save the changes.
Advanced Disk Setup 77
NOTE: Resize Filesystems
To resize an existing le system, select the partition and use Resize. Note, that
it is not possible to resize partitions while mounted. To resize partitions, un-
mount the relevant partition before running the partitioner.
3.1.4 Expert Options
After you select a hard disk device (like sda) in the System View pane, you can access
the Expert... menu in the lower right part of the Expert Partitioner window. The menu
contains the following commands:
Create New Partition Table
This option helps you create a new partition table on the selected device.
WARNING: Creating a New Partition Table
Creating a new partition table on a device irreversibly removes all the
partitions and their data from that device.
Clone This Disk
This option helps you clone the device partition layout (but not the data) to other
available disk devices.
3.1.5 Advanced Options
After you select the hostname of the computer (the top-level of the tree in the System
View pane), you can access the Congure... menu in the lower right part of the Expert
Partitioner window. The menu contains the following commands:
Congure iSCSI
To access SCSI over IP block devices, you rst have to congure iSCSI. This results
in additionally available devices in the main partition list.
Congure Multipath
Selecting this option helps you congure the multipath enhancement to the supported
mass storage devices.
78 Reference
3.1.6 More Partitioning Tips
The following section includes a few hints and tips on partitioning that should help you
make the right decisions when setting up your system.
TIP: Cylinder Numbers
Note, that different partitioning tools may start counting the cylinders of a
partition with 0 or with 1. When calculating the number of cylinders, you should
always use the difference between the last and the rst cylinder number and
add one.
3.1.6.1
Using swap
Swap is used to extend the available physical memory. It is then possible to use more
memory than physical RAM available. The memory management system of kernels
before 2.4.10 needed swap as a safety measure. Then, if you did not have twice the size
of your RAM in swap, the performance of the system suffered. These limitations no
longer exist.
Linux uses a page called “Least Recently Used” (LRU) to select pages that might be
moved from memory to disk. Therefore, running applications have more memory
available and caching works more smoothly.
If an application tries to allocate the maximum allowed memory, problems with swap
can arise. There are three major scenarios to look at:
System with no swap
The application gets the maximum allowed memory. All caches are freed, and thus
all other running applications are slowed. After a few minutes, the kernel's out-of-
memory kill mechanism activates and kills the process.
System with medіum sized swap (128 MB–512 MB)
At rst, the system slows like a system without swap. After all physical RAM has
been allocated, swap space is used as well. At this point, the system becomes very
slow and it becomes impossible to run commands from remote. Depending on the
speed of the hard disks that run the swap space, the system stays in this condition
for about 10 to 15 minutes until the out-of-memory kill mechanism resolves the
issue. Note that you will need a certain amount of swap if the computer needs to
Advanced Disk Setup 79
perform a “suspend to disk”. In that case, the swap size should be large enough to
contain the necessary data from memory (512 MB–1GB).
System with lots of swap (several GB)
It is better to not have an application that is out of control and swapping excessively
in this case. If you use such application, the system will need many hours to recover.
In the process, it is likely that other processes get timeouts and faults, leaving the
system in an undened state, even after killing the faulty process. In this case, do
a hard machine reboot and try to get it running again. Lots of swap is only useful
if you have an application that relies on this feature. Such applications (like
databases or graphics manipulation programs) often have an option to directly use
hard disk space for their needs. It is advisable to use this option instead of using
lots of swap space.
If your system is not out of control, but needs more swap after some time, it is possible
to extend the swap space online. If you prepared a partition for swap space, just add
this partition with YaST. If you do not have a partition available, you may also just use
a swap le to extend the swap. Swap les are generally slower than partitions, but
compared to physical ram, both are extremely slow so the actual difference is negligible.
Procedure 3.1
Adding a Swap File Manually
To add a swap le in the running system, proceed as follows:
1
Create an empty le in your system. For example, if you want to add a swap le
with 128 MB swap at /var/lib/swap/swapfile, use the commands:
mkdir -p /var/lib/swap
dd if=/dev/zero of=/var/lib/swap/swapfile bs=1M count=128
2
Initialize this swap le with the command
mkswap /var/lib/swap/swapfile
3
Activate the swap with the command
swapon /var/lib/swap/swapfile
To disable this swap le, use the command
swapoff /var/lib/swap/swapfile
4
Check the current available swap spaces with the command
80 Reference
cat /proc/swaps
Note that at this point, it is only temporary swap space. After the next reboot, it is
no longer utilized.
5
To enable this swap le permanently, add the following line to /etc/fstab:
/var/lib/swap/swapfile swap swap defaults 0 0
3.1.7 Partitioning and LVM
From the Expert partitioner, access the LVM conguration by clicking the Volume
Management item in the System View pane. However, if a working LVM conguration
already exists on your system, it is automatically activated upon entering the initial
LVM conguration of a session. In this case, all disks containing a partition (belonging
to an activated volume group) cannot be repartitioned. The Linux kernel cannot reread
the modied partition table of a hard disk when any partition on this disk is in use. If
you already have a working LVM conguration on your system, physical repartitioning
should not be necessary. Instead, change the conguration of the logical volumes.
At the beginning of the physical volumes (PVs), information about the volume is written
to the partition. To reuse such a partition for other non-LVM purposes, it is advisable
to delete the beginning of this volume. For example, in the VG system and PV /dev/
sda2, do this with the command dd if=/dev/zero of=/dev/sda2 bs=512
count=1.
WARNING: File System for Booting
The le system used for booting (the root le system or /boot) must not be
stored on an LVM logical volume. Instead, store it on a normal physical partition.
For more details about LVM, see the Storage Administration Guide.
3.2 LVM Conguration
This section briey describes the principles behind the Logical Volume Manager (LVM)
and its multipurpose features. In Section 3.2.2, “LVM Conguration with YaST”
(page 84), learn how to set up LVM with YaST.
Advanced Disk Setup 81
WARNING
Using LVM is sometimes associated with increased risk such as data loss. Risks
also include application crashes, power failures, and faulty commands. Save
your data before implementing LVM or reconguring volumes. Never work
without a backup.
3.2.1 The Logical Volume Manager
The LVM enables exible distribution of hard disk space over several le systems. It
was developed because sometimes the need to change the segmenting of hard disk space
arises just after the initial partitioning has been done. Because it is difcult to modify
partitions on a running system, LVM provides a virtual pool (volume group, VG for
short) of memory space from which logical volumes (LVs) can be created as needed.
The operating system accesses these LVs instead of the physical partitions. Volume
groups can occupy more than one disk, so that several disks or parts of them may con-
stitute one single VG. This way, LVM provides a kind of abstraction from the physical
disk space that allows its segmentation to be changed in a much easier and safer way
than with physical repartitioning. Background information regarding physical partitioning
can be found in Section 3.1.1, “Partition Types” (page 75) and Section 3.1, “Using the
YaST Partitioner” (page 73).
Figure 3.2
Physical Partitioning versus LVM
Figure 3.2, “Physical Partitioning versus LVM” (page 82) compares physical partitioning
(left) with LVM segmentation (right). On the left side, one single disk has been divided
into three physical partitions (PART), each with a mount point (MP) assigned so that
the operating system can gain access. On the right side, two disks have been divided
into two and three physical partitions each. Two LVM volume groups (VG 1 and VG 2)
82 Reference
have been dened. VG 1 contains two partitions from DISK 1 and one from DISK 2.
VG 2 contains the remaining two partitions from DISK 2. In LVM, the physical disk
partitions that are incorporated in a volume group are called physical volumes (PVs).
Within the volume groups, four LVs (LV 1 through LV 4) have been dened. They
can be used by the operating system via the associated mount points. The border between
different LVs do not need to be aligned with any partition border. See the border between
LV 1 and LV 2 in this example.
LVM features:
Several hard disks or partitions can be combined in a large logical volume.
Provided the conguration is suitable, an LV (such as /usr) can be enlarged if free
space is exhausted.
With LVM, it is possible to add hard disks or LVs in a running system. However,
this requires hot-swappable hardware.
It is possible to activate a "striping mode" that distributes the data stream of a LV
over several PVs. If these PVs reside on different disks, the read and write perfor-
mance is enhanced, as with RAID 0.
The snapshot feature enables consistent backups (especially for servers) of the running
system.
With these features, LVM is ready for heavily used home PCs or small servers. LVM
is well-suited for the user with a growing data stock (as in the case of databases, music
archives, or user directories). This would allow le systems that are larger than the
physical hard disk. Another advantage of LVM is that up to 256 LVs can be added.
However, working with LVM is different from working with conventional partitions.
Instructions and further information about conguring LVM is available in the ofcial
LVM HOWTO at http://tldp.org/HOWTO/LVM-HOWTO/.
Starting from Kernel version 2.6, LVM version 2 is available, which is backward-
compatible with the previous LVM and enables the continued management of old volume
groups. When creating new volume groups, decide whether to use the new format or
the backward-compatible version. LVM 2 does not require any kernel patches. It makes
use of the device mapper integrated in kernel 2.6. This kernel only supports LVM ver-
sion 2. Therefore, when talking about LVM, this section always refers to LVM version 2.
Advanced Disk Setup 83
3.2.2 LVM Conguration with YaST
The YaST LVM conguration can be reached from the YaST Expert Partitioner (see
Section 3.1, “Using the YaST Partitioner” (page 73)) within the Volume Management
item in the System View pane. The Expert Partitioner allows you to edit and delete ex-
isting partitions and also create new ones that need to be used with LVM. The rst task
is to create PVs that provide space to a volume group:
1
Select a hard disk from Hard Disks.
2
Change to the Partitions tab.
3
Click Add and enter the desired size of the PV on this disk.
4
Use Do not format partition and change the File System ID to 0x8E Linux LVM. Do
not mount this partition.
5
Repeat this procedure until you have dened all the desired physical volumes on the
available disks.
3.2.2.1 Creating Volume Groups
If no volume group exists on your system, you must add one (see Figure 3.3, “Creating
a Volume Group” (page 85)). It is possible to create additional groups by clicking on
Volume Management in the System View pane, and then on Add Volume Group. One
single volume group is usually sufcient.
1
Enter a name for the VG, for example, system.
2
Select the desired Physical Extend Size. This value denes the size of a physical
block in the volume group. All the disk space in a volume group is handled in blocks
of this size.
3
Add the prepared PVs to the VG by selecting the device and clicking on Add. Select-
ing several devices is possible by holding Ctrl while selecting the devices.
4
Select Finish to make the VG available to further conguration steps.
84 Reference
Figure 3.3
Creating a Volume Group
If you have multiple volume groups dened and want to add or remove PVs, select the
volume group in the Volume Management list and click Resize. In the following window,
you can add or remove PVs to the selected volume group.
3.2.2.2 Conguring Logical Volumes
After the volume group has been lled with PVs, dene the LVs which the operating
system should use in the next dialog. Choose the current volume group and change to
the Logical Volumes tab. Add, Edit, Resize, and Delete LVs as needed until all space
in the volume group has been occupied. Assign at least one LV to each volume group.
Advanced Disk Setup 85
Figure 3.4
Logical Volume Management
Click Add and go through the wizard-like pop-up that opens:
1.
Enter the name of the LV. For a partition that should be mounted to /home, a self-
explanatory name like HOME could be used.
2. Select the size and the number of stripes of the LV. If you have only one PV, selecting
more than one stripe is not useful.
3. Choose the lesystem to use on the LV as well as the mount point.
By using stripes it is possible to distribute the data stream in the LV among several PVs
(striping). However, striping a volume can only be done over different PVs, each pro-
viding at least the amount of space of the volume. The maximum number of stripes
equals to the number of PVs, where Stripe "1" means "no striping". Striping only makes
sense with PVs on different hard disks, otherwise performance will decrease.
WARNING: Striping
YaST cannot, at this point, verify the correctness of your entries concerning
striping. Any mistake made here is apparent only later when the LVM is imple-
mented on disk.
86 Reference
If you have already congured LVM on your system, the existing logical volumes can
also be used. Before continuing, assign appropriate mount points to these LVs. With
Finish, return to the YaST Expert Partitioner and nish your work there.
3.3 Soft RAID Conguration
The purpose of RAID (redundant array of independent disks) is to combine several
hard disk partitions into one large virtual hard disk to optimize performance and/or
data security. Most RAID controllers use the SCSI protocol because it can address a
larger number of hard disks in a more effective way than the IDE protocol. It is also
more suitable for the parallel command processing. There are some RAID controllers
that support IDE or SATA hard disks. Soft RAID provides the advantages of RAID
systems without the additional cost of hardware RAID controllers. However, this requires
some CPU time and has memory requirements that make it unsuitable for high perfor-
mance computers.
With openSUSE® , you can combine several hard disks into one soft RAID system.
RAID implies several strategies for combining several hard disks in a RAID system,
each with different goals, advantages, and characteristics. These variations are commonly
known as RAID levels.
Common RAID levels are:
RAID 0
This level improves the performance of your data access by spreading out blocks
of each le across multiple disk drives. Actually, this is not really a RAID, because
it does not provide data backup, but the name RAID 0 for this type of system is
commonly used. With RAID 0, two or more hard disks are pooled together. Perfor-
mance is enhanced, but the RAID system is destroyed and your data lost if even
one hard disk fails.
RAID 1
This level provides adequate security for your data, because the data is copied to
another hard disk 1:1. This is known as hard disk mirroring. If one disk is destroyed,
a copy of its contents is available on the other one. All disks but one could be
damaged without endangering your data. However, if the damage is not detected,
the damaged data can be mirrored to the undamaged disk. This could result in the
same loss of data. The writing performance suffers in the copying process compared
to using single disk access (10 to 20 % slower), but read access is signicantly
Advanced Disk Setup 87
faster in comparison to any one of the normal physical hard disks. The reason is
that the duplicate data can be parallel-scanned. Generally it can be said that Level 1
provides nearly twice the read transfer rate of single disks and almost the same
write transfer rate as single disks.
RAID 5
RAID 5 is an optimized compromise between Level 0 and Level 1, in terms of
performance and redundancy. The hard disk space equals the number of disks used
minus one. The data is distributed over the hard disks as with RAID 0. Parity blocks,
created on one of the partitions, exist for security reasons. They are linked to each
other with XOR, enabling the contents to be reconstructed by the corresponding
parity block in case of system failure. With RAID 5, no more than one hard disk
can fail at the same time. If one hard disk fails, it must be replaced as soon as pos-
sible to avoid the risk of losing data.
RAID 6
To further increase the reliability of the RAID system, it is possible to use RAID 6.
In this level, even if two disks fail, the array still can be reconstructed. With RAID 6,
at least 4 hard disks are needed to run the array. Note that when running as software
raid, this conguration needs a considerable amount of CPU time and memory.
RAID 10 (RAID 1+0)
This RAID implementation combines features of RAID 0 and RAID 1: the data
are rst mirrored in separate disk arrays, which are inserted into a new RAID 0;
type array. In each RAID 1 sub-array, one disk can fail without any damage to the
data. RAID 10 is used for database application where a huge load is expected.
Other RAID Levels
Several other RAID levels have been developed (RAID 2, RAID 3, RAID 4, RAIDn,
RAID 10, RAID 0+1, RAID 30, RAID 50, etc.), some of them being proprietary
implementations created by hardware vendors. These levels are not very common
and therefore are not explained here.
3.3.1 Soft RAID Conguration with YaST
The YaST RAID conguration can be reached from the YaST Expert Partitioner, de-
scribed in Section 3.1, “Using the YaST Partitioner” (page 73). This partitioning tool
enables you to edit and delete existing partitions and create new ones to be used with
soft RAID:
88 Reference
1
Select a hard disk from Hard Disks.
2
Change to the Partitions tab.
3
Click Add and enter the desired size of the raid partition on this disk.
4
Use Do not Format the Partition and change the File System ID to 0xFD Linux
RAID. Do not mount this partition.
5
Repeat this procedure until you have dened all the desired physical volumes on the
available disks.
For RAID 0 and RAID 1, at least two partitions are needed—for RAID 1, usually ex-
actly two and no more. If RAID 5 is used, at least three partitions are required. It is
recommended to utilize partitions of the same size only. The RAID partitions should
be located on different hard disks to decrease the risk of losing data if one is defective
(RAID 1 and 5) and to optimize the performance of RAID 0. After creating all the
partitions to use with RAID, click RAID > Add RAID to start the RAID conguration.
In the next dialog, choose between RAID levels 0, 1, 5, 6 and 10. Then, select all parti-
tions with either the “Linux RAID” or “Linux native” type that should be used by the
RAID system. No swap or DOS partitions are shown.
Figure 3.5
RAID Partitions
To add a previously unassigned partition to the selected RAID volume, rst click the
partition then Add. Assign all partitions reserved for RAID. Otherwise, the space on
Advanced Disk Setup 89
the partition remains unused. After assigning all partitions, click Next to select the
available RAID Options.
In this last step, set the le system to use as well as encryption and the mount point for
the RAID volume. After completing the conguration with Finish, see the /dev/md0
device and others indicated with RAID in the expert partitioner.
3.3.2 Troubleshooting
Check the le /proc/mdstat to nd out whether a RAID partition has been damaged.
In the event of a system failure, shut down your Linux system and replace the defective
hard disk with a new one partitioned the same way. Then restart your system and enter
the command mdadm /dev/mdX --add /dev/sdX. Replace 'X' with your partic-
ular device identiers. This integrates the hard disk automatically into the RAID system
and fully reconstructs it.
Note that although you can access all data during the rebuild, you may encounter some
performance issues until the RAID has been fully rebuilt.
3.3.3 For More Information
Conguration instructions and more details for soft RAID can be found in the HOWTOs
at:
/usr/share/doc/packages/mdadm/Software-RAID.HOWTO.html
http://raid.wiki.kernel.org
Linux RAID mailing lists are available, such as http://marc.info/?l=linux
-raid.
90 Reference
Part II. System
4
32-Bit and 64-Bit Applications
in a 64-Bit System
Environment
openSUSE® is available for 64-bit platforms. This does not necessarily mean that all
the applications included have already been ported to 64-bit platforms. openSUSE
supports the use of 32-bit applications in a 64-bit system environment. This chapter
offers a brief overview of how this support is implemented on 64-bit openSUSE plat-
forms. It explains how 32-bit applications are executed (runtime support) and how 32-
bit applications should be compiled to enable them to run both in 32-bit and 64-bit
system environments. Additionally, nd information about the kernel API and an ex-
planation of how 32-bit applications can run under a 64-bit kernel.
openSUSE for the 64-bit platforms amd64 and Intel 64 is designed so that existing 32-
bit applications run in the 64-bit environment “out-of-the-box.” This support means
that you can continue to use your preferred 32-bit applications without waiting for a
corresponding 64-bit port to become available.
4.1 Runtime Support
IMPORTANT: Conicts between Application Versions
If an application is available both for 32-bit and 64-bit environments, parallel
installation of both versions is bound to lead to problems. In such cases, decide
on one of the two versions and install and use this.
32-Bit and 64-Bit Applications in a 64-Bit System Environment 93
An exception to this rule is PAM (pluggable authentication modules). openSUSE
uses PAM in the authentication process as a layer that mediates between user
and application. On a 64-bit operating system that also runs 32-bit applications
it is necessary to always install both versions of a PAM module.
To be executed correctly, every application requires a range of libraries. Unfortunately,
the names for the 32-bit and 64-bit versions of these libraries are identical. They must
be differentiated from each other in another way.
To retain compatibility with the 32-bit version, the libraries are stored at the same place
in the system as in the 32-bit environment. The 32-bit version of libc.so.6 is located
under /lib/libc.so.6 in both the 32-bit and 64-bit environments.
All 64-bit libraries and object les are located in directories called lib64. The 64-bit
object les that you would normally expect to nd under /lib and /usr/lib are
now found under /lib64 and /usr/lib64. This means that there is space for the
32-bit libraries under /lib and /usr/lib, so the lename for both versions can re-
main unchanged.
Subdirectories of 32-bit /lib directories which contain data content that does not de-
pend on the word size are not moved. This scheme conforms to LSB (Linux Standards
Base) and FHS (File System Hierarchy Standard).
4.2 Software Development
A biarch development tool chain allows generation of 32-bit and 64-bit objects. The
default is to compile 64-bit objects. It is possible to generate 32-bit objects by using
special ags. For GCC, this special ag is -m32.
All header les must be written in an architecture-independent form. The installed 32-
bit and 64-bit libraries must have an API (application programming interface) that
matches the installed header les. The normal openSUSE environment is designed ac-
cording to this principle. In the case of manually updated libraries, resolve these issues
yourself.
94 Reference
4.3 Software Compilation on Biarch
Platforms
To develop binaries for the other architecture on a biarch architecture, the respective
libraries for the second architecture must additionally be installed. These packages are
called rpmname-32bit. You also need the respective headers and libraries from the
rpmname-devel packages and the development libraries for the second architecture
from rpmname-devel-32bit.
Most open source programs use an autoconf-based program conguration. To use
autoconf for conguring a program for the second architecture, overwrite the normal
compiler and linker settings of autoconf by running the configure script with
additional environment variables.
The following example refers to an x86_64 system with x86 as the second architecture.
1
Use the 32-bit compiler:
CC="gcc -m32"
2
Instruct the linker to process 32-bit objects (always use gcc as the linker front-end):
LD="gcc -m32"
3
Set the assembler to generate 32-bit objects:
AS="gcc -c -m32"
4
Specify linker ags, such as the location of 32-bit libraries, for example:
LDFLAGS="-L/usr/lib"
5
Specify the location for the 32-bit object code libraries:
--libdir=/usr/lib
6
Specify the location for the 32-bit X libraries:
--x-libraries=/usr/lib
32-Bit and 64-Bit Applications in a 64-Bit System Environment 95
Not all of these variables are needed for every program. Adapt them to the respective
program.
CC="gcc -m32"
LDFLAGS="-L/usr/lib;"
./configure --prefix=/usr --libdir=/usr/lib --x-libraries=/usr/lib
make
make install
4.4 Kernel Specications
The 64-bit kernels for x86_64 offer both a 64-bit and a 32-bit kernel ABI (application
binary interface). The latter is identical with the ABI for the corresponding 32-bit kernel.
This means that the 32-bit application can communicate with the 64-bit kernel in the
same way as with the 32-bit kernel.
The 32-bit emulation of system calls for a 64-bit kernel does not support all the APIs
used by system programs. This depends on the platform. For this reason, a small number
of applications, like lspci, must be compiled.
A 64-bit kernel can only load 64-bit kernel modules that have been specially compiled
for this kernel. It is not possible to use 32-bit kernel modules.
TIP: Kernel-loadable Modules
Some applications require separate kernel-loadable modules. If you intend to
use such a 32-bit application in a 64-bit system environment, contact the
provider of this application and SUSE to make sure that the 64-bit version of
the kernel-loadable module and the 32-bit compiled version of the kernel API
are available for this module.
96 Reference
5
Booting and Conguring a
Linux System
With the release of openSUSE 12.1 switched from System-V init to systemd. When
booting openSUSE, systemd is started as the very rts process and is responsible for
starting, stopping and controlling all other processes on the system. See http://en
.opensuse.org/SDB:Systemd for more information.
Booting and Conguring a Linux System 97
6
The Boot Loader GRUB
This chapter describes how to congure GRUB (Grand Unied Bootloader), the boot
loader used in openSUSE®. A special YaST module is available for conguring all
settings. If you are not familiar with the subject of booting in Linux, read the following
sections to acquire some background information. This chapter also describes some of
the problems frequently encountered when booting with GRUB and their solutions.
This chapter focuses on boot management and the conguration of the boot loader
GRUB. The boot procedure as a whole is outlined in Chapter 5, Booting and Conguring
a Linux System (page 97). A boot loader represents the interface between the machine
(BIOS) and the operating system (openSUSE). The conguration of the boot loader
directly impacts the start of the operating system.
The following terms appear frequently in this chapter and might need some explanation:
MBR (Master Boot Record)
The structure of the MBR is dened by an operating system–independent conven-
tion. The rst 446 bytes are reserved for the program code. They typically hold
part of a boot loader program or an operating system selector. The next 64 bytes
provide space for a partition table of up to four entries. The partition table contains
information about the partitioning of the hard disk and the le system types. The
operating system needs this table for handling the hard disk. With conventional
generic code in the MBR, exactly one partition must be marked active. The last
two bytes of the MBR must contain a static “magic number” (AA55). An MBR
containing a different value is regarded as invalid by some BIOSes, so is not con-
sidered for booting.
The Boot Loader GRUB 99
Boot Sectors
Boot sectors are the rst sectors of hard disk partitions with the exception of the
extended partition, which merely serves as a “container” for other partitions. These
boot sectors have 512 bytes of space for code used to boot an operating system in-
stalled in the respective partition. This applies to boot sectors of formatted DOS,
Windows, and OS/2 partitions, which also contain some basic important data of
the le system. In contrast, the boot sectors of Linux partitions are initially empty
after setting up a le system other than XFS. Therefore, a Linux partition is not
bootable by itself, even if it contains a kernel and a valid root le system. A boot
sector with valid code for booting the system has the same magic number as the
MBR in its last two bytes (AA55).
6.1 Booting with GRUB
GRUB comprises two stages. Stage 1 consists of 512 bytes and its only task is to load
the second stage of the boot loader. Subsequently, stage 2 is loaded. This stage contains
the main part of the boot loader.
In some congurations, an intermediate stage 1.5 can be used, which locates and loads
stage 2 from an appropriate le system. If possible, this method is chosen by default
on installation or when initially setting up GRUB with YaST.
Stage 2 is able to access many le systems. Currently, ext2, ext3, ReiserFS, Minix, and
the DOS FAT le system used by Windows are supported. To a certain extent, XFS,
and UFS and FFS used by BSD systems are also supported. Since version 0.95 GRUB
is also able to boot from a CD or DVD containing an ISO 9660 standard le system
pursuant to the “El Torito” specication. Even before the system is booted, GRUB can
access le systems of supported BIOS disk devices (oppy disks or hard disks, CD
drives and DVD drives detected by the BIOS). Therefore, changes to the GRUB con-
guration le (menu.lst) do not require a new installation of the boot manager. When
the system is booted, GRUB reloads the menu le with the valid paths and partition
data of the kernel or the initial RAM disk (initrd) and locates these les.
The actual conguration of GRUB is based on four les that are described below:
/boot/grub/menu.lst
This le contains all information about partitions or operating systems that can be
booted with GRUB. Without this information, the GRUB command line prompts
100 Reference
the user for how to proceed. For details, see Section 6.1.1.3, “Editing Menu Entries
during the Boot Procedure” (page 106).
/boot/grub/device.map
This le translates device names from the GRUB and BIOS notation to Linux device
names.
/etc/grub.conf
This le contains the commands, parameters and options the GRUB shell needs
for installing the boot loader correctly.
/etc/sysconfig/bootloader
This le is read by the perl-bootloader library which is used when conguring the
bootloader with YaST and every time a new kernel is installed. It contains congu-
ration options (such as kernel parameters) that will be added by default to the
bootloader conguration le.
GRUB can be controlled in various ways. Boot entries from an existing conguration
can be selected from the graphical menu (splash screen). The conguration is loaded
from the le menu.lst.
In GRUB, all boot parameters can be changed prior to booting. For example, errors
made when editing the menu le can be corrected in this way. Boot commands can also
be entered interactively at a kind of input prompt. For details, see Section 6.1.1.3,
“Editing Menu Entries during the Boot Procedure” (page 106). GRUB offers the possi-
bility of determining the location of the kernel and the initrd prior to booting. In
this way, you can even boot an installed operating system for which no entry exists in
the boot loader conguration.
GRUB actually exists in two versions: as a boot loader and as a normal Linux program
in /usr/sbin/grub. The latter is referred to as the GRUB shell. It provides an em-
ulation of GRUB in the installed system and can be used to install GRUB or test new
settings before applying them. The functionality to install GRUB as the boot loader on
a hard disk or oppy disk is integrated in GRUB in the form of the command setup.
This is available in the GRUB shell when Linux is loaded.
The Boot Loader GRUB 101
6.1.1 The File /boot/grub/menu.lst
The graphical splash screen with the boot menu is based on the GRUB conguration
le /boot/grub/menu.lst, which contains all information about all partitions or
operating systems that can be booted by the menu.
Every time the system is booted, GRUB loads the menu le from the le system. For
this reason, GRUB does not need to be reinstalled after every change to the le. Use
the YaST boot loader to modify the GRUB conguration as described in Section 6.2,
“Conguring the Boot Loader with YaST” (page 110).
The menu le contains commands. The syntax is very simple. Every line contains a
command followed by optional parameters separated by spaces like in the shell. For
historical reasons, some commands permit an = in front of the rst parameter. Comments
are introduced by a hash (#).
To identify the menu items in the menu overview, set a title for every entry. The
text (including any spaces) following the keyword title is displayed as a selectable
option in the menu. All commands up to the next title are executed when this menu
item is selected.
The simplest case is the redirection to boot loaders of other operating systems. The
command is chainloader and the argument is usually the boot block of another
partition, in GRUB block notation. For example:
chainloader (hd0,3)+1
The device names in GRUB are explained in Section 6.1.1.1, “Naming Conventions
for Hard Disks and Partitions” (page 103). This example species the rst block of the
fourth partition of the rst hard disk.
Use the command kernel to specify a kernel image. The rst argument is the path to
the kernel image in a partition. The other arguments are passed to the kernel on its
command line.
If the kernel does not have built-in drivers for access to the root partition or a recent
Linux system with advanced hotplug features is used, initrd must be specied with
a separate GRUB command whose only argument is the path to the initrd le. Be-
cause the loading address of the initrd is written into the loaded kernel image, the
command initrd must follow after the kernel command.
102 Reference
The command root simplies the specication of kernel and initrd les. The only
argument of root is a device or a partition. This device is used for all kernel, initrd,
or other le paths for which no device is explicitly specied until the next root com-
mand.
The boot command is implied at the end of every menu entry, so it does not need to
be written into the menu le. However, if you use GRUB interactively for booting, you
must enter the boot command at the end. The command itself has no arguments. It
merely boots the loaded kernel image or the specied chain loader.
After writing all menu entries, dene one of them as the default entry. Otherwise,
the rst one (entry 0) is used. You can also specify a time-out in seconds after which
the default entry should boot. timeout and default usually precede the menu entries.
An example le is described in Section 6.1.1.2, “An Example Menu File” (page 104).
6.1.1.1 Naming Conventions for Hard Disks and
Partitions
The naming convention GRUB uses for hard disks and partitions differ from that used
for normal Linux devices. It more closely resembles the simple disk enumeration the
BIOS does and the syntax is similar to that used in some BSD derivatives. In GRUB,
the numbering of the partitions start with zero. This means that (hd0,0) is the rst
partition of the rst hard disk. On a common desktop machine with a hard disk connected
as primary master, the corresponding Linux device name is /dev/sda1.
The four possible primary partitions are assigned the partition numbers 0 to 3. The
logical partitions are numbered from 4:
(hd0,0) first primary partition of the first hard disk
(hd0,1) second primary partition
(hd0,2) third primary partition
(hd0,3) fourth primary partition (usually an extended partition)
(hd0,4) first logical partition
(hd0,5) second logical partition
Being dependent on BIOS devices, GRUB does not distinguish between PATA (IDE),
SATA, SCSI, and hardware RAID devices. All hard disks recognized by the BIOS or
other controllers are numbered according to the boot sequence preset in the BIOS.
The Boot Loader GRUB 103
Unfortunately, it is often not possible to map the Linux device names to BIOS device
names exactly. It generates this mapping with the help of an algorithm and saves it to
the le device.map, which can be edited if necessary. Information about the le
device.map is available in Section 6.1.2, “The File device.map” (page 107).
A complete GRUB path consists of a device name written in parentheses and the path
to the le in the le system in the specied partition. The path begins with a slash. For
example, the bootable kernel could be specied as follows on a system with a single
PATA (IDE) hard disk containing Linux in its rst partition:
(hd0,0)/boot/vmlinuz
6.1.1.2 An Example Menu File
The following example shows the structure of a GRUB menu le. The example instal-
lation has a Linux boot partition under /dev/sda5, a root partition under /dev/
sda7 and a Windows installation under /dev/sda1.
gfxmenu (hd0,4)/boot/message
color white/blue black/light-gray
default 0
timeout 8
title linux
root (hd0,4)
kernel /boot/vmlinuz root=/dev/sda7 vga=791 resume=/dev/sda9
initrd /boot/initrd
title windows
rootnoverify (hd0,0)
chainloader +1
title floppy
rootnoverify (hd0,0)
chainloader (fd0)+1
title failsafe
root (hd0,4)
kernel /boot/vmlinuz.shipped root=/dev/sda7 ide=nodma \
apm=off acpi=off vga=normal nosmp maxcpus=0 3 noresume
initrd /boot/initrd.shipped
The rst block denes the conguration of the splash screen:
The background image message is located in the /boot directory of the /dev/
sda5 partition.
104 Reference
Color scheme: white (foreground), blue (background), black (selection) and light
gray (background of the selection). The color scheme has no effect on the splash
screen, only on the customizable GRUB menu that you can access by exiting the
splash screen with Esc.
The rst (0) menu entry title linux is booted by default.
After eight seconds without any user input, GRUB automatically boots the default
entry. To deactivate automatic boot, delete the timeout line. If you set timeout
0, GRUB boots the default entry immediately.
The second and largest block lists the various bootable operating systems. The sections
for the individual operating systems are introduced by title.
The rst entry (title linux) is responsible for booting openSUSE. The kernel
(vmlinuz) is located in the rst logical partition (the boot partition) of the rst
hard disk. Kernel parameters, such as the root partition and VGA mode, are ap-
pended here. The root partition is specied according to the Linux naming con-
vention (/dev/sda7/) because this information is read by the kernel and has
nothing to do with GRUB. The initrd is also located in the rst logical partition
of the rst hard disk.
The second entry is responsible for loading Windows. Windows is booted from
the rst partition of the rst hard disk (hd0,0). The command chainloader
+1 causes GRUB to read and execute the rst sector of the specied partition.
The next entry enables booting from oppy disk without modifying the BIOS
settings.
The boot option failsafe starts Linux with a selection of kernel parameters
that enables Linux to boot even on problematic systems.
The menu le can be changed whenever necessary. GRUB then uses the modied set-
tings during the next boot. Edit the le permanently using YaST or an editor of your
choice. Alternatively, make temporary changes interactively using the edit function of
GRUB. See Section 6.1.1.3, “Editing Menu Entries during the Boot Procedure”
(page 106).
The Boot Loader GRUB 105
6.1.1.3 Editing Menu Entries during the Boot
Procedure
In the graphical boot menu, select the operating system to boot with the arrow keys. If
you select a Linux system, you can enter additional boot parameters at the boot prompt.
To edit individual menu entries directly, press Esc to exit the splash screen and get to
the GRUB text-based menu then press E. Changes made in this way only apply to the
current boot and are not adopted permanently.
IMPORTANT: Keyboard Layout during the Boot Procedure
The US keyboard layout is the only one available when booting. See Figure “US
Keyboard Layout” (↑Start-Up).
Editing menu entries facilitates the repair of a defective system that can no longer be
booted, because the faulty conguration le of the boot loader can be circumvented by
manually entering parameters. Manually entering parameters during the boot procedure
is also useful for testing new settings without impairing the native system.
After activating the editing mode, use the arrow keys to select the menu entry of the
conguration to edit. To make the conguration editable, press E again. In this way,
edit incorrect partitions or path specications before they have a negative effect on the
boot process. Press Enter to exit the editing mode and return to the menu. Then press
B to boot this entry. Further possible actions are displayed in the help text at the bottom.
To enter changed boot options permanently and pass them to the kernel, open the le
menu.lst as the user root and append the respective kernel parameters to the existing
line, separated by spaces:
title linux
root(hd0,0)
kernel /vmlinuz root=/dev/sda3 additional parameter
initrd /initrd
GRUB automatically adopts the new parameters the next time the system is booted.
Alternatively, this change can also be made with the YaST boot loader module. Append
the new parameters to the existing line, separated by spaces.
106 Reference
6.1.2 The File device.map
The le device.map maps GRUB and BIOS device names to Linux device names.
In a mixed system containing PATA (IDE) and SCSI hard disks, GRUB must try to
determine the boot sequence by a special procedure, because GRUB may not have access
to the BIOS information on the boot sequence. GRUB saves the result of this analysis
in the le /boot/grub/device.map. Example device.map les for a system
on which the boot sequence in the BIOS is set to PATA before SCSI could look as
follows:
(fd0) /dev/fd0
(hd0) /dev/sda
(hd1) /dev/sdb
or
(fd0) /dev/fd0
(hd0) /dev/disk-by-id/DISK1 ID
(hd1) /dev/disk-by-id/DISK2 ID
Because the order of PATA (IDE), SCSI and other hard disks depends on various factors
and Linux is not able to identify the mapping, the sequence in the le device.map
can be set manually. If you encounter problems when booting, check if the sequence
in this le corresponds to the sequence in the BIOS and use the GRUB prompt to
modify it temporarily, if necessary. After the Linux system has booted, the le device
.map can be edited permanently with the YaST boot loader module or an editor of
your choice.
After manually changing device.map, execute the following command to reinstall
GRUB. This command causes the le device.map to be reloaded and the commands
listed in grub.conf to be executed:
grub --batch < /etc/grub.conf
6.1.3 The File /etc/grub.conf
The third important GRUB conguration le after menu.lst and device.map is
/etc/grub.conf. This le contains the commands, parameters and options the
GRUB shell needs for installing the boot loader correctly:
setup --stage2=/boot/grub/stage2 --force-lba (hd0,1) (hd0,1)
quit
The Boot Loader GRUB 107
This command tells GRUB to automatically install the boot loader to the second partition
on the rst hard disk (hd0,1) using the boot images located on the same partition. The
--stage2=/boot/grub/stage2 parameter is needed to install the stage2 image
from a mounted le system. Some BIOSes have a faulty LBA support implementation,
--force-lba provides a solution to ignore them.
6.1.4 The File /etc/syscong/bootloader
This conguration le is only used when conguring the bootloader with YaST and
every time a new kernel is installed. It is evaluated by the perl-bootloader library which
modies the bootloader conguration le (for example /boot/grub/menu.lst
for GRUB) accordingly. /etc/sysconfig/bootloader is not a GRUB specic
conguration le - the values are applied to any bootloader installed on openSUSE.
NOTE: Bootloader Conguration after a Kernel Update
Every time a new kernel is installed, the perl bootloader writes a new bootloader
conguration le (for example /boot/grub/menu.lst for GRUB) using the
defaults specied in /etc/sysconfig/bootloader. If you are using a
customized set of kernel parameters, make sure to adjust the relevant defaults
in /etc/sysconfig/bootloader according to your needs.
LOADER_TYPE
Species the bootloader installed on the system (e.g. GRUB or LILO). Do not
modify—use YaST to change the bootloader as described in Procedure 6.6,
“Changing the Boot Loader Type” (page 115).
DEFAULT_VGA / FAILSAFE_VGA / XEN_VGA
Screen resolution and color depth of the framebuffer used during booting are con-
gured with the kernel parameter vga. These values dene which resolution and
color depth to use for the default boot entry, the failsafe and the XEN entry. The
following values are valid:
Table 6.1
Screen Resolution and Color Depth Reference
1600x12001280x10241024x768800x600640x480
0x31C0x3070x3050x3030x3018bit
108 Reference
1600x12001280x10241024x768800x600640x480
0x31D0x3190x3160x3130x31015bit
0x31E0x31A0x3170x3140x31116bit
0x31F0x31B0x3180x3150x31224bit
DEFAULT_APPEND / FAILSAFE_APPEND / XEN_KERNEL_APPEND
Kernel parameters (other than vga) that are automatically appended to the default,
failsafe and XEN boot entries in the bootloader conguration le.
CYCLE_DETECTION / CYCLE_NEXT_ENTRY
Congure whether to use boot cycle detection and if so, which alternative entry
from /boot/grub/menu.lst to boot in case of a reboot cycle (e.g.
Failsafe). See /usr/share/doc/packages/bootcycle/README for
detailed information.
6.1.5 Setting a Boot Password
Even before the operating system is booted, GRUB enables access to le systems. Users
without root permissions can access les in your Linux system to which they have no
access once the system is booted. To block this kind of access or to prevent users from
booting certain operating systems, set a boot password.
IMPORTANT: Boot Password and Splash Screen
If you use a boot password for GRUB, the usual splash screen is not displayed.
As the user root, proceed as follows to set a boot password:
1
At the root prompt, encrypt the password using grub-md5-crypt:
# grub-md5-crypt
Password: ****
Retype password: ****
Encrypted: $1$lS2dv/$JOYcdxIn7CJk9xShzzJVw/
2
Paste the encrypted string into the global section of the le menu.lst:
The Boot Loader GRUB 109
gfxmenu (hd0,4)/message
color white/blue black/light-gray
default 0
timeout 8
password --md5 $1$lS2dv/$JOYcdxIn7CJk9xShzzJVw/
Now GRUB commands can only be executed at the boot prompt after pressing P
and entering the password. However, users can still boot all operating systems from
the boot menu.
3
To prevent one or several operating systems from being booted from the boot menu,
add the entry lock to every section in menu.lst that should not be bootable
without entering a password. For example:
title linux
kernel (hd0,4)/vmlinuz root=/dev/sda7 vga=791
initrd (hd0,4)/initrd
lock
After rebooting the system and selecting the Linux entry from the boot menu, the
following error message is displayed:
Error 32: Must be authenticated
Press Enter to enter the menu. Then press P to get a password prompt. After entering
the password and pressing Enter, the selected operating system (Linux in this case)
should boot.
6.2 Conguring the Boot Loader with
YaST
The easiest way to congure the boot loader in your openSUSE system is to use the
YaST module. In the YaST Control Center, select System > Boot Loader. As in Fig-
ure 6.1, “Boot Loader Settings” (page 111), this shows the current boot loader congu-
ration of your system and allows you to make changes.
110 Reference
Figure 6.1
Boot Loader Settings
Use the Section Management tab to edit, change and delete boot loader sections for the
individual operating systems. To add an option, click Add. To change the value of an
existing option, select it with the mouse and click Edit. To remove an existing entry,
select it and click Delete. If you are not familiar with boot loader options, read Sec-
tion 6.1, “Booting with GRUB” (page 100) rst.
Use the Boot Loader Installation tab to view and change settings related to type, location
and advanced loader settings.
Click Other to access advanced conguration options. The build-in editor lets you
change the GRUB conguration les. For details, see Section 6.1, “Booting with GRUB”
(page 100). You can also delete the existing conguration and Start from Scratch or let
YaST Propose a New Conguration. It is also possible to write the conguration to
disk or reread the conguration from the disk. To restore the original Master Boot
Record (MBR) that was saved during the installation, choose Restore MBR of Hard
Disk.
The Boot Loader GRUB 111
6.2.1 Adjusting the Default Boot Entry
To change the system that is booted by default, proceed as follows:
Procedure 6.1
Setting the Default System
1
Open the Section Management tab.
2
Select the desired entry from the list.
3
Click Set as Default.
4
Click OK to activate these changes.
6.2.2 Modifying the Boot Loader Location
To modify the location of the boot loader, follow these steps:
Procedure 6.2
Changing the Boot Loader Location
1
Select the Boot Loader Installation tab and then choose one of the following options
for Boot Loader Location:
Boot from Master Boot Record
This installs the boot loader in the MBR of the rst disk (according to the boot
sequence preset in the BIOS).
Boot from Root Partition
This installs the boot loader in the boot sector of the / partition (this is the de-
fault).
Boot from Boot Partition
This installs the boot loader in the boot sector of the /boot partition.
Boot from Extended Partition
This installs the boot loader in the extended partition container.
Custom Boot Partition
Use this option to specify the location of the boot loader manually.
112 Reference
2
Click OK to apply your changes.
6.2.3 Changing the Boot Loader Time-Out
The boot loader does not boot the default system immediately. During the time-out,
you can select the system to boot or write some kernel parameters. To set the boot
loader time-out, proceed as follows:
Procedure 6.3
Changing the Boot Loader Time-Out
1
Open the Boot Loader Installation tab.
2
Click Boot Loader Options.
3
Change the value of Time-Out in Seconds by typing in a new value and clicking the
appropriate arrow key with your mouse, or by using the arrow keys on the keyboard.
4
Click OK twice to save the changes.
WARNING: Timeout of 0 Seconds
When setting the timeout to 0 seconds, you will not be able to access GRUB
during boot time. When having set the default boot option to a non-Linux
operation system at the same time, this effectively disables access to the Linux
system.
6.2.4 Setting a Boot Password
Using this YaST module, you can also set a password to protect booting. This gives
you an additional level of security.
Procedure 6.4
Setting a Boot Loader Password
1
Open the Boot Loader Installation tab.
2
Click Boot Loader Options.
The Boot Loader GRUB 113
3
Activate the Protect Boot Loader with Password option with a click and type in your
Password twice.
4
Click OK twice to save the changes.
6.2.5 Adjusting the Disk Order
If your computer has more than one hard disk, you can specify the boot sequence of
the disks to match the BIOS setup of the machine (see Section 6.1.2, “The File de-
vice.map” (page 107)). To do so, proceed as follows:
Procedure 6.5
Setting the Disk Order
1
Open the Boot Loader Installation tab.
2
Click Boot Loader Installation Details.
3
If more than one disk is listed, select a disk and click Up or Down to reorder the
displayed disks.
4
Click OK two times to save the changes.
6.2.6 Conguring Advanced Options
Advanced boot options can be congured via Boot Loader Installation > Boot Loader
Options. Normally, it should not be necessary to change the default settings.
Set Active Flag in Partition Table for Boot Partition
Activates the partition that contains the boot loader. Some legacy operating systems
(such as Windows 98) can only boot from an active partition.
Write Generic Boot Code to MBR
Replaces the current MBR with generic, operating system independent code.
Debugging Flag
Sets GRUB in debug mode where it displays messages to show disk activity.
Hide Boot Menu
Hides the boot menu and boots the default entry.
114 Reference
WARNING
When hiding the boot menu, you will not be able to access GRUB during
boot time. When having set the default boot option to a non-Linux opera-
tion system at the same time, this effectively disables access to the Linux
system.
Use Trusted GRUB
Starts the Trusted GRUB which supports trusted computing functionality.
Enable Acoustic Signals
Enables or disables acoustic signals in GRUB.
Graphical Menu File
Path to the graphics le used when displaying the boot screen.
Use Serial Console
If your machine is controlled via a serial console, activate this option and specify
which COM port to use at which speed. See info grub or http://www.gnu
.org/software/grub/manual/grub.html#Serial-terminal
6.2.7 Changing Boot Loader Type
Set the boot loader type in Boot Loader Installation. The default boot loader in open-
SUSE is GRUB. To use LILO or ELILO, proceed as follows:
WARNING: LILO is unsupported
Using LILO is not recommended—it is unsupported on openSUSE. Only use it
in special cases.
Procedure 6.6
Changing the Boot Loader Type
1
Select the Boot Loader Installation tab.
2
For Boot Loader, select LILO.
3
In the dialog box that opens, select one of the following actions:
The Boot Loader GRUB 115
Propose New Conguration
Have YaST propose a new conguration.
Convert Current Conguration
Have YaST convert the current conguration. When converting the conguration,
some settings may be lost.
Start New Conguration from Scratch
Write a custom conguration. This action is not available during the installation
of openSUSE.
Read Conguration Saved on Disk
Load your own /etc/lilo.conf. This action is not available during the in-
stallation of openSUSE.
4
Click OK two times to save the changes.
During the conversion, the old GRUB conguration is saved to the disk. To use it,
simply change the boot loader type back to GRUB and choose Restore Conguration
Saved before Conversion. This action is available only on an installed system.
NOTE: Custom Boot Loader
To use a boot loader other than GRUB or LILO, select Do Not Install Any Boot
Loader. Read the documentation of your boot loader carefully before choosing
this option.
6.3 Uninstalling the Linux Boot
Loader
YaST can be used to uninstall the Linux boot loader and restore the MBR to the state
it had prior to the installation of Linux. During the installation, YaST automatically
creates a backup copy of the original MBR and restores it upon request.
To uninstall GRUB, start YaST and click System > Boot Loader to start the boot loader
module. Select Other > Restore MBR of Hard Disk and conrm with Yes, Rewrite.
116 Reference
6.4 Creating Boot CDs
If problems occur while booting your system using a boot manager or if the boot man-
ager cannot be installed on your hard disk disk, it is also possible to create a bootable
CD with all the necessary start-up les for Linux. This requires a CD writer be installed
in your system.
Creating a bootable CD-ROM with GRUB merely requires a special form of stage2
called stage2_eltorito and, optionally, a customized menu.lst. The classic
les stage1 and stage2 are not required.
Procedure 6.7
Creating Boot CDs
1
Change into a directory in which to create the ISO image, for example: cd /tmp
2
Create a subdirectory for GRUB and change into the newly created iso directory:
mkdir -p iso/boot/grub && cd iso
3
Copy the kernel, the les stage2_eltorito, initrd, menu.lst and
message to iso/boot/:
cp /boot/vmlinuz boot/
cp /boot/initrd boot/
cp /boot/message boot/
cp /usr/lib/grub/stage2_eltorito boot/grub
cp /boot/grub/menu.lst boot/grub
4
Replace the root (hdx, y) entries with root (cd) to point to the CD_ROM
device. You may also need to adjust the paths to the message le, the kernel and the
initrd—they need to point to /boot/message, /boot/vmlinuz and /boot/
initrd, respectively. After having made the adjustments, menu.lst should look
similar to the following example:
timeout 8
default 0
gfxmenu (cd)/boot/message
title Linux
root (cd)
kernel /boot/vmlinuz root=/dev/sda5 vga=794 resume=/dev/sda1 \
splash=verbose showopts
initrd /boot/initrd
The Boot Loader GRUB 117
Use splash=silent instead of splash=verbose to prevent the boot messages
from appearing during the boot procedure.
5
Create the ISO image with the following command:
genisoimage -R -b boot/grub/stage2_eltorito -no-emul-boot \
-boot-load-size 4 -boot-info-table -iso-level 2 -input-charset utf-8 \
-o grub.iso /tmp/iso
6
Write the resulting le grub.iso to a CD using your preferred utility. Do not burn
the ISO image as a data le, but use the option for burning a CD image in your
burning utility.
6.5 The Graphical SUSE Screen
The graphical SUSE screen is displayed on the rst console if the option vga=value
is used as a kernel parameter. If you install using YaST, this option is automatically
activated in accordance with the selected resolution and the graphics card. There are
three ways to disable the SUSE screen, if desired:
Disabling the SUSE Screen When Necessary
Enter the command echo 0 >/proc/splash on the command line to disable
the graphical screen. To activate it again, enter echo 1 >/proc/splash.
Disabling the SUSE screen by default
Add the kernel parameter splash=0 to your boot loader conguration. Chapter 6,
The Boot Loader GRUB (page 99) provides more information about this. However,
if you prefer the text mode (the default in earlier versions) set vga=normal.
Completely Disabling the SUSE Screen
Compile a new kernel and disable the option Use splash screen instead of boot logo
in framebuffer support. Disabling framebuffer support in the kernel automatically
disables the splash screen, as well.
WARNING: No Support
SUSE cannot provide any support for your system if you run it with a custom
kernel.
118 Reference
6.6 Troubleshooting
This section lists some of the problems frequently encountered when booting with
GRUB and a short description of possible solutions. Some of the problems are covered
in articles in the Support Database at http://en.opensuse.org/Portal:
Support_database. Use the search dialog to search for keywords like GRUB, boot
and boot loader.
GRUB and XFS
XFS leaves no room for stage1 in the partition boot block. Therefore, do not
specify an XFS partition as the location of the boot loader. This problem can be
solved by creating a separate boot partition that is not formatted with XFS.
GRUB Reports GRUB Geom Error
GRUB checks the geometry of connected hard disks when the system is booted.
Sometimes, the BIOS returns inconsistent information and GRUB reports a GRUB
Geom Error. In this case, update the BIOS.
GRUB also returns this error message if Linux was installed on an additional hard
disk that is not registered in the BIOS. stage1 of the boot loader is found and
loaded correctly, but stage2 is not found. This problem can be remedied by regis-
tering the new hard disk in the BIOS.
System Containing Several Hard Disks Does Not Boot
During the installation, YaST may have incorrectly determined the boot sequence
of the hard disks. For example, GRUB may regard the PATA (IDE) disk as hd0
and the SCSI disk as hd1, although the boot sequence in the BIOS is reversed
(SCSI before PATA).
In this case, correct the hard disks during the boot process with the help of the
GRUB command line. After the system has booted, edit device.map to apply
the new mapping permanently. Then check the GRUB device names in the les
/boot/grub/menu.lst and /boot/grub/device.map and reinstall the
boot loader with the following command:
grub --batch < /etc/grub.conf
The Boot Loader GRUB 119
Booting Windows from the Second Hard Disk
Some operating systems, such as Windows, can only boot from the rst hard disk.
If such an operating system is installed on a hard disk other than the rst hard disk,
you can effect a logical change for the respective menu entry.
...
title windows
map (hd0) (hd1)
map (hd1) (hd0)
chainloader(hd1,0)+1
...
In this example, Windows is started from the second hard disk. For this purpose,
the logical order of the hard disks is changed with map. This change does not affect
the logic within the GRUB menu le. Therefore, the second hard disk must be
specied for chainloader.
6.7 For More Information
Extensive information about GRUB is available at http://www.gnu.org/
software/grub/. Also refer to the grub info page. You can also search for the
keyword “GRUB” in the Support Database at http://en.opensuse.org/
Portal:Support_database to get information about special issues.
120 Reference
7
Special System Features
This chapter starts with information about various software packages, the virtual consoles
and the keyboard layout. We talk about software components like bash, cron and
logrotate, because they were changed or enhanced during the last release cycles.
Even if they are small or considered of minor importance, users may want to change
their default behavior, because these components are often closely coupled with the
system. The chapter concludes with a section about language and country-specic set-
tings (I18N and L10N).
7.1 Information about Special
Software Packages
The programs bash, cron, logrotate, locate, ulimit and free are very
important for system administrators and many users. Man pages and info pages are two
useful sources of information about commands, but both are not always available. GNU
Emacs is a popular and very congurable text editor.
7.1.1 The bash Package and /etc/prole
Bash is the default system shell. When used as a login shell, it reads several initialization
les. Bash processes them in the order they appear in this list:
Special System Features 121
1.
/etc/profile
2.
~/.profile
3.
/etc/bash.bashrc
4.
~/.bashrc
Make custom settings in ~/.profile or ~/.bashrc. To ensure the correct process-
ing of these les, it is necessary to copy the basic settings from /etc/skel/
.profile or /etc/skel/.bashrc into the home directory of the user. It is rec-
ommended to copy the settings from /etc/skel after an update. Execute the following
shell commands to prevent the loss of personal adjustments:
mv ~/.bashrc ~/.bashrc.old
cp /etc/skel/.bashrc ~/.bashrc
mv ~/.profile ~/.profile.old
cp /etc/skel/.profile ~/.profile
Then copy personal adjustments back from the *.old les.
7.1.2 The cron Package
If you want to run commands regularly and automatically in the background at predened
times, cron is the tool to use. cron is driven by specially formatted time tables. Some
of them come with the system and users can write their own tables if needed.
The cron tables are located in /var/spool/cron/tabs. /etc/crontab serves
as a systemwide cron table. Enter the username to run the command directly after the
time table and before the command. In Example 7.1, “Entry in /etc/crontab” (page 122),
root is entered. Package-specic tables, located in /etc/cron.d, have the same
format. See the cron man page (man cron).
Example 7.1
Entry in /etc/crontab
1-59/5 * * * * root test -x /usr/sbin/atrun && /usr/sbin/atrun
You cannot edit /etc/crontab by calling the command crontab -e. This le
must be loaded directly into an editor, then modied and saved.
122 Reference
A number of packages install shell scripts to the directories /etc/cron.hourly,
/etc/cron.daily, /etc/cron.weekly and /etc/cron.monthly, whose
execution is controlled by /usr/lib/cron/run-crons. /usr/lib/cron/run
-crons is run every 15 minutes from the main table (/etc/crontab). This guaran-
tees that processes that may have been neglected can be run at the proper time.
To run the hourly, daily or other periodic maintenance scripts at custom times,
remove the time stamp les regularly using /etc/crontab entries (see Example 7.2,
“/etc/crontab: Remove Time Stamp Files” (page 123), which removes the hourly one
before every full hour, the daily one once a day at 2:14 a.m., etc.).
Example 7.2
/etc/crontab: Remove Time Stamp Files
59 * * * * root rm -f /var/spool/cron/lastrun/cron.hourly
14 2 * * * root rm -f /var/spool/cron/lastrun/cron.daily
29 2 * * 6 root rm -f /var/spool/cron/lastrun/cron.weekly
44 2 1 * * root rm -f /var/spool/cron/lastrun/cron.monthly
Or you can set DAILY_TIME in /etc/sysconfig/cron to the time at which
cron.daily should start. The setting of MAX_NOT_RUN ensures that the daily tasks
get triggered to run, even if the user did not turn on the computer at the specied
DAILY_TIME for a longer period of time. The maximum value of MAX_NOT_RUN is
14 days.
The daily system maintenance jobs are distributed to various scripts for reasons of
clarity. They are contained in the package aaa_base. /etc/cron.daily contains,
for example, the components suse.de-backup-rpmdb, suse.de-clean-tmp
or suse.de-cron-local.
7.1.3 Log Files: Package logrotate
There are a number of system services (daemons) that, along with the kernel itself,
regularly record the system status and specic events onto log les. This way, the ad-
ministrator can regularly check the status of the system at a certain point in time, recog-
nize errors or faulty functions and troubleshoot them with pinpoint precision. These
log les are normally stored in /var/log as specied by FHS and grow on a daily
basis. The logrotate package helps control the growth of these les.
Special System Features 123
Congure logrotate with the le /etc/logrotate.conf. In particular, the
include specication primarily congures the additional les to read. Programs that
produce log les install individual conguration les in /etc/logrotate.d. For
example, such les ship with the packages apache2 (/etc/logrotate.d/
apache2) and syslogd (/etc/logrotate.d/syslog).
Example 7.3
Example for /etc/logrotate.conf
# see "man logrotate" for details
# rotate log files weekly
weekly
# keep 4 weeks worth of backlogs
rotate 4
# create new (empty) log files after rotating old ones
create
# uncomment this if you want your log files compressed
#compress
# RPM packages drop log rotation information into this directory
include /etc/logrotate.d
# no packages own lastlog or wtmp - we'll rotate them here
#/var/log/wtmp {
# monthly
# create 0664 root utmp
# rotate 1
#}
# system-specific logs may be also be configured here.
logrotate is controlled through cron and is called daily by /etc/cron.daily/
logrotate.
IMPORTANT
The create option reads all settings made by the administrator in /etc/
permissions*. Ensure that no conicts arise from any personal modications.
124 Reference
7.1.4 The locate Command
locate, a command for quickly nding les, is not included in the standard scope of
installed software. If desired, install the package findutils-locate. The updatedb
process is started automatically every night or about 15 minutes after booting the system.
7.1.5 The ulimit Command
With the ulimit (user limits) command, it is possible to set limits for the use of system
resources and to have these displayed. ulimit is especially useful for limiting available
memory for applications. With this, an application can be prevented from co-opting
too much of the system resources and slowing or even hanging up the operating system.
ulimit can be used with various options. To limit memory usage, use the options
listed in Table 7.1, ulimit: Setting Resources for the User” (page 125).
Table 7.1
ulimit: Setting Resources for the User
The maximum resident set size
-m
The maximum amount of virtual memory available to the
shell
-v
The maximum size of the stack
-s
The maximum size of core les created
-c
All current limits are reported
-a
Systemwide entries can be made in /etc/profile. There, enable creation of core
les (needed by programmers for debugging). A normal user cannot increase the values
specied in /etc/profile by the system administrator, but can make special entries
in ~/.bashrc.
Special System Features 125
Example 7.4
ulimit: Settings in ~/.bashrc
# Limits maximum resident set size (physical memory):
ulimit -m 98304
# Limits of virtual memory:
ulimit -v 98304
Memory allocations must be specied in KB. For more detailed information, see man
bash.
IMPORTANT
Not all shells support ulimit directives. PAM (for instance, pam_limits)
offers comprehensive adjustment possibilities if you depend on encompassing
settings for these restrictions.
7.1.6 The free Command
The free command displays the total amount of free and used physical memory and
swap space in the system, as well as the buffers and cache consumed by the kernel. The
concept of available RAM dates back to before the days of unied memory management.
The slogan free memory is bad memory applies well to Linux. As a result, Linux has
always made the effort to balance out caches without actually allowing free or unused
memory.
Basically, the kernel does not have direct knowledge of any applications or user data.
Instead, it manages applications and user data in a page cache. If memory runs short,
parts of it are written to the swap partition or to les, from which they can initially be
read with the help of the mmap command (see man mmap).
The kernel also contains other caches, such as the slab cache, where the caches used
for network access are stored. This may explain the differences between the counters
in /proc/meminfo. Most, but not all, of them can be accessed via /proc/
slabinfo.
However, if your goal is to nd out how much RAM is currently being used, nd this
information in /proc/meminfo.
126 Reference
7.1.7 Man Pages and Info Pages
For some GNU applications (such as tar), the man pages are no longer maintained. For
these commands, use the --help option to get a quick overview of the info pages,
which provide more in-depth instructions. Info is GNU's hypertext system. Read an
introduction to this system by entering info info. Info pages can be viewed with
Emacs by entering emacs -f info or directly in a console with info. You can
also use tkinfo, xinfo or the help system to view info pages.
7.1.8 Selecting Man Pages Using the man
Command
To read a man page enter man man_page. If a man page with the same name exists
in different sections, they will all be listed with the corresponding section numbers.
Select the one to display. If you don't enter a section number within a few seconds, the
rst man page will be displayed.
If you want to change this to the default system behavior, set
MAN_POSIXLY_CORRECT=1 in a shell initialization le such as ~/.bashrc.
7.1.9 Settings for GNU Emacs
GNU Emacs is a complex work environment. The following sections cover the con-
guration les processed when GNU Emacs is started. More information is available at
http://www.gnu.org/software/emacs/.
On start-up, Emacs reads several les containing the settings of the user, system admin-
istrator and distributor for customization or preconguration. The initialization le ~/
.emacs is installed to the home directories of the individual users from /etc/skel.
.emacs, in turn, reads the le /etc/skel/.gnu-emacs. To customize the program,
copy .gnu-emacs to the home directory (with cp /etc/skel/.gnu-emacs
~/.gnu-emacs) and make the desired settings there.
.gnu-emacs denes the le ~/.gnu-emacs-custom as custom-file. If users
make settings with the customize options in Emacs, the settings are saved to ~/
.gnu-emacs-custom.
Special System Features 127
With openSUSE, the emacs package installs the le site-start.el in the direc-
tory /usr/share/emacs/site-lisp. The le site-start.el is loaded before
the initialization le ~/.emacs. Among other things, site-start.el ensures that
special conguration les distributed with Emacs add-on packages, such as psgml,
are loaded automatically. Conguration les of this type are located in /usr/share/
emacs/site-lisp, too, and always begin with suse-start-. The local system
administrator can specify systemwide settings in default.el.
More information about these les is available in the Emacs info le under Init File:
info:/emacs/InitFile. Information about how to disable the loading of these
les (if necessary) is also provided at this location.
The components of Emacs are divided into several packages:
The base package emacs.
emacs-x11 (usually installed): the program with X11 support.
emacs-nox: the program without X11 support.
emacs-info: online documentation in info format.
emacs-el: the uncompiled library les in Emacs Lisp. These are not required at
runtime.
Numerous add-on packages can be installed if needed: emacs-auctex (LaTeX),
psgml (SGML and XML), gnuserv (client and server operation) and others.
7.2 Virtual Consoles
Linux is a multiuser and multitasking system. The advantages of these features can be
appreciated even on a stand-alone PC system. In text mode, there are six virtual consoles
available. Switch between them using Alt + F1 through Alt + F6. The seventh console
is reserved for X and the tenth console shows kernel messages. More or fewer consoles
can be assigned by modifying the le /etc/inittab.
To switch to a console from X without shutting it down, use Ctrl + Alt + F1 to Ctrl +
Alt + F6. To return to X, press Alt + F7.
128 Reference
7.3 Keyboard Mapping
To standardize the keyboard mapping of programs, changes were made to the following
les:
/etc/inputrc
/etc/X11/Xmodmap
/etc/skel/.emacs
/etc/skel/.gnu-emacs
/etc/skel/.vimrc
/etc/csh.cshrc
/etc/termcap
/usr/share/terminfo/x/xterm
/usr/share/X11/app-defaults/XTerm
/usr/share/emacs/VERSION/site-lisp/term/*.el
These changes only affect applications that use terminfo entries or whose congu-
ration les are changed directly (vi, emacs, etc.). Applications not shipped with the
system should be adapted to these defaults.
Under X, the compose key (multikey) can be enabled as explained in /etc/X11/
Xmodmap.
Further settings are possible using the X Keyboard Extension (XKB). This extension
is also used by the desktop environments GNOME (gswitchit) and KDE (kxkb).
TIP: For More Information
Information about XKB is available in the documents listed in /usr/share/
doc/packages/xkeyboard-config (part of the xkeyboard-config
package).
7.4 Language and Country-Specic
Settings
The system is, to a very large extent, internationalized and can be modied for local
needs. Internationalization (I18N) allows specic localizations (L10N). The abbreviations
I18N and L10N are derived from the rst and last letters of the words and, in between,
the number of letters omitted.
Special System Features 129
Settings are made with LC_ variables dened in the le /etc/sysconfig/
language. This refers not only to native language support, but also to the categories
Messages (Language), Character Set, Sort Order, Time and Date, Numbers and Money.
Each of these categories can be dened directly with its own variable or indirectly with
a master variable in the le language (see the locale man page).
RC_LC_MESSAGES, RC_LC_CTYPE, RC_LC_COLLATE, RC_LC_TIME,
RC_LC_NUMERIC, RC_LC_MONETARY
These variables are passed to the shell without the RC_ prex and represent the
listed categories. The shell proles concerned are listed below. The current setting
can be shown with the command locale.
RC_LC_ALL
This variable, if set, overwrites the values of the variables already mentioned.
RC_LANG
If none of the previous variables are set, this is the fallback. By default, only
RC_LANG is set. This makes it easier for users to enter their own values.
ROOT_USES_LANG
A yes or no variable. If set to no, root always works in the POSIX environment.
The variables can be set with the YaST syscong editor. The value of such a variable
contains the language code, country code, encoding and modier. The individual
components are connected by special characters:
LANG=<language>[[_<COUNTRY>].<Encoding>[@<Modifier>]]
7.4.1 Some Examples
You should always set the language and country codes together. Language settings
follow the standard ISO 639 available at http://www.evertype.com/
standards/iso639/iso639-en.html and http://www.loc.gov/
standards/iso639-2/. Country codes are listed in ISO 3166 available at http://
www.din.de/gremien/nas/nabd/iso3166ma/codlstp1/en_listp1
.html.
130 Reference
It only makes sense to set values for which usable description les can be found in
/usr/lib/locale. Additional description les can be created from the les in
/usr/share/i18n using the command localedef. The description les are part
of the glibc-i18ndata package. A description le for en_US.UTF-8 (for English
and United States) can be created with:
localedef -i en_US -f UTF-8 en_US.UTF-8
LANG=en_US.UTF-8
This is the default setting if American English is selected during installation. If you
selected another language, that language is enabled but still with UTF-8 as the
character encoding.
LANG=en_US.ISO-8859-1
This sets the language to English, country to United States and the character set to
ISO-8859-1. This character set does not support the Euro sign, but it can be
useful sometimes for programs that have not been updated to support UTF-8. The
string dening the charset (ISO-8859-1 in this case) is then evaluated by pro-
grams like Emacs.
LANG=en_IE@euro
The above example explicitly includes the Euro sign in a language setting. This
setting is basically obsolete now, as UTF-8 also covers the Euro symbol. It is only
useful if an application supports ISO-8859-15 and not UTF-8.
In former releases, it was necessary to run SuSEconfig after doing any changes to
/etc/sysconfig/language. SuSEcong then wrote the changes to /etc/
SuSEconfig/profile and /etc/SuSEconfig/csh.login. Upon login,
these les were read by /etc/profile (for the Bash) or by /etc/csh.login
(for the tcsh) .
In recent releases, /etc/SuSEconfig/profile has been replaced with /etc/
profile.d/lang.sh, and /etc/SuSEconfig/csh.login with /etc/
profile.de/lang.csh. But if they exist, both legacy le are still read upon login.
The process chain is now as follows:
For the Bash: /etc/profile reads /etc/profile.d/lang.sh which, in
turn, analyzes /etc/sysconfig/language.
Special System Features 131
For tcsh: At login, /etc/csh.login reads /etc/profile.d/lang.csh
which, in turn, analyzes /etc/sysconfig/language.
This ensures that any changes to /etc/sysconfig/language are available at the
next login to the respective shell, without having to run SuSEcong rst.
Users can override the system defaults by editing their ~/.bashrc accordingly. For
instance, if you do not want to use the systemwide en_US for program messages, include
LC_MESSAGES=es_ES so that messages are displayed in Spanish instead.
7.4.2 Locale Settings in ~/.i18n
If you are not satised with locale system defaults, change the settings in ~/.i18n
according to the Bash scripting syntax. Entries in ~/.i18n override system defaults
from /etc/sysconfig/language. Use the same variable names but without the
RC_ namespace prexes. For example, use LANG instead of RC_LANG:
LANG=cs_CZ.UTF-8
LC_COLLATE=C
7.4.3 Settings for Language Support
Files in the category Messages are, as a rule, only stored in the corresponding language
directory (like en) to have a fallback. If you set LANG to en_US and the message le
in /usr/share/locale/en_US/LC_MESSAGES does not exist, it falls back to
/usr/share/locale/en/LC_MESSAGES.
A fallback chain can also be dened, for example, for Breton to French or for Galician
to Spanish to Portuguese:
LANGUAGE="br_FR:fr_FR"
LANGUAGE="gl_ES:es_ES:pt_PT"
If desired, use the Norwegian variants Nynorsk and Bokmål instead (with additional
fallback to no):
LANG="nn_NO"
132 Reference
LANGUAGE="nn_NO:nb_NO:no"
or
LANG="nb_NO"
LANGUAGE="nb_NO:nn_NO:no"
Note that in Norwegian, LC_TIME is also treated differently.
One problem that can arise is a separator used to delimit groups of digits not being
recognized properly. This occurs if LANG is set to only a two-letter language code like
de, but the denition le glibc uses is located in /usr/share/lib/de_DE/LC
_NUMERIC. Thus LC_NUMERIC must be set to de_DE to make the separator denition
visible to the system.
7.4.4 For More Information
The GNU C Library Reference Manual, Chapter “Locales and Internationalization”.
It is included in glibc-info.
Markus Kuhn, UTF-8 and Unicode FAQ for Unix/Linux, currently at http://www
.cl.cam.ac.uk/~mgk25/unicode.html.
Unicode-Howto by Bruno Haible, available at http://tldp.org/HOWTO/
Unicode-HOWTO-1.html.
Special System Features 133
8
Dynamic Kernel Device
Management with udev
The kernel can add or remove almost any device in a running system. Changes in the
device state (whether a device is plugged in or removed) need to be propagated to
userspace. Devices need to be congured as soon as they are plugged in and recognized.
Users of a certain device need to be informed about any changes in this device's recog-
nized state. udev provides the needed infrastructure to dynamically maintain the device
node les and symbolic links in the /dev directory. udev rules provide a way to plug
external tools into the kernel device event processing. This enables you to customize
udev device handling by, for example, adding certain scripts to execute as part of
kernel device handling, or request and import additional data to evaluate during device
handling.
8.1 The /dev Directory
The device nodes in the /dev directory provide access to the corresponding kernel
devices. With udev, the /dev directory reects the current state of the kernel. Every
kernel device has one corresponding device le. If a device is disconnected from the
system, the device node is removed.
The content of the /dev directory is kept on a temporary le system and all les are
rendered at every system start-up. Manually created or modied les do not, by design,
survive a reboot. Static les and directories that should always be present in the /dev
directory regardless of the state of the corresponding kernel device can be placed in the
/lib/udev/devices directory. At system start-up, the contents of that directory
Dynamic Kernel Device Management with udev 135
is copied to the /dev directory with the same ownership and permissions as the les
in /lib/udev/devices.
8.2
Kernel uevents and udev
The required device information is exported by the sysfs le system. For every device
the kernel has detected and initialized, a directory with the device name is created. It
contains attribute les with device-specic properties.
Every time a device is added or removed, the kernel sends a uevent to notify udev of
the change. The udev daemon reads and parses all provided rules from the /etc/
udev/rules.d/*.rules les once at start-up and keeps them in memory. If rules
les are changed, added or removed, the daemon can reload the in-memory representa-
tion of all rules with the command udevadm control reload_rules. This is
also done when running /etc/init.d/boot.udev reload. For more details
on udev rules and their syntax, refer to Section 8.6, “Inuencing Kernel Device Event
Handling with udev Rules” (page 139).
Every received event is matched against the set of provides rules. The rules can add or
change event environment keys, request a specic name for the device node to create,
add symlinks pointing to the node or add programs to run after the device node is cre-
ated. The driver core uevents are received from a kernel netlink socket.
8.3 Drivers, Kernel Modules and
Devices
The kernel bus drivers probe for devices. For every detected device, the kernel creates
an internal device structure while the driver core sends a uevent to the udev daemon.
Bus devices identify themselves by a specially-formatted ID, which tells what kind of
device it is. Usually these IDs consist of vendor and product ID and other subsystem-
specic values. Every bus has its own scheme for these IDs, called MODALIAS. The
kernel takes the device information, composes a MODALIAS ID string from it and sends
that string along with the event. For a USB mouse, it looks like this:
MODALIAS=usb:v046DpC03Ed2000dc00dsc00dp00ic03isc01ip02
136 Reference
Every device driver carries a list of known aliases for devices it can handle. The list is
contained in the kernel module le itself. The program depmod reads the ID lists and
creates the le modules.alias in the kernel's /lib/modules directory for all
currently available modules. With this infrastructure, module loading is as easy as
calling modprobe for every event that carries a MODALIAS key. If modprobe
$MODALIAS is called, it matches the device alias composed for the device with the
aliases provided by the modules. If a matching entry is found, that module is loaded.
All this is automatically triggered by udev.
8.4 Booting and Initial Device Setup
All device events happening during the boot process before the udev daemon is running
are lost, because the infrastructure to handle these events resides on the root le system
and is not available at that time. To cover that loss, the kernel provides a uevent le
located in the device directory of every device in the sysfs le system. By writing
add to that le, the kernel resends the same event as the one lost during boot. A simple
loop over all uevent les in /sys triggers all events again to create the device nodes
and perform device setup.
As an example, a USB mouse present during boot may not be initialized by the early
boot logic, because the driver is not available at that time. The event for the device
discovery was lost and failed to nd a kernel module for the device. Instead of manually
searching for possibly connected devices, udev just requests all device events from
the kernel after the root le system is available, so the event for the USB mouse device
just runs again. Now it nds the kernel module on the mounted root le system and the
USB mouse can be initialized.
From userspace, there is no visible difference between a device coldplug sequence and
a device discovery during runtime. In both cases, the same rules are used to match and
the same congured programs are run.
Dynamic Kernel Device Management with udev 137
8.5
Monitoring the Running udev
Daemon
The program udevadm monitor can be used to visualize the driver core events and
the timing of the udev event processes.
UEVENT[1185238505.276660] add /devices/pci0000:00/0000:00:1d.2/usb3/3-1
(usb)
UDEV [1185238505.279198] add /devices/pci0000:00/0000:00:1d.2/usb3/3-1
(usb)
UEVENT[1185238505.279527] add
/devices/pci0000:00/0000:00:1d.2/usb3/3-1/3-1:1.0 (usb)
UDEV [1185238505.285573] add
/devices/pci0000:00/0000:00:1d.2/usb3/3-1/3-1:1.0 (usb)
UEVENT[1185238505.298878] add
/devices/pci0000:00/0000:00:1d.2/usb3/3-1/3-1:1.0/input/input10 (input)
UDEV [1185238505.305026] add
/devices/pci0000:00/0000:00:1d.2/usb3/3-1/3-1:1.0/input/input10 (input)
UEVENT[1185238505.305442] add
/devices/pci0000:00/0000:00:1d.2/usb3/3-1/3-1:1.0/input/input10/mouse2 (input)
UEVENT[1185238505.306440] add
/devices/pci0000:00/0000:00:1d.2/usb3/3-1/3-1:1.0/input/input10/event4 (input)
UDEV [1185238505.325384] add
/devices/pci0000:00/0000:00:1d.2/usb3/3-1/3-1:1.0/input/input10/event4 (input)
UDEV [1185238505.342257] add
/devices/pci0000:00/0000:00:1d.2/usb3/3-1/3-1:1.0/input/input10/mouse2 (input)
The UEVENT lines show the events the kernel has sent over netlink. The UDEV lines
show the nished udev event handlers. The timing is printed in microseconds. The
time between UEVENT and UDEV is the time udev took to process this event or the
udev daemon has delayed its execution to synchronize this event with related and al-
ready running events. For example, events for hard disk partitions always wait for the
main disk device event to nish, because the partition events may rely on the data that
the main disk event has queried from the hardware.
udevadm monitor --env shows the complete event environment:
ACTION=add
DEVPATH=/devices/pci0000:00/0000:00:1d.2/usb3/3-1/3-1:1.0/input/input10
SUBSYSTEM=input
SEQNUM=1181
NAME="Logitech USB-PS/2 Optical Mouse"
PHYS="usb-0000:00:1d.2-1/input0"
UNIQ=""
EV=7
KEY=70000 0 0 0 0
138 Reference
REL=103
MODALIAS=input:b0003v046DpC03Ee0110-e0,1,2,k110,111,112,r0,1,8,amlsfw
udev also sends messages to syslog. The default syslog priority that controls which
messages are sent to syslog is specied in the udev conguration le /etc/udev/
udev.conf. The log priority of the running daemon can be changed with udevadm
control log_priority=level/number.
8.6 Inuencing Kernel Device Event
Handling with udev Rules
A udev rule can match any property the kernel adds to the event itself or any informa-
tion that the kernel exports to sysfs. The rule can also request additional information
from external programs. Every event is matched against all provided rules. All rules
are located in the /etc/udev/rules.d directory.
Every line in the rules le contains at least one key value pair. There are two kinds of
keys, match and assignment keys. If all match keys match their values, the rule is applied
and the assignment keys are assigned the specied value. A matching rule may specify
the name of the device node, add symlinks pointing to the node or run a specied pro-
gram as part of the event handling. If no matching rule is found, the default device node
name is used to create the device node. Detailed information about the rule syntax and
the provided keys to match or import data are described in the udev man page. The
following example rules provide a basic introduction to udev rule syntax. The example
rules are all taken from the udev default rule set that is located under /etc/udev/
rules.d/50-udev-default.rules.
Example 8.1
Example udev Rules
# console
KERNEL=="console", MODE="0600", OPTIONS="last_rule"
# serial devices
KERNEL=="ttyUSB*", ATTRS{product}=="[Pp]alm*Handheld*", SYMLINK+="pilot"
# printer
SUBSYSTEM=="usb", KERNEL=="lp*", NAME="usb/%k", SYMLINK+="usb%k", GROUP="lp"
# kernel firmware loader
SUBSYSTEM=="firmware", ACTION=="add", RUN+="firmware.sh"
Dynamic Kernel Device Management with udev 139
The console rule consists of three keys: one match key (KERNEL) and two assign
keys (MODE, OPTIONS). The KERNEL match rule searches the device list for any items
of the type console. Only exact matches are valid and trigger this rule to be executed.
The MODE key assigns special permissions to the device node, in this case, read and
write permissions to the owner of this device only. The OPTIONS key makes this rule
the last rule to be applied to any device of this type. Any later rule matching this partic-
ular device type does not have any effect.
The serial devices rule is not available in 50-udev-default.rules any-
more, but it is still worth considering. It consists of two match keys (KERNEL and
ATTRS) and one assign key (SYMLINK). The KERNEL key searches for all devices of
the ttyUSB type. Using the * wild card, this key matches several of these devices.
The second match key, ATTRS, checks whether the product attribute le in sysfs
for any ttyUSB device contains a certain string. The assign key (SYMLINK) triggers
the addition of a symbolic link to this device under /dev/pilot. The operator used
in this key (+=) tells udev to additionally perform this action, even if previous or later
rules add other symbolic links. As this rule contains two match keys, it is only applied
if both conditions are met.
The printer rule deals with USB printers and contains two match keys which must
both apply to get the entire rule applied (SUBSYSTEM and KERNEL). Three assign
keys deal with the naming for this device type (NAME), the creation of symbolic device
links (SYMLINK) and the group membership for this device type (GROUP). Using the
* wild card in the KERNEL key makes it match several lp printer devices. Substitutions
are used in both, the NAME and the SYMLINK keys to extend these strings by the internal
device name. For example, the symlink to the rst lp USB printer would read /dev/
usblp0.
The kernel firmware loader rule makes udev load additional rmware by
an external helper script during runtime. The SUBSYSTEM match key searches for the
firmware subsystem. The ACTION key checks whether any device belonging to the
firmware subsystem has been added. The RUN+= key triggers the execution of the
firmware.sh script to locate the rmware that is to be loaded.
Some general characteristics are common to all rules:
Each rule consists of one or more key value pairs separated by a comma.
140 Reference
A key's operation is determined by the operator. udev rules support several different
operators.
Each given value must be enclosed by quotation marks.
Each line of the rules le represents one rule. If a rule is longer than just one line,
use \ to join the different lines just as you would do in shell syntax.
udev rules support a shell-style pattern that matches the *, ?, and [] patterns.
udev rules support substitutions.
8.6.1
Using Operators in udev Rules
Creating keys you can choose from several different operators, depending on the type
of key you want to create. Match keys will normally just be used to nd a value that
either matches or explicitly mismatches the search value. Match keys contain either of
the following operators:
==
Compare for equality. If the key contains a search pattern, all results matching this
pattern are valid.
!=
Compare for non-equality. If the key contains a search pattern, all results matching
this pattern are valid.
Any of the following operators can be used with assign keys:
=
Assign a value to a key. If the key previously consisted of a list of values, the key
resets and only the single value is assigned.
+=
Add a value to a key that contains a list of entries.
:=
Assign a nal value. Disallow any later change by later rules.
Dynamic Kernel Device Management with udev 141
8.6.2
Using Substitutions in udev Rules
udev rules support the use of placeholders and substitutions. Use them in a similar
fashion as you would do in any other scripts. The following substitutions can be used
with udev rules:
%r, $root
The device directory, /dev by default.
%p, $devpath
The value of DEVPATH.
%k, $kernel
The value of KERNEL or the internal device name.
%n, $number
The device number.
%N, $tempnode
The temporary name of the device le.
%M, $major
The major number of the device.
%m, $minor
The minor number of the device.
%s{attribute}, $attr{attribute}
The value of a sysfs attribute (specied by attribute).
%E{variable}, $attr{variable}
The value of an environment variable (specied by variable).
%c, $result
The output of PROGRAM.
%%
The % character.
142 Reference
$$
The $ character.
8.6.3
Using udev Match Keys
Match keys describe conditions that must be met before a udev rule can be applied.
The following match keys are available:
ACTION
The name of the event action, for example, add or remove when adding or remov-
ing a device.
DEVPATH
The device path of the event device, for example,
DEVPATH=/bus/pci/drivers/ipw3945 to search for all events related to
the ipw3945 driver.
KERNEL
The internal (kernel) name of the event device.
SUBSYSTEM
The subsystem of the event device, for example, SUBSYSTEM=usb for all events
related to USB devices.
ATTR{filename}
sysfs attributes of the event device. To match a string contained in the vendor
attribute le name, you could use ATTR{vendor}=="On[sS]tream", for
example.
KERNELS
Let udev search the device path upwards for a matching device name.
SUBSYSTEMS
Let udev search the device path upwards for a matching device subsystem name.
DRIVERS
Let udev search the device path upwards for a matching device driver name.
Dynamic Kernel Device Management with udev 143
ATTRS{filename}
Let udev search the device path upwards for a device with matching sysfs at-
tribute values.
ENV{key}
The value of an environment variable, for example, ENV{ID_BUS}="ieee1394
to search for all events related to the FireWire bus ID.
PROGRAM
Let udev execute an external program. To be successful, the program must return
with exit code zero. The program's output, printed to stdout, is available to the
RESULT key.
RESULT
Match the output string of the last PROGRAM call. Either include this key in the
same rule as the PROGRAM key or in a later one.
8.6.4
Using udev Assign Keys
In contrast to the match keys described above, assign keys do not describe conditions
that must be met. They assign values, names and actions to the device nodes maintained
by udev.
NAME
The name of the device node to be created. Once a rule has set a node name, all
other rules with a NAME key for this node are ignored.
SYMLINK
The name of a symlink related to the node to be created. Multiple matching rules
can add symlinks to be created with the device node. You can also specify multiple
symlinks for one node in one rule using the space character to separate the symlink
names.
OWNER, GROUP, MODE
The permissions for the new device node. Values specied here overwrite anything
that has been compiled in.
144 Reference
ATTR{key}
Specify a value to be written to a sysfs attribute of the event device. If the ==
operator is used, this key is also used to match against the value of a sysfs at-
tribute.
ENV{key}
Tell udev to export a variable to the environment. If the == operator is used, this
key is also used to match against an environment variable.
RUN
Tell udev to add a program to the list of programs to be executed for this device.
Keep in mind to restrict this to very short tasks to avoid blocking further events
for this device.
LABEL
Add a label where a GOTO can jump to.
GOTO
Tell udev to skip a number of rules and continue with the one that carries the label
referenced by the GOTO key.
IMPORT{type}
Load variables into the event environment such as the output of an external program.
udev imports variables of several different types. If no type is specied, udev
tries to determine the type itself based on the executable bit of the le permissions.
program tells udev to execute an external program and import its output.
file tells udev to import a text le.
parent tells udev to import the stored keys from the parent device.
WAIT_FOR_SYSFS
Tells udev to wait for the specied sysfs le to be created for a certain device.
For example, WAIT_FOR_SYSFS="ioerr_cnt" informs udev to wait until
the ioerr_cnt le has been created.
OPTIONS
The OPTION key may have several possible values:
Dynamic Kernel Device Management with udev 145
last_rule tells udev to ignore all later rules.
ignore_device tells udev to ignore this event completely.
ignore_remove tells udev to ignore all later remove events for the device.
all_partitions tells udev to create device nodes for all available partitions
on a block device.
8.7 Persistent Device Naming
The dynamic device directory and the udev rules infrastructure make it possible to
provide stable names for all disk devices—regardless of their order of recognition or
the connection used for the device. Every appropriate block device the kernel creates
is examined by tools with special knowledge about certain buses, drive types or le
systems. Along with the dynamic kernel-provided device node name, udev maintains
classes of persistent symbolic links pointing to the device:
/dev/disk
|-- by-id
| |-- scsi-SATA_HTS726060M9AT00_MRH453M4HWHG7B -> ../../sda
| |-- scsi-SATA_HTS726060M9AT00_MRH453M4HWHG7B-part1 -> ../../sda1
| |-- scsi-SATA_HTS726060M9AT00_MRH453M4HWHG7B-part6 -> ../../sda6
| |-- scsi-SATA_HTS726060M9AT00_MRH453M4HWHG7B-part7 -> ../../sda7
| |-- usb-Generic_STORAGE_DEVICE_02773 -> ../../sdd
| `-- usb-Generic_STORAGE_DEVICE_02773-part1 -> ../../sdd1
|-- by-label
| |-- Photos -> ../../sdd1
| |-- SUSE10 -> ../../sda7
| `-- devel -> ../../sda6
|-- by-path
| |-- pci-0000:00:1f.2-scsi-0:0:0:0 -> ../../sda
| |-- pci-0000:00:1f.2-scsi-0:0:0:0-part1 -> ../../sda1
| |-- pci-0000:00:1f.2-scsi-0:0:0:0-part6 -> ../../sda6
| |-- pci-0000:00:1f.2-scsi-0:0:0:0-part7 -> ../../sda7
| |-- pci-0000:00:1f.2-scsi-1:0:0:0 -> ../../sr0
| |-- usb-02773:0:0:2 -> ../../sdd
| |-- usb-02773:0:0:2-part1 -> ../../sdd1
`-- by-uuid
|-- 159a47a4-e6e6-40be-a757-a629991479ae -> ../../sda7
|-- 3e999973-00c9-4917-9442-b7633bd95b9e -> ../../sda6
`-- 4210-8F8C -> ../../sdd1
146 Reference
8.8
Files used by udev
/sys/*
Virtual le system provided by the Linux kernel, exporting all currently known
devices. This information is used by udev to create device nodes in /dev
/dev/*
Dynamically created device nodes and static content copied at boot time from
/lib/udev/devices/*
The following les and directories contain the crucial elements of the udev infrastruc-
ture:
/etc/udev/udev.conf
Main udev conguration le.
/etc/udev/rules.d/*
udev event matching rules.
/lib/udev/devices/*
Static /dev content.
/lib/udev/*
Helper programs called from udev rules.
8.9 For More Information
For more information about the udev infrastructure, refer to the following man pages:
udev
General information about udev, keys, rules and other important conguration
issues.
udevadm
udevadm can be used to control the runtime behavior of udev, request kernel
events, manage the event queue and provide simple debugging mechanisms.
Dynamic Kernel Device Management with udev 147
udevd
Information about the udev event managing daemon.
148 Reference
Part III. Services
9
Basic Networking
Linux offers the necessary networking tools and features for integration into all types
of network structures. Network access using a network card, modem or other device
can be congured with YaST. Manual conguration is also possible. In this chapter
only the fundamental mechanisms and the relevant network conguration les are
covered.
Linux and other Unix operating systems use the TCP/IP protocol. It is not a single
network protocol, but a family of network protocols that offer various services. The
protocols listed in Table 9.1, “Several Protocols in the TCP/IP Protocol Family”
(page 152), are provided for the purpose of exchanging data between two machines via
TCP/IP. Networks combined by TCP/IP, comprising a worldwide network, are also
referred to as “the Internet.”
RFC stands for Request for Comments. RFCs are documents that describe various In-
ternet protocols and implementation procedures for the operating system and its appli-
cations. The RFC documents describe the setup of Internet protocols. To expand your
knowledge of any of the protocols, refer to the appropriate RFC documents. These are
available at http://www.ietf.org/rfc.html.
Basic Networking 151
Table 9.1
Several Protocols in the TCP/IP Protocol Family
DescriptionProtocol
Transmission Control Protocol: a connection-oriented secure protocol.
The data to transmit is rst sent by the application as a stream of data
TCP
and converted into the appropriate format by the operating system. The
data arrives at the respective application on the destination host in the
original data stream format it was initially sent. TCP determines whether
any data has been lost or jumbled during the transmission. TCP is im-
plemented wherever the data sequence matters.
User Datagram Protocol: a connectionless, insecure protocol. The data
to transmit is sent in the form of packets generated by the application.
UDP
The order in which the data arrives at the recipient is not guaranteed
and data loss is possible. UDP is suitable for record-oriented applica-
tions. It features a smaller latency period than TCP.
Internet Control Message Protocol: Essentially, this is not a protocol
for the end user, but a special control protocol that issues error reports
ICMP
and can control the behavior of machines participating in TCP/IP data
transfer. In addition, it provides a special echo mode that can be viewed
using the program ping.
Internet Group Management Protocol: This protocol controls machine
behavior when implementing IP multicast.
IGMP
As shown in Figure 9.1, “Simplied Layer Model for TCP/IP” (page 153), data exchange
takes place in different layers. The actual network layer is the insecure data transfer via
IP (Internet protocol). On top of IP, TCP (transmission control protocol) guarantees,
to a certain extent, security of the data transfer. The IP layer is supported by the under-
lying hardware-dependent protocol, such as ethernet.
152 Reference
Figure 9.1
Simplied Layer Model for TCP/IP
The diagram provides one or two examples for each layer. The layers are ordered ac-
cording to abstraction levels. The lowest layer is very close to the hardware. The upper-
most layer, however, is almost a complete abstraction from the hardware. Every layer
has its own special function. The special functions of each layer are mostly implicit in
their description. The data link and physical layers represent the physical network used,
such as ethernet.
Almost all hardware protocols work on a packet-oriented basis. The data to transmit is
collected into packets (it cannot be sent all at once). The maximum size of a TCP/IP
packet is approximately 64 KB. Packets are normally quite smaller, as the network
hardware can be a limiting factor. The maximum size of a data packet on an ethernet
is about fteen hundred bytes. The size of a TCP/IP packet is limited to this amount
when the data is sent over an ethernet. If more data is transferred, more data packets
need to be sent by the operating system.
For the layers to serve their designated functions, additional information regarding each
layer must be saved in the data packet. This takes place in the header of the packet.
Every layer attaches a small block of data, called the protocol header, to the front of
each emerging packet. A sample TCP/IP data packet traveling over an ethernet cable
is illustrated in Figure 9.2, “TCP/IP Ethernet Packet” (page 154). The proof sum is lo-
Basic Networking 153
cated at the end of the packet, not at the beginning. This simplies things for the network
hardware.
Figure 9.2
TCP/IP Ethernet Packet
When an application sends data over the network, the data passes through each layer,
all implemented in the Linux kernel except the physical layer. Each layer is responsible
for preparing the data so it can be passed to the next layer. The lowest layer is ultimately
responsible for sending the data. The entire procedure is reversed when data is received.
Like the layers of an onion, in each layer the protocol headers are removed from the
transported data. Finally, the transport layer is responsible for making the data available
for use by the applications at the destination. In this manner, one layer only communi-
cates with the layer directly above or below it. For applications, it is irrelevant whether
data is transmitted via a 100 Mbit/s FDDI network or via a 56-Kbit/s modem line.
Likewise, it is irrelevant for the data line which kind of data is transmitted, as long as
packets are in the correct format.
9.1 IP Addresses and Routing
The discussion in this section is limited to IPv4 networks. For information about IPv6
protocol, the successor to IPv4, refer to Section 9.2, “IPv6—The Next Generation In-
ternet” (page 157).
154 Reference
9.1.1 IP Addresses
Every computer on the Internet has a unique 32-bit address. These 32 bits (or 4 bytes)
are normally written as illustrated in the second row in Example 9.1, “Writing IP Ad-
dresses” (page 155).
Example 9.1
Writing IP Addresses
IP Address (binary): 11000000 10101000 00000000 00010100
IP Address (decimal): 192. 168. 0. 20
In decimal form, the four bytes are written in the decimal number system, separated by
periods. The IP address is assigned to a host or a network interface. It can be used only
once throughout the world. There are exceptions to this rule, but these are not relevant
to the following passages.
The points in IP addresses indicate the hierarchical system. Until the 1990s, IP addresses
were strictly categorized in classes. However, this system proved too inexible and
was discontinued. Now, classless routing (CIDR, classless interdomain routing) is used.
9.1.2 Netmasks and Routing
Netmasks are used to dene the address range of a subnetwork. If two hosts are in the
same subnetwork, they can reach each other directly. If they are not in the same subnet-
work, they need the address of a gateway that handles all the trafc for the subnetwork.
To check if two IP addresses are in the same subnet, simply “AND” both addresses
with the netmask. If the result is identical, both IP addresses are in the same local net-
work. If there are differences, the remote IP address, and thus the remote interface, can
only be reached over a gateway.
To understand how the netmask works, look at Example 9.2, “Linking IP Addresses to
the Netmask” (page 156). The netmask consists of 32 bits that identify how much of an
IP address belongs to the network. All those bits that are 1 mark the corresponding bit
in the IP address as belonging to the network. All bits that are 0 mark bits inside the
subnetwork. This means that the more bits are 1, the smaller the subnetwork is. Because
the netmask always consists of several successive 1 bits, it is also possible to just count
the number of bits in the netmask. In Example 9.2, “Linking IP Addresses to the Net-
mask” (page 156) the rst net with 24 bits could also be written as 192.168.0.0/24.
Basic Networking 155
Example 9.2
Linking IP Addresses to the Netmask
IP address (192.168.0.20): 11000000 10101000 00000000 00010100
Netmask (255.255.255.0): 11111111 11111111 11111111 00000000
---------------------------------------------------------------
Result of the link: 11000000 10101000 00000000 00000000
In the decimal system: 192. 168. 0. 0
IP address (213.95.15.200): 11010101 10111111 00001111 11001000
Netmask (255.255.255.0): 11111111 11111111 11111111 00000000
---------------------------------------------------------------
Result of the link: 11010101 10111111 00001111 00000000
In the decimal system: 213. 95. 15. 0
To give another example: all machines connected with the same ethernet cable are
usually located in the same subnetwork and are directly accessible. Even when the
subnet is physically divided by switches or bridges, these hosts can still be reached di-
rectly.
IP addresses outside the local subnet can only be reached if a gateway is congured
for the target network. In the most common case, there is only one gateway that handles
all trafc that is external. However, it is also possible to congure several gateways
for different subnets.
If a gateway has been congured, all external IP packets are sent to the appropriate
gateway. This gateway then attempts to forward the packets in the same manner—from
host to host—until it reaches the destination host or the packet's TTL (time to live) ex-
pires.
Table 9.2
Specic Addresses
DescriptionAddress Type
This is the netmask AND any address in the network, as shown
in Example 9.2, “Linking IP Addresses to the Netmask”
Base Network Ad-
dress
(page 156) under Result. This address cannot be assigned to
any hosts.
This basically says, “Access all hosts in this subnetwork.” To
generate this, the netmask is inverted in binary form and linked
Broadcast Address
to the base network address with a logical OR. The above exam-
156 Reference
DescriptionAddress Type
ple therefore results in 192.168.0.255. This address cannot be
assigned to any hosts.
The address 127.0.0.1 is assigned to the “loopback device”
on each host. A connection can be set up to your own machine
Local Host
with this address and with all addresses from the complete
127.0.0.0/8 loopback network as dened with IPv4. With
IPv6 there is just one loopback address (::1).
Because IP addresses must be unique all over the world, you cannot just select random
addresses. There are three address domains to use if you want to set up a private IP-
based network. These cannot get any connection from the rest of the Internet, because
they cannot be transmitted over the Internet. These address domains are specied in
RFC 1597 and listed in Table 9.3, “Private IP Address Domains” (page 157).
Table 9.3
Private IP Address Domains
DomainNetwork/Netmask
10.x.x.x10.0.0.0/255.0.0.0
172.16.x.x 172.31.x.x172.16.0.0/255.240.0.0
192.168.x.x192.168.0.0/255.255.0.0
9.2 IPv6—The Next Generation
Internet
Due to the emergence of the WWW (World Wide Web), the Internet has experienced
explosive growth, with an increasing number of computers communicating via TCP/IP
in the past fteen years. Since Tim Berners-Lee at CERN (http://public.web
.cern.ch) invented the WWW in 1990, the number of Internet hosts has grown from
a few thousand to about a hundred million.
Basic Networking 157
As mentioned, an IPv4 address consists of only 32 bits. Also, quite a few IP addresses
are lost—they cannot be used due to the way in which networks are organized. The
number of addresses available in your subnet is two to the power of the number of bits,
minus two. A subnetwork has, for example, 2, 6, or 14 addresses available. To connect
128 hosts to the Internet, for example, you need a subnetwork with 256 IP addresses,
from which only 254 are usable, because two IP addresses are needed for the structure
of the subnetwork itself: the broadcast and the base network address.
Under the current IPv4 protocol, DHCP or NAT (network address translation) are the
typical mechanisms used to circumvent the potential address shortage. Combined with
the convention to keep private and public address spaces separate, these methods can
certainly mitigate the shortage. The problem with them lies in their conguration, which
is a chore to set up and a burden to maintain. To set up a host in an IPv4 network, you
need a number of address items, such as the host's own IP address, the subnetmask, the
gateway address and maybe a name server address. All these items need to be known
and cannot be derived from somewhere else.
With IPv6, both the address shortage and the complicated conguration should be a
thing of the past. The following sections tell more about the improvements and benets
brought by IPv6 and about the transition from the old protocol to the new one.
9.2.1 Advantages
The most important and most visible improvement brought by the new protocol is the
enormous expansion of the available address space. An IPv6 address is made up of 128
bit values instead of the traditional 32 bits. This provides for as many as several
quadrillion IP addresses.
However, IPv6 addresses are not only different from their predecessors with regard to
their length. They also have a different internal structure that may contain more specic
information about the systems and the networks to which they belong. More details
about this are found in Section 9.2.2, “Address Types and Structure” (page 160).
The following is a list of some other advantages of the new protocol:
Autoconguration
IPv6 makes the network “plug and play” capable, which means that a newly set up
system integrates into the (local) network without any manual conguration. The
new host uses its automatic conguration mechanism to derive its own address
158 Reference
from the information made available by the neighboring routers, relying on a pro-
tocol called the neighbor discovery (ND) protocol. This method does not require
any intervention on the administrator's part and there is no need to maintain a central
server for address allocation—an additional advantage over IPv4, where automatic
address allocation requires a DHCP server or the usage of ARP and 169.254.0.0/16
addresses.
Nevertheless if a router is connected to a switch, the router should send periodic
advertisements with ags telling the hosts of a network how they should interact
with each other. For more information, see RFC 2462 and the radvd.conf(5)
manpage, and RFC 3315.
Mobility
IPv6 makes it possible to assign several addresses to one network interface at the
same time. This allows users to access several networks easily, something that
could be compared with the international roaming services offered by mobile phone
companies: when you take your mobile phone abroad, the phone automatically
logs in to a foreign service as soon as it enters the corresponding area, so you can
be reached under the same number everywhere and are able to place an outgoing
call just like in your home area.
Secure Communication
With IPv4, network security is an add-on function. IPv6 includes IPsec as one of
its core features, allowing systems to communicate over a secure tunnel to avoid
eavesdropping by outsiders on the Internet.
Backward Compatibility
Realistically, it would be impossible to switch the entire Internet from IPv4 to IPv6
at one time. Therefore, it is crucial that both protocols are able to coexist not only
on the Internet, but also on one system. This is ensured by compatible addresses
(IPv4 addresses can easily be translated into IPv6 addresses) and through the use
of a number of tunnels. See Section 9.2.3, “Coexistence of IPv4 and IPv6”
(page 164). Also, systems can rely on a dual stack IP technique to support both
protocols at the same time, meaning that they have two network stacks that are
completely separate, such that there is no interference between the two protocol
versions.
Custom Tailored Services through Multicasting
With IPv4, some services, such as SMB, need to broadcast their packets to all hosts
in the local network. IPv6 allows a much more ne-grained approach by enabling
Basic Networking 159
servers to address hosts through multicasting—by addressing a number of hosts as
parts of a group (which is different from addressing all hosts through broadcasting
or each host individually through unicasting). Which hosts are addressed as a group
may depend on the concrete application. There are some predened groups to ad-
dress all name servers (the all name servers multicast group), for example, or all
routers (the all routers multicast group).
9.2.2 Address Types and Structure
As mentioned, the current IP protocol is lacking in two important aspects: there is an
increasing shortage of IP addresses and conguring the network and maintaining the
routing tables is becoming a more complex and burdensome task. IPv6 solves the rst
problem by expanding the address space to 128 bits. The second one is countered by
introducing a hierarchical address structure, combined with sophisticated techniques
to allocate network addresses, as well as multihoming (the ability to assign several ad-
dresses to one device, giving access to several networks).
When dealing with IPv6, it is useful to know about three different types of addresses:
Unicast
Addresses of this type are associated with exactly one network interface. Packets
with such an address are delivered to only one destination. Accordingly, unicast
addresses are used to transfer packets to individual hosts on the local network or
the Internet.
Multicast
Addresses of this type relate to a group of network interfaces. Packets with such
an address are delivered to all destinations that belong to the group. Multicast ad-
dresses are mainly used by certain network services to communicate with certain
groups of hosts in a well-directed manner.
Anycast
Addresses of this type are related to a group of interfaces. Packets with such an
address are delivered to the member of the group that is closest to the sender, ac-
cording to the principles of the underlying routing protocol. Anycast addresses are
used to make it easier for hosts to nd out about servers offering certain services
in the given network area. All servers of the same type have the same anycast ad-
dress. Whenever a host requests a service, it receives a reply from the server with
the closest location, as determined by the routing protocol. If this server should fail
160 Reference
for some reason, the protocol automatically selects the second closest server, then
the third one, and so forth.
An IPv6 address is made up of eight four-digit elds, each representing 16 bits, written
in hexadecimal notation. They are separated by colons (:). Any leading zero bytes
within a given eld may be dropped, but zeros within the eld or at its end may not.
Another convention is that more than four consecutive zero bytes may be collapsed
into a double colon. However, only one such :: is allowed per address. This kind of
shorthand notation is shown in Example 9.3, “Sample IPv6 Address” (page 161), where
all three lines represent the same address.
Example 9.3
Sample IPv6 Address
fe80 : 0000 : 0000 : 0000 : 0000 : 10 : 1000 : 1a4
fe80 : 0 : 0 : 0 : 0 : 10 : 1000 : 1a4
fe80 : : 10 : 1000 : 1a4
Each part of an IPv6 address has a dened function. The rst bytes form the prex and
specify the type of address. The center part is the network portion of the address, but
it may be unused. The end of the address forms the host part. With IPv6, the netmask
is dened by indicating the length of the prex after a slash at the end of the address.
An address, as shown in Example 9.4, “IPv6 Address Specifying the Prex Length”
(page 161), contains the information that the rst 64 bits form the network part of the
address and the last 64 form its host part. In other words, the 64 means that the netmask
is lled with 64 1-bit values from the left. Just like with IPv4, the IP address is combined
with AND with the values from the netmask to determine whether the host is located
in the same subnetwork or in another one.
Example 9.4
IPv6 Address Specifying the Prex Length
fe80::10:1000:1a4/64
IPv6 knows about several predened types of prexes. Some of these are shown in
Table 9.4, “Various IPv6 Prexes” (page 161).
Table 9.4
Various IPv6 Prexes
DenitionPrex (hex)
IPv4 addresses and IPv4 over IPv6 compatibility addresses. These
are used to maintain compatibility with IPv4. Their use still re-
00
quires a router able to translate IPv6 packets into IPv4 packets.
Basic Networking 161
DenitionPrex (hex)
Several special addresses, such as the one for the loopback device,
have this prex as well.
Aggregatable global unicast addresses. As is the case with IPv4,
an interface can be assigned to form part of a certain subnetwork.
2 or 3 as the rst
digit
Currently, there are the following address spaces: 2001::/16
(production quality address space) and 2002::/16 (6to4 address
space).
Link-local addresses. Addresses with this prex should not be
routed and should therefore only be reachable from within the
same subnetwork.
fe80::/10
Site-local addresses. These may be routed, but only within the
network of the organization to which they belong. In effect, they
fec0::/10
are the IPv6 equivalent of the current private network address
space, such as 10.x.x.x.
These are multicast addresses.
ff
A unicast address consists of three basic components:
Public Topology
The rst part (which also contains one of the prexes mentioned above) is used to
route packets through the public Internet. It includes information about the company
or institution that provides the Internet access.
Site Topology
The second part contains routing information about the subnetwork to which to
deliver the packet.
Interface ID
The third part identies the interface to which to deliver the packet. This also allows
for the MAC to form part of the address. Given that the MAC is a globally unique,
xed identier coded into the device by the hardware maker, the conguration
procedure is substantially simplied. In fact, the rst 64 address bits are consoli-
dated to form the EUI-64 token, with the last 48 bits taken from the MAC, and
162 Reference
the remaining 24 bits containing special information about the token type. This also
makes it possible to assign an EUI-64 token to interfaces that do not have a MAC,
such as those based on PPP or ISDN.
On top of this basic structure, IPv6 distinguishes between ve different types of unicast
addresses:
:: (unspecied)
This address is used by the host as its source address when the interface is initialized
for the rst time—when the address cannot yet be determined by other means.
::1 (loopback)
The address of the loopback device.
IPv4 Compatible Addresses
The IPv6 address is formed by the IPv4 address and a prex consisting of 96 zero
bits. This type of compatibility address is used for tunneling (see Section 9.2.3,
“Coexistence of IPv4 and IPv6” (page 164)) to allow IPv4 and IPv6 hosts to com-
municate with others operating in a pure IPv4 environment.
IPv4 Addresses Mapped to IPv6
This type of address species a pure IPv4 address in IPv6 notation.
Local Addresses
There are two address types for local use:
link-local
This type of address can only be used in the local subnetwork. Packets with a
source or target address of this type should not be routed to the Internet or
other subnetworks. These addresses contain a special prex (fe80::/10)
and the interface ID of the network card, with the middle part consisting of
zero bytes. Addresses of this type are used during automatic conguration to
communicate with other hosts belonging to the same subnetwork.
site-local
Packets with this type of address may be routed to other subnetworks, but not
to the wider Internet—they must remain inside the organization's own network.
Such addresses are used for intranets and are an equivalent of the private address
space dened by IPv4. They contain a special prex (fec0::/10), the inter-
Basic Networking 163
face ID, and a 16 bit eld specifying the subnetwork ID. Again, the rest is
lled with zero bytes.
As a completely new feature introduced with IPv6, each network interface normally
gets several IP addresses, with the advantage that several networks can be accessed
through the same interface. One of these networks can be congured completely auto-
matically using the MAC and a known prex with the result that all hosts on the local
network can be reached as soon as IPv6 is enabled (using the link-local address). With
the MAC forming part of it, any IP address used in the world is unique. The only variable
parts of the address are those specifying the site topology and the public topology, de-
pending on the actual network in which the host is currently operating.
For a host to go back and forth between different networks, it needs at least two address-
es. One of them, the home address, not only contains the interface ID but also an iden-
tier of the home network to which it normally belongs (and the corresponding prex).
The home address is a static address and, as such, it does not normally change. Still,
all packets destined to the mobile host can be delivered to it, regardless of whether it
operates in the home network or somewhere outside. This is made possible by the
completely new features introduced with IPv6, such as stateless autoconguration and
neighbor discovery. In addition to its home address, a mobile host gets one or more
additional addresses that belong to the foreign networks where it is roaming. These are
called care-of addresses. The home network has a facility that forwards any packets
destined to the host when it is roaming outside. In an IPv6 environment, this task is
performed by the home agent, which takes all packets destined to the home address and
relays them through a tunnel. On the other hand, those packets destined to the care-of
address are directly transferred to the mobile host without any special detours.
9.2.3 Coexistence of IPv4 and IPv6
The migration of all hosts connected to the Internet from IPv4 to IPv6 is a gradual
process. Both protocols will coexist for some time to come. The coexistence on one
system is guaranteed where there is a dual stack implementation of both protocols. That
still leaves the question of how an IPv6 enabled host should communicate with an IPv4
host and how IPv6 packets should be transported by the current networks, which are
predominantly IPv4 based. The best solutions offer tunneling and compatibility addresses
(see Section 9.2.2, “Address Types and Structure” (page 160)).
IPv6 hosts that are more or less isolated in the (worldwide) IPv4 network can commu-
nicate through tunnels: IPv6 packets are encapsulated as IPv4 packets to move them
164 Reference
across an IPv4 network. Such a connection between two IPv4 hosts is called a tunnel.
To achieve this, packets must include the IPv6 destination address (or the corresponding
prex) as well as the IPv4 address of the remote host at the receiving end of the tunnel.
A basic tunnel can be congured manually according to an agreement between the
hosts' administrators. This is also called static tunneling.
However, the conguration and maintenance of static tunnels is often too labor-intensive
to use them for daily communication needs. Therefore, IPv6 provides for three different
methods of dynamic tunneling:
6over4
IPv6 packets are automatically encapsulated as IPv4 packets and sent over an IPv4
network capable of multicasting. IPv6 is tricked into seeing the whole network
(Internet) as a huge local area network (LAN). This makes it possible to determine
the receiving end of the IPv4 tunnel automatically. However, this method does not
scale very well and is also hampered by the fact that IP multicasting is far from
widespread on the Internet. Therefore, it only provides a solution for smaller cor-
porate or institutional networks where multicasting can be enabled. The specica-
tions for this method are laid down in RFC 2529.
6to4
With this method, IPv4 addresses are automatically generated from IPv6 addresses,
enabling isolated IPv6 hosts to communicate over an IPv4 network. However, a
number of problems have been reported regarding the communication between
those isolated IPv6 hosts and the Internet. The method is described in RFC 3056.
IPv6 Tunnel Broker
This method relies on special servers that provide dedicated tunnels for IPv6 hosts.
It is described in RFC 3053.
9.2.4 Conguring IPv6
To congure IPv6, you normally do not need to make any changes on the individual
workstations. IPv6 is enabled by default. You can disable it during installation in the
network conguration step described in Section 1.14.2.2, “Network Conguration”
(page 31). To disable or enable IPv6 on an installed system, use the YaST Network
Settings module. On the Global Options tab, check or uncheck the Enable IPv6 option
as necessary. To enable or disable IPv6 manually, edit /etc/modprobe.d/50-ipv6
.conf and restart the system. If you want to enable it temporarily until the next reboot,
Basic Networking 165
enter modprobe -i ipv6 as root. It is basically impossible to unload the ipv6
module once loaded.
Because of the autoconguration concept of IPv6, the network card is assigned an ad-
dress in the link-local network. Normally, no routing table management takes place on
a workstation. The network routers can be queried by the workstation, using the router
advertisement protocol, for what prex and gateways should be implemented. The
radvd program can be used to set up an IPv6 router. This program informs the worksta-
tions which prex to use for the IPv6 addresses and which routers. Alternatively, use
zebra/quagga for automatic conguration of both addresses and routing.
Consult the ifcfg-tunnel (5) man page to get information about how to set up various
types of tunnels using the /etc/sysconfig/network les.
9.2.5 For More Information
The above overview does not cover the topic of IPv6 comprehensively. For a more in-
depth look at the new protocol, refer to the following online documentation and books:
http://www.ipv6.org/
The starting point for everything about IPv6.
http://www.ipv6day.org
All information needed to start your own IPv6 network.
http://www.ipv6-to-standard.org/
The list of IPv6-enabled products.
http://www.bieringer.de/linux/IPv6/
Here, nd the Linux IPv6-HOWTO and many links related to the topic.
RFC 2640
The fundamental RFC about IPv6.
IPv6 Essentials
A book describing all the important aspects of the topic is IPv6 Essentials by Silvia
Hagen (ISBN 0-596-00125-8).
166 Reference
9.3 Name Resolution
DNS assists in assigning an IP address to one or more names and assigning a name to
an IP address. In Linux, this conversion is usually carried out by a special type of soft-
ware known as bind. The machine that takes care of this conversion is called a name
server. The names make up a hierarchical system in which each name component is
separated by a period. The name hierarchy is, however, independent of the IP address
hierarchy described above.
Consider a complete name, such as jupiter.example.com, written in the format
hostname.domain. A full name, referred to as a fully qualied domain name
(FQDN), consists of a hostname and a domain name (example.com). The latter also
includes the top level domain or TLD (com).
TLD assignment has become quite confusing for historical reasons. Traditionally, three-
letter domain names are used in the USA. In the rest of the world, the two-letter ISO
national codes are the standard. In addition to that, longer TLDs were introduced in
2000 that represent certain spheres of activity (for example, .info, .name, .museum).
In the early days of the Internet (before 1990), the le /etc/hosts was used to store
the names of all the machines represented over the Internet. This quickly proved to be
impractical in the face of the rapidly growing number of computers connected to the
Internet. For this reason, a decentralized database was developed to store the hostnames
in a widely distributed manner. This database, similar to the name server, does not have
the data pertaining to all hosts in the Internet readily available, but can dispatch requests
to other name servers.
The top of the hierarchy is occupied by root name servers. These root name servers
manage the top level domains and are run by the Network Information Center (NIC).
Each root name server knows about the name servers responsible for a given top level
domain. Information about top level domain NICs is available at http://www
.internic.net.
DNS can do more than just resolve hostnames. The name server also knows which host
is receiving e-mails for an entire domain—the mail exchanger (MX).
For your machine to resolve an IP address, it must know about at least one name server
and its IP address. Easily specify such a name server with the help of YaST. If you have
a modem dial-up connection, you may not need to congure a name server manually
Basic Networking 167
at all. The dial-up protocol provides the name server address as the connection is made.
The conguration of name server access with openSUSE® is described in Sec-
tion 9.4.1.4, “Conguring Hostname and DNS” (page 177). Setting up your own name
server is described in Chapter 11, The Domain Name System (page 215).
The protocol whois is closely related to DNS. With this program, quickly nd out
who is responsible for any given domain.
NOTE: MDNS and .local Domain Names
The .local top level domain is treated as link-local domain by the resolver.
DNS requests are send as multicast DNS requests instead of normal DNS re-
quests. If you already use the .local domain in your nameserver conguration,
you must switch this option off in /etc/host.conf. For more information,
see the host.conf manual page.
If you want to switch off MDNS during installation, use nomdns=1 as a boot
parameter.
For more information on multicast DNS, see http://www.multicastdns
.org.
9.4 Conguring a Network
Connection with YaST
There are many supported networking types on Linux. Most of them use different device
names and the conguration les are spread over several locations in the le system.
For a detailed overview of the aspects of manual network conguration, see Section 9.6,
“Conguring a Network Connection Manually” (page 192).
During installation on a laptop (where NetworkManager is active by default) YaST
congures all interfaces that have been detected. If NetworkManager is not active, only
the rst interface with link up (with a network cable connected) is automatically con-
gured. Additional hardware can be congured any time on the installed system. The
following sections describe the network conguration for all types of network connec-
tions supported by openSUSE.
168 Reference
9.4.1 Conguring the Network Card with
YaST
To congure your wired or wireless network card in YaST, select Network Devices >
Network Settings. After starting the module, YaST displays the Network Settings dialog
with four tabs: Global Options, Overview, Hostname/DNS and Routing.
The Global Options tab allows you to set general networking options such as the use
of NetworkManager, IPv6 and general DHCP options. For more information, see Sec-
tion 9.4.1.1, “Conguring Global Networking Options” (page 170).
The Overview tab contains information about installed network interfaces and congu-
rations. Any properly detected network card is listed with its name. You can manually
congure new cards, remove or change their conguration in this dialog. If you want
to manually congure a card that was not automatically detected, see Section 9.4.1.3,
“Conguring an Undetected Network Card” (page 176). If you want to change the
conguration of an already congured card, see Section 9.4.1.2, “Changing the Con-
guration of a Network Card” (page 171).
The Hostname/DNS tab allows to set the hostname of the machine and name the servers
to be used. For more information, see Section 9.4.1.4, “Conguring Hostname and
DNS” (page 177).
The Routing tab is used for the conguration of routing. See Section 9.4.1.5, “Cong-
uring Routing” (page 179) for more information.
Basic Networking 169
Figure 9.3
Conguring Network Settings
9.4.1.1 Conguring Global Networking Options
The Global Options tab of the YaST Network Settings module allows you to set impor-
tant global networking options, such as the use of NetworkManager, IPv6 and DHCP
client options. These settings are applicable for all network interfaces.
In the Network Setup Method choose the way network connections are managed. If you
want a NetworkManager desktop applet to manage connections for all interfaces, choose
User Controlled with NetworkManager. This option is well suited for switching between
multiple wired and wireless networks. If you do not run a desktop environment (GNOME
or KDE), or if your computer is a Xen server, virtual system, or provides network ser-
vices such as DHCP or DNS in your network, use the Traditional Method with ifup. If
NetworkManager is used, nm-applet should be used to congure network options
and the Overview, Hostname/DNS and Routing tabs of the Network Settings module
are disabled. For more information on NetworkManager, see Chapter 21, Using Net-
workManager (page 379).
170 Reference
In the IPv6 Protocol Settings choose whether you want to use the IPv6 protocol. It is
possible to use IPv6 together with IPv4. By default, IPv6 is activated. However, in
networks not using IPv6 protocol, response times can be faster with IPv6 protocol dis-
abled. If you want to disable IPv6, uncheck the Enable IPv6 option. This disables au-
toload of the kernel module for IPv6. This will be applied after reboot.
In the DHCP Client Options congure options for the DHCP client. The DHCP Client
Identier must be different for each DHCP client on a single network. If left empty, it
defaults to the hardware address of the network interface. However, if you are running
several virtual machines using the same network interface and, therefore, the same
hardware address, specify a unique free-form identier here.
The Hostname to Send species a string used for the hostname option eld when dhcpcd
sends messages to DHCP server. Some DHCP servers update name server zones (forward
and reverse records) according to this hostname (Dynamic DNS). Also, some DHCP
servers require the Hostname to Send option eld to contain a specic string in the
DHCP messages from clients. Leave AUTO to send the current hostname (that is the
one dened in /etc/HOSTNAME). Leave the option eld empty for not sending any
hostname. If yo do not want to change the default route according to the information
from DHCP, uncheck Change Default Route via DHCP.
9.4.1.2 Changing the Conguration of a Network
Card
To change the conguration of a network card, select a card from the list of the detected
cards in Network Settings > Overview in YaST and click Edit. The Network Card Setup
dialog appears in which to adjust the card conguration using the General, Address
and Hardware tabs. For information about wireless card conguration, see Section 20.5,
“Conguration with YaST” (page 365).
Conguring IP Addresses
You can set the IP address of the network card or the way its IP address is determined
in the Address tab of the Network Card Setup dialog. Both IPv4 and IPv6 addresses are
supported. The network card can have No IP Address (which is useful for bonding de-
vices), a Statically Assigned IP Address (IPv4 or IPv6) or a Dynamic Address assigned
via DHCP or Zeroconf or both.
Basic Networking 171
If using Dynamic Address, select whether to use DHCP Version 4 Only (for IPv4),
DHCP Version 6 Only (for IPv6) or DHCP Both Version 4 and 6.
If possible, the rst network card with link that is available during the installation is
automatically congured to use automatic address setup via DHCP. In case of laptop
computers where NetworkManager is active by default, all network cards are congured.
DHCP should also be used if you are using a DSL line but with no static IP assigned
by the ISP (Internet Service Provider). If you decide to use DHCP, congure the details
in DHCP Client Options in the Global Options tab of the Network Settings dialog of
the YaST network card conguration module. If you have a virtual host setup where
different hosts communicate through the same interface, an DHCP Client Identier is
necessary to distinguish them.
DHCP is a good choice for client conguration but it is not ideal for server conguration.
To set a static IP address, proceed as follows:
1
Select a card from the list of detected cards in the Overview tab of the YaST network
card conguration module and click Edit.
2
In the Address tab, choose Statically Assigned IP Address.
3
Enter the IP Address. Both IPv4 and IPv6 addresses can be used. Enter the network
mask in Subnet Mask. If the IPv6 address is used, use Subnet Mask for prex length
in format /64.
Optionally, you can enter a fully qualied Hostname for this address, which will be
written to the /etc/hosts conguration le.
4
Click Next.
5
To activate the conguration, click OK.
If you use the static address, the name servers and default gateway are not congured
automatically. To congure name servers, proceed as described in Section 9.4.1.4,
“Conguring Hostname and DNS” (page 177). To congure a gateway, proceed as de-
scribed in Section 9.4.1.5, “Conguring Routing” (page 179).
172 Reference
Conguring Aliases
One network device can have multiple IP addresses, called aliases.
NOTE: Aliases Are a Compatibility Feature
These so-called aliases resp. labels work with IPv4 only. With IPv6 they will be
ignored. Using iproute2 network interfaces can have one or more addresses.
Using YaST to set an alias for your network card, proceed as follows:
1
Select a card from the list of detected cards in the Overview tab of the YaST network
card conguration module and click Edit.
2
In the Address > Additional Addresses tab, click Add.
3
Enter Alias Name, IP Address, and Netmask. Do not include the interface name in
the alias name.
4
Click OK.
5
Click Next.
6
To activate the conguration, click OK.
Changing the Device Name and Udev Rules
It is possible to change the device name of the network card when it is used. It is also
possible to determine whether the network card should be identied by udev via its
hardware (MAC) address or via the bus ID. The later option is preferable in large servers
to ease hot swapping of cards. To set these options with YaST, proceed as follows:
1
Select a card from the list of detected cards in the Overview tab of the YaST Network
Settings module and click Edit.
2
Go to the Hardware tab. The current device name is shown in Udev Rules. Click
Change.
3
Select whether udev should identify the card by its MAC Address or Bus ID. The
current MAC address and bus ID of the card are shown in the dialog.
Basic Networking 173
4
To change the device name, check the Change Device Name option and edit the
name.
5
Click OK and Next.
6
To activate the conguration, click OK.
Changing Network Card Kernel Driver
For some network cards, several kernel drivers may be available. If the card is already
congured, YaST allows you to select a kernel driver to be used from a list of available
suitable drivers. It is also possible to specify options for the kernel driver. To set these
options with YaST, proceed as follows:
1
Select a card from the list of detected cards in the Overview tab of the YaST Network
Settings module and click Edit.
2
Go to the Hardware tab.
3
Select the kernel driver to be used in Module Name. Enter any options for the selected
driver in Options in the form option=value . If more options are used, they
should be space-separated.
4
Click OK and Next.
5
To activate the conguration, click OK.
Activating the Network Device
If you use the traditional method with ifup, you can congure your device to either start
during boot, on cable connection, on card detection, manually or never. To change device
start-up, proceed as follows:
1
In YaST select a card from the list of detected cards in Network Devices > Network
Settings and click Edit.
2
In the General tab, select the desired entry from Device Activation.
Choose At Boot Time to start the device during the system boot. With On Cable
Connection, the interface is watched for any existing physical connection. With On
174 Reference
Hotplug, the interface is set as soon as available. It is similar to the At Boot Time
option, and only differs in the fact that no error occurs if the interface is not present
at boot time. Choose Manually to control the interface manually with ifup. Choose
Never to not start the device at all. The On NFSroot is similar to At Boot Time, but
the interface does not shut down with the rcnetwork stop command. Use this
if you use an nfs or iscsi root le system.
3
Click Next.
4
To activate the conguration, click OK.
Usually, only the system administrator can activate and deactivate network interfaces.
If you want any user to be able to activate this interface via KInternet, select Enable
Device Control for Non-root User via KInternet.
Setting Up Maximum Transfer Unit Size
You can set a maximum transmission unit (MTU) for the interface. MTU refers to the
largest allowed packet size in bytes. A higher MTU brings higher bandwidth efciency.
However, large packets can block up a slow interface for some time, increasing the lag
for further packets.
1
In YaST select a card from the list of detected cards in Network Devices > Network
Settings and click Edit.
2
In the General tab, select the desired entry from the Set MTU list.
3
Click Next.
4
To activate the conguration, click OK.
Conguring the Firewall
Without having to enter the detailed rewall setup as described in Section “Conguring
the Firewall with YaST” (Chapter 13, Masquerading and Firewalls, ↑Security Guide),
you can determine the basic rewall setup for your device as part of the device setup.
Proceed as follows:
1
Open the YaST Network Devices > Network Settings module. In the Overview tab,
select a card from the list of detected cards and click Edit.
Basic Networking 175
2
Enter the General tab of the Network Settings dialog.
3
Determine the rewall zone to which your interface should be assigned. The following
options are available:
Firewall Disabled
This option is available only if the rewall is disabled and the rewall does not
run at all. Only use this option if your machine is part of a greater network that
is protected by an outer rewall.
Automatically Assign Zone
This option is available only if the rewall is enabled. The rewall is running
and the interface is automatically assigned to a rewall zone. The zone which
contains the keyword any or the external zone will be used for such an interface.
Internal Zone (Unprotected)
The rewall is running, but does not enforce any rules to protect this interface.
Use this option if your machine is part of a greater network that is protected by
an outer rewall. It is also useful for the interfaces connected to the internal
network, when the machine has more network interfaces.
Demilitarized Zone
A demilitarized zone is an additional line of defense in front of an internal net-
work and the (hostile) Internet. Hosts assigned to this zone can be reached from
the internal network and from the Internet, but cannot access the internal network.
External Zone
The rewall is running on this interface and fully protects it against other—pre-
sumably hostile—network trafc. This is the default option.
4
Click Next.
5
Activate the conguration by clicking OK.
9.4.1.3 Conguring an Undetected Network Card
Your card may not be detected correctly. In this case, the card is not included in the list
of detected cards. If you are sure that your system includes a driver for your card, you
can congure it manually. You can also congure special network device types, such
176 Reference
as bridge, bond, TUN or TAP. To congure an undetected network card (or a special
device) proceed as follows:
1
In the Network Devices > Network Settings > Overview dialog in YaST click Add.
2
In the Hardware dialog, set the Device Type of the interface from the available options
and Conguration Name. If the network card is a PCMCIA or USB device, activate
the respective check box and exit this dialog with Next. Otherwise, you can dene
the kernel Module Name to be used for the card and its Options, if necessary.
In Ethtool Options, you can set ethtool options used by ifup for the interface.
See the ethtool manual page for available options. If the option string starts with
a - (for example -K interface_name rx on), the second word in the string
is replaced with the current interface name. Otherwise (for example autoneg off
speed 10) ifup prepends -s interface_name.
3
Click Next.
4
Congure any needed options, such as the IP address, device activation or rewall
zone for the interface in the General, Address, and Hardware tabs. For more infor-
mation about the conguration options, see Section 9.4.1.2, “Changing the Congu-
ration of a Network Card” (page 171).
5
If you selected Wireless as the device type of the interface, congure the wireless
connection in the next dialog.
6
Click Next.
7
To activate the new network conguration, click OK.
9.4.1.4 Conguring Hostname and DNS
If you did not change the network conguration during installation and the wired card
was already available, a hostname was automatically generated for your computer and
DHCP was activated. The same applies to the name service information your host needs
to integrate into a network environment. If DHCP is used for network address setup,
the list of domain name servers is automatically lled with the appropriate data. If a
static setup is preferred, set these values manually.
Basic Networking 177
To change the name of your computer and adjust the name server search list, proceed
as follows:
1
Go to the Network Settings > Hostname/DNS tab in the Network Devices module in
YaST.
2
Enter the Hostname and, if needed, the Domain Name. The domain is especially
important if the machine is a mail server. Note that the hostname is global and applies
to all set network interfaces.
If you are using DHCP to get an IP address, the hostname of your computer will be
automatically set by the DHCP. You may want to disable this behavior if you connect
to different networks, because they may assign different hostnames and changing
the hostname at runtime may confuse the graphical desktop. To disable using DHCP
to get an IP address uncheck Change Hostname via DHCP.
Assign Hostname to Loopback IP associates your hostname with 127.0.0.2
(loopback) IP address in /etc/hosts. This is an useful option if you want to have
the hostname resolvable at all times, even without active network.
3
In Modify DNS Conguration, select the way the DNS conguration (name servers,
search list, the content of the /etc/resolv.conf le) is modied.
If the Use Default Policy option is selected, the conguration is handled by the
netconfig script which merges the data dened statically (with YaST or in the
conguration les) with data obtained dynamically (from the DHCP client or Net-
workManager). This default policy is sufcient in most cases.
If the Only Manually option is selected, netconfig is not allowed to modify the
/etc/resolv.conf le. However, this le can be edited manually.
If the Custom Policy option is selected, a Custom Policy Rule string dening the
merge policy should be specied. The string consists of a comma-separated list of
interface names to be considered a valid source of settings. Except for complete in-
terface names, basic wildcards to match multiple interfaces are allowed, as well. For
example, eth* ppp? will rst target all eth and then all ppp0-ppp9 interfaces.
There are two special policy values that indicate how to apply the static settings de-
ned in the /etc/sysconfig/network/config le:
178 Reference
STATIC
The static settings have to be merged together with the dynamic settings.
STATIC_FALLBACK
The static settings are used only when no dynamic conguration is available.
For more information, see the man 8 netconfig.
4
Enter the Name Servers and ll in the Domain Search list. Name servers must be
specied by IP addresses, such as 192.168.1.116, not by hostnames. Names specied
in the Domain Search tab are domain names used for resolving hostnames without
a specied domain. If more than one Domain Search is used, separate domains with
commas or white space.
5
To activate the conguration, click OK.
9.4.1.5 Conguring Routing
To make your machine communicate with other machines and other networks, routing
information must be given to make network trafc take the correct path. If DHCP is
used, this information is automatically provided. If a static setup is used, this data must
be added manually.
1
In YaST go to Network Settings > Routing.
2
Enter the IP address of the Default Gateway (IPv4 and IPv6 if necessary). The default
gateway matches every possible destination, but if any other entry exists that
matches the required address, use this instead of the default route.
3
More entries can be entered in the Routing Table. Enter the Destination network IP
address, Gateway IP address and the Netmask. Select the Device through which the
trafc to the dened network will be routed (the minus sign stands for any device).
To omit any of these values, use the minus sign -. To enter a default gateway into
the table, use default in the Destination eld.
NOTE
If more default routes are used, it is possible to specify the metric option
to determine which route has a higher priority. To specify the metric option,
Basic Networking 179
enter - metric number in Options. The route with the highest metric is
used as default. If the network device is disconnected, its route will be re-
moved and the next one will be used. However, the current kernel does not
use metric in static routing, only routing daemons like multipathd do.
4
If the system is a router, enable the IP Forwarding option in the Network Settings.
5
To activate the conguration, click OK.
9.4.2 Modem
In the YaST Control Center, access the modem conguration under Network Devices
> Modem. If your modem was not automatically detected, go to the Modem Devices
tab and open the dialog for manual conguration by clicking Add. Enter the interface
to which the modem is connected under Modem Device.
TIP: CDMA and GPRS Modems
Congure supported CDMA and GPRS modems with the YaST Modem module
just as you would congure regular modems.
180 Reference
Figure 9.4
Modem Conguration
If you are behind a private branch exchange (PBX), you may need to enter a dial prex.
This is often a zero. Consult the instructions that came with the PBX to nd out. Also
select whether to use tone or pulse dialing, whether the speaker should be on and whether
the modem should wait until it detects a dial tone. The last option should not be enabled
if the modem is connected to an exchange.
Under Details, set the baud rate and the modem initialization strings. Only change these
settings if your modem was not detected automatically or if it requires special settings
for data transmission to work. This is mainly the case with ISDN terminal adapters.
Leave this dialog by clicking OK. To delegate control over the modem to the normal
user without root permissions, activate Enable Device Control for Non-root User via
KInternet. In this way, a user without administrator permissions can activate or deactivate
an interface. Under Dial Prex Regular Expression, specify a regular expression. The
Dial Prex in KInternet, which can be modied by the normal user, must match this
regular expression. If this eld is left empty, the user cannot set a different Dial Prex
without administrator permissions.
Basic Networking 181
In the next dialog, select the ISP. To choose from a predened list of ISPs operating
in your country, select Country. Alternatively, click New to open a dialog in which to
provide the data for your ISP. This includes a name for the dial-up connection and ISP
as well as the login and password provided by your ISP. Enable Always Ask for Password
to be prompted for the password each time you connect.
In the last dialog, specify additional connection options:
Dial on Demand
If you enable Dial on Demand, set at least one name server. Use this feature only
if your Internet connection is inexpensive, because there are programs that period-
ically request data from the Internet.
Modify DNS when Connected
This option is enabled by default, with the effect that the name server address is
updated each time you connect to the Internet.
Automatically Retrieve DNS
If the provider does not transmit its domain name server after connecting, disable
this option and enter the DNS data manually.
Automatically Reconnect
If this options is enabled, the connection is automatically reestablished after failure.
Ignore Prompts
This option disables the detection of any prompts from the dial-up server. If the
connection build-up is slow or does not work at all, try this option.
External Firewall Interface
Selecting this option activates the rewall and sets the interface as external. This
way, you are protected from outside attacks for the duration of your Internet con-
nection.
Idle Time-Out (seconds)
With this option, specify a period of network inactivity after which the modem
disconnects automatically.
IP Details
This opens the address conguration dialog. If your ISP does not assign a dynamic
IP address to your host, disable Dynamic IP Address then enter your host's local
182 Reference
IP address and the remote IP address. Ask your ISP for this information. Leave
Default Route enabled and close the dialog by selecting OK.
Selecting Next returns to the original dialog, which displays a summary of the modem
conguration. Close this dialog with OK.
9.4.3 ISDN
Use this module to congure one or several ISDN cards for your system. If YaST did
not detect your ISDN card, click on Add in the ISDN Devices tab and manually select
your card. Multiple interfaces are possible, but several ISPs can be congured for one
interface. In the subsequent dialogs, set the ISDN options necessary for the proper
functioning of the card.
Figure 9.5
ISDN Conguration
In the next dialog, shown in Figure 9.5, “ISDN Conguration” (page 183), select the
protocol to use. The default is Euro-ISDN (EDSS1), but for older or larger exchanges,
select 1TR6. If you are in the US, select NI1. Select your country in the relevant eld.
The corresponding country code then appears in the eld next to it. Finally, provide
Basic Networking 183
your Area Code and the Dial Prex if necessary. If you do not want to log all your ISDN
trafc, uncheck the Start ISDN Log option.
Activate Device denes how the ISDN interface should be started: At Boot Time causes
the ISDN driver to be initialized each time the system boots. Manually requires you to
load the ISDN driver as root with the command rcisdn start. On Hotplug, used
for PCMCIA or USB devices, loads the driver after the device is plugged in. When
nished with these settings, select OK.
In the next dialog, specify the interface type for your ISDN card and add ISPs to an
existing interface. Interfaces may be either the SyncPPP or the RawIP type, but most
ISPs operate in the SyncPPP mode, which is described below.
Figure 9.6
ISDN Interface Conguration
The number to enter for My Phone Number depends on your particular setup:
ISDN Card Directly Connected to Phone Outlet
A standard ISDN line provides three phone numbers (called multiple subscriber
numbers, or MSNs). If the subscriber asked for more, there may be up to 10. One
of these MSNs must be entered here, but without your area code. If you enter the
184 Reference
wrong number, your phone operator automatically falls back to the rst MSN as-
signed to your ISDN line.
ISDN Card Connected to a Private Branch Exchange
Again, the conguration may vary depending on the equipment installed:
1. Smaller private branch exchanges (PBX) built for home purposes mostly use the
Euro-ISDN (EDSS1) protocol for internal calls. These exchanges have an internal
S0 bus and use internal numbers for the equipment connected to them.
Use one of the internal numbers as your MSN. You should be able to use at least
one of the exchange's MSNs that have been enabled for direct outward dialing.
If this does not work, try a single zero. For further information, consult the doc-
umentation delivered with your phone exchange.
2. Larger phone exchanges designed for businesses normally use the 1TR6 protocol
for internal calls. Their MSN is called EAZ and usually corresponds to the direct-
dial number. For the conguration under Linux, it should be sufcient to enter
the last digit of the EAZ. As a last resort, try each of the digits from 1 to 9.
For the connection to be terminated just before the next charge unit is due, enable
ChargeHUP. However, remember that may not work with every ISP. You can also
enable channel bundling (multilink PPP) by selecting the corresponding option. Finally,
you can enable the rewall for your link by selecting External Firewall Interface and
Restart Firewall. To enable the normal user without administrator permissions to activate
or deactivate the interface, select the Enable Device Control for Non-root User via
KInternet.
Details opens a dialog in which to implement more complex connection schemes which
are not relevant for normal home users. Leave the Details dialog by selecting OK.
In the next dialog, congure IP address settings. If you have not been given a static IP
by your provider, select Dynamic IP Address. Otherwise, use the elds provided to
enter your host's local IP address and the remote IP address according to the specica-
tions of your ISP. If the interface should be the default route to the Internet, select Default
Route. Each host can only have one interface congured as the default route. Leave
this dialog by selecting Next.
The following dialog allows you to set your country and select an ISP. The ISPs included
in the list are call-by-call providers only. If your ISP is not in the list, select New. This
opens the Provider Parameters dialog in which to enter all the details for your ISP.
Basic Networking 185
When entering the phone number, do not include any blanks or commas among the
digits. Finally, enter your login and the password as provided by the ISP. When nished,
select Next.
To use Dial on Demand on a stand-alone workstation, specify the name server (DNS
server) as well. Most ISPs support dynamic DNS, which means the IP address of a
name server is sent by the ISP each time you connect. For a single workstation, however,
you still need to provide a placeholder address like 192.168.22.99. If your ISP
does not support dynamic DNS, specify the name server IP addresses of the ISP. If
desired, specify a time-out for the connection—the period of network inactivity (in
seconds) after which the connection should be automatically terminated. Conrm your
settings with Next. YaST displays a summary of the congured interfaces. To activate
these settings, select OK.
9.4.4 Cable Modem
In some countries it is quite common to access the Internet through the TV cable net-
work. The TV cable subscriber usually gets a modem that is connected to the TV cable
outlet on one side and to a computer network card on the other (using a 10Base-TG
twisted pair cable). The cable modem then provides a dedicated Internet connection
with a xed IP address.
Depending on the instructions provided by your ISP, when conguring the network
card either select Dynamic Address or Statically Assigned IP Address. Most providers
today use DHCP. A static IP address often comes as part of a special business account.
9.4.5 DSL
To congure your DSL device, select the DSL module from the YaST Network Devices
section. This YaST module consists of several dialogs in which to set the parameters
of DSL links based on one of the following protocols:
PPP over Ethernet (PPPoE)
PPP over ATM (PPPoATM)
CAPI for ADSL (Fritz Cards)
186 Reference
Point-to-Point Tunneling Protocol (PPTP)—Austria
In the DSL Devices tab of the DSL Conguration Overview dialog, you will nd a list
of installed DSL devices. To change the conguration of a DSL device, select it in the
list and click Edit. If you click Add, you can manually congure a new DSL device.
The conguration of a DSL connection based on PPPoE or PPTP requires that the
corresponding network card be set up in the correct way. If you have not done so yet,
rst congure the card by selecting Congure Network Cards (see Section 9.4.1,
“Conguring the Network Card with YaST” (page 169)). In the case of a DSL link,
addresses may be assigned automatically but not via DHCP, which is why you should
not enable the option Dynamic Address. Instead, enter a static dummy address for the
interface, such as 192.168.22.1. In Subnet Mask, enter 255.255.255.0. If you
are conguring a stand-alone workstation, leave Default Gateway empty.
TIP
Values in IP Address and Subnet Mask are only placeholders. They are only
needed to initialize the network card and do not represent the DSL link as such.
In the rst DSL conguration dialog (see Figure 9.7, “DSL Conguration” (page 188)),
select the PPP Mode and the Ethernet Card to which the DSL modem is connected (in
most cases, this is eth0). Then use Activate Device to specify whether the DSL link
should be established during the boot process. Click Enable Device Control for Non-
root User via KInternet to authorize the normal user without root permissions to activate
or deactivate the interface with KInternet.
In the next dialog select your country and choose from a number of ISPs operating in
it. The details of any subsequent dialogs of the DSL conguration depend on the options
set so far, which is why they are only briey mentioned in the following paragraphs.
For details on the available options, read the detailed help available from the dialogs.
Basic Networking 187
Figure 9.7
DSL Conguration
To use Dial on Demand on a stand-alone workstation, also specify the name server
(DNS server). Most ISPs support dynamic DNS—the IP address of a name server is
sent by the ISP each time you connect. For a single workstation, however, provide a
placeholder address like 192.168.22.99. If your ISP does not support dynamic
DNS, enter the name server IP address provided by your ISP.
Idle Time-Out (seconds) denes a period of network inactivity after which to terminate
the connection automatically. A reasonable time-out value is between 60 and 300 sec-
onds. If Dial on Demand is disabled, it may be useful to set the time-out to zero to
prevent automatic hang-up.
The conguration of T-DSL is very similar to the DSL setup. Just select T-Online as
your provider and YaST opens the T-DSL conguration dialog. In this dialog, provide
some additional information required for T-DSL—the line ID, the T-Online number,
the user code and your password. All of these should be included in the information
you received after subscribing to T-DSL.
188 Reference
9.5 NetworkManager
NetworkManager is the ideal solution for laptops and other portable computers. With
NetworkManager, you do not need to worry about conguring network interfaces and
switching between networks when you are moving.
9.5.1 NetworkManager and ifup
However, NetworkManager is not a suitable solution for all cases, so you can still
choose between the traditional method for managing network connections (ifup) and
NetworkManager. If you want to manage your network connection with NetworkMan-
ager, enable NetworkManager in the YaST Network Settings module as described in
Section 21.2, “Enabling NetworkManager” (page 380) and congure your network
connections with NetworkManager. For a list of use cases and a detailed description
how to congure and use NetworkManager, refer to Chapter 21, Using NetworkMan-
ager (page 379).
Some differences between ifup and NetworkManager include:
root Privileges
If you use NetworkManager for network setup, you can easily switch, stop or start
your network connection at any time from within your desktop environment using
an applet. NetworkManager also makes it possible to change and congure wireless
card connections without requiring root privileges. For this reason, NetworkMan-
ager is the ideal solution for a mobile workstation.
Traditional conguration with ifup also provides some ways to switch, stop or start
the connection with or without user intervention, like user-managed devices.
However, this always requires root privileges to change or congure a network
device. This is often a problem for mobile computing, where it is not possible to
precongure all the connection possibilities.
Types of Network Connections
Both traditional conguration and NetworkManager can handle network connections
with a wireless network (with WEP, WPA-PSK, and WPA-Enterprise access) and
wired networks using DHCP and static conguration. They also support connection
through dial-up, DSL and VPN. With NetworkManager you can also connect a
Basic Networking 189
mobile broadband (3G) modem, which is not possible with the traditional congu-
ration.
NetworkManager tries to keep your computer connected at all times using the best
connection available. If the network cable is accidentally disconnected, it tries to
reconnect. It can nd the network with the best signal strength from the list of your
wireless connections and automatically use it to connect. To get the same function-
ality with ifup, a great deal of conguration effort is required.
9.5.2 NetworkManager Functionality and
Conguration Files
The individual network connection settings created with NetworkManager are stored
in conguration proles. The system connections congured with either NetworkMan-
ager or YaST are saved in /etc/networkmanager/system-connections/
* or in /etc/sysconfig/network/ifcfg-*. Any user-dened connections
are stored in GConf for GNOME or $HOME/.kde4/share/apps/
networkmanagement/* for KDE.
In case no prole is congured, NetworkManager automatically creates one and names
it Auto $INTERFACE-NAME. That is made in an attempt to work without any con-
guration for as many cases as (securely) possible. If the automatically created proles
do not suit your needs, use the network connection conguration dialogs provided by
KDE or GNOME to modify them as desired. For more information, refer to Section 21.3,
“Conguring Network Connections” (page 380).
9.5.3 Controlling and Locking Down
NetworkManager Features
On centrally administered machines, certain NetworkManager features can be controlled
or disabled with PolicyKit, for example if a user is allowed to modify administrator
dened connections or if a user is allowed to dene his own network congurations.
To view or change the respective NetworkManager policies, start the graphical Autho-
rizations tool for PolicyKit. In the tree on the left side, nd them below the network-
manager-settings entry.
190 Reference
The following table gives an overview of the PolicyKit identiers related to Network-
Manager:
Table 9.5
PolicyKit Identiers for NetworkManager
DescriptionIdentier
Enable or disable system networkingorg.freedesktop.NetworkManager.enable-
disable-network
Put NetworkManager to sleep or wake
it up
org.freedesktop.NetworkManager.sleep-wake
Enable or disable mobile broadband
devices
org.freedesktop.NetworkManager.enable-
disable-wwan
Allow control of network connectionsorg.freedesktop.NetworkManager.network-
control
Enable or disable WiFi devicesorg.freedesktop.NetworkManager.enable-
disable-wi
Allow use of user-specic connec-
tions
org.freedesktop.NetworkManager.use-user-
connections
Modify system connectionsorg.freedesktop.network-manager-settings.sys-
tem.modify
Connection sharing via an open WiFi
network
org.freedesktop.network-manager-settings.sys-
tem.wi.share.open
Connection sharing via a protected
WiFi network
org.freedesktop.network-manager-settings.sys-
tem.wi.share.protected
Basic Networking 191
9.6 Conguring a Network
Connection Manually
Manual conguration of the network software should always be the last alternative.
Using YaST is recommended. However, this background information about the network
conguration can also assist your work with YaST.
When the Kernel detects a network card and creates a corresponding network interface,
it assigns the device a name depending on the order of device discovery, or order of
the loading of the Kernel modules. The default Kernel device names are only predictable
in very simple or tightly controlled hardware environments. Systems which allow adding
or removing hardware during runtime or support automatic conguration of devices
cannot expect stable network device names assigned by the Kernel across reboots.
However, all system conguration tools rely on persistent interface names. This problem
is solved by udev. The udev persistent net generator (/lib/udev/rules.d/75
-persistent-net-generator.rules) generates a rule matching the hardware
(using its hardware address by default) and assigns a persistently unique interface for
the hardware. The udev database of network interfaces is stored in the le /etc/
udev/rules.d/70-persistent-net.rules. Every line in the le describes
one network interface and species its persistent name. System administrators can
change the assigned names by editing the NAME="" entries. The persistent rules can
also be modied using YaST.
Table 9.6, “Manual Network Conguration Scripts” (page 192) summarizes the most
important scripts involved in the network conguration.
Table 9.6
Manual Network Conguration Scripts
FunctionCommand
The if scripts start or stop network interfaces, or return the status
of the specied interface. For more information, see the ifup
manual page.
ifup,
ifdown,
ifstatus
The rcnetwork script can be used to start, stop or restart all
network interfaces (or just a specied one). Use rcnetwork
rcnetwork
192 Reference
FunctionCommand
stop to stop, rcnetwork start to start and rcnetwork
restart to restart network interfaces. If you want to stop, start
or restart just one interface, use the command followed by the in-
terface name, for example rcnetwork restart eth0. The
rcnetwork status command displays the state of the inter-
faces, their IP addresses and whether a DHCP client is running.
With rcnetwork stop-all-dhcp-clients and
rcnetwork restart-all-dhcp-clients you can stop
or restart DHCP clients running on network interfaces.
For more information about udev and persistent device names, see Chapter 8, Dynamic
Kernel Device Management with udev (page 135).
9.6.1 Conguration Files
This section provides an overview of the network conguration les and explains their
purpose and the format used.
9.6.1.1 /etc/syscong/network/ifcfg-*
These les contain the congurations for network interfaces. They include information
such as the start mode and the IP address. Possible parameters are described in the
manual page of ifup. Additionally, most variables from the dhcp and wireless
les can be used in the ifcfg-* les if a general setting should be used for only one
interface. However, most of the /etc/sysconfig/network/config variables
are global and cannot be overridden in ifcfg-les. For example NETWORKMANAGER
or NETCONFIG_* variables are global.
For ifcfg.template, see Section 9.6.1.2, /etc/sysconfig/network/
config, /etc/sysconfig/network/dhcp, and /etc/sysconfig/
network/wireless (page 194).
Basic Networking 193
9.6.1.2 /etc/syscong/network/cong,
/etc/syscong/network/dhcp, and
/etc/syscong/network/wireless
The le config contains general settings for the behavior of ifup, ifdown and
ifstatus. dhcp contains settings for DHCP and wireless for wireless LAN
cards. The variables in all three conguration les are commented. Some of the variables
from /etc/sysconfig/network/config can also be used in ifcfg-* les,
where they are given a higher priority. The /etc/sysconfig/network/ifcfg
.template le lists variables that can be specied in a per interface scope. However,
most of the /etc/sysconfig/network/config variables are global and cannot
be overridden in ifcfg-les. For example, NETWORKMANAGER or NETCONFIG_*
variables are global.
9.6.1.3 /etc/syscong/network/routes and
/etc/syscong/network/ifroute-*
The static routing of TCP/IP packets is determined here. All the static routes required
by the various system tasks can be entered in the /etc/sysconfig/network/
routes le: routes to a host, routes to a host via a gateway and routes to a network.
For each interface that needs individual routing, dene an additional conguration le:
/etc/sysconfig/network/ifroute-*. Replace * with the name of the inter-
face. The entries in the routing conguration les look like this:
# Destination Dummy/Gateway Netmask Device
#
127.0.0.0 0.0.0.0 255.255.255.0 lo
204.127.235.0 0.0.0.0 255.255.255.0 eth0
default 204.127.235.41 0.0.0.0 eth0
207.68.156.51 207.68.145.45 255.255.255.255 eth1
192.168.0.0 207.68.156.51 255.255.0.0 eth1
The route's destination is in the rst column. This column may contain the IP address
of a network or host or, in the case of reachable name servers, the fully qualied network
or hostname.
The second column contains the default gateway or a gateway through which a host or
network can be accessed. The third column contains the netmask for networks or hosts
194 Reference
behind a gateway. For example, the mask is 255.255.255.255 for a host behind a
gateway.
The fourth column is only relevant for networks connected to the local host such as
loopback, Ethernet, ISDN, PPP and dummy device. The device name must be entered
here.
An (optional) fth column can be used to specify the type of a route. Columns that are
not needed should contain a minus sign - to ensure that the parser correctly interprets
the command. For details, refer to the routes(5) man page.
The unied format for IPv4 and IPv6 now looks as follows:
prefix/length gateway - [interface]
And the so-called compatibility format looks accordingly:
prefix gateway length [interface]
For IPv4 you still can use the old format with netmask:
ipv4-network gateway ipv4-netmask [interface]
The following examples are equivalent:
2001:db8:abba:cafe::/64 2001:db8:abba:cafe::dead - eth0
208.77.188.0/24 208.77.188.166 - eth0
2001:db8:abba:cafe:: 2001:db8:abba:cafe::dead 64 eth0
208.77.188.0 208.77.188.166 24 eth0
208.77.188.0 208.77.188.166 255.255.255.0 eth0
9.6.1.4 /etc/resolv.conf
The domain to which the host belongs is specied in this le (keyword search). Also
listed is the status of the name server address to access (keyword nameserver).
Multiple domain names can be specied in the le. When resolving a name that is not
fully qualied, an attempt is made to generate one by attaching the individual search
entries. Multiple name servers can be specied in multiple lines, each beginning with
nameserver. Comments are preceded by # signs. Example 9.5, /etc/resolv
.conf (page 196) shows what /etc/resolv.conf could look like.
Basic Networking 195
However, the /etc/resolv.conf should not be edited by hand. Instead, it is gen-
erated by the netconfig script. To dene static DNS conguration without using
YaST, edit the appropriate variables manually in the /etc/sysconfig/network/
config le:
NETCONFIG_DNS_STATIC_SEARCHLIST
list of DNS domain names used for hostname lookup
NETCONFIG_DNS_STATIC_SERVERS
list of name server IP addresses to use for hostname lookup
NETCONFIG_DNS_FORWARDER
denes the name of the DNS forwarder that has to be congured
To disable DNS conguration using netcong, set NETCONFIG_DNS_POLICY=''.
For more information about netconfig, see man 8 netconfig.
Example 9.5
/etc/resolv.conf
# Our domain
search example.com
#
# We use dns.example.com (192.168.1.116) as nameserver
nameserver 192.168.1.116
9.6.1.5 /sbin/netcong
netconfig is a modular tool to manage additional network conguration settings. It
merges statically dened settings with settings provided by autoconguration mecha-
nisms as DHCP or PPP according to a predened policy. The required changes are ap-
plied to the system by calling the netcong modules that are responsible for modifying
a conguration le and restarting a service or a similar action.
netconfig recognizes three main actions. The netconfig modify and
netconfig remove commands are used by daemons such as DHCP or PPP to
provide or remove settings to netcong. Only the netconfig update command
is available for the user:
modify
The netconfig modify command modies the current interface and service
specic dynamic settings and updates the network conguration. Netcong reads
196 Reference
settings from standard input or from a le specied with the --lease-file
filename option and internally stores them until a system reboot (or the next
modify or remove action). Already existing settings for the same interface and
service combination are overwritten. The interface is specied by the -i
interface_name parameter. The service is specied by the -s
service_name parameter.
remove
The netconfig remove command removes the dynamic settings provided by
a modicatory action for the specied interface and service combination and updates
the network conguration. The interface is specied by the -i interface_name
parameter. The service is specied by the -s service_name parameter.
update
The netconfig update command updates the network conguration using
current settings. This is useful when the policy or the static conguration has
changed. Use the -m module_type parameter, if you want to update a specied
service only (dns, nis, or ntp).
The netcong policy and the static conguration settings are dened either manually
or using YaST in the /etc/sysconfig/network/config le. The dynamic
conguration settings provided by autoconguration tools as DHCP or PPP are delivered
directly by these tools with the netconfig modify and netconfig remove
actions. NetworkManager also uses netconfig modify and netconfig remove
actions. When NetworkManager is enabled, netcong (in policy mode auto) uses
only NetworkManager settings, ignoring settings from any other interfaces congured
using the traditional ifup method. If NetworkManager does not provide any setting,
static settings are used as a fallback. A mixed usage of NetworkManager and the tradi-
tional ifup method is not supported.
For more information about netconfig, see man 8 netconfig.
9.6.1.6 /etc/hosts
In this le, shown in Example 9.6, /etc/hosts (page 198), IP addresses are assigned
to hostnames. If no name server is implemented, all hosts to which an IP connection
will be set up must be listed here. For each host, enter a line consisting of the IP address,
the fully qualied hostname, and the hostname into the le. The IP address must be at
Basic Networking 197
the beginning of the line and the entries separated by blanks and tabs. Comments are
always preceded by the # sign.
Example 9.6
/etc/hosts
127.0.0.1 localhost
192.168.2.100 jupiter.example.com jupiter
192.168.2.101 venus.example.com venus
9.6.1.7 /etc/networks
Here, network names are converted to network addresses. The format is similar to that
of the hosts le, except the network names precede the addresses. See Example 9.7,
/etc/networks (page 198).
Example 9.7
/etc/networks
loopback 127.0.0.0
localnet 192.168.0.0
9.6.1.8 /etc/host.conf
Name resolution—the translation of host and network names via the resolver library—is
controlled by this le. This le is only used for programs linked to libc4 or libc5. For
current glibc programs, refer to the settings in /etc/nsswitch.conf. A parameter
must always stand alone in its own line. Comments are preceded by a # sign. Table 9.7,
“Parameters for /etc/host.conf” (page 198) shows the parameters available. A sample
/etc/host.conf is shown in Example 9.8, /etc/host.conf (page 199).
Table 9.7
Parameters for /etc/host.conf
Species in which order the services are accessed for the name
resolution. Available arguments are (separated by blank spaces
or commas):
order hosts, bind
hosts: searches the /etc/hosts le
bind: accesses a name server
nis: uses NIS
198 Reference
Denes if a host entered in /etc/hosts can have multiple
IP addresses.
multi on/off
These parameters inuence the name server spoong but do
not exert any inuence on the network conguration.
nospoof on
spoofalert on/off
The specied domain name is separated from the hostname
after hostname resolution (as long as the hostname includes
trim domainname
the domain name). This option is useful only if names from
the local domain are in the /etc/hosts le, but should still
be recognized with the attached domain names.
Example 9.8
/etc/host.conf
# We have named running
order hosts bind
# Allow multiple address
multi on
9.6.1.9 /etc/nsswitch.conf
The introduction of the GNU C Library 2.0 was accompanied by the introduction of
the Name Service Switch (NSS). Refer to the nsswitch.conf(5) man page and
The GNU C Library Reference Manual for details.
The order for queries is dened in the le /etc/nsswitch.conf. A sample
nsswitch.conf is shown in Example 9.9, /etc/nsswitch.conf (page 200).
Comments are preceded by # signs. In this example, the entry under the hosts database
means that a request is sent to /etc/hosts (files) via DNS.
Basic Networking 199
Example 9.9
/etc/nsswitch.conf
passwd: compat
group: compat
hosts: files dns
networks: files dns
services: db files
protocols: db files
rpc: files
ethers: files
netmasks: files
netgroup: files nis
publickey: files
bootparams: files
automount: files nis
aliases: files nis
shadow: compat
The “databases” available over NSS are listed in Table 9.8, “Databases Available via
/etc/nsswitch.conf” (page 200). The conguration options for NSS databases are listed
in Table 9.9, “Conguration Options for NSS “Databases”” (page 201).
Table 9.8
Databases Available via /etc/nsswitch.conf
Mail aliases implemented by sendmail; see man 5
aliases.
aliases
Ethernet addresses.
ethers
List of network and their subnet masks. Only needed, if
you use subnetting.
netmasks
For user groups used by getgrent. See also the man page
for group.
group
For hostnames and IP addresses, used by
gethostbyname and similar functions.
hosts
Valid host and user lists in the network for the purpose of
controlling access permissions; see the netgroup(5)
man page.
netgroup
200 Reference
Network names and addresses, used by getnetent.networks
Public and secret keys for Secure_RPC used by NFS and
NIS+..
publickey
User passwords, used by getpwent; see the passwd(5)
man page.
passwd
Network protocols, used by getprotoent; see the
protocols(5) man page.
protocols
Remote procedure call names and addresses, used by
getrpcbyname and similar functions.
rpc
Network services, used by getservent.services
Shadow passwords of users, used by getspnam; see the
shadow(5) man page.
shadow
Table 9.9
Conguration Options for NSS “Databases”
directly access les, for example, /etc/aliasesfiles
access via a database
db
NIS, see also Chapter 3, Using NIS (↑Security Guide)
nis, nisplus
can only be used as an extension for hosts and
networks
dns
can only be used as an extension for passwd, shadow
and group
compat
9.6.1.10 /etc/nscd.conf
This le is used to congure nscd (name service cache daemon). See the nscd(8)
and nscd.conf(5) man pages. By default, the system entries of passwd and
Basic Networking 201
groups are cached by nscd. This is important for the performance of directory services,
like NIS and LDAP, because otherwise the network connection needs to be used for
every access to names or groups. hosts is not cached by default, because the mecha-
nism in nscd to cache hosts makes the local system unable to trust forward and reverse
lookup checks. Instead of asking nscd to cache names, set up a caching DNS server.
If the caching for passwd is activated, it usually takes about fteen seconds until a
newly added local user is recognized. Reduce this waiting time by restarting nscd with
the command rcnscd restart.
9.6.1.11 /etc/HOSTNAME
This contains the fully qualied hostname with the domain name attached. This le is
read by several scripts while the machine is booting. It must contain only one line (in
which the hostname is set).
9.6.2 Testing the Conguration
Before you write your conguration to the conguration les, you can test it. To set
up a test conguration, use the ip command. To test the connection, use the ping
command. Older conguration tools, ifconfig and route, are also available.
The commands ip, ifconfig and route change the network conguration directly
without saving it in the conguration le. Unless you enter your conguration in the
correct conguration les, the changed network conguration is lost on reboot.
9.6.2.1 Conguring a Network Interface with ip
ip is a tool to show and congure network devices, routing, policy routing, and tunnels.
ip is a very complex tool. Its common syntax is ip options object command.
You can work with the following objects:
link
This object represents a network device.
address
This object represents the IP address of device.
202 Reference
neighbor
This object represents a ARP or NDISC cache entry.
route
This object represents the routing table entry.
rule
This object represents a rule in the routing policy database.
maddress
This object represents a multicast address.
mroute
This object represents a multicast routing cache entry.
tunnel
This object represents a tunnel over IP.
If no command is given, the default command is used (usually list).
Change the state of a device with the command ip link
set device_name command. For example, to deactivate device eth0, enter ip
link set eth0 down. To activate it again, use ip link set eth0 up.
After activating a device, you can congure it. To set the IP address, use ip addr
add ip_address + dev device_name. For example, to set the address of the
interface eth0 to 192.168.12.154/30 with standard broadcast (option brd), enter ip
addr add 192.168.12.154/30 brd + dev eth0.
To have a working connection, you must also congure the default gateway. To set a
gateway for your system, enter ip route add gateway_ip_address. To
translate one IP address to another, use nat: ip route add
nat ip_address via other_ip_address.
To display all devices, use ip link ls. To display the running interfaces only, use
ip link ls up. To print interface statistics for a device, enter ip -s link
ls device_name. To view addresses of your devices, enter ip addr. In the output
of the ip addr, also nd information about MAC addresses of your devices. To show
all routes, use ip route show.
Basic Networking 203
For more information about using ip, enter ip help or see the ip(8) man page.
The help option is also available for all ip subcommands. If, for example, you need
help for ip addr, enter ip addr help. Find the ip manual in /usr/share/
doc/packages/iproute2/ip-cref.pdf.
9.6.2.2 Testing a Connection with ping
The ping command is the standard tool for testing whether a TCP/IP connection works.
It uses the ICMP protocol to send a small data packet, ECHO_REQUEST datagram,
to the destination host, requesting an immediate reply. If this works, ping displays a
message to that effect, which indicates that the network link is basically functioning.
ping does more than only test the function of the connection between two computers:
it also provides some basic information about the quality of the connection. In Exam-
ple 9.10, “Output of the Command ping” (page 204), you can see an example of the
ping output. The second-to-last line contains information about the number of trans-
mitted packets, packet loss, and total time of ping running.
As the destination, you can use a hostname or IP address, for example,
ping example.com or ping 192.168.3.100. The program sends packets until
you press Ctrl + C.
If you only need to check the functionality of the connection, you can limit the number
of the packets with the -c option. For example to limit ping to three packets, enter
ping -c 3 example.com.
Example 9.10
Output of the Command ping
ping -c 3 example.com
PING example.com (192.168.3.100) 56(84) bytes of data.
64 bytes from example.com (192.168.3.100): icmp_seq=1 ttl=49 time=188 ms
64 bytes from example.com (192.168.3.100): icmp_seq=2 ttl=49 time=184 ms
64 bytes from example.com (192.168.3.100): icmp_seq=3 ttl=49 time=183 ms
--- example.com ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2007ms
rtt min/avg/max/mdev = 183.417/185.447/188.259/2.052 ms
The default interval between two packets is one second. To change the interval, ping
provides the option -i. For example, to increase the ping interval to ten seconds, enter
ping -i 10 example.com.
204 Reference
In a system with multiple network devices, it is sometimes useful to send the ping
through a specic interface address. To do so, use the -I option with the name of the
selected device, for example, ping -I wlan1 example.com.
For more options and information about using ping, enter ping -h or see the ping
(8) man page.
TIP: Pinging IPv6 Addresses
For IPv6 addresses use the ping6 command. Note, to ping link-local addresses,
you must specify the interface with -I. The following command works, if the
address is reachable via eth1:
ping6 -I eth1 fe80::117:21ff:feda:a425
9.6.2.3 Conguring the Network with ifcong
ifconfig is a network conguration tool.
NOTE: ifconfig and ip
The ifconfig tool is obsolete. Use ip instead. In contrast to ip, you can use
ifconfig only for interface conguration. It limits interface names to 9
characters.
Without arguments, ifconfig displays the status of the currently active interfaces.
As you can see in Example 9.11, “Output of the ifconfig Command” (page 206),
ifconfig has very well-arranged and detailed output. The output also contains infor-
mation about the MAC address of your device (the value of HWaddr) in the rst line.
Basic Networking 205
Example 9.11
Output of the ifcong Command
eth0 Link encap:Ethernet HWaddr 00:08:74:98:ED:51
inet6 addr: fe80::208:74ff:fe98:ed51/64 Scope:Link
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:634735 errors:0 dropped:0 overruns:4 frame:0
TX packets:154779 errors:0 dropped:0 overruns:0 carrier:1
collisions:0 txqueuelen:1000
RX bytes:162531992 (155.0 Mb) TX bytes:49575995 (47.2 Mb)
Interrupt:11 Base address:0xec80
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:8559 errors:0 dropped:0 overruns:0 frame:0
TX packets:8559 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:533234 (520.7 Kb) TX bytes:533234 (520.7 Kb)
wlan1 Link encap:Ethernet HWaddr 00:0E:2E:52:3B:1D
inet addr:192.168.2.4 Bcast:192.168.2.255 Mask:255.255.255.0
inet6 addr: fe80::20e:2eff:fe52:3b1d/64 Scope:Link
UP BROADCAST NOTRAILERS RUNNING MULTICAST MTU:1500 Metric:1
RX packets:50828 errors:0 dropped:0 overruns:0 frame:0
TX packets:43770 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:45978185 (43.8 Mb) TX bytes:7526693 (7.1 MB)
For more options and information about using ifconfig, enter ifconfig -h or
see the ifconfig (8) man page.
9.6.2.4 Conguring Routing with route
route is a program for manipulating the IP routing table. You can use it to view your
routing conguration and to add or remove routes.
NOTE: route and ip
The program route is obsolete. Use ip instead.
route is especially useful if you need quick and comprehensible information about
your routing conguration to determine problems with routing. To view your current
routing conguration, enter route -n as root.
206 Reference
Example 9.12
Output of the route -n Command
route -n
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.20.0.0 * 255.255.248.0 U 0 0 0 eth0
link-local * 255.255.0.0 U 0 0 0 eth0
loopback * 255.0.0.0 U 0 0 0 lo
default styx.exam.com 0.0.0.0 UG 0 0 0 eth0
For more options and information about using route, enter route -h or see the route
(8) man page.
9.6.3 Start-Up Scripts
Apart from the conguration les described above, there are also various scripts that
load the network programs while the machine is booting. These are started as soon as
the system is switched to one of the multiuser runlevels. Some of these scripts are de-
scribed in Table 9.10, “Some Start-Up Scripts for Network Programs” (page 207).
Table 9.10
Some Start-Up Scripts for Network Programs
This script handles the conguration of the net-
work interfaces. If the network service was not
started, no network interfaces are implemented.
/etc/init.d/network
Starts xinetd. xinetd can be used to make server
services available on the system. For example, it
/etc/init.d/xinetd
can start vsftpd whenever an FTP connection is
initiated.
Starts the rpcbind utility that converts RPC pro-
gram numbers to universal addresses. It is needed
for RPC services, such as an NFS server.
/etc/init.d/rpcbind
Starts the NFS server.
/etc/init.d/nfsserver
Controls the postx process.
/etc/init.d/postfix
Starts the NIS server.
/etc/init.d/ypserv
Basic Networking 207
Starts the NIS client.
/etc/init.d/ypbind
9.7 smpppd as Dial-up Assistant
Some home users do not have a dedicated line connecting them to the Internet. Instead,
they use dial-up connections. Depending on the dial-up method (ISDN or DSL), the
connection is controlled by ipppd or pppd. Basically, all that needs to be done to go
online is to start these programs correctly.
If you have a at-rate connection that does not generate any additional costs for the
dial-up connection, simply start the respective daemon. Control the dial-up connection
with a desktop applet or a command-line interface. If the Internet gateway is not the
host you are using, you might want to control the dial-up connection by way of a network
host.
This is where smpppd (SUSE Meta PPP Daemon) is involved. It provides a uniform
interface for auxiliary programs and acts in two directions. First, it programs the required
pppd or ipppd and controls its dial-up properties. Second, it makes various providers
available to the user programs and transmits information about the current status of the
connection. As smpppd can also be controlled by way of the network, it is suitable for
controlling dial-up connections to the Internet from a workstation in a private subnet-
work.
9.7.1 Conguring smpppd
The connections provided by smpppd are automatically congured by YaST. The actual
dial-up programs KInternet and cinternet are also precongured. Manual settings are
only required to congure additional features of smpppd such as remote control.
The conguration le of smpppd is /etc/smpppd.conf. By default, it does not
enable remote control. The most important options of this conguration le are:
open-inet-socket = yes|no
To control smpppd via the network, set this option to yes. smpppd listens on port
3185. If this parameter is set to yes, the parameters bind-address,
host-range and password must be set accordingly.
208 Reference
bind-address = ip address
If a host has several IP addresses, use this parameter to determine at which IP ad-
dress smpppd should accept connections. The default is to listen at all addresses.
host-range = min ipmax ip
The parameter host-range denes a network range. Hosts whose IP addresses
are within this range are granted access to smpppd. All hosts not within this range
are denied access.
password = password
By assigning a password, limit the clients to authorized hosts. As this is a plain-
text password, you should not overrate the security it provides. If no password is
assigned, all clients are permitted to access smpppd.
slp-register = yes|no
With this parameter, the smpppd service can be announced in the network via SLP.
More information about smpppd is available in the smpppd(8) and
smpppd.conf(5) man pages.
9.7.2 Conguring qinternet for Remote Use
qinternet can be used to control a local or remote smpppd. cinternet is the command-
line counterpart to the graphical KInternet. To prepare these utilities for use with a remote
smpppd, edit the conguration le /etc/smpppd-c.conf manually or using qin-
ternet. This le only uses four options:
sites = list of sites
list of sites where the front-ends search for smpppd. The front-ends test
the options in the order specied here. local orders the establishment of a con-
nection to the local smpppd. gateway points to an smpppd on the gateway.
config-file indicates that the connection should be established to the smpppd
specied in the server and port options in /etc/smpppd-c.conf. slp
orders the front-ends to connect to an smpppd found via SLP.
server = server
The host on which smpppd runs.
Basic Networking 209
port = port
The port on which smpppd runs.
password = password
The password selected for smpppd.
210 Reference
10
SLP Services in the Network
The service location protocol (SLP) was developed to simplify the conguration of
networked clients within a local network. To congure a network client, including all
required services, the administrator traditionally needs detailed knowledge of the servers
available in the network. SLP makes the availability of selected services known to all
clients in the local network. Applications that support SLP can use the information
distributed and be congured automatically.
openSUSE® supports installation using installation sources provided with SLP and
contains many system services with integrated support for SLP. YaST and Konqueror
both have appropriate front-ends for SLP. You can use SLP to provide networked clients
with central functions, such as an installation server, le server, or print server on your
system.
IMPORTANT: SLP Support in openSUSE
Services that offer SLP support include cupsd, rsyncd, ypserv, openldap2, ksys-
guardd, saned, kdm, vnc, login, smpppd, rpasswd , postx, and sshd (via sh).
10.1 Installation
All packages necessary to use SLP services are installed by default. However, if you
want to provide services via SLP, check that the openslp-server package is in-
stalled. For SLP daemon server conguration install the yast2-slp-server
package.
SLP Services in the Network 211
10.2 Activating SLP
slpd must run on your system to offer services with SLP. If the machine should only
operate as client, and does not offer services, it is not necessary to run slpd. Like most
system services in openSUSE, the slpd daemon is controlled by means of a separate
init script. After the installation, the daemon is inactive by default. To activate it
temporarily, run rcslpd start as root or rcslpd stop to stop it. Perform a
restart or status check with restart or status. If slpd should be always active after
booting, enable slpd in YaST System > System Services (Runlevel) or run the
insserv slpd command as root.
10.3 SLP Front-Ends in openSUSE
To nd services provided via SLP in your network, use an SLP front-end such as
slptool (openslp package) or YaST:
slptool
slptool is a command line program that can be used to announce SLP inquiries in
the network or announce proprietary services. slptool --help lists all available
options and functions. For example, to nd all time servers that announce themselves
in the current network, run the command:
slptool findsrvs service:ntp
YaST
YaST also provides an SLP browser. However, this browser is not available from
the YaST Control Center. To start it, run yast2 slp as root user. Click on a
Service Type on the lefthand side to get more information about a service.
10.4 Installation over SLP
If you have an installation server with openSUSE installation media within your network,
this can be registered and offered with SLP. For details, see Section 2.2, “Setting Up
the Server Holding the Installation Sources” (page 46). If SLP installation is selected,
linuxrc starts an SLP inquiry after the system has booted from the selected boot medium
and displays the sources found.
212 Reference
10.5 Providing Services via SLP
Many applications in openSUSE have integrated SLP support through the use of the
libslp library. If a service has not been compiled with SLP support, use one of the
following methods to make it available via SLP:
Static Registration with /etc/slp.reg.d
Create a separate registration le for each new service. This is an example for
registering a scanner service:
## Register a saned service on this system
## en means english language
## 65535 disables the timeout, so the service registration does
## not need refreshes
service:scanner.sane://$HOSTNAME:6566,en,65535
watch-port-tcp=6566
description=SANE scanner daemon
The most important line in this le is the service URL, which begins with
service:. This contains the service type (scanner.sane) and the address
under which the service is available on the server. $HOSTNAME is automatically
replaced with the full hostname. The name of the TCP port on which the relevant
service can be found follows, separated by a colon. Then enter the language in
which the service should appear and the duration of registration in seconds. These
should be separated from the service URL by commas. Set the value for the duration
of registration between 0 and 65535. 0 prevents registration. 65535 removes all
restrictions.
The registration le also contains the two variables watch-port-tcp and
description. watch-port-tcp links the SLP service announcement to
whether the relevant service is active by having slpd check the status of the service.
The second variable contains a more precise description of the service that is dis-
played in suitable browsers.
Static Registration with /etc/slp.reg
The only difference between this method and the procedure with /etc/slp.reg
.d is that all services are grouped within a central le.
SLP Services in the Network 213
Dynamic Registration with slptool
If a service needs to be registered dynamically without the need of conguration
les, use the slptool command line utility. The same utility can also be used to
deregister an existing service offering without restarting slpd.
10.6 For More Information
RFC 2608, 2609, 2610
RFC 2608 generally deals with the denition of SLP. RFC 2609 deals with the
syntax of the service URLs used in greater detail and RFC 2610 deals with DHCP
via SLP.
http://www.openslp.org
The home page of the OpenSLP project.
/usr/share/doc/packages/openslp
This directory contains the documentation for SLP coming with the
openslp-server package, including a README.SuSE containing the open-
SUSE details, the RFCs, and two introductory HTML documents. Programmers
who want to use the SLP functions nd more information in the Programmers
Guide that is included in the openslp-devel package.
214 Reference
11
The Domain Name System
DNS (domain name system) is needed to resolve the domain names and hostnames into
IP addresses. In this way, the IP address 192.168.2.100 is assigned to the hostname
jupiter, for example. Before setting up your own name server, read the general in-
formation about DNS in Section 9.3, “Name Resolution” (page 167). The following
conguration examples refer to BIND.
11.1 DNS Terminology
Zone
The domain namespace is divided into regions called zones. For instance, if you
have example.com, you have the example section (or zone) of the com domain.
DNS server
The DNS server is a server that maintains the name and IP information for a domain.
You can have a primary DNS server for master zone, a secondary server for slave
zone, or a slave server without any zones for caching.
Master zone DNS server
The master zone includes all hosts from your network and a DNS server master
zone stores up-to-date records for all the hosts in your domain.
Slave zone DNS server
A slave zone is a copy of the master zone. The slave zone DNS server obtains
its zone data with zone transfer operations from its master server. The slave
zone DNS server responds authoritatively for the zone as long as it has valid
The Domain Name System 215
(not expired) zone data. If the slave cannot obtain a new copy of the zone data,
it stops responding for the zone.
Forwarder
Forwarders are DNS servers to which your DNS server should send queries it
cannot answer. To enable different conguration sources in one conguration,
netconfig is used (see also man 8 netconfig).
Record
The record is information about name and IP address. Supported records and their
syntax are described in BIND documentation. Some special records are:
NS record
An NS record tells name servers which machines are in charge of a given do-
main zone.
MX record
The MX (mail exchange) records describe the machines to contact for directing
mail across the Internet.
SOA record
SOA (Start of Authority) record is the rst record in a zone le. The SOA
record is used when using DNS to synchronize data between multiple comput-
ers.
11.2 Installation
To install a DNS server, start YaST and select Software > Software Management.
Choose Filter > Patterns and select DHCP and DNS Server. Conrm the installation
of the dependent packages to nish the installation process.
11.3 Conguration with YaST
Use the YaST DNS module to congure a DNS server for the local network. When
starting the module for the rst time, a wizard starts, prompting you to make a few de-
cisions concerning administration of the server. Completing this initial setup produces
216 Reference
a basic server conguration. Use the expert mode to deal with more advanced congu-
ration tasks, such as setting up ACLs, logging, TSIG keys, and other options.
11.3.1 Wizard Conguration
The wizard consists of three steps or dialogs. At the appropriate places in the dialogs,
you are given the opportunity to enter the expert conguration mode.
1
When starting the module for the rst time, the Forwarder Settings dialog, shown
in Figure 11.1, “DNS Server Installation: Forwarder Settings” (page 217), opens.
The Netcong DNS Policy decides which devices should provide forwarders or
whether you want to supply your own Forwarder List. For more information about
netcong, see man 8 netconfig.
Figure 11.1
DNS Server Installation: Forwarder Settings
Forwarders are DNS servers to which your DNS server sends queries it cannot answer
itself. Enter their IP address and click Add.
The Domain Name System 217
2
The DNS Zones dialog consists of several parts and is responsible for the management
of zone les, described in Section 11.6, “Zone Files” (page 233). For a new zone,
provide a name for it in Name. To add a reverse zone, the name must end in
.in-addr.arpa. Finally, select the Type (master, slave, or forward). See Fig-
ure 11.2, “DNS Server Installation: DNS Zones” (page 218). Click Edit to congure
other settings of an existing zone. To remove a zone, click Delete.
Figure 11.2
DNS Server Installation: DNS Zones
3
In the nal dialog, you can open the DNS port in the rewall by clicking Open Port
in Firewall. Then decide whether to start the DNS server when booting (On or Off).
You can also activate LDAP support. See Figure 11.3, “DNS Server Installation:
Finish Wizard” (page 219).
218 Reference
Figure 11.3
DNS Server Installation: Finish Wizard
11.3.2 Expert Conguration
After starting the module, YaST opens a window displaying several conguration op-
tions. Completing it results in a DNS server conguration with the basic functions in
place:
11.3.2.1 Start-Up
Under Start-Up, dene whether the DNS server should be started when the booting the
system or manually. To start the DNS server immediately, click Start DNS Server Now.
To stop the DNS server, click Stop DNS Server Now. To save the current settings, select
Save Settings and Reload DNS Server Now. You can open the DNS port in the rewall
with Open Port in Firewall and modify the rewall settings with Firewall Details.
By selecting LDAP Support Active, the zone les are managed by an LDAP database.
Any changes to zone data written to the LDAP database are picked up by the DNS
server as soon as it is restarted or prompted to reload its conguration.
The Domain Name System 219
11.3.2.2 Forwarders
If your local DNS server cannot answer a request, it tries to forward the request to a
Forwarder, if congured so. This forwarder may be added manually to the Forwarder
List. If the forwarder is not static like in dial-up connections, netcong handles the
conguration. For more information about netcong, see man 8 netconfig.
11.3.2.3 Basic Options
In this section, set basic server options. From the Option menu, select the desired item
then specify the value in the corresponding entry eld. Include the new entry by selecting
Add.
11.3.2.4 Logging
To set what the DNS server should log and how, select Logging. Under Log Type,
specify where the DNS server should write the log data. Use the systemwide log le
/var/log/messages by selecting System Log or specify a different le by selecting
File. In the latter case, additionally specify a name, the maximum le size in megabytes
and the number of logle versions to store.
Further options are available under Additional Logging. Enabling Log All DNS Queries
causes every query to be logged, in which case the log le could grow extremely large.
For this reason, it is not a good idea to enable this option for other than debugging
purposes. To log the data trafc during zone updates between DHCP and DNS server,
enable Log Zone Updates. To log the data trafc during a zone transfer from master to
slave, enable Log Zone Transfer. See Figure 11.4, “DNS Server: Logging” (page 221).
220 Reference
Figure 11.4
DNS Server: Logging
11.3.2.5 ACLs
Use this dialog to dene ACLs (access control lists) to enforce access restrictions. After
providing a distinct name under Name, specify an IP address (with or without netmask)
under Value in the following fashion:
{ 192.168.1/24; }
The syntax of the conguration le requires that the address ends with a semicolon and
is put into curly braces.
11.3.2.6 TSIG Keys
The main purpose of TSIGs (transaction signatures) is to secure communications between
DHCP and DNS servers. They are described in Section 11.8, “Secure Transactions”
(page 237).
The Domain Name System 221
To generate a TSIG key, enter a distinctive name in the eld labeled Key ID and specify
the le where the key should be stored (Filename). Conrm your choices with Generate.
To use a previously created key, leave the Key ID eld blank and select the le where
it is stored under Filename. After that, conrm with Add.
11.3.2.7 DNS Zones (Adding a Slave Zone)
To add a slave zone, select DNS Zones, choose the zone type Slave, write the name of
the new zone, and click Add.
In the Zone Editor sub-dialog under Master DNS Server IP, specify the master from
which the slave should pull its data. To limit access to the server, select one of the ACLs
from the list.
11.3.2.8 DNS Zones (Adding a Master Zone)
To add a master zone, select DNS Zones, choose the zone type Master, write the name
of the new zone, and click Add. When adding a master zone, a reverse zone is also
needed. For example, when adding the zone example.com that points to hosts in a
subnet 192.168.1.0/24, you should also add a reverse zone for the IP-address
range covered. By denition, this should be named 1.168.192.in-addr.arpa.
11.3.2.9 DNS Zones (Editing a Master Zone)
To edit a master zone, select DNS Zones, select the master zone from the table, and
click Edit. The dialog consists of several pages: Basics (the one opened rst), NS
Records, MX Records, SOA, and Records.
The basic dialog, shown in Figure 11.5, “DNS Server: Zone Editor (Basics)” (page 223),
lets you dene settings for dynamic DNS and access options for zone transfers to clients
and slave name servers. To permit the dynamic updating of zones, select Allow Dynamic
Updates as well as the corresponding TSIG key. The key must have been dened before
the update action starts. To enable zone transfers, select the corresponding ACLs. ACLs
must have been dened already.
In the Basics dialog, select whether to enable zone transfers. Use the listed ACLs to
dene who can download zones.
222 Reference
Figure 11.5
DNS Server: Zone Editor (Basics)
Zone Editor (NS Records)
The NS Records dialog allows you to dene alternative name servers for the zones
specied. Make sure that your own name server is included in the list. To add a
record, enter its name under Name Server to Add then conrm with Add. See Fig-
ure 11.6, “DNS Server: Zone Editor (NS Records)” (page 224).
The Domain Name System 223
Figure 11.6
DNS Server: Zone Editor (NS Records)
Zone Editor (MX Records)
To add a mail server for the current zone to the existing list, enter the corresponding
address and priority value. After doing so, conrm by selecting Add. See Fig-
ure 11.7, “DNS Server: Zone Editor (MX Records)” (page 225).
224 Reference
Figure 11.7
DNS Server: Zone Editor (MX Records)
Zone Editor (SOA)
This page allows you to create SOA (start of authority) records. For an explanation
of the individual options, refer to Example 11.6, “The /var/lib/named/exam-
ple.com.zone File” (page 233).
The Domain Name System 225
Figure 11.8
DNS Server: Zone Editor (SOA)
Zone Editor (Records)
This dialog manages name resolution. In Record Key, enter the hostname then select
its type. A-Record represents the main entry. The value for this should be an IP
address. CNAME is an alias. Use the types NS and MX for detailed or partial records
that expand on the information provided in the NS Records and MX Records tabs.
These three types resolve to an existing A record. PTR is for reverse zones. It is
the opposite of an A record, for example:
hostname.example.com. IN A 192.168.0.1
1.0.168.192.in-addr.arpa IN PTR hostname.example.com.
NOTE: Editing the Reverse Zone
After adding a forward zone, go back to the main menu and select the reverse
zone for editing. There in the tab Basics activate the checkbox Automatically
Generate Records From and select your forward zone. That way, all changes to
the forward zone are automatically updated in the reverse zone.
226 Reference
11.4 Starting the BIND Name Server
On a openSUSE® system, the name server BIND (Berkeley Internet Name Domain)
comes precongured so it can be started right after installation without any problems.
If you already have a functioning Internet connection and have entered 127.0.0.1
as the name server address for localhost in /etc/resolv.conf, you normally
already have a working name resolution without needing to know the DNS of the
provider. BIND carries out name resolution via the root name server, a notably slower
process. Normally, the DNS of the provider should be entered with its IP address in the
conguration le /etc/named.conf under forwarders to ensure effective and
secure name resolution. If this works so far, the name server runs as a pure caching-
only name server. Only when you congure its own zones it becomes a proper DNS.
Find a simple example documented in /usr/share/doc/packages/bind/
config.
TIP: Automatic Adaptation of the Name Server Information
Depending on the type of Internet connection or the network connection, the
name server information can automatically be adapted to the current conditions.
To do this, set the NETCONFIG_DNS_POLICY variable in the /etc/
sysconfig/network/config le to auto.
However, do not set up an ofcial domain until one is assigned to you by the responsible
institution. Even if you have your own domain and it is managed by the provider, you
are better off not using it, because BIND would otherwise not forward requests for this
domain. The Web server at the provider, for example, would not be accessible for this
domain.
To start the name server, enter the command rcnamed start as root. If “done”
appears to the right in green then named (as the name server process is called) has been
started successfully. Test the name server immediately on the local system with the
host or dig programs, which should return localhost as the default server with
the address 127.0.0.1. If this is not the case, /etc/resolv.conf probably
contains an incorrect name server entry or the le does not exist at all. For the rst test,
enter host 127.0.0.1, which should always work. If you get an error message, use
rcnamed status to see whether the server is actually running. If the name server
does not start or behaves unexpectedly, you can usually nd the cause in the log le
/var/log/messages.
The Domain Name System 227
To use the name server of the provider (or one already running on your network) as the
forwarder, enter the corresponding IP address or addresses in the options section
under forwarders. The addresses included in Example 11.1, “Forwarding Options
in named.conf” (page 228) are just examples. Adjust these entries to your own setup.
Example 11.1
Forwarding Options in named.conf
options {
directory "/var/lib/named";
forwarders { 10.11.12.13; 10.11.12.14; };
listen-on { 127.0.0.1; 192.168.1.116; };
allow-query { 127/8; 192.168/16 };
notify no;
};
The options entry is followed by entries for the zone, localhost, and
0.0.127.in-addr.arpa. The type hint entry under “.” should always be
present. The corresponding les do not need to be modied and should work as they
are. Also make sure that each entry is closed with a “;” and that the curly braces are in
the correct places. After changing the conguration le /etc/named.conf or the
zone les, tell BIND to reread them with rcnamed reload. Achieve the same by
stopping and restarting the name server with rcnamed restart. Stop the server at
any time by entering rcnamed stop.
11.5 The /etc/named.conf
Conguration File
All the settings for the BIND name server itself are stored in the /etc/named.conf
le. However, the zone data for the domains to handle (consisting of the hostnames,
IP addresses, and so on) are stored in separate les in the /var/lib/named directory.
The details of this are described later.
/etc/named.conf is roughly divided into two areas. One is the options section
for general settings and the other consists of zone entries for the individual domains.
A logging section and acl (access control list) entries are optional. Comment lines
begin with a # sign or //. A minimal /etc/named.conf is shown in Example 11.2,
“A Basic /etc/named.conf” (page 229).
228 Reference
Example 11.2
A Basic /etc/named.conf
options {
directory "/var/lib/named";
forwarders { 10.0.0.1; };
notify no;
};
zone "localhost" in {
type master;
file "localhost.zone";
};
zone "0.0.127.in-addr.arpa" in {
type master;
file "127.0.0.zone";
};
zone "." in {
type hint;
file "root.hint";
};
11.5.1 Important Conguration Options
directory "filename";
Species the directory in which BIND can nd the les containing the zone data.
Usually, this is /var/lib/named.
forwarders { ip-address; };
Species the name servers (mostly of the provider) to which DNS requests should
be forwarded if they cannot be resolved directly. Replace ip-address with an
IP address like 192.168.1.116.
forward rst;
Causes DNS requests to be forwarded before an attempt is made to resolve them
via the root name servers. Instead of forward first, forward only can
be written to have all requests forwarded and none sent to the root name servers.
This makes sense for rewall congurations.
listen-on port 53 { 127.0.0.1; ip-address; };
Tells BIND on which network interfaces and port to accept client queries. port
53 does not need to be specied explicitly, because 53 is the default port. Enter
The Domain Name System 229
127.0.0.1 to permit requests from the local host. If you omit this entry entirely,
all interfaces are used by default.
listen-on-v6 port 53 {any; };
Tells BIND on which port it should listen for IPv6 client requests. The only alter-
native to any is none. As far as IPv6 is concerned, the server only accepts wild
card addresses.
query-source address * port 53;
This entry is necessary if a rewall is blocking outgoing DNS requests. This tells
BIND to post requests externally from port 53 and not from any of the high ports
above 1024.
query-source-v6 address * port 53;
Tells BIND which port to use for IPv6 queries.
allow-query { 127.0.0.1; net; };
Denes the networks from which clients can post DNS requests. Replace net with
address information like 192.168.2.0/24. The /24 at the end is an abbreviated
expression for the netmask (in this case 255.255.255.0).
allow-transfer ! *;;
Controls which hosts can request zone transfers. In the example, such requests are
completely denied with ! *. Without this entry, zone transfers can be requested
from anywhere without restrictions.
statistics-interval 0;
In the absence of this entry, BIND generates several lines of statistical information
per hour in /var/log/messages. Set it to 0 to suppress these statistics com-
pletely or set an interval in minutes.
cleaning-interval 720;
This option denes at which time intervals BIND clears its cache. This triggers an
entry in /var/log/messages each time it occurs. The time specication is in
minutes. The default is 60 minutes.
interface-interval 0;
BIND regularly searches the network interfaces for new or nonexistent interfaces.
If this value is set to 0, this is not done and BIND only listens at the interfaces de-
230 Reference
tected at start-up. Otherwise, the interval can be dened in minutes. The default is
sixty minutes.
notify no;
no prevents other name servers from being informed when changes are made to
the zone data or when the name server is restarted.
For a list of available options, read the manual page man 5 named.conf.
11.5.2 Logging
What, how, and where logging takes place can be extensively congured in BIND.
Normally, the default settings should be sufcient. Example 11.3, “Entry to Disable
Logging” (page 231), shows the simplest form of such an entry and completely suppresses
any logging.
Example 11.3
Entry to Disable Logging
logging {
category default { null; };
};
11.5.3 Zone Entries
Example 11.4
Zone Entry for example.com
zone "example.com" in {
type master;
file "example.com.zone";
notify no;
};
After zone, specify the name of the domain to administer (example.com) followed
by in and a block of relevant options enclosed in curly braces, as shown in Exam-
ple 11.4, “Zone Entry for example.com” (page 231). To dene a slave zone, switch the
type to slave and specify a name server that administers this zone as master
(which, in turn, may be a slave of another master), as shown in Example 11.5, “Zone
Entry for example.net” (page 232).
The Domain Name System 231
Example 11.5
Zone Entry for example.net
zone "example.net" in {
type slave;
file "slave/example.net.zone";
masters { 10.0.0.1; };
};
The zone options:
type master;
By specifying master, tell BIND that the zone is handled by the local name
server. This assumes that a zone le has been created in the correct format.
type slave;
This zone is transferred from another name server. It must be used together with
masters.
type hint;
The zone . of the hint type is used to set the root name servers. This zone deni-
tion can be left as is.
le example.com.zone or le “slave/example.net.zone”;
This entry species the le where zone data for the domain is located. This le is
not required for a slave, because this data is pulled from another name server. To
differentiate master and slave les, use the directory slave for the slave les.
masters { server-ip-address; };
This entry is only needed for slave zones. It species from which name server the
zone le should be transferred.
allow-update {! *; };
This option controls external write access, which would allow clients to make a
DNS entry—something not normally desirable for security reasons. Without this
entry, zone updates are not allowed at all. The above entry achieves the same be-
cause ! * effectively bans any such activity.
232 Reference
11.6 Zone Files
Two types of zone les are needed. One assigns IP addresses to hostnames and the
other does the reverse: it supplies a hostname for an IP address.
TIP: Using the Dot (Period, Fullstop) in Zone Files
The "." has an important meaning in the zone les. If hostnames are given
without a nal ., the zone is appended. Complete hostnames specied with a
full domain name must end with a . to avoid having the domain added to it
again. A missing or wrongly placed "." is probably the most frequent cause of
name server conguration errors.
The rst case to consider is the zone le example.com.zone, responsible for the
domain example.com, shown in Example 11.6, “The /var/lib/named/exam-
ple.com.zone File” (page 233).
Example 11.6
The /var/lib/named/example.com.zone File
1. $TTL 2D
2. example.com. IN SOA dns root.example.com. (
3. 2003072441 ; serial
4. 1D ; refresh
5. 2H ; retry
6. 1W ; expiry
7. 2D ) ; minimum
8.
9. IN NS dns
10. IN MX 10 mail
11.
12. gate IN A 192.168.5.1
13. IN A 10.0.0.1
14. dns IN A 192.168.1.116
15. mail IN A 192.168.3.108
16. jupiter IN A 192.168.2.100
17. venus IN A 192.168.2.101
18. saturn IN A 192.168.2.102
19. mercury IN A 192.168.2.103
20. ntp IN CNAME dns
21. dns6 IN A6 0 2002:c0a8:174::
Line 1:
$TTL denes the default time to live that should apply to all the entries in this le.
In this example, entries are valid for a period of two days (2 D).
The Domain Name System 233
Line 2:
This is where the SOA (start of authority) control record begins:
The name of the domain to administer is example.com in the rst position.
This ends with ".", because otherwise the zone would be appended a second
time. Alternatively, @ can be entered here, in which case the zone would be ex-
tracted from the corresponding entry in /etc/named.conf.
After IN SOA is the name of the name server in charge as master for this zone.
The name is expanded from dns to dns.example.com, because it does not
end with a ".".
An e-mail address of the person in charge of this name server follows. Because
the @ sign already has a special meaning, "." is entered here instead. For
root@example.com the entry must read root.example.com.. The "."
must be included at the end to prevent the zone from being added.
The ( includes all lines up to ) into the SOA record.
Line 3:
The serial number is an arbitrary number that is increased each time this le
is changed. It is needed to inform the secondary name servers (slave servers) of
changes. For this, a 10 digit number of the date and run number, written as
YYYYMMDDNN, has become the customary format.
Line 4:
The refresh rate species the time interval at which the secondary name
servers verify the zone serial number. In this case, one day.
Line 5:
The retry rate species the time interval at which a secondary name server,
in case of error, attempts to contact the primary server again. Here, two hours.
Line 6:
The expiration time species the time frame after which a secondary name
server discards the cached data if it has not regained contact to the primary server.
Here, a week.
234 Reference
Line 7:
The last entry in the SOA record species the negative caching TTL—the
time for which results of unresolved DNS queries from other servers may be cached.
Line 9:
The IN NS species the name server responsible for this domain. dns is extended
to dns.example.com because it does not end with a ".". There can be several
lines like this—one for the primary and one for each secondary name server. If
notify is not set to no in /etc/named.conf, all the name servers listed here
are informed of the changes made to the zone data.
Line 10:
The MX record species the mail server that accepts, processes, and forwards e-
mails for the domain example.com. In this example, this is the host
mail.example.com. The number in front of the hostname is the preference
value. If there are multiple MX entries, the mail server with the smallest value is
taken rst and, if mail delivery to this server fails, an attempt is made with the next
higher value.
Lines 12–19:
These are the actual address records where one or more IP addresses are assigned
to hostnames. The names are listed here without a "." because they do not include
their domain, so example.com is added to all of them. Two IP addresses are as-
signed to the host gate, as it has two network cards. Wherever the host address
is a traditional one (IPv4), the record is marked with A. If the address is an IPv6
address, the entry is marked with AAAA.
NOTE: IPv6 Syntax
The IPv6 record has a slightly different syntax than IPv4. Because of the
fragmentation possibility, it is necessary to provide information about
missed bits before the address. To just ll up the IPv6 address with the
needed number of “0”, add two colons at the correct place in the address.
pluto AAAA 2345:00C1:CA11::1234:5678:9ABC:DEF0
pluto AAAA 2345:00D2:DA11::1234:5678:9ABC:DEF0
Line 20:
The alias ntp can be used to address dns (CNAME means canonical name).
The Domain Name System 235
The pseudodomain in-addr.arpa is used for the reverse lookup of IP addresses
into hostnames. It is appended to the network part of the address in reverse notation.
So 192.168 is resolved into 168.192.in-addr.arpa. See Example 11.7, “Re-
verse Lookup” (page 236).
Example 11.7
Reverse Lookup
1. $TTL 2D
2. 168.192.in-addr.arpa. IN SOA dns.example.com. root.example.com. (
3. 2003072441 ; serial
4. 1D ; refresh
5. 2H ; retry
6. 1W ; expiry
7. 2D ) ; minimum
8.
9. IN NS dns.example.com.
10.
11. 1.5 IN PTR gate.example.com.
12. 100.3 IN PTR www.example.com.
13. 253.2 IN PTR cups.example.com.
Line 1:
$TTL denes the standard TTL that applies to all entries here.
Line 2:
The conguration le should activate reverse lookup for the network 192.168.
Given that the zone is called 168.192.in-addr.arpa, it should not be added
to the hostnames. Therefore, all hostnames are entered in their complete form—with
their domain and with a "." at the end. The remaining entries correspond to those
described for the previous example.com example.
Lines 3–7:
See the previous example for example.com.
Line 9:
Again this line species the name server responsible for this zone. This time,
however, the name is entered in its complete form with the domain and a "." at
the end.
Lines 11–13:
These are the pointer records hinting at the IP addresses on the respective hosts.
Only the last part of the IP address is entered at the beginning of the line, without
236 Reference
the "." at the end. Appending the zone to this (without the .in-addr.arpa)
results in the complete IP address in reverse order.
Normally, zone transfers between different versions of BIND should be possible without
any problems.
11.7 Dynamic Update of Zone Data
The term dynamic update refers to operations by which entries in the zone les of a
master server are added, changed, or deleted. This mechanism is described in RFC 2136.
Dynamic update is congured individually for each zone entry by adding an optional
allow-update or update-policy rule. Zones to update dynamically should not
be edited by hand.
Transmit the entries to update to the server with the command nsupdate. For the
exact syntax of this command, check the manual page for nsupdate (man 8 nsupdate).
For security reasons, any such update should be performed using TSIG keys as described
in Section 11.8, “Secure Transactions” (page 237).
11.8 Secure Transactions
Secure transactions can be made with the help of transaction signatures (TSIGs) based
on shared secret keys (also called TSIG keys). This section describes how to generate
and use such keys.
Secure transactions are needed for communication between different servers and for
the dynamic update of zone data. Making the access control dependent on keys is much
more secure than merely relying on IP addresses.
Generate a TSIG key with the following command (for details, see
man dnssec-keygen):
dnssec-keygen -a hmac-md5 -b 128 -n HOST host1-host2
This creates two les with names similar to these:
Khost1-host2.+157+34265.private Khost1-host2.+157+34265.key
The Domain Name System 237
The key itself (a string like ejIkuCyyGJwwuN3xAteKgg==) is found in both les.
To use it for transactions, the second le (Khost1-host2.+157+34265.key)
must be transferred to the remote host, preferably in a secure way (using scp, for exam-
ple). On the remote server, the key must be included in the /etc/named.conf le
to enable a secure communication between host1 and host2:
key host1-host2 {
algorithm hmac-md5;
secret "ejIkuCyyGJwwuN3xAteKgg==";
};
WARNING: File Permissions of /etc/named.conf
Make sure that the permissions of /etc/named.conf are properly restricted.
The default for this le is 0640, with the owner being root and the group
named. As an alternative, move the keys to an extra le with specially limited
permissions, which is then included from /etc/named.conf. To include an
external le, use:
include "filename"
Replace filename with an absolute path to your le with keys.
To enable the server host1 to use the key for host2 (which has the address
10.1.2.3 in this example), the server's /etc/named.conf must include the fol-
lowing rule:
server 10.1.2.3 {
keys { host1-host2. ;};
};
Analogous entries must be included in the conguration les of host2.
Add TSIG keys for any ACLs (access control lists, not to be confused with le system
ACLs) that are dened for IP addresses and address ranges to enable transaction secu-
rity. The corresponding entry could look like this:
allow-update { key host1-host2. ;};
This topic is discussed in more detail in the BIND Administrator Reference Manual
under update-policy.
238 Reference
11.9 DNS Security
DNSSEC, or DNS security, is described in RFC 2535. The tools available for DNSSEC
are discussed in the BIND Manual.
A zone considered secure must have one or several zone keys associated with it. These
are generated with dnssec-keygen, just like the host keys. The DSA encryption
algorithm is currently used to generate these keys. The public keys generated should
be included in the corresponding zone le with an $INCLUDE rule.
With the command dnssec-signzone, you can create sets of generated keys
(keyset- les), transfer them to the parent zone in a secure manner, and sign them.
This generates the les to include for each zone in /etc/named.conf.
11.10 For More Information
For additional information, refer to the BIND Administrator Reference Manual from
package bind-doc, which is installed under /usr/share/doc/packages/
bind/. Consider additionally consulting the RFCs referenced by the manual and the
manual pages included with BIND. /usr/share/doc/packages/bind/README
.SuSE contains up-to-date information about BIND in openSUSE.
The Domain Name System 239
12
DHCP
The purpose of the Dynamic Host Conguration Protocol (DHCP) is to assign network
settings centrally (from a server) rather than conguring them locally on each and every
workstation. A host congured to use DHCP does not have control over its own static
address. It is enabled to congure itself completely and automatically according to di-
rections from the server. If you use the NetworkManager on the client side, you do not
need to congure the client at all. This is useful if you have changing environments
and only one interface active at a time. Never use NetworkManager on a machine that
runs a DHCP server.
One way to congure a DHCP server is to identify each client using the hardware address
of its network card (which should be xed in most cases), then supply that client with
identical settings each time it connects to the server. DHCP can also be congured to
assign addresses to each relevant client dynamically from an address pool set up for
this purpose. In the latter case, the DHCP server tries to assign the same address to the
client each time it receives a request, even over extended periods. This works only if
the network does not have more clients than addresses.
DHCP makes life easier for system administrators. Any changes, even bigger ones, re-
lated to addresses and the network conguration in general can be implemented centrally
by editing the server's conguration le. This is much more convenient than recong-
uring numerous workstations. It is also much easier to integrate machines, particularly
new machines, into the network, because they can be given an IP address from the pool.
Retrieving the appropriate network settings from a DHCP server is especially useful
in case of laptops regularly used in different networks.
In this chapter, the DHCP server will run in the same subnet as the workstations,
192.168.2.0/24 with 192.168.2.1 as gateway. It has the xed IP address 192.168.2.254
DHCP 241
and serves two address ranges, 192.168.2.10 to 192.168.2.20 and 192.168.2.100
192.168.2.200.
A DHCP server supplies not only the IP address and the netmask, but also the hostname,
domain name, gateway, and name server addresses for the client to use. In addition to
that, DHCP allows a number of other parameters to be congured in a centralized way,
for example, a time server from which clients may poll the current time or even a print
server.
12.1 Conguring a DHCP Server with
YaST
To install a DHCP server, start YaST and select Software > Software Management.
Choose Filter > Patterns and select DHCP and DNS Server. Conrm the installation
of the dependent packages to nish the installation process.
IMPORTANT: LDAP Support
The YaST DHCP module can be set up to store the server conguration locally
(on the host that runs the DHCP server) or to have its conguration data
managed by an LDAP server. If you want to use LDAP, set up your LDAP envi-
ronment before conguring the DHCP server.
For more information about LDAP, see Chapter 4, LDAP—A Directory Service
(↑Security Guide).
The YaST DHCP module (yast2-dhcp-server) allows you to set up your own
DHCP server for the local network. The module can run in wizard mode or expert
conguration mode.
12.1.1 Initial Conguration (Wizard)
When the module is started for the rst time, a wizard starts, prompting you to make
a few basic decisions concerning server administration. Completing this initial setup
produces a very basic server conguration that should function in its essential aspects.
The expert mode can be used to deal with more advanced conguration tasks.
242 Reference
Card Selection
In the rst step, YaST looks for the network interfaces available on your system
and displays them in a list. From the list, select the interface to which the DHCP
server should listen and click Select. After this, select Open Firewall for Selected
Interfaces to open the rewall for this interface, and click Next. See Figure 12.1,
“DHCP Server: Card Selection” (page 243).
Figure 12.1
DHCP Server: Card Selection
Global Settings
Use the check box to determine whether your DHCP settings should be automati-
cally stored by an LDAP server. In the entry elds, provide the network specics
for all clients the DHCP server should manage. These specics are the domain
name, address of a time server, addresses of the primary and secondary name
server, addresses of a print and a WINS server (for a mixed network with both
Windows and Linux clients), gateway address, and lease time. See Figure 12.2,
“DHCP Server: Global Settings” (page 244).
DHCP 243
Figure 12.2
DHCP Server: Global Settings
Dynamic DHCP
In this step, congure how dynamic IP addresses should be assigned to clients. To
do so, specify an IP range from which the server can assign addresses to DHCP
clients. All these addresses must be covered by the same netmask. Also specify the
lease time during which a client may keep its IP address without needing to request
an extension of the lease. Optionally, specify the maximum lease time—the period
during which the server reserves an IP address for a particular client. See Fig-
ure 12.3, “DHCP Server: Dynamic DHCP” (page 245).
244 Reference
Figure 12.3
DHCP Server: Dynamic DHCP
Finishing the Conguration and Setting the Start Mode
After the third part of the conguration wizard, a last dialog is shown in which you
can dene how the DHCP server should be started. Here, specify whether to start
the DHCP server automatically when the system is booted or manually when
needed (for example, for testing purposes). Click Finish to complete the congura-
tion of the server. See Figure 12.4, “DHCP Server: Start-Up” (page 245).
Figure 12.4
DHCP Server: Start-Up
DHCP 245
12.2 DHCP Software Packages
Both the DHCP server and the DHCP clients are available for openSUSE. The DHCP
server available is dhcpd (published by the Internet Systems Consortium). On the client
side, choose between two different DHCP client programs: dhcp-client (also from
ISC) and the DHCP client daemon in the dhcpcd package.
openSUSE installs dhcpcd by default. The program is very easy to handle and is launched
automatically on each system boot to watch for a DHCP server. It does not need a
conguration le to do its job and works out of the box in most standard setups. For
more complex situations, use the ISC dhcp-client, which is controlled by means of the
conguration le /etc/dhclient.conf.
12.3 The DHCP Server dhcpd
The core of any DHCP system is the dynamic host conguration protocol daemon. This
server leases addresses and watches how they are used, according to the settings dened
in the conguration le /etc/dhcpd.conf. By changing the parameters and values
in this le, a system administrator can inuence the program's behavior in numerous
ways. Look at the basic sample /etc/dhcpd.conf le in Example 12.1, “The
Conguration File /etc/dhcpd.conf” (page 246).
Example 12.1
The Conguration File /etc/dhcpd.conf
default-lease-time 600; # 10 minutes
max-lease-time 7200; # 2 hours
option domain-name "example.com";
option domain-name-servers 192.168.1.116;
option broadcast-address 192.168.2.255;
option routers 192.168.2.1;
option subnet-mask 255.255.255.0;
subnet 192.168.2.0 netmask 255.255.255.0
{
range 192.168.2.10 192.168.2.20;
range 192.168.2.100 192.168.2.200;
}
246 Reference
This simple conguration le should be sufcient to get the DHCP server to assign IP
addresses in the network. Make sure that a semicolon is inserted at the end of each line,
because otherwise dhcpd is not started.
The sample le can be divided into three sections. The rst one denes how many
seconds an IP address is leased to a requesting client by default
(default-lease-time) before it should apply for renewal. This section also in-
cludes a statement of the maximum period for which a machine may keep an IP address
assigned by the DHCP server without applying for renewal (max-lease-time).
In the second part, some basic network parameters are dened on a global level:
The line option domain-name denes the default domain of your network.
With the entry option domain-name-servers, specify up to three values for
the DNS servers used to resolve IP addresses into hostnames and vice versa. Ideally,
congure a name server on your machine or somewhere else in your network before
setting up DHCP. That name server should also dene a hostname for each dynamic
address and vice versa. To learn how to congure your own name server, read
Chapter 11, The Domain Name System (page 215).
The line option broadcast-address denes the broadcast address the re-
questing client should use.
With option routers, set where the server should send data packets that cannot
be delivered to a host on the local network (according to the source and target host
address and the subnet mask provided). In most cases, especially in smaller networks,
this router is identical to the Internet gateway.
With option subnet-mask, specify the netmask assigned to clients.
The last section of the le denes a network, including a subnet mask. To nish,
specify the address range that the DHCP daemon should use to assign IP addresses to
interested clients. In Example 12.1, “The Conguration File /etc/dhcpd.conf” (page 246),
clients may be given any address between 192.168.2.10 and 192.168.2.20 as
well as 192.168.2.100 and 192.168.2.200.
After editing these few lines, you should be able to activate the DHCP daemon with
the command rcdhcpd start. It will be ready for use immediately. Use the command
rcdhcpd check-syntax to perform a brief syntax check. If you encounter any
DHCP 247
unexpected problems with your conguration (the server aborts with an error or does
not return done on start), you should be able to nd out what has gone wrong by
looking for information either in the main system log /var/log/messages or on
console 10 (Ctrl + Alt + F10).
On a default openSUSE system, the DHCP daemon is started in a chroot environment
for security reasons. The conguration les must be copied to the chroot environment
so the daemon can nd them. Normally, there is no need to worry about this because
the command rcdhcpd start automatically copies the les.
12.3.1 Clients with Fixed IP Addresses
DHCP can also be used to assign a predened, static address to a specic client. Ad-
dresses assigned explicitly always take priority over dynamic addresses from the pool.
A static address never expires in the way a dynamic address would, for example, if
there were not enough addresses available and the server needed to redistribute them
among clients.
To identify a client congured with a static address, dhcpd uses the hardware address
(which is a globally unique, xed numerical code consisting of six octet pairs) for the
identication of all network devices (for example, 00:30:6E:08:EC:80). If the
respective lines, like the ones in Example 12.2, “Additions to the Conguration File”
(page 248), are added to the conguration le of Example 12.1, “The Conguration
File /etc/dhcpd.conf” (page 246), the DHCP daemon always assigns the same set of
data to the corresponding client.
Example 12.2
Additions to the Conguration File
host jupiter {
hardware ethernet 00:30:6E:08:EC:80;
fixed-address 192.168.2.100;
}
The name of the respective client (host hostname, here jupiter) is entered in
the rst line and the MAC address in the second line. On Linux hosts, nd the MAC
address with the command ip link show followed by the network device (for ex-
ample, eth0). The output should contain something like
link/ether 00:30:6E:08:EC:80
248 Reference
In the preceding example, a client with a network card having the MAC address
00:30:6E:08:EC:80 is assigned the IP address 192.168.2.100 and the hostname
jupiter automatically. The type of hardware to enter is ethernet in nearly all
cases, although token-ring, which is often found on IBM systems, is also supported.
12.3.2 The openSUSE Version
To improve security, the openSUSE version of the ISC's DHCP server comes with the
non-root/chroot patch by Ari Edelkind applied. This enables dhcpd to run with the user
ID nobody and run in a chroot environment (/var/lib/dhcp). To make this pos-
sible, the conguration le dhcpd.conf must be located in /var/lib/dhcp/
etc. The init script automatically copies the le to this directory when starting.
Control the server's behavior regarding this feature by means of entries in the le /etc/
sysconfig/dhcpd. To run dhcpd without the chroot environment, set the variable
DHCPD_RUN_CHROOTED in /etc/sysconfig/dhcpd to “no”.
To enable dhcpd to resolve hostnames even from within the chroot environment, some
other conguration les must be copied as well:
/etc/localtime
/etc/host.conf
/etc/hosts
/etc/resolv.conf
These les are copied to /var/lib/dhcp/etc/ when starting the init script. Take
these copies into account for any changes that they require if they are dynamically
modied by scripts like /etc/ppp/ip-up. However, there should be no need to
worry about this if the conguration le only species IP addresses (instead of host-
names).
If your conguration includes additional les that should be copied into the chroot en-
vironment, set these under the variable DHCPD_CONF_INCLUDE_FILES in the le
/etc/sysconfig/dhcpd. To ensure that the DHCP logging facility keeps working
DHCP 249
even after a restart of the syslog-ng daemon, there is an additional entry
SYSLOGD_ADDITIONAL_SOCKET_DHCP in the le /etc/sysconfig/syslog.
12.4 For More Information
More information about DHCP is available at the Web site of the Internet Systems
Consortium (http://www.isc.org/products/DHCP/). Information is also
available in the dhcpd, dhcpd.conf, dhcpd.leases, and dhcp-options man
pages.
250 Reference
13
Time Synchronization with
NTP
The NTP (network time protocol) mechanism is a protocol for synchronizing the system
time over the network. First, a machine can obtain the time from a server that is a reliable
time source. Second, a machine can itself act as a time source for other computers in
the network. The goal is twofold—maintaining the absolute time and synchronizing
the system time of all machines within a network.
Maintaining an exact system time is important in many situations. The built-in hardware
(BIOS) clock does often not meet the requirements of applications such as databases
or clusters. Manual correction of the system time would lead to severe problems because,
for example, a backward leap can cause malfunction of critical applications. Within a
network, it is usually necessary to synchronize the system time of all machines, but
manual time adjustment is a bad approach. NTP provides a mechanism to solve these
problems. The NTP service continuously adjusts the system time with the help of reliable
time servers in the network. It further enables the management of local reference clocks,
such as radio-controlled clocks.
13.1 Conguring an NTP Client with
YaST
The NTP daemon (ntpd) coming with the ntp package is preset to use the local
computer clock as a time reference. Using the (BIOS) clock, however, only serves as
a fallback for cases where no time source of better precision is available. YaST facilitates
the conguration of an NTP client.
Time Synchronization with NTP 251
13.1.1 Basic Conguration
The YaST NTP client conguration (Network Services > NTP Conguration) consists
of tabs. Set the start mode of ntpd and the server to query on the General Settings tab.
Figure 13.1
Advanced NTP Conguration: General Settings
Only Manually
Select Only Manually, if you want to congure everything on your own.
Synchronize without Daemon
On laptops and other machines that suspend automatically, select Synchronize
without Daemon. Using this mode, YaST does not start ntpd on the local machine
for synchronizing. Instead YaST creates a crontab entry (/etc/cron.d/novell
.ntp-synchronize) that checks the time with the time server as specied in
the Interval of the Synchronization in Minutes eld. For more information about
cron, see Section 7.1.2, “The cron Package” (page 122).
252 Reference
Now and On Boot
Select Now and On Boot to start ntpd automatically when the system is booted.
Either of 0.opensuse.pool.ntp.org, 1.opensuse.pool.ntp.org,
2.opensuse.pool.ntp.org, or 3.opensuse.pool.ntp.org is pre-
selected.
13.1.2 Changing Basic Conguration
The servers and other time sources for the client to query are listed in the lower part of
the General Settings tab. Modify this list as needed with Add, Edit, and Delete. Display
Log provides the possibility to view the log les of your client.
Click Add to add a new source of time information. In the following dialog, select the
type of source with which the time synchronization should be made. The following
options are available:
Figure 13.2
YaST: NTP Server
Time Synchronization with NTP 253
Server
In the pull-down Select list (see Figure 13.2, “YaST: NTP Server” (page 253), de-
termine whether to set up time synchronization using a time server from your local
network (Local NTP Server) or an Internet-based time server that takes care of
your time zone (Public NTP Server). For a local time server, click Lookup to start
an SLP query for available time servers in your network. Select the most suitable
time server from the list of search results and exit the dialog with OK. For a public
time server, select your country (time zone) and a suitable server from the list under
Public NTP Server then exit the dialog with OK. In the main dialog, test the avail-
ability of the selected server with Test.
Another dialog enables you to select an NTP server. Activate Use for Initial Syn-
chronization to trigger the synchronization of the time information between the
server and the client when the system is booted. Options allows you to specify ad-
ditional options for ntpd.
Using Access Control Options, you can restrict the actions that the remote computer
can perform with the daemon running on your computer. This eld is enabled only
after checking Restrict NTP Service to Congured Servers Only on the Security
Settings tab (see Figure 13.3, “Advanced NTP Conguration: Security Settings”
(page 255)). The options correspond to the restrict clauses in /etc/ntp
.conf. For example, nomodify notrap noquery disallows the server to
modify NTP settings of your computer and to use the trap facility (a remote event
logging feature) of your NTP daemon. Using these restrictions is recommended
for servers out of your control (for example, on the Internet).
Refer to /usr/share/doc/packages/ntp-doc (part of the ntp-doc
package) for detailed information.
Peer
A peer is a machine to which a symmetric relationship is established: it acts both
as a time server and as a client. To use a peer in the same network instead of a
server, enter the address of the system. The rest of the dialog is identical to the
Server dialog.
Radio Clock
To use a radio clock in your system for the time synchronization, enter the clock
type, unit number, device name, and other options in this dialog. Click Driver
Calibration to ne-tune the driver. Detailed information about the operation of a
254 Reference
local radio clock is available in /usr/share/doc/packages/ntp-doc/
refclock.html.
Outgoing Broadcast
Time information and queries can also be transmitted by broadcast in the network.
In this dialog, enter the address to which such broadcasts should be sent. Do not
activate broadcasting unless you have a reliable time source like a radio controlled
clock.
Incoming Broadcast
If you want your client to receive its information via broadcast, enter the address
from which the respective packets should be accepted in this elds.
Figure 13.3
Advanced NTP Conguration: Security Settings
In the Security Settings tab (see Figure 13.3, “Advanced NTP Conguration: Security
Settings” (page 255)), determine whether ntpd should be started in a chroot jail. By
default, Run NTP Daemon in Chroot Jail is activated. This increases the security in the
event of an attack over ntpd, as it prevents the attacker from compromising the entire
system.
Time Synchronization with NTP 255
Restrict NTP Service to Congured Servers Only increases the security of your system
by disallowing remote computers to view and modify NTP settings of your computer
and to use the trap facility for remote event logging. Once enabled, these restrictions
apply to all remote computers, unless you override the access control options for indi-
vidual computers in the list of time sources in the General Settings tab. For all other
remote computers, only querying for local time is allowed.
Enable Open Port in Firewall if SuSErewall2 is active (which it is by default). If you
leave the port closed, it is not possible to establish a connection to the time server.
13.2 Manually Conguring ntp in the
Network
The easiest way to use a time server in the network is to set server parameters. For ex-
ample, if a time server called ntp.example.com is reachable from the network, add
its name to the le /etc/ntp.conf by adding the following line:
server ntp.example.com
To add more time servers, insert additional lines with the keyword server. After
initializing ntpd with the command rcntp start, it takes about one hour until the
time is stabilized and the drift le for correcting the local computer clock is created.
With the drift le, the systematic error of the hardware clock can be computed as soon
as the computer is powered on. The correction is used immediately, resulting in a
higher stability of the system time.
There are two possible ways to use the NTP mechanism as a client: First, the client can
query the time from a known server in regular intervals. With many clients, this approach
can cause a high load on the server. Second, the client can wait for NTP broadcasts sent
out by broadcast time servers in the network. This approach has the disadvantage that
the quality of the server is unknown and a server sending out wrong information can
cause severe problems.
If the time is obtained via broadcast, you do not need the server name. In this case, enter
the line broadcastclient in the conguration le /etc/ntp.conf. To use one
or more known time servers exclusively, enter their names in the line starting with
servers.
256 Reference
13.3 Dynamic Time Synchronization
at Runtime
If the system boots without network connection, ntpd starts up, but it cannot resolve
DNS names of the time servers set in the conguration le. This can happen if you use
Network Manager with an encrypted WLAN.
If you want ntpd to resolve DNS names at runtime, you must set the dynamic option.
Then, when the network is establish some time after booting, ntpd looks up the names
again and can reach the time servers to get the time.
Manually edit /etc/ntp.conf and add dynamic to one or more server entries:
server ntp.example.com dynamic
Or use YaST and proceed as follows:
1
In YaST click Network Services > NTP Conguration.
2
Select the server you want to congure. Then click Edit.
3
Activate the Options eld and add dynamic. Separate it with a space, if there are
already other options entered.
4
Click Ok to close the edit dialog. Repeat the previous step to change all servers as
wanted.
5
Finally click Ok to save the settings.
13.4 Setting Up a Local Reference
Clock
The software package ntp contains drivers for connecting local reference clocks. A list
of supported clocks is available in the ntp-doc package in the le /usr/share/
doc/packages/ntp-doc/refclock.html. Every driver is associated with a
number. In ntp, the actual conguration takes place by means of pseudo IP addresses.
Time Synchronization with NTP 257
The clocks are entered in the le /etc/ntp.conf as though they existed in the net-
work. For this purpose, they are assigned special IP addresses in the form
127.127.t.u. Here, t stands for the type of the clock and determines which driver
is used and u for the unit, which determines the interface used.
Normally, the individual drivers have special parameters that describe conguration
details. The le /usr/share/doc/packages/ntp-doc/drivers/driverNN
.html (where NN is the number of the driver) provides information about the particular
type of clock. For example, the “type 8” clock (radio clock over serial interface) requires
an additional mode that species the clock more precisely. The Conrad DCF77 receiver
module, for example, has mode 5. To use this clock as a preferred reference, specify
the keyword prefer. The complete server line for a Conrad DCF77 receiver
module would be:
server 127.127.8.0 mode 5 prefer
Other clocks follow the same pattern. Following the installation of the ntp-doc
package, the documentation for ntp is available in the directory /usr/share/doc/
packages/ntp-doc. The le /usr/share/doc/packages/ntp-doc/
refclock.html provides links to the driver pages describing the driver parameters.
258 Reference
14
Sharing File Systems with NFS
Distributing and sharing le systems over a network is a common task in corporate
environments. The well-proven network le system (NFS) works together with NIS,
the yellow pages protocol. For a more secure protocol that works together with LDAP
and may also use Kerberos, check NFSv4.
NFS with NIS makes a network transparent to the user. With NFS, it is possible to
distribute arbitrary le systems over the network. With an appropriate setup, users always
nd themselves in the same environment regardless of the terminal they currently use.
IMPORTANT: Need for DNS
In principle, all exports can be made using IP addresses only. To avoid time-
outs, you need a working DNS system. DNS is necessary at least for logging
purposes, because the mountd daemon does reverse lookups.
14.1 Terminology
The following are terms used in the YaST module.
Exports
A directory exported by an NFS server, which clients can integrate it into their
system.
Sharing File Systems with NFS 259
NFS Client
The NFS client is a system that uses NFS services from an NFS server over the
Network File System protocol. The TCP/IP protocol is already integrated into the
Linux kernel; there is no need to install any additional software.
NFS Server
The NFS server provides NFS services to clients. A running server depends on the
following daemons: nfsd (worker), idmapd (user and group name mappings to
IDs and vice versa), statd (le locking), and mountd (mount requests).
14.2 Installing NFS Server
The NFS server software is not part of the default installation. To install the NFS
server software, start YaST and select Software > Software Management. Now choose
Filter > Patterns and select File Server or use the Search option and search for NFS
Server. Conrm the installation of the packages to nish the installation process.
Like NIS, NFS is a client/server system. However, a machine can be both—it can supply
le systems over the network (export) and mount le systems from other hosts (import).
14.3 Conguring NFS Server
Conguring an NFS server can be done either through YaST or manually. For authen-
tication, NFS can also be combined with Kerberos.
14.3.1 Exporting File Systems with YaST
With YaST, turn a host in your network into an NFS server—a server that exports di-
rectories and les to all hosts granted access to it. The server can also provide applica-
tions to all members of a group without installing the applications locally on each and
every host. To set up such a server, proceed as follows:
1
Start YaST and select Network Services > NFS Server; see Figure 14.1, “NFS Server
Conguration Tool” (page 261).
260 Reference
Figure 14.1
NFS Server Conguration Tool
2
Activate the Start radio button and enter the NFSv4 Domain Name.
3
Click Enable GSS Security if you need secure access to the server. A prerequisite
for this is to have Kerberos installed on your domain and to have both the server and
the clients kerberized. Click Next.
4
Enter the directories to export in the upper text eld. Below, enter the hosts that
should have access to them. This dialog is shown in Figure 14.2, “Conguring an
NFS Server with YaST” (page 262).
Sharing File Systems with NFS 261
Figure 14.2
Conguring an NFS Server with YaST
The gure shows the scenario where NFSv4 is enabled in the previous dialog.
Bindmount Targets is shown in the right pane. For more details, click Help.
In the lower half of the dialog, there are four options that can be set for each host:
single host, netgroups, wildcards, and IP networks. For a more
thorough explanation of these options, refer to the exports man page.
5
Click Finish to complete the conguration.
IMPORTANT: Automatic Firewall Conguration
If a rewall is active on your system (SuSErewall2), YaST adapts its conguration
for the NFS server by enabling the nfs service when Open Ports in Firewall is
selected.
262 Reference
14.3.1.1 Exporting for NFSv4 Clients
Activate Enable NFSv4 to support NFSv4 clients. Clients with NFSv3 can still access
the server's exported directories if they are exported appropriately. This is explained in
detail in Section 14.3.1.3, “Coexisting v3 and v4 Exports” (page 266).
After activating NFSv4, enter an appropriate domain name. Make sure the name is the
same as the one in the /etc/idmapd.conf le of any NFSv4 client that accesses
this particular server. This parameter is for the idmapd service that is required for NFSv4
support (on both server and client). Leave it as localdomain (the default) if you do
not have special requirements. For more information, see the links in Section 14.5, “For
More Information” (page 273).
Click Next. The dialog that follows has two sections. The upper half consists of two
columns named Directories and Bind Mount Targets. Directories is a directly editable
column that lists the directories to export.
For a xed set of clients, there are two types of directories that can be exported—direc-
tories that act as pseudo root le systems and those that are bound to some subdirectory
of the pseudo le system. This pseudo le system acts as a base point under which all
le systems exported for the same client set take their place. For a client or set of clients,
only one directory on the server can be congured as pseudo root for export. For this
client, export multiple directories by binding them to some existing subdirectory in the
pseudo root.
Sharing File Systems with NFS 263
Figure 14.3
Exporting Directories with NFSv4
In the lower half of the dialog, enter the client (wild card) and export options for a
particular directory. After adding a directory in the upper half, another dialog for entering
the client information and options pops up automatically. After that, to add a new client
or a set of clients, click Add Host.
In the small dialog that opens, enter the host wild card. There are four possible types
of host wild cards that can be set for each host: a single host (name or IP address), net-
groups, wild cards (such as * indicating all machines can access the server), and IP
networks. Then, in Options, include fsid=0 in the comma-separated list of options
to congure the directory as pseudo root. If this directory needs to be bound to another
directory under an already congured pseudo root, make sure that a target bind path is
given in the option list with bind=/target/path.
For example, suppose that the directory /exports is chosen as the pseudo root direc-
tory for all the clients that can access the server. Then add this in the upper half and
make sure that the options entered for this directory include fsid=0. If there is another
directory, /data, that also needs to be NFSv4 exported, add this directory to the upper
half. While entering options for this, make sure that bind=/exports/data is in
264 Reference
the list and that /exports/data is an already existing subdirectory of /exports.
Any change in the option bind=/target/path, whether addition, deletion, or
change in value, is reected in Bindmount Targets. This column is not a directly editable
column, but instead summarizes directories and their nature. After all information is
provided, click Finish to complete the conguration. The service will become available
immediately.
14.3.1.2 NFSv3 and NFSv2 Exports
Make sure that Enable NFSv4 is not checked in the initial dialog before clicking Next.
The next dialog has two parts. In the upper text eld, enter the directories to export.
Below, enter the hosts that should have access to them. There are four types of host
wild cards that can be set for each host: a single host (name or IP address), netgroups,
wild cards (such as * indicating all machines can access the server), and IP networks.
This dialog is shown in Figure 14.4, “Exporting Directories with NFSv2 and v3”
(page 266). Find a more thorough explanation of these options in man exports. Click
Finish to complete the conguration.
Sharing File Systems with NFS 265
Figure 14.4
Exporting Directories with NFSv2 and v3
14.3.1.3 Coexisting v3 and v4 Exports
NFSv3 and NFSv4 exports can coexist on a server. After enabling the support for NFSv4
in the initial conguration dialog, those exports for which fsid=0 and
bind=/target/path are not included in the option list are considered v3 exports.
Consider the example in Figure 14.2, “Conguring an NFS Server with YaST”
(page 262). If you add another directory, such as /data2, using Add Directory then in
the corresponding options list do not mention either fsid=0 or
bind=/target/path, this export acts as a v3 export.
IMPORTANT
Automatic Firewall Conguration
If SuSErewall2 is active on your system, YaST adapts its conguration for the
NFS server by enabling the nfs service when Open Ports in Firewall is selected.
266 Reference
14.3.2 Exporting File Systems Manually
The conguration les for the NFS export service are /etc/exports and /etc/
sysconfig/nfs. In addition to these les, /etc/idmapd.conf is needed for
the NFSv4 server conguration. To start or restart the services, run the command
rcnfsserver restart. This also starts the rpc.idmapd if NFSv4 is congured
in /etc/sysconfig/nfs. The NFS server depends on a running RPC portmapper.
Therefore, also start or restart the portmapper service with rcrpcbind restart.
14.3.2.1 Exporting File Systems with NFSv4
NFSv4 is the latest version of NFS protocol available on openSUSE. Conguring direc-
tories for export with NFSv4 differs slightly from previous NFS versions.
/etc/exports
The /etc/exports le contains a list of entries. Each entry indicates a directory
that is shared and how it is shared. A typical entry in /etc/exports consists of:
/shared/directory host(option_list)
For example:
/export 192.168.1.2(rw,fsid=0,sync,crossmnt)
/export/data 192.168.1.2(rw,bind=/data,sync)
Here the IP address 192.168.1.2 is used to identify the allowed client. You can also
use the name of the host, a wild card indicating a set of hosts (*.abc.com, *, etc.),
or netgroups (@my-hosts).
The directory which species fsid=0 is special. It is the root of the lesystem that is
exported, sometimes referred to as the pseudo root lesystem. This directory must also
have the crossmnt for correct operation with NFSv4. All other directories exported
via NFSv4 must be mounted below this point. If you want to export a directory that is
not within the exported root, it needs to be bound into the exported tree. This can be
done using the bind= syntax.
In the example above, /data is not within /export, so we export /export/data,
and specify that the /data directory should be bound to that name. The directory
/export/data must exist and should normally be empty.
Sharing File Systems with NFS 267
When clients mount from this server, they just mount servername:/ rather than
servername:/export. It is not necessary to mount servername:/data, because
it will automatically appear beneath wherever servername:/ was mounted.
/etc/syscong/nfs
The /etc/sysconfig/nfs le contains a few parameters that determine NFSv4
server daemon behavior. It is important to set the parameter NFS4_SUPPORT to yes.
NFS4_SUPPORT determines whether the NFS server supports NFSv4 exports and
clients.
/etc/idmapd.conf
Every user on a Linux machine has a name and ID. idmapd does the name-to-ID mapping
for NFSv4 requests to the server and replies to the client. It must be running on both
server and client for NFSv4, because NFSv4 uses only names for its communication.
Make sure that there is a uniform way in which usernames and IDs (uid) are assigned
to users across machines that might probably be sharing le systems using NFS. This
can be achieved by using NIS, LDAP, or any uniform domain authentication mechanism
in your domain.
The parameter Domain must be set the same for both, client and server in the /etc/
idmapd.conf le. If you are not sure, leave the domain as localdomain in the
server and client les. A sample conguration le looks like the following:
[General]
Verbosity = 0
Pipefs-Directory = /var/lib/nfs/rpc_pipefs
Domain = localdomain
[Mapping]
Nobody-User = nobody
Nobody-Group = nobody
For further reference, read the man page of idmapd and idmapd.conf; man
idmapd, man idmapd.conf.
268 Reference
Starting and Stopping Services
After changing /etc/exports or /etc/sysconfig/nfs, start or restart the
NFS server service with rcnfsserver restart. After changing /etc/idmapd
.conf, reload the conguration le with the command killall -HUP
rpc.idmapd.
If the NFS service needs to start at boot time, run the command chkconfig
nfsserver on.
14.3.2.2 Exporting File Systems with NFSv2 and
NFSv3
This section is specic to NFSv3 and NFSv2 exports. Refer to Section 14.3.1.1, “Ex-
porting for NFSv4 Clients” (page 263) for exporting with NFSv4.
Exporting le systems with NFS involves two conguration les: /etc/exports
and /etc/sysconfig/nfs. A typical /etc/exports le entry is in the format:
/shared/directory host(list_of_options)
For example:
/export 192.168.1.2(rw,sync)
Here, the directory /export is shared with the host 192.168.1.2 with the option
list rw,sync. This IP address can be replaced with a client name or set of clients using
a wild card (such as *.abc.com) or even netgroups.
For a detailed explanation of all options and their meaning, refer to the man page of
exports (man exports).
After changing /etc/exports or /etc/sysconfig/nfs, start or restart the
NFS server using the command rcnfsserver restart.
14.3.3 NFS with Kerberos
To use Kerberos authentication for NFS, GSS security must be enabled. Select Enable
GSS Security in the initial YaST NFS Server dialog. You must have a working Kerberos
Sharing File Systems with NFS 269
server to use this feature. YaST does not set up the server but just uses the provided
functionality. If you want to use Kerberos authentication in addition to the YaST con-
guration, complete at least the following steps before running the NFS conguration:
1
Make sure that both the server and the client are in the same Kerberos domain. They
must access the same KDC (Key Distribution Center) server and share their krb5
.keytab le (the default location on any machine is /etc/krb5.keytab). For
more information about Kerberos, see Chapter 6, Network Authentication with Ker-
beros (↑Security Guide).
2
Start the gssd service on the client with rcgssd start.
3
Start the svcgssd service on the server with rcsvcgssd start.
For more information about conguring kerberized NFS, refer to the links in Sec-
tion 14.5, “For More Information” (page 273).
14.4 Conguring Clients
To congure your host as an NFS client, you do not need to install additional software.
All needed packages are installed by default.
14.4.1 Importing File Systems with YaST
Authorized users can mount NFS directories from an NFS server into the local le tree
using the YaST NFS client module. Click on Add and enter the hostname of the NFS
server, the directory to import, and the mount point at which to mount this directory
locally. The changes will take effect after clicking Finish in the rst dialog.
In the NFS Settings tab, enable Open Port in Firewall to allow access to the service
from remote computers. The rewall status is displayed next to the check box. When
using NFSv4, make sure that the checkbox Enable NFSv4 is selected and that the NFSv4
Domain Name contains the same value as used by the NFSv4 server. The default domain
is localdomain.
Click OK to save your changes. See Figure 14.5, “NFS Client Conguration with YaST”
(page 271).
270 Reference
The conguration is written to /etc/fstab and the specied le systems are
mounted. When you start the YaST conguration client at a later time, it also reads the
existing conguration from this le.
Figure 14.5
NFS Client Conguration with YaST
14.4.2 Importing File Systems Manually
The prerequisite for importing le systems manually from an NFS server is a running
RPC port mapper. Start it by entering rcrpcbind start as root. Then remote
le systems can be mounted in the le system like local partitions using mount:
mount host:remote-pathlocal-path
To import user directories from the nfs.example.com machine, for example, use:
mount nfs.example.com:/home /home
Sharing File Systems with NFS 271
14.4.2.1 Using the Automount Service
The autofs daemon can be used to mount remote le systems automatically. Add the
following entry in the your /etc/auto.master le:
/nfsmounts /etc/auto.nfs
Now the /nfsmounts directory acts as the root for all the NFS mounts on the client
if the auto.nfs le is lled appropriately. The name auto.nfs is chosen for the
sake of convenience—you can choose any name. In auto.nfs add entries for all the
NFS mounts as follows:
localdata -fstype=nfs server1:/data
nfs4mount -fstype=nfs4 server2:/
Activate the settings with rcautofs start as root. In this example,
/nfsmounts/localdata, the /data directory of server1, is mounted with
NFS and /nfsmounts/nfs4mount from server2 is mounted with NFSv4.
If the /etc/auto.master le is edited while the service autofs is running, the au-
tomounter must be restarted for the changes to take effect with rcautofs restart.
14.4.2.2 Manually Editing /etc/fstab
A typical NFSv3 mount entry in /etc/fstab looks like this:
nfs.example.com:/data /local/path nfs rw,noauto 0 0
NFSv4 mounts may also be added to the /etc/fstab le. For these mounts, use
nfs4 instead of nfs in the third column and make sure that the remote le system is
given as / after the nfs.example.com: in the rst column. A sample line for an
NFSv4 mount in /etc/fstab looks like this:
nfs.example.com:/ /local/pathv4 nfs4 rw,noauto 0 0
The noauto option prevents the le system from being mounted automatically at start
up. If you want to mount the respective le system manually, it is possible to shorten
the mount command specifying the mount point only:
mount /local/path
272 Reference
Note, that if you do not enter the noauto option, the initialization scripts of the system
will handle the mount of those le systems at start up.
14.5 For More Information
In addition to the man pages of exports, nfs, and mount, information about con-
guring an NFS server and client is available in /usr/share/doc/packages/
nfsidmap/README. For further documentation online refer to the following Web
sites:
Find the detailed technical documentation online at SourceForge [http://nfs
.sourceforge.net/].
For instructions for setting up kerberized NFS, refer to NFS Version 4 Open Source
Reference Implementation [http://www.citi.umich.edu/projects/
nfsv4/linux/krb5-setup.html].
If you have questions on NFSv4, refer to the Linux NFSv4 FAQ [http://www
.citi.umich.edu/projects/nfsv4/linux/faq/].
Sharing File Systems with NFS 273
15
Samba
Using Samba, a Unix machine can be congured as a le and print server for Mac OS
X, Windows, and OS/2 machines. Samba has developed into a fully-edged and rather
complex product. Congure Samba with YaST, SWAT (a Web interface), or by editing
the conguration le manually.
15.1 Terminology
The following are some terms used in Samba documentation and in the YaST module.
SMB protocol
Samba uses the SMB (server message block) protocol that is based on the NetBIOS
services. Microsoft released the protocol so other software manufacturers could
establish connections to a Microsoft domain network. With Samba, the SMB pro-
tocol works on top of the TCP/IP protocol, so the TCP/IP protocol must be installed
on all clients.
CIFS protocol
CIFS (common Internet le system) protocol is another protocol supported by
Samba. CIFS denes a standard remote le system access protocol for use over
the network, enabling groups of users to work together and share documents across
the network.
NetBIOS
NetBIOS is a software interface (API) designed for communication between ma-
chines providing a name service. It enables machines connected to the network to
Samba 275
reserve names for themselves. After reservation, these machines can be addressed
by name. There is no central process that checks names. Any machine on the net-
work can reserve as many names as it wants as long as the names are not already
in use. The NetBIOS interface can be implemented for different network architec-
tures. An implementation that works relatively closely with network hardware is
called NetBEUI, but this is often referred to as NetBIOS. Network protocols imple-
mented with NetBIOS are IPX from Novell (NetBIOS via TCP/IP) and TCP/IP.
The NetBIOS names sent via TCP/IP have nothing in common with the names
used in /etc/hosts or those dened by DNS. NetBIOS uses its own, completely
independent naming convention. However, it is recommended to use names that
correspond to DNS hostnames to make administration easier or use DNS natively.
This is the default used by Samba.
Samba server
Samba server provides SMB/CIFS services and NetBIOS over IP naming services
to clients. For Linux, there are three daemons for Samba server: smbd for SMB/CIFS
services, nmbd for naming services, and winbind for authentication.
Samba client
The Samba client is a system that uses Samba services from a Samba server over
the SMB protocol. All common operating systems, such as Mac OS X, Windows,
and OS/2, support the SMB protocol. The TCP/IP protocol must be installed on all
computers. Samba provides a client for the different UNIX avors. For Linux,
there is a kernel module for SMB that allows the integration of SMB resources on
the Linux system level. You do not need to run any daemon for the Samba client.
Shares
SMB servers provide resources to the clients by means of shares. Shares are printers
and directories with their subdirectories on the server. It is exported by means of
a name and can be accessed by its name. The share name can be set to any name—it
does not have to be the name of the export directory. A printer is also assigned a
name. Clients can access the printer by its name.
DC
A domain controller (DC) is a server that handles accounts in domain. For data
replication, additional domain controllers are available in one domain.
276 Reference
15.2 Installing a Samba Server
To install a Samba server, start YaST and select Software > Software Management.
Choose Filter > Patterns and select File Server. Conrm the installation of the required
packages to nish the installation process.
15.3 Starting and Stopping Samba
You can start or stop the Samba server automatically (during boot) or manually. Starting
and stopping policy is a part of the YaST Samba server conguration described in
Section 15.4.1, “Conguring a Samba Server with YaST” (page 277).
To stop or start running Samba services with YaST, use System > System Services
(Runlevel) and check winbind, smb, and nmb. From a command line, stop services re-
quired for Samba with rcsmb stop && rcnmb stop and start them with rcnmb
start && rcsmb start; rcsmb cares about winbind if needed.
15.4 Conguring a Samba Server
A Samba server in openSUSE® can be congured in two different ways: with YaST
or manually. Manual conguration offers a higher level of detail, but lacks the conve-
nience of the YaST GUI.
15.4.1 Conguring a Samba Server with
YaST
To congure a Samba server, start YaST and select Network Services > Samba Server.
15.4.1.1 Initial Samba Conguration
When starting the module for the rst time, the Samba Installation dialog starts,
prompting you to make just a few basic decisions concerning administration of the
server. At the end of the conguration it prompts for the Samba administrator password
(Samba Root Password. For later starts, the Samba Server Conguration dialog appears.
Samba 277
The Samba Installation dialog consists of two steps and optional detailed settings:
Workgroup or Domain Name
Select an existing name from Workgroup or Domain Name or enter a new one and
click Next.
Samba Server Type
In the next step, specify whether your server should act as a primary domain con-
troller (PDC), backup domain controller (BDC), or not to act as a domain controller
at all. Continue with Next.
Start-Up
Select whether you want to start Samba During Boot or Manually and click OK.
Then in the nal pop-up box, set the Samba root Password.
You can change all settings later in the Samba Conguration dialog with the Start-Up,
Shares, Identity, Trusted Domains, and LDAP Settings tabs.
15.4.1.2 Advanced Samba Conguration
During the rst start of the Samba server module the Samba Conguration dialog appears
directly after the two initial steps described in Section 15.4.1.1, “Initial Samba Con-
guration” (page 277). Use it to adjust your Samba server conguration.
After editing your conguration, click OK to save your settings.
Starting the Server
In the Start Up tab, congure the start of the Samba server. To start the service every
time your system boots, select During Boot. To activate manual start, choose Manually.
More information about starting a Samba server is provided in Section 15.3, “Starting
and Stopping Samba” (page 277).
In this tab, you can also open ports in your rewall. To do so, select Open Port in
Firewall. If you have multiple network interfaces, select the network interface for
Samba services by clicking Firewall Details, selecting the interfaces, and clicking OK.
278 Reference
Shares
In the Shares tab, determine the Samba shares to activate. There are some predened
shares, like homes and printers. Use Toggle Status to switch between Active and Inactive.
Click Add to add new shares and Delete to delete the selected share.
Allow Users to Share Their Directories enables members of the group in Permitted
Group to share directories they own with other users. For example, users for a local
scope or DOMAIN\Users for a domain scope. The user also must make sure that the
le system permissions allow access. With Maximum Number of Shares, limit the total
amount of shares that may be created. To permit access to user shares without authen-
tication, enable Allow Guest Access.
Identity
In the Identity tab, you can determine the domain with which the host is associated
(Base Settings) and whether to use an alternative hostname in the network (NetBIOS
Hostname). It is also possible to use Microsoft Windows Internet Name Service (WINS)
for name resolution. In this case, activate Use WINS for Hostname Resolution and decide
whether to Retrieve WINS server via DHCP. To set expert global settings or set a user
authentication source, click Advanced Settings.
Trusted Domains
To enable users from other domains to access your domain, make the appropriate settings
in the Trusted Domains tab. To add a new domain, click Add. To remove the selected
domain, click Delete.
LDAP Settings
In the tab LDAP Settings, you can determine the LDAP server to use for authentication.
To test the connection to your LDAP server, click Test Connection. To set expert LDAP
settings or use default values, click Advanced Settings.
For more information about LDAP conguration, see Chapter 4, LDAP—A Directory
Service (↑Security Guide).
Samba 279
15.4.2 Web Administration with SWAT
An alternative tool for Samba server administration is SWAT (Samba Web Administra-
tion Tool). It provides a simple Web interface with which to congure the Samba
server. To use SWAT, open http://localhost:901 in a Web browser and log
in as user root. If you do not have a special Samba root account, use the system root
account.
NOTE: Activating SWAT
After Samba server installation, SWAT is not activated. To activate it, open
Network Services > Network Services (xinetd) in YaST, enable the network services
conguration, select swat from the table, and click Toggle Status (On or Off).
15.4.3 Conguring the Server Manually
If you intend to use Samba as a server, install samba. The main conguration le of
Samba is /etc/samba/smb.conf. This le can be divided into two logical parts.
The [global] section contains the central and global settings. The [share] sections
contain the individual le and printer shares. By means of this approach, details regarding
the shares can be set differently or globally in the [global] section, which enhances
the structural transparency of the conguration le.
15.4.3.1 The global Section
The following parameters of the [global] section need some adjustment to match
the requirements of your network setup so other machines can access your Samba
server via SMB in a Windows environment.
workgroup = TUX-NET
This line assigns the Samba server to a workgroup. Replace TUX-NET with an
appropriate workgroup of your networking environment. Your Samba server appears
under its DNS name unless this name has been assigned to some other machine in
the network. If the DNS name is not available, set the server name using
netbiosname=MYNAME. For more details about this parameter, see the
smb.conf man page.
280 Reference
os level = 20
This parameter triggers whether your Samba server tries to become LMB (local
master browser) for its workgroup. With the Samba 3 release series, it is seldom
necessary to override the default setting (20). Choose a very low value such as 2
to spare the existing Windows network from any disturbances caused by a miscon-
gured Samba server. More information about this important topic can be found
in the Network Browsing chapter of the Samba 3 Howto; for more information on
the Samba 3 Howto, see Section 15.7, “For More Information” (page 286).
If no other SMB server is present in your network (such as a Windows 2000 server)
and you want the Samba server to keep a list of all systems present in the local
environment, set the os level to a higher value (for example, 65). Your Samba
server is then chosen as LMB for your local network.
When changing this setting, consider carefully how this could affect an existing
Windows network environment. First test the changes in an isolated network or at
a noncritical time of day.
wins support and wins server
To integrate your Samba server into an existing Windows network with an active
WINS server, enable the wins server option and set its value to the IP address
of that WINS server.
If your Windows machines are connected to separate subnets and need to still be
aware of each other, you need to set up a WINS server. To turn a Samba server
into such a WINS server, set the option wins support = Yes. Make sure that
only one Samba server of the network has this setting enabled. The options wins
server and wins support must never be enabled at the same time in your
smb.conf le.
15.4.3.2 Shares
The following examples illustrate how a CD-ROM drive and the user directories
(homes) are made available to the SMB clients.
[cdrom]
To avoid having the CD-ROM drive accidentally made available, these lines are
deactivated with comment marks (semicolons in this case). Remove the semicolons
in the rst column to share the CD-ROM drive with Samba.
Samba 281
Example 15.1
A CD-ROM Share (deactivated)
;[cdrom]
; comment = Linux CD-ROM
; path = /media/cdrom
; locking = No
[cdrom] and comment
The [cdrom] section entry is the name of the share that can be seen by all
SMB clients on the network. An additional comment can be added to further
describe the share.
path = /media/cdrom
path exports the directory /media/cdrom.
By means of a very restrictive default conguration, this kind of share is only made
available to the users present on this system. If this share should be made available
to everybody, add a line guest ok = yes to the conguration. This setting
gives read permissions to anyone on the network. It is recommended to handle this
parameter with great care. This applies even more to the use of this parameter in
the [global] section.
[homes]
The [homes] share is of special importance here. If the user has a valid account
and password for the Linux le server and his own home directory, he can be
connected to it.
Example 15.2
[homes] Share
[homes]
comment = Home Directories
valid users = %S
browseable = No
read only = No
create mask = 0640
directory mask = 0750
[homes]
As long as there is no other share using the share name of the user connecting
to the SMB server, a share is dynamically generated using the [homes] share
directives. The resulting name of the share is the username.
282 Reference
valid users = %S
%S is replaced with the concrete name of the share as soon as a connection has
been successfully established. For a [homes] share, this is always the user-
name. As a consequence, access rights to a user's share are restricted exclusively
to that user.
browseable = No
This setting makes the share invisible in the network environment.
read only = No
By default, Samba prohibits write access to any exported share by means of
the read only = Yes parameter. To make a share writable, set the value
read only = No, which is synonymous with writable = Yes.
create mask = 0640
Systems that are not based on MS Windows NT do not understand the concept
of UNIX permissions, so they cannot assign permissions when creating a le.
The parameter create mask denes the access permissions assigned to
newly created les. This only applies to writable shares. In effect, this setting
means the owner has read and write permissions and the members of the
owner's primary group have read permissions. valid users = %S prevents
read access even if the group has read permissions. For the group to have read
or write access, deactivate the line valid users = %S.
15.4.3.3 Security Levels
To improve security, each share access can be protected with a password. SMB offers
the following ways of checking permissions:
Share Level Security (security = share)
A password is rmly assigned to a share. Everyone who knows this password has
access to that share.
User Level Security (security = user)
This variant introduces the concept of the user to SMB. Each user must register
with the server with his or her own password. After registration, the server can
grant access to individual exported shares dependent on usernames.
Samba 283
Server Level Security (security = server)
To its clients, Samba pretends to be working in user level mode. However, it
passes all password queries to another user level mode server, which takes care of
authentication. This setting requires the additional password server parameter.
ADS Level Security (security = ADS)
In this mode, Samba will act as a domain member in an Active Directory environ-
ment. To operate in this mode, the machine running Samba needs Kerberos installed
and congured. You must join the machine using Samba to the ADS realm. This
can be done using the YaST Windows Domain Membership module.
Domain Level Security (security = domain)
This mode will only work correctly if the machine has been joined into a Windows
NT Domain. Samba will try to validate username and password by passing it to a
Windows NT Primary or Backup Domain Controller. The same way as a Windows
NT Server would do. It expects the encrypted passwords parameter to be set to
yes.
The selection of share, user, server, or domain level security applies to the entire server.
It is not possible to offer individual shares of a server conguration with share level
security and others with user level security. However, you can run a separate Samba
server for each congured IP address on a system.
More information about this subject can be found in the Samba 3 HOWTO. For multiple
servers on one system, pay attention to the options interfaces and bind
interfaces only.
15.5 Conguring Clients
Clients can only access the Samba server via TCP/IP. NetBEUI and NetBIOS via IPX
cannot be used with Samba.
15.5.1 Conguring a Samba Client with YaST
Congure a Samba client to access resources (les or printers) on the Samba or Windows
server. Enter the NT or Active Directory domain or workgroup in the dialog Network
Services > Windows Domain Membership. If you activate Also Use SMB Information
284 Reference
for Linux Authentication, the user authentication runs over the Samba, NT or Kerberos
server.
Click Expert Settings for advanced conguration options. For example, use the Mount
Server Directories table to enable mounting server home directory automatically with
authentication. This way users will be able to access their home directories when hosted
on CIFS. For details, see the the pam_mount man page.
After completing all settings, conrm the dialog to nish the conguration.
15.6 Samba as Login Server
In networks where predominantly Windows clients are found, it is often preferable that
users may only register with a valid account and password. In a Windows-based network,
this task is handled by a primary domain controller (PDC). You can use a Windows
NT server congured as PDC, but this task can also be done with a Samba server. The
entries that must be made in the [global] section of smb.conf are shown in Ex-
ample 15.3, “Global Section in smb.conf” (page 285).
Example 15.3
Global Section in smb.conf
[global]
workgroup = TUX-NET
domain logons = Yes
domain master = Yes
If encrypted passwords are used for verication purposes the Samba server must be
able to handle these. The entry encrypt passwords = yes in the [global]
section enables this (with Samba version 3, this is now the default). In addition, it is
necessary to prepare user accounts and passwords in an encryption format that conforms
with Windows. Do this with the command smbpasswd -a name. Create the domain
account for the computers, required by the Windows domain concept, with the following
commands:
useradd hostname\$
smbpasswd -a -m hostname
With the useradd command, a dollar sign is added. The command smbpasswd inserts
this automatically when the parameter -m is used. The commented conguration example
(/usr/share/doc/packages/samba/examples/smb.conf.SUSE) contains
settings that automate this task.
Samba 285
add machine script = /usr/sbin/useradd -g nogroup -c "NT Machine Account" \
-s /bin/false %m\$
To make sure that Samba can execute this script correctly, choose a Samba user with
the required administrator permissions and add it to the ntadmin group. Then all users
belonging to this Linux group can be assigned Domain Admin status with the com-
mand:
net groupmap add ntgroup="Domain Admins" unixgroup=ntadmin
For more information about this topic, see Chapter 12 of the Samba 3 HOWTO, found
in /usr/share/doc/packages/samba/Samba3-HOWTO.pdf.
15.7 For More Information
Detailed Samba information is available in the digital documentation. Enter apropos
samba at the command line to display some manual pages or just browse the /usr/
share/doc/packages/samba directory if Samba documentation is installed for
more online documentation and examples. Find a commented example conguration
(smb.conf.SUSE) in the examples subdirectory.
The Samba 3 HOWTO provided by the Samba team includes a section about trou-
bleshooting. In addition to that, Part V of the document provides a step-by-step guide
to checking your conguration. You can nd Samba 3 HOWTO in /usr/share/
doc/packages/samba/Samba3-HOWTO.pdf after installing the package
samba-doc.
Also read the Samba page in the openSUSE wiki at http://en.openSUSE.org/
Samba.
286 Reference
16
The Apache HTTP Server
With a share of more than 50%, the Apache HTTP Server (Apache) is the world's most
widely-used Web server according to the survey from http://www.netcraft
.com/. Apache, developed by the Apache Software Foundation (http://www
.apache.org/), is available for most operating systems. openSUSE® includes
Apache version 2.2. In this chapter, learn how to install, congure and set up a Web
server; how to use SSL, CGI, and additional modules; and how to troubleshoot Apache.
16.1 Quick Start
With the help of this section, quickly set up and start Apache. You must be root to
install and congure Apache.
16.1.1 Requirements
Make sure the following requirements are met before trying to set up the Apache Web
server:
1. The machine's network is congured properly. For more information about this topic,
refer to Chapter 9, Basic Networking (page 151).
2. The machine's exact system time is maintained by synchronizing with a time server.
This is necessary because parts of the HTTP protocol depend on the correct time.
See Chapter 13, Time Synchronization with NTP (page 251) to learn more about this
topic.
The Apache HTTP Server 287
3. The latest security updates are installed. If in doubt, run a YaST Online Update.
4.
The default Web server port (80) is opened in the rewall. For this, congure the
SuSEFirewall2 to allow the service HTTP Server in the external zone. This can be
done using YaST. See Section “Conguring the Firewall with YaST” (Chapter 13,
Masquerading and Firewalls, ↑Security Guide) for details.
16.1.2 Installation
Apache on openSUSE is not installed by default. To install it with a standard, predened
conguration that runs “out of the box”, proceed as follows:
Procedure 16.1
Installing Apache with the Default Conguration
1
Start YaST and select Software > Software Management.
2
Choose Filter > Patterns and select Web and LAMP Server int Server Functions.
3
Conrm the installation of the dependent packages to nish the installation process.
The installation includes the multiprocessing module apache2-prefork as well as
the PHP5 module. Refer to Section 16.4, “Installing, Activating, and Conguring
Modules” (page 307) for more information about modules.
16.1.3 Start
You can start Apache automatically at boot time or start it manually.
Procedure 16.2
Starting Apache Automatically
1
To make sure that Apache is automatically started during boot in runlevels 3 and 5,
execute the following command:
chkconfig -a apache2
2
Alternatively, start YaST and select System > System Services (Runlevel).
3
Search for apache2 and Enable the service.
288 Reference
The Web server starts immediately.
4
Save your changes with Finish.
The system is congured to automatically start Apache in runlevels 3 and 5 during
boot.
To manually start Apache using the shell, run rcapache2 start.
Procedure 16.3
Checking if Apache is Running
If you do not receive error messages when starting Apache, this usually indicates that
the Web server is running. To test this:
1
Start a browser and open http://localhost/.
If Apache is up and running, you get a test page stating “It works!”.
2
If you do not see this page, refer to Section 16.8, “Troubleshooting” (page 327).
Now that the Web server is running, you can add your own documents, adjust the con-
guration according to your needs, or add functionality by installing modules.
16.2 Conguring Apache
openSUSE offers two conguration options:
Conguring Apache Manually (page 293)
Conguring Apache with YaST (page 298)
Manual conguration offers a higher level of detail, but lacks the convenience of the
YaST GUI.
IMPORTANT: Reload or Restart Apache after Conguration Changes
Most conguration changes require a reload (some also a restart) of Apache
to take effect. Manually reload Apache with rcapache2 reload or use one
The Apache HTTP Server 289
of the restart options as described in Section 16.3, “Starting and Stopping
Apache (page 304).
If you congure Apache with YaST, this can be taken care of automatically if
you set HTTP Service to Enabled as described in Section 16.2.3.2, “HTTP Server
Conguration” (page 302).
16.2.1 Apache Conguration Files
This section gives an overview of the Apache conguration les. If you use YaST for
conguration, you do not need to touch these les—however, the information might
be useful for you if you want to switch to manual conguration later on.
Apache conguration les can be found in two different locations:
/etc/sysconfig/apache2 (page 290)
/etc/apache2/ (page 290)
16.2.1.1 /etc/syscong/apache2
/etc/sysconfig/apache2 controls some global settings of Apache, like modules
to load, additional conguration les to include, ags with which the server should be
started, and ags that should be added to the command line. Every conguration option
in this le is extensively documented and therefore not mentioned here. For a general-
purpose Web server, the settings in /etc/sysconfig/apache2 should be sufcient
for any conguration needs.
16.2.1.2 /etc/apache2/
/etc/apache2/ hosts all conguration les for Apache. In the following, the purpose
of each le is explained. Each le includes several conguration options (also referred
to as directives). Every conguration option in these les is extensively documented
and therefore not mentioned here.
The Apache conguration les are organized as follows:
/etc/apache2/
|
290 Reference
|- charset.conv
|- conf.d/
| |
| |- *.conf
|
|- default-server.conf
|- errors.conf
|- httpd.conf
|- listen.conf
|- magic
|- mime.types
|- mod_*.conf
|- server-tuning.conf
|- ssl.*
|- ssl-global.conf
|- sysconfig.d
| |
| |- global.conf
| |- include.conf
| |- loadmodule.conf . .
|
|- uid.conf
|- vhosts.d
| |- *.conf
Apache Conguration Files in /etc/apache2/
charset.conv
Species which character sets to use for different languages. Do not edit this le.
conf.d/*.conf
Conguration les added by other modules. These conguration les can be in-
cluded into your virtual host conguration where needed. See vhosts.d/vhost
.template for examples. By doing so, you can provide different module sets
for different virtual hosts.
default-server.conf
Global conguration for all virtual hosts with reasonable defaults. Instead of
changing the values, overwrite them with a virtual host conguration.
errors.conf
Denes how Apache responds to errors. To customize these messages for all virtual
hosts, edit this le. Otherwise overwrite these directives in your virtual host con-
gurations.
The Apache HTTP Server 291
httpd.conf
The main Apache server conguration le. Avoid changing this le. It primarily
contains include statements and global settings. Overwrite global settings in the
pertinent conguration les listed here. Change host-specic settings (such as
document root) in your virtual host conguration.
listen.conf
Binds Apache to specic IP addresses and ports. Name-based virtual hosting is
also congured here. For details, see Section “Name-Based Virtual Hosts”
(page 294).
magic
Data for the mime_magic module that helps Apache automatically determine the
MIME type of an unknown le. Do not change this le.
mime.types
MIME types known by the system (this actually is a link to /etc/mime.types).
Do not edit this le. If you need to add MIME types not listed here, add them to
mod_mime-defaults.conf.
mod_*.conf
Conguration les for the modules that are installed by default. Refer to Sec-
tion 16.4, “Installing, Activating, and Conguring Modules” (page 307) for details.
Note that conguration les for optional modules reside in the directory conf.d.
server-tuning.conf
Contains conguration directives for the different MPMs (see Section 16.4.4,
“Multiprocessing Modules” (page 312)) as well as general conguration options
that control Apache's performance. Properly test your Web server when making
changes here.
ssl-global.conf and ssl.*
Global SSL conguration and SSL certicate data. Refer to Section 16.6, “Setting
Up a Secure Web Server with SSL” (page 317) for details.
sysconfig.d/*.conf
Conguration les automatically generated from /etc/sysconfig/apache2.
Do not change any of these les—edit /etc/sysconfig/apache2 instead.
Do not put other conguration les in this directory.
292 Reference
uid.conf
Species under which user and group ID Apache runs. Do not change this le.
vhosts.d/*.conf
Your virtual host conguration should be located here. The directory contains
template les for virtual hosts with and without SSL. Every le in this directory
ending with .conf is automatically included in the Apache conguration. Refer
to Section 16.2.2.1, “Virtual Host Conguration” (page 293) for details.
16.2.2 Conguring Apache Manually
Conguring Apache manually involves editing plain text conguration les as user
root.
16.2.2.1 Virtual Host Conguration
The term virtual host refers to Apache's ability to serve multiple universal resource
identiers (URIs) from the same physical machine. This means that several domains,
such as www.example.com and www.example.net, are run by a single Web server on
one physical machine.
It is common practice to use virtual hosts to save administrative effort (only a single
Web server needs to be maintained) and hardware expenses (each domain does not re-
quire a dedicated server). Virtual hosts can be name based, IP based, or port based.
To list all existing virtual hosts, use the command httpd2 -S. This outputs a list
showing the default server and all virtual hosts together with their IP addresses and
listening ports. Furthermore, the list also contains an entry for each virtual host showing
its location in the conguration les.
Virtual hosts can be congured via YaST as described in Section “Virtual Hosts”
(page 301) or by manually editing a conguration le. By default, Apache in openSUSE
is prepared for one conguration le per virtual host in /etc/apache2/vhosts
.d/. All les in this directory with the extension .conf are automatically included
to the conguration. A basic template for a virtual host is provided in this directory
(vhost.template or vhost-ssl.template for a virtual host with SSL support).
The Apache HTTP Server 293
TIP: Always Create a Virtual Host Conguration
It is recommended to always create a virtual host conguration le, even if
your Web server only hosts one domain. By doing so, you not only have the
domain-specic conguration in one le, but you can always fall back to a
working basic conguration by simply moving, deleting, or renaming the con-
guration le for the virtual host. For the same reason, you should also create
separate conguration les for each virtual host.
When using name-based virtual hosts it is recommended to set up a default
conguration that will be used when a domain name does not match a virtual
host conguration. The default virtual host is the one whose conguration is
loaded rst. Since the order of the conguration les is determined by lename,
start the lename of the default virtual host conguration with an underscore
character (_) to make sure it is loaded rst (for example: _default_vhost
.conf).
The <VirtualHost></VirtualHost> block holds the information that applies
to a particular domain. When Apache receives a client request for a dened virtual host,
it uses the directives enclosed in this section. Almost all directives can be used in a
virtual host context. See http://httpd.apache.org/docs/2.2/mod/
quickreference.html for further information about Apache's conguration di-
rectives.
Name-Based Virtual Hosts
With name-based virtual hosts, more than one Web site is served per IP address. Apache
uses the host eld in the HTTP header that is sent by the client to connect the request
to a matching ServerName entry of one of the virtual host declarations. If no matching
ServerName is found, the rst specied virtual host is used as a default.
The directive NameVirtualHost tells Apache on which IP address and, optionally,
which port it should listen to for requests by clients containing the domain name in the
HTTP header. This option is congured in the conguration le /etc/apache2/
listen.conf.
The rst argument can be a fully qualied domain name, but it is recommended to use
the IP address. The second argument is the port and is optional. By default, port 80 is
used and is congured via the Listen directive.
294 Reference
The wild card * can be used for both the IP address and the port number to receive re-
quests on all interfaces. IPv6 addresses must be enclosed in square brackets.
Example 16.1
Variations of Name-Based VirtualHost Entries
# NameVirtualHost IP-address[:Port]
NameVirtualHost 192.168.3.100:80
NameVirtualHost 192.168.3.100
NameVirtualHost *:80
NameVirtualHost *
NameVirtualHost [2002:c0a8:364::]:80
The opening VirtualHost tag takes the IP address (or fully qualied domain name)
previously declared with the NameVirtualHost as an argument in a name-based
virtual host conguration. A port number previously declared with the
NameVirtualHost directive is optional.
The wild card * is also allowed as a substitute for the IP address. This syntax is only
valid in combination with the wild card usage in NameVirtualHost * . When using
IPv6 addresses, the address must be included in square brackets.
Example 16.2
Name-Based VirtualHost Directives
<VirtualHost 192.168.3.100:80>
...
</VirtualHost>
<VirtualHost 192.168.3.100>
...
</VirtualHost>
<VirtualHost *:80>
...
</VirtualHost>
<VirtualHost *>
...
</VirtualHost>
<VirtualHost [2002:c0a8:364::]>
...
</VirtualHost>
The Apache HTTP Server 295
IP-Based Virtual Hosts
This alternative virtual host conguration requires the setup of multiple IPs for a ma-
chine. One instance of Apache hosts several domains, each of which is assigned a dif-
ferent IP.
The physical server must have one IP address for each IP-based virtual host. If the
machine does not have multiple network cards, virtual network interfaces (IP aliasing)
can also be used.
The following example shows Apache running on a machine with the IP
192.168.3.100, hosting two domains on the additional IPs 192.168.3.101 and
192.168.3.102. A separate VirtualHost block is needed for every virtual
server.
Example 16.3
IP-Based VirtualHost Directives
<VirtualHost 192.168.3.101>
...
</VirtualHost>
<VirtualHost 192.168.3.102>
...
</VirtualHost>
Here, VirtualHost directives are only specied for interfaces other than
192.168.3.100. When a Listen directive is also congured for
192.168.3.100, a separate IP-based virtual host must be created to answer HTTP
requests to that interface—otherwise the directives found in the default server congu-
ration (/etc/apache2/default-server.conf) are applied.
Basic Virtual Host Conguration
At least the following directives should be present in each virtual host conguration in
order to set up a virtual host. See /etc/apache2/vhosts.d/vhost.template
for more options.
ServerName
The fully qualied domain name under which the host should be addressed.
296 Reference
DocumentRoot
Path to the directory from which Apache should serve les for this host. For secu-
rity reasons, access to the entire le system is forbidden by default, so you must
explicitly unlock this directory within a Directory container.
ServerAdmin
E-mail address of the server administrator. This address is, for example, shown on
error pages Apache creates.
ErrorLog
The error log le for this virtual host. Although it is not necessary to create separate
error log les for each virtual host, it is common practice to do so, because it makes
the debugging of errors much easier. /var/log/apache2/ is the default direc-
tory for Apache's log les.
CustomLog
The access log le for this virtual host. Although it is not necessary to create separate
access log les for each virtual host, it is common practice to do so, because it allows
the separate analysis of access statistics for each host. /var/log/apache2/ is
the default directory for Apache's log les.
As mentioned above, access to the whole le system is forbidden by default for security
reasons. Therefore, explicitly unlock the directories in which you have placed the les
Apache should serve—for example the DocumentRoot:
<Directory "/srv/www/www.example.com/htdocs">
Order allow,deny
Allow from all
</Directory>
The complete conguration le looks like this:
Example 16.4
Basic VirtualHost Conguration
<VirtualHost 192.168.3.100>
ServerName www.example.com
DocumentRoot /srv/www/www.example.com/htdocs
ServerAdmin webmaster@example.com
ErrorLog /var/log/apache2/www.example.com_log
CustomLog /var/log/apache2/www.example.com-access_log common
<Directory "/srv/www/www.example.com/htdocs">
Order allow,deny
Allow from all
</Directory>
</VirtualHost>
The Apache HTTP Server 297
16.2.3 Conguring Apache with YaST
To congure your Web server with YaST, start YaST and select Network Services >
HTTP Server. When starting the module for the rst time, the HTTP Server Wizard
starts, prompting you to make a few basic decisions concerning administration of the
server. After having nished the wizard, the HTTP Server Conguration dialog starts
each time you call the HTTP Server module. For more information, see Section 16.2.3.2,
“HTTP Server Conguration” (page 302).
16.2.3.1 HTTP Server Wizard
The HTTP Server Wizard consists of ve steps. In the last step of the dialog, you are
given the opportunity to enter the expert conguration mode to make even more specic
settings.
Network Device Selection
Here, specify the network interfaces and ports Apache uses to listen for incoming re-
quests. You can select any combination of existing network interfaces and their respec-
tive IP addresses. Ports from all three ranges (well-known ports, registered ports, and
dynamic or private ports) that are not reserved by other services can be used. The default
setting is to listen on all network interfaces (IP addresses) on port 80.
Check Open Port In Firewall to open the ports in the rewall that the Web server listens
on. This is necessary to make the Web server available on the network, which can be
a LAN, WAN, or the public Internet. Keeping the port closed is only useful in test sit-
uations where no external access to the Web server is necessary. If you have multiple
network interfaces, click Firewall Details... to specify on which interface(s) the port(s)
should be opened.
Click Next to continue with the conguration.
Modules
The Modules conguration option allows for the activation or deactivation of the script
languages that the Web server should support. For the activation or deactivation of
other modules, refer to Section “Server Modules” (page 303). Click Next to advance to
the next dialog.
298 Reference
Default Host
This option pertains to the default Web server. As explained in Section 16.2.2.1, “Vir-
tual Host Conguration” (page 293), Apache can serve multiple virtual hosts from a
single physical machine. The rst declared virtual host in the conguration le is
commonly referred to as the default host. Each virtual host inherits the default host's
conguration.
To edit the host settings (also called directives), choose the appropriate entry in the table
then click Edit. To add new directives, click Add. To delete a directive, select it and
click Delete.
Figure 16.1
HTTP Server Wizard: Default Host
Here is list of the default settings of the server:
Document Root
Path to the directory from which Apache serves les for this host. /srv/www/
htdocs is the default location.
The Apache HTTP Server 299
Alias
With the help of Alias directives, URLs can be mapped to physical le system
locations. This means that a certain path even outside the Document Root in
the le system can be accessed via a URL aliasing that path.
The default openSUSE Alias /icons points to /usr/share/apache2/
icons for the Apache icons displayed in the directory index view.
ScriptAlias
Similar to the Alias directive, the ScriptAlias directive maps a URL to a
le system location. The difference is that ScriptAlias designates the target
directory as a CGI location, meaning that CGI scripts should be executed in that
location.
Directory
With Directory settings, you can enclose a group of conguration options that
will only apply to the specied directory.
Access and display options for the directories /srv/www/htdocs, /usr/
share/apache2/icons and /srv/www/cgi-bin are congured here. It
should not be necessary to change the defaults.
Include
With include, additional conguration les can be specied. Two Include direc-
tives are already precongured: /etc/apache2/conf.d/ is the directory
containing the conguration les that come with external modules. With this direc-
tive, all les in this directory ending in .conf are included. With the second di-
rective, /etc/apache2/conf.d/apache2-manual.conf, the apache2
-manual conguration le is included.
Server Name
This species the default URL used by clients to contact the Web server. Use a
fully qualied domain name (FQDN) to reach the Web server at http://FQDN/
or its IP address. You cannot choose an arbitrary name here—the server must be
“known” under this name.
Server Administrator E-Mail
E-mail address of the server administrator. This address is, for example, shown on
error pages Apache creates.
300 Reference
After nishing with the Default Host step, click Next to continue with the conguration.
Virtual Hosts
In this step, the wizard displays a list of already congured virtual hosts (see Sec-
tion 16.2.2.1, “Virtual Host Conguration” (page 293)). If you have not made manual
changes prior to starting the YaST HTTP wizard, no virtual host is present.
To add a host, click Add to open a dialog in which to enter basic information about the
host, such as Server Name, Server Contents Root (DocumentRoot), and the Adminis-
trator E-Mail. Server Resolution is used to determine how a host is identied (name
based or IP based). Specify the name or IP address with Change Virtual Host ID
Clicking Next advances to the second part of the virtual host conguration dialog.
In part two of the virtual host conguration you can specify whether or not to enable
CGI scripts and which directory to use for these scripts. It is also possible to enable
SSL. If you do so, you must specify the path to the certicate as well. See Section 16.6.2,
“Conguring Apache with SSL” (page 323) for details on SSL and certicates. With
the Directory Index option, you can specify which le to display when the client requests
a directory (by default, index.html). Add one or more lenames (space-separated)
if you want to change this. With Enable Public HTML, the content of the users public
directories (~user/public_html/) is made available on the server under
http://www.example.com/~user.
IMPORTANT: Creating Virtual Hosts
It is not possible to add virtual hosts at will. If using name-based virtual hosts,
each hostname must be resolved on the network. If using IP-based virtual hosts,
you can assign only one host to each IP address available.
Summary
This is the nal step of the wizard. Here, determine how and when the Apache server
is started: when booting or manually. Also see a short summary of the conguration
made so far. If you are satised with your settings, click Finish to complete congura-
tion. If you want to change something, click Back until you have reached the desired
dialog. Clicking HTTP Server Expert Conguration opens the dialog described in
Section 16.2.3.2, “HTTP Server Conguration” (page 302).
The Apache HTTP Server 301
Figure 16.2
HTTP Server Wizard: Summary
16.2.3.2 HTTP Server Conguration
The HTTP Server Conguration dialog also lets you make even more adjustments to
the conguration than the wizard (which only runs if you congure your Web server
for the rst time). It consists of four tabs described in the following. No conguration
option you change here is effective immediately—you always must conrm your
changes with Finish to make them effective. Clicking Abort leaves the conguration
module and discards your changes.
Listen Ports and Addresses
In HTTP Service, select whether Apache should be running (Enabled) or stopped
(Disabled). In Listen on Ports, Add, Edit, or Delete addresses and ports on which the
server should be available. The default is to listen on all interfaces on port 80. You
should always check Open Port In Firewall, because otherwise the Web server is not
reachable from outside. Keeping the port closed is only useful in test situations where
no external access to the Web server is necessary. If you have multiple network inter-
302 Reference
faces, click Firewall Details... to specify on which interface(s) the port(s) should be
opened.
With Log Files, watch either the access log or the error log. This is useful if you want
to test your conguration. The log le opens in a separate window from which you can
also restart or reload the Web server. For details, see Section 16.3, “Starting and Stopping
Apache” (page 304). These commands are effective immediately and their log messages
are also displayed immediately.
Figure 16.3
HTTP Server Conguration: Listen Ports and Addresses
Server Modules
You can change the status (enabled or disabled) of Apache2 modules by clicking Toggle
Status. Click Add Module to add a new module that is already installed but not yet
listed. Learn more about modules in Section 16.4, “Installing, Activating, and Cong-
uring Modules” (page 307).
The Apache HTTP Server 303
Figure 16.4
HTTP Server Conguration: Server Modules
Main Host or Hosts
These dialogs are identical to the ones already described. Refer to Section “Default
Host” (page 299) and Section “Virtual Hosts” (page 301).
16.3 Starting and Stopping Apache
If congured with YaST as described in Section 16.2.3, “Conguring Apache with
YaST” (page 298), Apache is started at boot time in runlevels 3 and 5 and stopped in
runlevels 0, 1, 2, and 6. You can change this behavior using YaST's runlevel editor or
the command line tool chkconfig.
To start, stop, or manipulate Apache on a running system, use the init script
/usr/sbin/rcapache2. The rcapache2 command takes the following parame-
ters:
304 Reference
status
Checks if Apache is started.
start
Starts Apache if it is not already running.
startssl
Starts Apache with SSL support if it is not already running. For more information
about SSL support, refer to Section 16.6, “Setting Up a Secure Web Server with
SSL” (page 317).
stop
Stops Apache by terminating the parent process.
restart
Stops and then restarts Apache. Starts the Web server if it was not running before.
try-restart
Stops then restarts Apache only if it is already running.
reload or graceful
Stops the Web server by advising all forked Apache processes to rst nish their
requests before shutting down. As each process dies, it is replaced by a newly
started one, resulting in a complete “restart” of Apache.
TIP: Restarting Apache in Production Environments
To activate changes in the Apache conguration without causing connection
break-offs, use the rcapache2 reload command.
restart-graceful
Starts a second Web server that immediately serves all incoming requests. The
previous instance of the Web server continues to handle all existing requests for a
dened period of time congured with GracefulShutdownTimeout.
rcapache2 restart-graceful is either useful when upgrading to a new
version or when having changed conguration options that require a restart. Using
this option ensures a minimum server downtime.
The Apache HTTP Server 305
GracefulShutdownTimeout needs to be set, otherwise restart-graceful
will result in a regular restart. If set to zero, the server will wait indenitely until
all remaining requests have been fully served.
A graceful restart can fail if the original Apache instance is not able to clear all
necessary resources. In this case, the command will result in a graceful stop.
stop-graceful
Stops the Web server after a dened period of time congured with
GracefulShutdownTimeout in order to ensure that existing requests can be
nished.
GracefulShutdownTimeout needs to be set, otherwise stop-graceful
will result in a regular restart. If set to zero, the server will wait indenitely until
all remaining requests have been fully served.
configtest or extreme-configtest
Checks the syntax of the conguration les without affecting a running Web
server. Because this check is forced every time the server is started, reloaded, or
restarted, it is usually not necessary to run the test explicitly (if a conguration error
is found, the Web server is not started, reloaded, or restarted). The
extreme-configtest options start the Web server as user nobody and actu-
ally load the conguration, so more errors can be detected. Note that although the
conguration is loaded, it is not possible to test the SSL setup because the SSL
certicates cannot be read by nobody.
probe
Probes for the necessity of a reload (checks whether the conguration has changed)
and suggests the required arguments for the rcapache2 command.
server-status and full-server-status
Dumps a short or full status screen, respectively. Requires either lynx or w3m in-
stalled as well as the module mod_status enabled. In addition to that, status
must be added to APACHE_SERVER_FLAGS in the le /etc/sysconfig/
apache2.
306 Reference
TIP: Additional Flags
If you specify additional ags to the rcapache2, these are passed through to
the Web server.
16.4 Installing, Activating, and
Conguring Modules
The Apache software is built in a modular fashion: all functionality except some core
tasks are handled by modules. This has progressed so far that even HTTP is processed
by a module (http_core).
Apache modules can be compiled into the Apache binary at build time or dynamically
loaded at runtime. Refer to Section 16.4.2, “Activation and Deactivation” (page 308)
for details of how to load modules dynamically.
Apache modules can be divided into four different categories:
Base Modules
Base modules are compiled into Apache by default. Apache in openSUSE has only
mod_so (needed to load other modules) and http_core compiled in. All others
are available as shared objects: rather than being included in the server binary itself,
they can be included at runtime.
Extension Modules
In general, modules labeled as extensions are included in the Apache software
package, but are usually not compiled into the server statically. In openSUSE, they
are available as shared objects that can be loaded into Apache at runtime.
External Modules
Modules labeled external are not included in the ofcial Apache distribution.
However, openSUSE provides several of them.
Multiprocessing Modules (MPMs)
MPMs are responsible for accepting and handling requests to the Web server, rep-
resenting the core of the Web server software.
The Apache HTTP Server 307
16.4.1 Module Installation
If you have done a default installation as described in Section 16.1.2, “Installation”
(page 288), the following modules are already installed: all base and extension modules,
the multiprocessing module Prefork MPM, and the external modules mod_php5 and
mod_python.
You can install additional external modules by starting YaST and choosing Software
> Software Management. Now choose Filter > Search and search for apache. Among
other packages, the results list contains all available external Apache modules.
16.4.2 Activation and Deactivation
Activate or deactivate particular modules either manually or with YaST. In YaST, script
language modules (PHP5, Perl, and Python) need to be enabled or disabled with the
module conguration described in Section 16.2.3.1, “HTTP Server Wizard” (page 298).
All other modules can be enabled or disabled as described in Section “Server Modules”
(page 303).
If you prefer to activate or deactivate the modules manually, use the commands
a2enmod mod_foo or a2dismod mod_foo, respectively. a2enmod -l outputs
a list of all currently active modules.
IMPORTANT: Including Conguration Files for External Modules
If you have activated external modules manually, make sure to load their con-
guration les in all virtual host congurations. Conguration les for external
modules are located under /etc/apache2/conf.d/ and are not loaded by
default. If you need the same modules on each virtual host, you can include *
.conf from this directory. Otherwise include individual les. See /etc/
apache2/vhost.d/vhost.template for examples.
16.4.3 Base and Extension Modules
All base and extension modules are described in detail in the Apache documentation.
Only a brief description of the most important modules is available here. Refer to
308 Reference
http://httpd.apache.org/docs/2.2/mod/ to learn details about each
module.
mod_actions
Provides methods to execute a script whenever a certain MIME type (such as
application/pdf), a le with a specic extension (like .rpm), or a certain
request method (such as GET) is requested. This module is enabled by default.
mod_alias
Provides Alias and Redirect directives with which you can map a URl to a
specic directory (Alias) or redirect a requested URL to another location. This
module is enabled by default.
mod_auth*
The authentication modules provide different authentication methods: basic authen-
tication with mod_auth_basic or digest authentication with
mod_auth_digest. Digest authentication in Apache 2.2 is considered experi-
mental.
mod_auth_basic and mod_auth_digest must be combined with an authen-
tication provider module, mod_authn_* (for example, mod_authn_file for
text le–based authentication) and with an authorization module mod_authz_*
(for example, mod_authz_user for user authorization).
More information about this topic is available in the Authentication HOWTO at
http://httpd.apache.org/docs/2.2/howto/auth.html.
mod_autoindex
Autoindex generates directory listings when no index le (for example, index
.html) is present. The look and feel of these indexes is congurable. This module
is enabled by default. However, directory listings are disabled by default via the
Options directive—overwrite this setting in your virtual host conguration. The
default conguration le for this module is located at /etc/apache2/mod
_autoindex-defaults.conf.
mod_cgi
mod_cgi is needed to execute CGI scripts. This module is enabled by default.
The Apache HTTP Server 309
mod_deflate
Using this module, Apache can be congured to compress given le types on the
y before delivering them.
mod_dir
mod_dir provides the DirectoryIndex directive with which you can congure
which les are automatically delivered when a directory is requested (index
.html by default). It also provides an automatic redirect to the correct URL when
a directory request does not contain a trailing slash. This module is enabled by de-
fault.
mod_env
Controls the environment that is passed to CGI scripts or SSI pages. Environment
variables can be set or unset or passed from the shell that invoked the httpd process.
This module is enabled by default.
mod_expires
With mod_expires, you can control how often proxy and browser caches refresh
your documents by sending an Expires header. This module is enabled by default.
mod_include
mod_include lets you use Server Side Includes (SSI), which provide a basic
functionality to generate HTML pages dynamically. This module is enabled by
default.
mod_info
Provides a comprehensive overview of the server conguration under http://local-
host/server-info/. For security reasons, you should always limit access to this URL.
By default only localhost is allowed to access this URL. mod_info is cong-
ured at /etc/apache2/mod_info.conf.
mod_log_config
With this module, you can congure the look of the Apache log les. This module
is enabled by default.
mod_mime
The mime module makes certain that a le is delivered with the correct MIME
header based on the lename's extension (for example text/html for HTML
documents). This module is enabled by default.
310 Reference
mod_negotiation
Necessary for content negotiation. See http://httpd.apache.org/docs/
2.2/content-negotiation.html for more information. This module is
enabled by default.
mod_rewrite
Provides the functionality of mod_alias, but offers more features and exibility.
With mod_rewrite, you can redirect URLs based on multiple rules, request
headers, and more.
mod_setenvif
Sets environment variables based on details of the client's request, such as the
browser string the client sends, or the client's IP address. This module is enabled
by default.
mod_speling
mod_speling attempts to automatically correct typographical errors in URLs,
such as capitalization errors.
mod_ssl
Enables encrypted connections between Web server and clients. See Section 16.6,
“Setting Up a Secure Web Server with SSL” (page 317) for details. This module is
enabled by default.
mod_status
Provides information on server activity and performance under http://localhost/serv-
er-status/. For security reasons, you should always limit access to this URL. By
default, only localhost is allowed to access this URL. mod_status is cong-
ured at /etc/apache2/mod_status.conf
mod_suexec
mod_suexec lets you run CGI scripts under a different user and group. This
module is enabled by default.
mod_userdir
Enables user-specic directories available under ~user/. The UserDir directive
must be specied in the conguration. This module is enabled by default.
The Apache HTTP Server 311
16.4.4 Multiprocessing Modules
openSUSE provides two different multiprocessing modules (MPMs) for use with
Apache:
Prefork MPM (page 312)
Section 16.4.4.2, “Worker MPM” (page 312)
16.4.4.1 Prefork MPM
The prefork MPM implements a nonthreaded, preforking Web server. It makes the Web
server behave similarly to Apache version 1.x. In this version it isolates each request
and handles it by forking a separate child process. Thus problematic requests cannot
affect others, avoiding a lockup of the Web server.
While providing stability with this process-based approach, the prefork MPM consumes
more system resources than its counterpart, the worker MPM. The prefork MPM is
considered the default MPM for Unix-based operating systems.
IMPORTANT: MPMs in This Document
This document assumes Apache is used with the prefork MPM.
16.4.4.2 Worker MPM
The worker MPM provides a multi-threaded Web server. A thread is a “lighter” form
of a process. The advantage of a thread over a process is its lower resource consumption.
Instead of only forking child processes, the worker MPM serves requests by using
threads with server processes. The preforked child processes are multi-threaded. This
approach makes Apache perform better by consuming fewer system resources than the
prefork MPM.
One major disadvantage is the stability of the worker MPM: if a thread becomes corrupt,
all threads of a process can be affected. In the worst case, this may result in a server
crash. Especially when using the Common Gateway Interface (CGI) with Apache under
heavy load, internal server errors might occur due to threads being unable to communi-
cate with system resources. Another argument against using the worker MPM with
312 Reference
Apache is that not all available Apache modules are thread-safe and thus cannot be
used in conjunction with the worker MPM.
WARNING: Using PHP Modules with MPMs
Not all available PHP modules are thread-safe. Using the worker MPM with
mod_php is strongly discouraged.
16.4.5 External Modules
Find a list of all external modules shipped with openSUSE here. Find the module's
documentation in the listed directory.
mod-apparmor
Adds support to Apache to provide AppArmor connement to individual CGI
scripts handled by modules like mod_php5 and mod_perl.
Package Name: apache2-mod_apparmor
More Information: Part “Conning Privileges with AppArmor” (↑Security Guide)
mod_mono
Using mod_mono allows you to run ASP.NET pages in your server.
Package Name: apache2-mod_mono
Conguration File: /etc/apache2/conf.d/mod_mono.conf
mod_perl
mod_perl enables you to run Perl scripts in an embedded interpreter. The persis-
tent interpreter embedded in the server avoids the overhead of starting an external
interpreter and the penalty of Perl start-up time.
Package Name: apache2-mod_perl
Conguration File: /etc/apache2/conf.d/mod_perl.conf
More Information: /usr/share/doc/packages/apache2-mod_perl
mod_php5
PHP is a server-side, cross-platform HTML embedded scripting language.
The Apache HTTP Server 313
Package Name: apache2-mod_php5
Conguration File: /etc/apache2/conf.d/php5.conf
More Information: /usr/share/doc/packages/apache2-mod_php5
mod_python
mod_python allows embedding Python within the Apache HTTP server for a
considerable boost in performance and added exibility in designing Web-based
applications.
Package Name: apache2-mod_python
More Information: /usr/share/doc/packages/apache2-mod_python
mod_tidy
mod_tidy validates each outgoing HTML page by means of the TidyLib. In case
of a validation error, a page with an error list is delivered. Otherwise the original
HTML page is delivered.
Package Name: apache2-mod_tidy
Conguration File: /etc/apache2/mod_tidy.conf
More Information: /usr/share/doc/packages/apache2-mod_tidy
16.4.6 Compilation
Apache can be extended by advanced users by writing custom modules. To develop
modules for Apache or compile third-party modules, the package apache2-devel
is required along with the corresponding development tools. apache2-devel also
contains the apxs2 tools, which are necessary for compiling additional modules for
Apache.
apxs2 enables the compilation and installation of modules from source code (including
the required changes to the conguration les), which creates dynamic shared objects
(DSOs) that can be loaded into Apache at runtime.
The apxs2 binaries are located under /usr/sbin:
/usr/sbin/apxs2—suitable for building an extension module that works with
any MPM. The installation location is /usr/lib/apache2.
314 Reference
/usr/sbin/apxs2-prefork—suitable for prefork MPM modules. The instal-
lation location is /usr/lib/apache2-prefork.
/usr/sbin/apxs2-worker—suitable for worker MPM modules. The installation
location is /usr/lib/apache2-worker.
Install and activate a module from source code with the following commands:
cd /path/to/module/source; apxs2 -cia
mod_foo.c
where -c compiles the module, -i installs it, and -a activates it. Other options of
apxs2 are described in the apxs2(1) man page.
16.5 Getting CGI Scripts to Work
Apache's Common Gateway Interface (CGI) lets you create dynamic content with
programs or scripts usually referred to as CGI scripts. CGI scripts can be written in any
programming language. Usually, script languages such as Perl or PHP are used.
To enable Apache to deliver content created by CGI scripts, mod_cgi needs to be
activated. mod_alias is also needed. Both modules are enabled by default. Refer to
Section 16.4.2, “Activation and Deactivation” (page 308) for details on activating
modules.
WARNING: CGI Security
Allowing the server to execute CGI scripts is a potential security hole. Refer to
Section 16.7, Avoiding Security Problems” (page 325) for additional information.
16.5.1 Apache Conguration
In openSUSE, the execution of CGI scripts is only allowed in the directory /srv/
www/cgi-bin/. This location is already congured to execute CGI scripts. If you
have created a virtual host conguration (see Section 16.2.2.1, “Virtual Host Congu-
ration” (page 293)) and want to place your scripts in a host-specic directory, you must
unlock and congure this directory.
The Apache HTTP Server 315
Example 16.5
VirtualHost CGI Conguration
ScriptAlias /cgi-bin/ "/srv/www/www.example.com/cgi-bin/"
<Directory "/srv/www/www.example.com/cgi-bin/">
Options +ExecCGI
AddHandler cgi-script .cgi .pl
Order allow,deny
Allow from all
</Directory>
Tells Apache to handle all les within this directory as CGI scripts.
Enables CGI script execution
Tells the server to treat les with the extensions .pl and .cgi as CGI scripts. Adjust
according to your needs.
The Order and Allow directives control the default access state and the order
in which allow and deny directives are evaluated. In this case “allow” statements
are evaluated before “deny” statements and universal access is enabled.
16.5.2 Running an Example Script
CGI programming differs from "regular" programming in that the CGI programs and
scripts must be preceded by a MIME-Type header such as Content-type:
text/html. This header is sent to the client, so it understands what kind of content
it receives. Secondly, the script's output must be something the client, usually a Web
browser, understands—HTML in most cases or plain text or images, for example.
A simple test script available under /usr/share/doc/packages/apache2/
test-cgi is part of the Apache package. It outputs the content of some environment
variables as plain text. Copy this script to either /srv/www/cgi-bin/ or the script
directory of your virtual host (/srv/www/www.example.com/cgi-bin/) and
name it test.cgi.
Files accessible by the Web server should be owned by the user root. For additional
information see Section 16.7, “Avoiding Security Problems” (page 325). Because the
Web server runs with a different user, the CGI scripts must be world-executable and
world-readable. Change into the CGI directory and use the command chmod 755
test.cgi to apply the proper permissions.
316 Reference
Now call http://localhost/cgi-bin/test.cgi or
http://www.example.com/cgi-bin/test.cgi. You should see the “CGI/1.0
test script report”.
16.5.3 CGI Troubleshooting
If you do not see the output of the test program but an error message instead, check the
following:
CGI Troubleshooting
Have you reloaded the server after having changed the conguration? Check with
rcapache2 probe.
If you have congured your custom CGI directory, is it congured properly? If in
doubt, try the script within the default CGI directory /srv/www/cgi-bin/ and
call it with http://localhost/cgi-bin/test.cgi.
Are the le permissions correct? Change into the CGI directory and execute ls -l
test.cgi. Its output should start with
-rwxr-xr-x 1 root root
Make sure that the script does not contain programming errors. If you have not
changed test.cgi, this should not be the case, but if you are using your own pro-
grams, always make sure that they do not contain programming errors.
16.6 Setting Up a Secure Web Server
with SSL
Whenever sensitive data, such as credit card information, is transferred between Web
server and client, it is desirable to have a secure, encrypted connection with authentica-
tion. mod_ssl provides strong encryption using the secure sockets layer (SSL) and
transport layer security (TLS) protocols for HTTP communication between a client and
the Web server. Using SSL/TSL, a private connection between Web server and client
The Apache HTTP Server 317
is established. Data integrity is ensured and client and server are able to authenticate
each other.
For this purpose, the server sends an SSL certicate that holds information proving the
server's valid identity before any request to a URL is answered. In turn, this guarantees
that the server is the uniquely correct end point for the communication. Additionally,
the certicate generates an encrypted connection between client and server that can
transport information without the risk of exposing sensitive, plain-text content.
mod_ssl does not implement the SSL/TSL protocols itself, but acts as an interface
between Apache and an SSL library. In openSUSE, the OpenSSL library is used.
OpenSSL is automatically installed with Apache.
The most visible effect of using mod_ssl with Apache is that URLs are prexed with
https:// instead of http://.
TIP: Example Certicate
An example certicate for a hypothetical company “Snake Oil” is available when
installing the package apache2-example-certificates.
16.6.1 Creating an SSL Certicate
In order to use SSL/TSL with the Web server, you need to create an SSL certicate.
This certicate is needed for the authorization between Web server and client, so that
each party can clearly identify the other party. To ensure the integrity of the certicate,
it must be signed by a party every user trusts.
There are three types of certicates you can create: a “dummy” certicate for testing
purposes only, a self-signed certicate for a dened circle of users that trust you, and
a certicate signed by an independent, publicly-known certicate authority (CA).
Creating a certicate is basically a two step process. First, a private key for the certicate
authority is generated then the server certicate is signed with this key.
318 Reference
TIP: For More Information
To learn more about concepts and denitions of SSL/TSL, refer to http://
httpd.apache.org/docs/2.2/ssl/ssl_intro.html.
16.6.1.1 Creating a “Dummy” Certicate
Generating a dummy certicate is simple. Just call the script
/usr/bin/gensslcert. It creates or overwrites the les listed below. Make use
of gensslcert's optional switches to ne-tune the certicate. Call
/usr/bin/gensslcert -h for more information.
/etc/apache2/ssl.crt/ca.crt
/etc/apache2/ssl.crt/server.crt
/etc/apache2/ssl.key/server.key
/etc/apache2/ssl.csr/server.csr
/root/.mkcert.cfg
A copy of ca.crt is also placed at /srv/www/htdocs/CA.crt for download.
IMPORTANT: For Testing Purposes Only
A dummy certicate should never be used on a production system. Only use
it for testing purposes.
16.6.1.2 Creating a Self-Signed Certicate
If you are setting up a secure Web server for an Intranet or for a dened circle of users,
it might be sufcient if you sign a certicate with your own certicate authority (CA).
Creating a self-signed certicate is an interactive nine-step process. Change into the
directory /usr/share/doc/packages/apache2 and run the following command:
./mkcert.sh make --no-print-directory /usr/bin/openssl
The Apache HTTP Server 319
/usr/sbin/ custom. Do not attempt to run this command from outside this direc-
tory. The program provides a series of prompts, some of which require user input.
Procedure 16.4
Creating a Self-Signed Certicate with mkcert.sh
1
Decide the signature algorithm used for certificates
Choose RSA (R, the default), because some older browsers have problems with DSA.
2
Generating RSA private key for CA (1024 bit)
No interaction needed.
3
Generating X.509 certificate signing request for CA
Create the CA's distinguished name here. This requires you to answer a few questions,
such as country name or organization name. Enter valid data, because everything
you enter here later shows up in the certicate. You do not need to answer every
question. If one does not apply to you or you want to leave it blank, use “.”. Common
name is the name of the CA itself—choose a signicant name, such as My company
CA.
IMPORTANT: Common Name of the CA
The common name of the CA must be different from the server's common
name, so do not choose the fully qualied hostname in this step.
4
Generating X.509 certificate for CA signed by itself
Choose certicate version 3 (the default).
5
Generating RSA private key for SERVER (1024 bit)
No interaction needed.
6
Generating X.509 certificate signing request for SERVER
Create the distinguished name for the server key here. Questions are almost identical
to the ones already answered for the CA's distinguished name. The data entered here
applies to the Web server and does not necessarily need to be identical to the CA's
data (for example, if the server is located elsewhere).
320 Reference
IMPORTANT: Selecting a Common Name
The common name you enter here must be the fully qualied hostname of
your secure server (for example, www.example.com). Otherwise the browser
issues a warning that the certicate does not match the server when accessing
the Web server.
7
Generating X.509 certificate signed by own CA
Choose certicate version 3 (the default).
8
Encrypting RSA private key of CA with a passphrase for
security
It is strongly recommended to encrypt the private key of the CA with a password,
so choose Y and enter a password.
9
Encrypting RSA private key of SERVER with a passphrase
for security
Encrypting the server key with a password requires you to enter this password every
time you start the Web server. This makes it difcult to automatically start the
server on boot or to restart the Web server. Therefore, it is common sense to say N
to this question. Keep in mind that your key is unprotected when not encrypted with
a password and make sure that only authorized persons have access to the key.
IMPORTANT: Encrypting the Server Key
If you choose to encrypt the server key with a password, increase the value
for APACHE_TIMEOUT in /etc/sysconfig/apache2. Otherwise you do
not have enough time to enter the passphrase before the attempt to start
the server is stopped unsuccessfully.
The script's result page presents a list of certicates and keys it has generated. Contrary
to what the script outputs, the les have not been generated in the local directory conf,
but to the correct locations under /etc/apache2/.
The last step is to copy the CA certicate le from /etc/apache2/ssl.crt/ca
.crt to a location where your users can access it in order to incorporate it into the list
The Apache HTTP Server 321
of known and trusted CAs in their Web browsers. Otherwise a browser complains that
the certicate was issued by an unknown authority. The certicate is valid for one year.
IMPORTANT: Self-Signed Certicates
Only use a self-signed certicate on a Web server that is accessed by people
who know and trust you as a certicate authority. It is not recommended to
use such a certicate for a public shop, for example.
16.6.1.3 Getting an Ofcially Signed Certicate
There are a number of ofcial certicate authorities that sign your certicates. The
certicate is signed by a trustworthy third party, so can be fully trusted. Publicly oper-
ating secure Web servers usually have got an ofcially signed certicate.
The best-known ofcial CAs are Thawte (http://www.thawte.com/) or Verisign
(http://www.verisign.com). These and other CAs are already compiled into
all browsers, so certicates signed by these certicate authorities are automatically ac-
cepted by the browser.
When requesting an ofcially signed certicate, you do not send a certicate to the
CA. Instead, issue a Certicate Signing Request (CSR). To create a CSR, call the script
/usr/share/ssl/misc/CA.sh -newreq.
First the script asks for a password with which the CSR should be encrypted. Then you
are asked to enter a distinguished name. This requires you to answer a few questions,
such as country name or organization name. Enter valid data—everything you enter
here later shows up in the certicate and is checked. You do not need to answer every
question. If one does not apply to you or you want to leave it blank, use “.”. Common
name is the name of the CA itself—choose a signicant name, such as My company
CA. Last, a challenge password and an alternative company name must be entered.
Find the CSR in the directory from which you called the script. The le is named
newreq.pem.
322 Reference
16.6.2 Conguring Apache with SSL
The default port for SSL and TLS requests on the Web server side is 443. There is no
conict between a “regular” Apache listening on port 80 and an SSL/TLS-enabled
Apache listening on port 443. In fact, HTTP and HTTPS can be run with the same
Apache instance. Usually separate virtual hosts are used to dispatch requests to port 80
and port 443 to separate virtual servers.
IMPORTANT: Firewall Conguration
Do not forget to open the rewall for SSL-enabled Apache on port 443. This
can be done with YaST as described in Section “Conguring the Firewall with
YaST” (Chapter 13, Masquerading and Firewalls, ↑Security Guide).
The SSL module is enabled by default in the global server conguration. In case it has
been disabled on your host, activate it with the following command: a2enmod ssl.
To nally enable SSL, the server needs to be started with the ag “SSL”. To do so, call
a2enflag SSL. If you have chosen to encrypt your server certicate with a password,
you should also increase the value for APACHE_TIMEOUT in /etc/sysconfig/
apache2, so you have enough time to enter the passphrase when Apache starts. Restart
the server to make these changes active. A reload is not sufcient.
The virtual host conguration directory contains a template /etc/apache2/vhosts
.d/vhost-ssl.template with SSL-specic directives that are extensively docu-
mented. Refer to Section 16.2.2.1, “Virtual Host Conguration” (page 293) for the
general virtual host conguration.
To get started, copy the template to /etc/apache2/vhosts.d/mySSL-host
.conf and edit it. Adjusting the values for the following directives should be sufcient:
DocumentRoot
ServerName
ServerAdmin
ErrorLog
TransferLog
The Apache HTTP Server 323
16.6.2.1 Name-Based Virtual Hosts and SSL
By default it is not possible to run multiple SSL-enabled virtual hosts on a server with
only one IP address. Name-based virtual hosting requires that Apache knows which
server name has been requested. The problem with SSL connections is, that such a re-
quest can only be read after the SSL connection has already been established (by using
the default virtual host). As a result, users will receive a warning message stating that
the certicate does not match the server name.
openSUSE comes with an extension to the SSL protocol called Server Name Indication
(SNI) addresses this issue by sending the name of the virtual domain as part of the SSL
negotiation. This enables the server to “switch” to the correct virtual domain early and
present the browser the correct certicate.
SNI is enabled by default on openSUSE. In order to enable Name-Based Virtual Hosts
for SSL, congure the server as described in Section “Name-Based Virtual Hosts”
(page 294) (note that you need to use port 443 rather than port 80 with SSL).
IMPORTANT: SNI Browser Support
SNI must also be supported on the client side. Although SNI is supported by
most browsers, some browsers for mobile hardware as well as Internet Explorer
and Safari on Windows* XP lack SNI support. See http://en.wikipedia
.org/wiki/Server_Name_Indication for details.
Congure how to handle non-SNI capable browser with the directive
SSLStrictSNIVHostCheck. When set to on in the server conguration,
non-SNI capable browser will be rejected for all virtual hosts. When set to on
within a VirtualHost directive, access to this particular Host will be rejected.
When set to off in the server conguration, the server will behave as if not
having SNI support. SSL requests will be handled by the rst Virtual host dened
(for port 443).
324 Reference
16.7 Avoiding Security Problems
A Web server exposed to the public Internet requires an ongoing administrative effort.
It is inevitable that security issues appear, both related to the software and to accidental
misconguration. Here are some tips for how to deal with them.
16.7.1 Up-to-Date Software
If there are vulnerabilities found in the Apache software, a security advisory will be
issued by SUSE. It contains instructions for xing the vulnerabilities, which in turn
should be applied as soon as possible. The SUSE security announcements are available
from the following locations:
Web Page http://www.novell.com/linux/security/
securitysupport.html
Mailing List Archive http://lists.opensuse.org/opensuse
-security-announce/
RSS Feed http://www.novell.com/linux/security/suse_security
.xml
16.7.2 DocumentRoot Permissions
By default in openSUSE, the DocumentRoot directory /srv/www/htdocs and
the CGI directory /srv/www/cgi-bin belong to the user and group root. You
should not change these permissions. If the directories are writable for all, any user can
place les into them. These les might then be executed by Apache with the permissions
of wwwrun, which may give the user unintended access to le system resources. Use
subdirectories of /srv/www to place the DocumentRoot and CGI directories for
your virtual hosts and make sure that directories and les belong to user and group
root.
The Apache HTTP Server 325
16.7.3 File System Access
By default, access to the whole le system is denied in /etc/apache2/httpd
.conf. You should never overwrite these directives, but specically enable access to
all directories Apache should be able to read. For details, see Section “Basic Virtual
Host Conguration” (page 296). In doing so, ensure that no critical les, such as password
or system conguration les, can be read from the outside.
16.7.4 CGI Scripts
Interactive scripts in Perl, PHP, SSI, or any other programming language can essentially
run arbitrary commands and therefore present a general security issue. Scripts that will
be executed from the server should only be installed from sources the server adminis-
trator trusts—allowing users to run their own scripts is generally not a good idea. It is
also recommended to do security audits for all scripts.
To make the administration of scripts as easy as possible, it is common practice to
limit the execution of CGI scripts to specic directories instead of globally allowing
them. The directives ScriptAlias and Option ExecCGI are used for congura-
tion. The openSUSE default conguration does not allow execution of CGI scripts from
everywhere.
All CGI scripts run as the same user, so different scripts can potentially conict with
each other. The module suEXEC lets you run CGI scripts under a different user and
group.
16.7.5 User Directories
When enabling user directories (with mod_userdir or mod_rewrite) you should
strongly consider not allowing .htaccess les, which would allow users to overwrite
security settings. At least you should limit the user's engagement by using the directive
AllowOverRide. In openSUSE, .htaccess les are enabled by default, but the
user is not allowed to overwrite any Option directives when using mod_userdir
(see the /etc/apache2/mod_userdir.conf conguration le).
326 Reference
16.8 Troubleshooting
If Apache does not start, the Web page is not accessible, or users cannot connect to the
Web server, it is important to nd the cause of the problem. Here are some typical
places to look for error explanations and important things to check:
Output of rcapache2
Instead of starting and stopping the Web server with the binary /usr/sbin/
httpd2, rather use the rcapache2 script instead (described in Section 16.3,
“Starting and Stopping Apache” (page 304)). It is verbose about errors, and it even
provides tips and hints for xing conguration errors.
Log Files and Verbosity
In case of both fatal and nonfatal errors, check the Apache log les for causes,
mainly the error log le located at /var/log/apache2/error_log by default.
Additionally, you can control the verbosity of the logged messages with the
LogLevel directive if more detail is needed in the log les.
TIP: A Simple Test
Watch the Apache log messages with the command tail -F
/var/log/apache2/my_error_log. Then run rcapache2 restart.
Now, try to connect with a browser and check the output.
Firewall and Ports
A common mistake is to not open the ports for Apache in the rewall conguration
of the server. If you congure Apache with YaST, there is a separate option available
to take care of this specic issue (see Section 16.2.3, “Conguring Apache with
YaST” (page 298)). If you are conguring Apache manually, open rewall ports
for HTTP and HTTPS via YaST's rewall module.
If the error cannot be tracked down with the help of any these, check the online Apache
bug database at http://httpd.apache.org/bug_report.html. Additionally,
the Apache user community can be reached via a mailing list available at http://
httpd.apache.org/userslist.html. A recommended newsgroup is comp
.infosystems.www.servers.unix.
The Apache HTTP Server 327
16.9 For More Information
The package apache2-doc contains the complete Apache manual in various local-
izations for local installation and reference. It is not installed by default—the quickest
way to install it is to use the command zypper in apache2-doc. Once installed,
the Apache manual is available at http://localhost/manual/. You may also
access it on the Web at http://httpd.apache.org/docs-2.2/. SUSE-spe-
cic conguration hints are available in the directory /usr/share/doc/packages/
apache2/README.*.
16.9.1 Apache 2.2
For a list of new features in Apache 2.2, refer to http://httpd.apache.org/
docs/2.2/new_features_2_2.html. Information about upgrading from version
2.0 to 2.2 is available at http://httpd.apache.org/docs-2.2/upgrading
.html.
16.9.2 Apache Modules
More information about external Apache modules that are briey described in Sec-
tion 16.4.5, “External Modules” (page 313) is available at the following locations:
mod-apparmor
http://en.opensuse.org/SDB:AppArmor
mod_mono
http://www.mono-project.com/Mod_mono
mod_perl
http://perl.apache.org/
mod_php5
http://www.php.net/manual/en/install.unix.apache2.php
mod_python
http://www.modpython.org/
328 Reference
mod_tidy
http://mod-tidy.sourceforge.net/
16.9.3 Development
More information about developing Apache modules or about getting involved in the
Apache Web server project are available at the following locations:
Apache Developer Information
http://httpd.apache.org/dev/
Apache Developer Documentation
http://httpd.apache.org/docs/2.2/developer/
Writing Apache Modules with Perl and C
http://www.modperl.com/
16.9.4 Miscellaneous Sources
If you experience difculties specic to Apache in openSUSE, take a look at the
openSUSE wiki at http://old-en.opensuse.org/Apache. The history of
Apache is provided at http://httpd.apache.org/ABOUT_APACHE.html.
This page also explains why the server is called Apache.
The Apache HTTP Server 329
17
Setting up an FTP server with
YaST
Using the YaST FTP Server module, you can congure your machine to function as
an FTP (File Transfer Protocol) server. Anonymous and/or authenticated users can
connect to your machine and download les using the FTP protocol. Depending on the
conguration, they can also upload les to the FTP server. YaST provides a unied
conguration interface for various FTP server daemons installed on your system.
You can use the YaST FTP Server conguration module to congure two different
FTP server daemons:
vsftpd (Very Secure FTP Daemon) and
pure-ftpd
Only installed servers can be congured. Standard openSUSE® media do not contain
the pure-ftpd package. However, if the pure-ftpd package is installed from an-
other repository, it can be congured using the YaST module.
The vsftpd and pure-ftpd servers have slightly different conguration options, especially
in the Experts Settings dialog. This chapter describes the settings of the vsftpd server ,
being the default server for openSUSE .
If the YaST FTP Server module is not available in your system, install the
yast2-ftp-server package.
To congure the FTP server using YaST, follow these steps:
Setting up an FTP server with YaST 331
1
Open YaST Control Center and choose Network Services > FTP Server or run the
yast2 ftp-server command as root.
2
If there is not any FTP server installed in your system, you will be asked which
server to install when the YaST FTP Server module starts. Choose a server (vsftpd
is the standard server for openSUSE) and conrm the dialog. If there are two servers
installed, choose the preferred server and click OK.
3
In the Start-Up dialog, congure the options for starting of the FTP server. For more
information, see Section 17.1, “Starting the FTP server” (page 332).
In the General dialog, congure FTP directories, welcome message, le creation
masks and various other parameters. For more information, see Section 17.2, “FTP
General Settings” (page 333).
In the Performance dialog, set the parameters that affect the load on the FTP server.
For more information, see Section 17.3, “FTP Performance Settings” (page 334).
In the Authentication dialog, set whether the FTP server should be available for
anonymous and/or authenticated users. For more information, see Section 17.4,
“Authentication” (page 334).
In the Expert Settings dialog, congure the operation mode of the FTP server, SSL
connections and rewall settings. For more information, see Section 17.5, “Expert
Settings” (page 335).
4
Press Finish to save the congurations.
17.1 Starting the FTP server
In the Service Start frame of the FTP Start-Up dialog set the way the FTP server is
started up. You can choose between starting the server automatically during the system
boot and starting it manually. If the FTP server should be started only after an FTP
connection request, choose Via xinetd.
The current status of the FTP server is shown in the Switch On and Off frame of the
FTP Start-Up dialog. Start the FTP server by clicking Start FTP Now. To stop the
server, click Stop FTP Now. After having changed the settings of the server click Save
332 Reference
Settings and Restart FTP Now. Your congurations will be saved by leaving the con-
guration module with Finish.
The Selected Service frame of the FTP Start-Up dialog shows which FTP server is
used: either vsftpd or pure-ftpd. If both servers are installed, you can switch between
them—the current conguration will automatically be converted. The pure-ftpd package
is not included in the standard openSUSE media so you have to install it from a different
installation source if you want to use it.
Figure 17.1
FTP Server Conguration Start-Up
17.2 FTP General Settings
In the General Settings frame of the FTP General Settings dialog you can set the Wel-
come message which is shown after connecting to the FTP server.
If you check the Chroot Everyone option, all local users will be placed in a chroot jail
in their home directory after login. This option has security implications, especially if
the users have upload permission or shell access, so be careful enabling this option.
If you check the Verbose Logging option, all FTP requests and responses are logged.
Setting up an FTP server with YaST 333
You can limit permissions of les created by anonymous and/or authenticated users
with umask. Set the le creation mask for anonymous users in Umask for Anonymous
and the le creation mask for authenticated users in Umask for Authenticated Users.
The masks should be entered as octal numbers with a leading zero. For more information
about umask, see the umask man page (man 1p umask).
In the FTP Directories frame set the directories used for anonymous and authorized
users. With Browse, you can select a directory to be used from the local lesystem.
The default FTP directory for anonymous users is /srv/ftp. Note that vsftpd does
not allow this directory to be writable for all users. The subdirectory upload with
write permissions for anonymous users is created instead.
NOTE: Write Permissions in FTP Directory
The pure-ftpd server allows the FTP directory for anonymous users to be
writable. When switching between servers, make sure you remove the write
permissions in the directory that was used with pure-ftpd before switching
back to the vsftpd server.
17.3 FTP Performance Settings
In the Performance dialog set the parameters which affect the load on the FTP server.
Max Idle Time is the maximum time (in minutes) the remote client may spend between
FTP commands. In case of longer inactivity, the remote client is disconnected. Max
Clients for One IP determines the maximum number of clients which can be connected
from a single IP address. Max Clients determines the maximum number of clients which
may be connected. Any additional clients will get an error message.
The maximum data transfer rate (in KB/s) is set in Local Max Rate for local authenti-
cated users, and in Anonymous Max Rate for anonymous clients respectively. The default
value for the rate settings is 0, which means unlimited data transfer rate.
17.4 Authentication
In the Enable/Disable Anonymous and Local Users frame of the Authentication dialog,
you are able to set which users are allowed to access your FTP server. You can choose
334 Reference
between the following options: granting access to anonymous users only, to authenti-
cated users only (with accounts on the system) or to both types of users.
If you want to allow users to upload les to the FTP server, check Enable Upload in
the Uploading frame of the Authentication dialog. Here you are able to allow uploading
or creating directories even for anonymous users by checking the respective box.
NOTE: vsftp—Allowing File Upload for Anonymous Users
If a vsftpd server is used and you want anonymous users to be able to upload
les or create directories, a subdirectory with writing permissions for all users
has to be created in the anonymous FTP directory.
17.5 Expert Settings
An FTP server can run in active or in passive mode. By default the server runs in passive
mode. To switch into active mode, just uncheck Enable Passive Mode option in Expert
Settings dialog. You can also change the range of ports on the server used for the data
stream by tweaking the Min Port for Pas. Mode and Max Port for Pas. Mode options.
If you want encrypted communication between clients and the server, you can Enable
SSL. Check the versions of the protocol to be supported and specify the DSA certicate
to be used for SSL encrypted connections.
If your system is protected by a rewall, check Open Port in Firewall to enable a con-
nection to the FTP server.
17.6 For more information
For more information about FTP servers read the manual pages of vsftpd and
vsftpd.conf.
Setting up an FTP server with YaST 335
Part IV. Mobility
18
Mobile Computing with Linux
Mobile computing is mostly associated with laptops, PDAs and cellular phones (and
the data exchange between them). Mobile hardware components, such as external hard
disks, ash drives, or digital cameras, can be connected to laptops or desktop systems.
A number of software components are involved in mobile computing scenarios and
some applications are tailor-made for mobile use.
18.1 Laptops
The hardware of laptops differs from that of a normal desktop system. This is because
criteria like exchangeability, space requirements and power consumption must be taken
into account. The manufacturers of mobile hardware have developed standard interfaces
like PCMCIA (Personal Computer Memory Card International Association), Mini PCI
and Mini PCIe that can be used to extend the hardware of laptops. The standards cover
memory cards, network interface cards, ISDN (and modem cards) and external hard
disks.
TIP: openSUSE and Tablet PCs
openSUSE also supports Tablet PCs. Tablet PCs come with a touchpad/digitizer
that allows you to use a digital pen or even ngertips to edit data right on the
screen instead of using mouse and keyboard. They are installed and congured
much like any other system. For a detailed introduction to the installation and
conguration of Tablet PCs, refer to Chapter 22, Using Tablet PCs (page 397).
Mobile Computing with Linux 339
18.1.1 Power Conservation
The inclusion of energy-optimized system components during laptop manufacturing
contributes to their suitability for use without access to the electrical power grid. Their
contribution towards conservation of power is at least as important as that of the oper-
ating system. openSUSE® supports various methods that inuence the power consump-
tion of a laptop and have varying effects on the operating time under battery power.
The following list is in descending order of contribution towards power conservation:
Throttling the CPU speed.
Switching off the display illumination during pauses.
Manually adjusting the display illumination.
Disconnecting unused, hotplug-enabled accessories (USB CD-ROM, external mouse,
unused PCMCIA cards, WLAN, etc.).
Spinning down the hard disk when idling.
Detailed background information about power management in openSUSE is provided
in Chapter 19, Power Management (page 349).
18.1.2 Integration in Changing Operating
Environments
Your system needs to adapt to changing operating environments when used for mobile
computing. Many services depend on the environment and the underlying clients must
be recongured. openSUSE handles this task for you.
340 Reference
Figure 18.1
Integrating a Mobile Computer in an Existing Environment
The services affected in the case of a laptop commuting back and forth between a small
home network and an ofce network are:
Network
This includes IP address assignment, name resolution, Internet connectivity and
connectivity to other networks.
Printing
A current database of available printers and an available print server must be present,
depending on the network.
E-Mail and Proxies
As with printing, the list of the corresponding servers must be current.
X (Graphical Environment)
If your laptop is temporarily connected to a projector or an external monitor, differ-
ent display congurations must be available.
Mobile Computing with Linux 341
openSUSE offers several ways of integrating laptops into existing operating environ-
ments:
NetworkManager
NetworkManager is especially tailored for mobile networking on laptops. It provides
a means to easily and automatically switch between network environments or dif-
ferent types of networks such as mobile broadband (such as GPRS, EDGE, or 3G),
wireless LAN, and Ethernet. NetworkManager supports WEP and WPA-PSK en-
cryption in wireless LANs. It also supports dial-up connections (with smpppd).
Both desktop environments (GNOME and KDE) include a front-end for Network-
Manager. For more information about the desktop applets, see Section 21.4, “Using
KNetworkManager” (page 384) and Section 21.5, “Using GNOME NetworkMan-
ager Applet” (page 387).
Table 18.1
Use Cases for NetworkManager
Use NetworkManagerMy computer…
Yesis a laptop
Yesis sometimes attached to different networks
Noprovides network services (such as DNS or DHCP)
Noonly uses a static IP address
Use the YaST tools to congure networking whenever NetworkManager should
not handle network conguration.
TIP: DNS conguration and various types of network connections
If you travel frequently with your laptop and change different types of
network connections, NetworkManager works ne when all DNS addresses
are assigned correctly assigned with DHCP. If some of your connections
use static DNS address(es), add it to the
NETCONFIG_DNS_STATIC_SERVERS option in /etc/sysconfig/
network/config.
342 Reference
SLP
The service location protocol (SLP) simplies the connection of a laptop to an ex-
isting network. Without SLP, the administrator of a laptop usually requires detailed
knowledge of the services available in a network. SLP broadcasts the availability
of a certain type of service to all clients in a local network. Applications that support
SLP can process the information dispatched by SLP and be congured automati-
cally. SLP can also be used to install a system, minimizing the effort of searching
for a suitable installation source. Find detailed information about SLP in Chapter 10,
SLP Services in the Network (page 211).
18.1.3 Software Options
There are various special task areas in mobile use that are covered by dedicated software:
system monitoring (especially the battery charge), data synchronization, and wireless
communication with peripherals and the Internet. The following sections cover the most
important applications that openSUSE provides for each task.
18.1.3.1 System Monitoring
Two KDE system monitoring tools are provided by openSUSE:
Power Management
Power Management is an application which lets you adjust energy saving related
behavior of the KDE desktop. You can typically access it via the Battery Monitor
tray icon, which changes according to the type of the current power supply. Other
way to open its conguration dialog is through the Kickoff Application Launcher:
Applications > Congure Desktop > Advanced > Power Management.
Click the Battery Monitor tray icon to access options to congure its behavior. You
can choose one of ve displayed power proles which best ts your needs. For
example, the Presentation scheme disables the screen saver and the power manage-
ment in general, so that your presentation is not interrupted by system events. Click
More... to open a more complex conguration screen. Here you can edit individual
proles and set advanced power management options and notications, such as
what to do when the laptop lid has been closed, or when the battery charge is low.
System Monitor
System Monitor (also called KSysguard) gathers measurable system parameters
into one monitoring environment. It presents the output information in 2 tabs by
Mobile Computing with Linux 343
default. Process Table gives detailed information about currently running processes,
such as CPU load, memory usage, or process ID number and nice value. The pre-
sentation and ltering of the collected data can be customized to add a new type
of process information, left-click on the process table header and choose which
column to hide or add to the view. It is also possible to monitor different system
parameters in various data pages or collect the data of various machines in parallel
over the network. KSysguard can also run as a daemon on machines without a KDE
environment. Find more information about this program in its integrated help
function or in the SUSE help pages.
In the GNOME environment use Power Management Preferences and System Monitor.
18.1.3.2 Synchronizing Data
When switching between working on a mobile machine disconnected from the network
and working at a networked workstation in an ofce, it is necessary to keep processed
data synchronized across all instances. This could include e-mail folders, directories
and individual les that need to be present for work on the road as well as at the ofce.
The solution in both cases is as follows:
Synchronizing E-Mail
Use an IMAP account for storing your e-mails in the ofce network. Then access
the e-mails from the workstation using any disconnected IMAP–enabled e-mail
client, like Mozilla Thunderbird Mail, Evolution, or KMail. The e-mail client must
be congured so that the same folder is always accessed for Sent messages.
This ensures that all messages are available along with their status information after
the synchronization process has completed. Use an SMTP server implemented in
the mail client for sending messages instead of the system-wide MTA postx or
sendmail to receive reliable feedback about unsent mail.
Synchronizing Files and Directories
There are several utilities suitable for synchronizing data between a laptop and a
workstation. One of the most widely used is a command-line tool called rsync.
For more information, see Chapter 23, Copying and Sharing Files (page 407).
344 Reference
18.1.3.3 Wireless Communication
As well as connecting to a home or ofce network with a cable, a laptop can also use
wireless connection to access other computers, peripherals, cellular phones or PDAs.
Linux supports three types of wireless communication:
WLAN
With the largest range of these wireless technologies, WLAN is the only one suitable
for the operation of large and sometimes even spatially separate networks. Single
machines can connect with each other to form an independent wireless network or
access the Internet. Devices called access points act as base stations for WLAN-
enabled devices and act as intermediaries for access to the Internet. A mobile user
can switch among access points depending on location and which access point is
offering the best connection. Like in cellular telephony, a large network is available
to WLAN users without binding them to a specic location for accessing it. Find
details about WLAN in Chapter 20, Wireless LAN (page 361).
Bluetooth
Bluetooth has the broadest application spectrum of all wireless technologies. It can
be used for communication between computers (laptops) and PDAs or cellular
phones, as can IrDA. It can also be used to connect various computers within range.
Bluetooth is also used to connect wireless system components, like a keyboard or
a mouse. The range of this technology is, however, not sufcient to connect remote
systems to a network. WLAN is the technology of choice for communicating
through physical obstacles like walls.
IrDA
IrDA is the wireless technology with the shortest range. Both communication parties
must be within viewing distance of each other. Obstacles like walls cannot be
overcome. One possible application of IrDA is the transmission of a le from a
laptop to a cellular phone. The short path from the laptop to the cellular phone is
then covered using IrDA. The long range transport of the le to the recipient of
the le is handled by the mobile network. Another application of IrDA is the
wireless transmission of printing jobs in the ofce.
18.1.4 Data Security
Ideally, you protect data on your laptop against unauthorized access in multiple ways.
Possible security measures can be taken in the following areas:
Mobile Computing with Linux 345
Protection against Theft
Always physically secure your system against theft whenever possible. Various
securing tools (like chains) are available in retail stores.
Strong Authentication
Use biometric authentication in addition to standard authentication via login and
password. openSUSE supports ngerprint authentication. For more details, see
Chapter 7, Using the Fingerprint Reader (↑Security Guide).
Securing Data on the System
Important data should not only be encrypted during transmission, but also on the
hard disk. This ensures its safety in case of theft. The creation of an encrypted
partition with openSUSE is described in Chapter 10, Encrypting Partitions and
Files (↑Security Guide). Another possibility is to create encrypted home directories
when adding the user with YaST.
IMPORTANT: Data Security and Suspend to Disk
Encrypted partitions are not unmounted during a suspend to disk event.
Thus, all data on these partitions is available to any party who manages to
steal the hardware and issue a resume of the hard disk.
Network Security
Any transfer of data should be secured, no matter how the transfer is done. Find
general security issues regarding Linux and networks in Chapter 1, Security and
Condentiality (↑Security Guide). Security measures related to wireless networking
are provided in Chapter 20, Wireless LAN (page 361).
18.2 Mobile Hardware
openSUSE supports the automatic detection of mobile storage devices over FireWire
(IEEE 1394) or USB. The term mobile storage device applies to any kind of FireWire
or USB hard disk, USB ash drive, or digital camera. These devices are automatically
detected and congured as soon as they are connected with the system over the corre-
sponding interface. The le managers of both GNOME and KDE offer exible handling
of mobile hardware items. To unmount any of these media safely, use the Safely Remove
(KDE) or Unmount (GNOME) feature of either le manager.
346 Reference
External Hard Disks (USB and FireWire)
As soon as an external hard disk is correctly recognized by the system, its icon
appears in the le manager. Clicking the icon displays the contents of the drive. It
is possible to create folders and les here and edit or delete them. To rename a hard
disk from the name it had been given by the system, select the corresponding menu
item from the menu that opens when the icon is right-clicked. This name change
is limited to display in the le manager. The descriptor by which the device is
mounted in /media remains unaffected by this.
USB Flash Drives
These devices are handled by the system just like external hard disks. It is similarly
possible to rename the entries in the le manager.
Digital Cameras (USB and FireWire)
Digital cameras recognized by the system also appear as external drives in the
overview of the le manager. KDE allows reading and accessing the pictures at
the URL camera:/ . The images can then be processed using digiKam or f-spot.
For advanced photo processing, use GIMP.
18.3 Cellular Phones and PDAs
A desktop system or a laptop can communicate with a cellular phone via Bluetooth or
IrDA. Some models support both protocols and some only one of the two. The usage
areas for the two protocols and the corresponding extended documentation has already
been mentioned in Section 18.1.3.3, “Wireless Communication” (page 345). The con-
guration of these protocols on the cellular phones themselves is described in their
manuals.
The support for synchronizing with handheld devices manufactured by Palm, Inc., is
already built into Evolution and Kontact. Initial connection with the device is easily
performed with the assistance of a wizard. Once the support for Palm Pilots is congured,
it is necessary to determine which type of data should be synchronized (addresses, ap-
pointments, etc.).
A more sophisticated synchronization solution is available with the program opensync
(see packages libopensync, msynctool and the respective plug-ins for the different de-
vices).
Mobile Computing with Linux 347
18.4 For More Information
The central point of reference for all questions regarding mobile devices and Linux is
http://tuxmobil.org/. Various sections of that Web site deal with the hardware
and software aspects of laptops, PDAs, cellular phones and other mobile hardware.
A similar approach to that of http://tuxmobil.org/ is made by http://www
.linux-on-laptops.com/. Information about laptops and handhelds can be
found here.
SUSE maintains a mailing list in German dedicated to the subject of laptops. See
http://lists.opensuse.org/opensuse-mobile-de/. On this list, users
and developers discuss all aspects of mobile computing with openSUSE. Postings in
English are answered, but the majority of the archived information is only available in
German. Use http://lists.opensuse.org/opensuse-mobile/ for English
postings.
Information about OpenSync is available on http://en.opensuse.org/
OpenSync.
348 Reference
19
Power Management
Power management is especially important on laptop computers, but is also useful on
other systems. ACPI (Advanced Conguration and Power Interface) is available on all
modern computers (laptops, desktops, and servers). Power management technologies
require suitable hardware and BIOS routines. Most laptops and many modern desktops
and servers meet these requirements. It is also possible to control CPU frequency scaling
to save power or decrease noise.
19.1 Power Saving Functions
Power saving functions are not only signicant for the mobile use of laptops, but also
for desktop systems. The main functions and their use in ACPI are:
Standby
not supported.
Suspend (to memory)
This mode writes the entire system state to the RAM. Subsequently, the entire
system except the RAM is put to sleep. In this state, the computer consumes very
little power. The advantage of this state is the possibility of resuming work at the
same point within a few seconds without having to boot and restart applications.
This function corresponds to the ACPI state S3. The support of this state is still
under development and therefore largely depends on the hardware.
Power Management 349
Hibernation (suspend to disk)
In this operating mode, the entire system state is written to the hard disk and the
system is powered off. There must be a swap partition at least as big as the RAM
to write all the active data. Reactivation from this state takes about 30 to 90 seconds.
The state prior to the suspend is restored. Some manufacturers offer useful hybrid
variants of this mode, such as RediSafe in IBM Thinkpads. The corresponding
ACPI state is S4. In Linux, suspend to disk is performed by kernel routines that
are independent from ACPI.
Battery Monitor
ACPI checks the battery charge status and provides information about it. Addition-
ally, it coordinates actions to perform when a critical charge status is reached.
Automatic Power-Off
Following a shutdown, the computer is powered off. This is especially important
when an automatic shutdown is performed shortly before the battery is empty.
Processor Speed Control
In connection with the CPU, energy can be saved in three different ways: frequency
and voltage scaling (also known as PowerNow! or Speedstep), throttling and putting
the processor to sleep (C-states). Depending on the operating mode of the computer,
these methods can also be combined.
19.2 Advanced Conguration and
Power Interface (ACPI)
ACPI was designed to enable the operating system to set up and control the individual
hardware components. ACPI supersedes both Power Management Plug and Play (PnP)
and Advanced Power Management (APM). It delivers information about the battery,
AC adapter, temperature, fan and system events, like “close lid” or “battery low.”
The BIOS provides tables containing information about the individual components and
hardware access methods. The operating system uses this information for tasks like
assigning interrupts or activating and deactivating components. Because the operating
system executes commands stored in the BIOS, the functionality depends on the BIOS
implementation. The tables ACPI can detect and load are reported in /var/log/boot
350 Reference
.msg. See Section 19.2.3, “Troubleshooting” (page 354) for more information about
troubleshooting ACPI problems.
19.2.1 Controlling the CPU Performance
The CPU can save energy in three ways:
Frequency and Voltage Scaling (page 351)
Throttling the Clock Frequency (T-states) (page 353)
Putting the Processor to Sleep (C-states) (page 353)
Depending on the operating mode of the computer, these methods can be combined.
Saving energy also means that the system heats up less and the fans are activated less
frequently.
Frequency scaling and throttling are only relevant if the processor is busy, because the
most economic C-state is applied anyway when the processor is idle. If the CPU is
busy, frequency scaling is the recommended power saving method. Often the processor
only works with a partial load. In this case, it can be run with a lower frequency. Usu-
ally, dynamic frequency scaling controlled by the kernel on-demand governor is the
best approach.
Throttling should be used as the last resort, for example, to extend the battery operation
time despite a high system load. However, some systems do not run smoothly when
they are throttled too much. Moreover, CPU throttling does not make sense if the CPU
has little to do.
19.2.1.1 Frequency and Voltage Scaling
PowerNow! and Speedstep are the designations AMD and Intel use for this technology.
However, this technology is also applied in processors of other manufacturers. The
clock frequency of the CPU and its core voltage are reduced at the same time, resulting
in more than linear energy savings. This means that when the frequency is halved (half
performance), far less than half of the energy is consumed. This technology is indepen-
dent from ACPI.
Power Management 351
There are two main approaches to performing CPU frequency scaling—by the kernel
itself (CPUfreq infrastructure with in-kernel governors) or by a userspace application.
The in-kernel governors are policy governors that can change the CPU frequency based
on different criteria (a sort of pre-congured power schemes for the CPU). The following
governors are available with the CPUfreq subsystem:
Performance Governor
The CPU frequency is statically set to the highest possible for maximum perfor-
mance. Consequently, saving power is not the focus of this governor.
Powersave Governor
The CPU frequency is statically set to the lowest possible. This can have severe
impact on the performance, as the system will never rise above this frequency no
matter how busy the processors are.
On-demand Governor
The kernel implementation of a dynamic CPU frequency policy: The governor
monitors the processor utilization. As soon as it exceeds a certain threshold, the
governor will set the frequency to the highest available. If the utilization is less
than the threshold, the next lowest frequency is used. If the system continues to be
underutilized, the frequency is again reduced until the lowest available frequency
is set.
Conservative Governor
Similar to the on-demand implementation, this governor also dynamically adjusts
frequencies based on processor utilization, except that it allows for a more gradual
increase in power. If processor utilization exceeds a certain threshold, the governor
does not immediately switch to the highest available frequency (as the on-demand
governor does), but only to next higher frequency available.
The relevant les for the kernel governors are located at /sys/devices/system/
cpu/cpu*/cpufreq/. If your machine has more than one CPU, /sys/devices/
system/cpu/ will hold a subdirectory for each processor: cpu0, cpu1, etc. If your
system currently uses the on-demand or conservative governor, you will see a separate
subdirectory for those governors in cpufreq, containing the parameters for the gov-
ernors.
352 Reference
19.2.1.2 Throttling the Clock Frequency (T-states)
This technology omits a certain percentage of the clock signal impulses for the CPU.
At 25% throttling, every fourth impulse is omitted. At 87.5%, only every eighth impulse
reaches the processor. However, the energy savings are a little less than linear. Normally,
throttling is only used if frequency scaling is not available or to maximize power savings.
This technology must be controlled by a special process, as well. The system interface
for Processor Throttling States (T-states) is /proc/acpi/processor/*/
throttling.
19.2.1.3 Putting the Processor to Sleep (C-states)
Modern processors have several power saving modes called C-states. They reect
the capability of an idle processor to turn off unused components in order to save
power. The operating system puts the processor to sleep whenever there is no activity.
In this case, the operating system sends the CPU a halt command. There are three
idle states: C1, C2, and C3. In the most economic state, C3, even the synchronization
of the processor cache with the main memory is halted. Therefore, this state can only
be applied if no other device modies the contents of the main memory via bus master
activity. Some drivers prevent the use of C3. The current state is displayed in /proc/
acpi/processor/*/power.
19.2.2 Tools
To view or adjust the current settings of the CPUfreq subsystem use the tools provided
by cpufrequtils for that. After you have installed the cpufrequtils package,
use the cpufreq-info to retrieve CPUfreq kernel information. The cpufreq-set
command can be used to modify CPUfreq settings. For example, run the following
command as root to activate the on-demand governor at runtime:
cpufreq-set -g ondemand
For more details and the available options, refer to the cpufreq-info and the
cpufreq-set man pages or run cpufreq-info --help or
cpufreq-set --help, respectively.
A useful tool for monitoring system power consumption is powerTOP, available after
installation of the powertop package. It helps you to identify the reasons for unnec-
Power Management 353
essary high power consumption (for example, processes that are mainly responsible for
waking up a processor from its idle state) and to optimize your system settings to avoid
these. It supports both Intel and AMD processors. For detailed information, refer to the
powerTOP project page at http://www.lesswatts.org/projects/
powertop/.
Apart from the tools above, the following ACPI utilities is available:
To merely display information, like the battery charge level and the temperature, you
can use the acpi command. For a list of available options, run acpi --help.
For editing the ACPI tables in the BIOS, install the acpica package.
19.2.3 Troubleshooting
There are two different types of problems. On one hand, the ACPI code of the kernel
may contain bugs that were not detected in time. In this case, a solution will be made
available for download. More often, the problems are caused by the BIOS. Sometimes,
deviations from the ACPI specication are purposely integrated in the BIOS to circum-
vent errors in the ACPI implementation of other widespread operating systems. Hardware
components that have serious errors in the ACPI implementation are recorded in a
blacklist that prevents the Linux kernel from using ACPI for these components.
The rst thing to do when problems are encountered is to update the BIOS. If the
computer does not boot at all, one of the following boot parameters may be helpful:
pci=noacpi
Do not use ACPI for conguring the PCI devices.
acpi=ht
Only perform a simple resource conguration. Do not use ACPI for other purposes.
acpi=off
Disable ACPI.
354 Reference
WARNING: Problems Booting without ACPI
Some newer machines (especially SMP systems and AMD64 systems) need ACPI
for conguring the hardware correctly. On these machines, disabling ACPI can
cause problems.
Sometimes, the machine is confused by hardware that is attached over USB or FireWire.
If a machine refuses to boot, unplug all unneeded hardware and try again.
Monitor the boot messages of the system with the command dmesg | grep -2i
acpi (or all messages, because the problem may not be caused by ACPI) after booting.
If an error occurs while parsing an ACPI table, the most important table—the DSDT
(Differentiated System Description Table)—can be replaced with an improved version.
In this case, the faulty DSDT of the BIOS is ignored. The procedure is described in
Section 19.4.1, “ACPI Activated with Hardware Support but Functions Do Not Work”
(page 358).
In the kernel conguration, there is a switch for activating ACPI debug messages. If a
kernel with ACPI debugging is compiled and installed, experts searching for an error
can be supported with detailed information.
If you experience BIOS or hardware problems, it is always advisable to contact the
manufacturers. Especially if they do not always provide assistance for Linux, they
should be confronted with the problems. Manufacturers will only take the issue seriously
if they realize that an adequate number of their customers use Linux.
19.2.3.1 For More Information
http://tldp.org/HOWTO/ACPI-HOWTO/ (detailed ACPI HOWTO, contains
DSDT patches)
http://www.acpi.info (Advanced Conguration & Power Interface Speci-
cation)
http://www.lesswatts.org/projects/acpi/ (the ACPI4Linux project
at Sourceforge)
http://acpi.sourceforge.net/dsdt/index.php (DSDT patches by
Bruno Ducrot)
Power Management 355
19.3 Rest for the Hard Disk
In Linux, the hard disk can be put to sleep entirely if it is not needed or it can be run in
a more economic or quieter mode. On modern laptops, you do not need to switch off
the hard disks manually, because they automatically enter an economic operating mode
whenever they are not needed. However, if you want to maximize power savings, test
some of the following methods, using the hdparm command.
It can be used to modify various hard disk settings. The option -y instantly switches
the hard disk to the standby mode. -Y puts it to sleep. hdparm -S x causes the hard
disk to be spun down after a certain period of inactivity. Replace x as follows: 0 disables
this mechanism, causing the hard disk to run continuously. Values from 1 to 240 are
multiplied by 5 seconds. Values from 241 to 251 correspond to 1 to 11 times 30
minutes.
Internal power saving options of the hard disk can be controlled with the option -B.
Select a value from 0 to 255 for maximum saving to maximum throughput. The result
depends on the hard disk used and is difcult to assess. To make a hard disk quieter,
use the option -M. Select a value from 128 to 254 for quiet to fast.
Often, it is not so easy to put the hard disk to sleep. In Linux, numerous processes write
to the hard disk, waking it up repeatedly. Therefore, it is important to understand how
Linux handles data that needs to be written to the hard disk. First, all data is buffered
in the RAM. This buffer is monitored by the pdflush daemon. When the data reaches
a certain age limit or when the buffer is lled to a certain degree, the buffer content is
ushed to the hard disk. The buffer size is dynamic and depends on the size of the
memory and the system load. By default, pdush is set to short intervals to achieve
maximum data integrity. It checks the buffer every 5 seconds and writes the data to the
hard disk. The following variables are interesting:
/proc/sys/vm/dirty_writeback_centisecs
Contains the delay until a pdush thread wakes up (in hundredths of a second).
/proc/sys/vm/dirty_expire_centisecs
Denes after which timeframe a dirty page should be written out latest. Default is
3000, which means 30 seconds.
356 Reference
/proc/sys/vm/dirty_background_ratio
Maximum percentage of dirty pages until pdush begins to write them. Default is
5%.
/proc/sys/vm/dirty_ratio
When the dirty page exceeds this percentage of the total memory, processes are
forced to write dirty buffers during their time slice instead of continuing to write.
WARNING: Impairment of the Data Integrity
Changes to the pdush daemon settings endanger the data integrity.
Apart from these processes, journaling le systems, like ReiserFS, Ext3, Ext4 and
others write their metadata independently from pdush, which also prevents the hard
disk from spinning down. To avoid this, a special kernel extension has been developed
for mobile devices. To make use of the extension, install the laptop-mode-tools
package and see /usr/src/linux/Documentation/laptops/laptop-mode
.txt for details.
Another important factor is the way active programs behave. For example, good editors
regularly write hidden backups of the currently modied le to the hard disk, causing
the disk to wake up. Features like this can be disabled at the expense of data integrity.
In this connection, the mail daemon postx makes use of the variable
POSTFIX_LAPTOP. If this variable is set to yes, postx accesses the hard disk far
less frequently.
19.4 Troubleshooting
All error messages and alerts are logged in the le /var/log/messages. The fol-
lowing sections cover the most common problems.
Power Management 357
19.4.1 ACPI Activated with Hardware
Support but Functions Do Not Work
If you experience problems with ACPI, search the output of dmesg for ACPI-specic
messages by using the command dmesg|grep -i acpi.
A BIOS update may be required to resolve the problem. Go to the home page of your
laptop manufacturer, look for an updated BIOS version, and install it. Ask the manufac-
turer to comply with the latest ACPI specication. If the errors persist after the BIOS
update, proceed as follows to replace the faulty DSDT table in your BIOS with an up-
dated DSDT:
Procedure 19.1
Updating the DSDT Table in the BIOS
For the procedure below, make sure the following packages are installed:
kernel-source, acpica, and mkinitrd.
1
Download the DSDT for your system from http://acpi.sourceforge.net/
dsdt/index.php. Check if the le is decompressed and compiled as shown by
the le extension .aml (ACPI machine language). If this is the case, continue with
step 3.
2
If the le extension of the downloaded table is .asl (ACPI source language) instead,
compile it by executing the following command:
iasl -sa file.asl
3
Copy the (resulting) le DSDT.aml to any location (/etc/DSDT.aml is recom-
mended).
4
Edit /etc/sysconfig/kernel and adapt the path to the DSDT le accordingly.
5
Start mkinitrd. Whenever you install the kernel and use mkinitrd to create an
initrd le, the modied DSDT is integrated and loaded when the system is
booted.
358 Reference
19.4.2 CPU Frequency Does Not Work
Refer to the kernel sources to see if your processor is supported. You may need a special
kernel module or module option to activate CPU frequency control. If the
kernel-source package is installed, this information is available in /usr/src/
linux/Documentation/cpu-freq/*.
19.4.3 Suspend and Standby Do Not Work
ACPI systems may have problems with suspend and standby due to a faulty DSDT
implementation (BIOS). If this is the case, update the BIOS.
When the system tries to unload faulty modules, the system is arrested or the suspend
event is not triggered. The same can also happen if you do not unload modules or stop
services that prevent a successful suspend. In both cases, try to identify the faulty
module that prevented the sleep mode. The log le /var/log/pm-suspend.log
contains detailed information about what is going on and where possible errors are.
Modify the SUSPEND_MODULES variable in /usr/lib/pm-utils/defaults
to unload problematic modules prior to a suspend or standby.
Refer to http://old-en.opensuse.org/Pm-utils and http://en
.opensuse.org/SDB:Suspend_to_RAM to get more detailed information on
how to modify the suspend and resume process.
19.5 For More Information
http://www.acpi.info (Advanced Conguration and Power Interface Speci-
cation)
http://www.lesswatts.org/projects/acpi/ (the ACPI4Linux project
at Sourceforge)
http://acpi.sourceforge.net/dsdt/index.php (DSDT patches by
Bruno Ducrot)
Power Management 359
http://wiki.opensuse.org/SDB:Suspend_to_RAM—How to get Suspend
to RAM working
http://old-en.opensuse.org/Pm-utils—How to modify the general
suspend framework
360 Reference
20
Wireless LAN
Wireless LANs, or Wireless Local Area Network (WLANs), have become an indispens-
able aspect of mobile computing. Today, most laptops have built-in WLAN cards. This
chapter describes how to set up a WLAN card with YaST, encrypt transmissions, and
use tips and tricks. Alternatively, you can congure and manage WLAN access with
NetworkManager. For details, refer to Chapter 21, Using NetworkManager (page 379).
20.1 WLAN Standards
WLAN cards communicate using the 802.11 standard, prepared by the IEEE organiza-
tion. Originally, this standard provided for a maximum transmission rate of 2 Mbit/s.
Meanwhile, several supplements have been added to increase the data rate. These sup-
plements dene details such as the modulation, transmission output, and transmission
rates (see Table 20.1, “Overview of Various WLAN Standards” (page 361)). Addition-
ally, many companies implement hardware with proprietary or draft features.
Table 20.1
Overview of Various WLAN Standards
NoteMaximum
Transmission
Rate (Mbit/s)
Band (GHz)Name
Outdated; virtually no end
devices available
22.4802.11 Legacy
Less interference-prone545802.11a
Wireless LAN 361
NoteMaximum
Transmission
Rate (Mbit/s)
Band (GHz)Name
Less common112.4802.11b
Widespread, backwards-
compatible with 11b
542.4802.11g
Common3002.4 and/or 5802.11n
802.11 Legacy cards are not supported by openSUSE®. Most cards using 802.11a,
802.11b, 802.11g and 802.11n are supported. New cards usually comply with the
802.11n standard, but cards using 802.11g are still available.
20.2 Operating Modes
In wireless networking, various techniques and congurations are used to ensure fast,
high-quality, and secure connections. Different operating types suit different setups. It
can be difcult to choose the right authentication method. The available encryption
methods have different advantages and pitfalls.
Basically, wireless networks can be classied into three network modes:
Managed Mode (Infrastructure Mode), via Access Point
Managed networks have a managing element: the access point. In this mode (also
referred to as infrastructure mode), all connections of the WLAN stations in the
network run through the access point, which may also serve as a connection to an
ethernet. To make sure only authorized stations can connect, various authentication
mechanisms (WPA, etc) are used.
Ad-hoc Mode (Peer-to-Peer Network)
Ad-hoc networks do not have an access point. The stations communicate directly
with each other, therefore an ad-hoc network is usually faster than a managed net-
work. However, the transmission range and number of participating stations are
greatly limited in ad-hoc networks. They also do not support WPA authentication.
If you intend to use WPA security, you should not use Ad-Hoc_Mode.
362 Reference
Master Mode
In master mode your network card is used as the access point. It works only if your
WLAN card supports this mode. Find out the details of your WLAN card on
http://linux-wless.passys.nl.
20.3 Authentication
Because a wireless network is much easier to intercept and compromise than a wired
network, the various standards include authentication and encryption methods. In the
original version of the IEEE 802.11 standard, these are described under the term WEP
(Wired Equivalent Privacy). However, because WEP has proven to be insecure (see
Section 20.6.3, “Security” (page 374)), the WLAN industry (joined under the name Wi-
Fi Alliance) has dened an extension called WPA, which is supposed to eliminate the
weaknesses of WEP. The later IEEE 802.11i standard includes WPA and some other
authentication and encryption methods. IEEE 802.11i is also referred to as WPA2, be-
cause WPA is based on a draft version of 802.11i.
To make sure that only authorized stations can connect, various authentication mecha-
nisms are used in managed networks:
None (Open)
An open system is a system that does not require authentication. Any station can
join the network. Nevertheless, WEP encryption can be used, see Section 20.4,
“Encryption” (page 364).
Shared Key (according to IEEE 802.11)
In this procedure, the WEP key is used for the authentication. However, this proce-
dure is not recommended, because it makes the WEP key more susceptible to at-
tacks. All an attacker needs to do is to listen long enough to the communication
between the station and the access point. During the authentication process, both
sides exchange the same information, once in encrypted form and once in unen-
crypted form. This makes it possible for the key to be reconstructed with suitable
tools. Because this method makes use of the WEP key for the authentication and
for the encryption, it does not enhance the security of the network. A station that
has the correct WEP key can authenticate, encrypt, and decrypt. A station that does
not have the key cannot decrypt received packets. Accordingly, it cannot commu-
nicate, regardless of whether it had to authenticate itself.
Wireless LAN 363
WPA-PSK (or WPA-Personal, according to IEEE 802.1x)
WPA-PSK (PSK stands for preshared key) works similarly to the Shared Key
procedure. All participating stations as well as the access point need the same key.
The key is 256 bits in length and is usually entered as a passphrase. This system
does not need a complex key management like WPA-EAP and is more suitable for
private use. Therefore, WPA-PSK is sometimes referred to as WPA “Home”.
WPA-EAP (or WPA-Enterprise, according to IEEE 802.1x)
Actually, WPA-EAP (Extensible Authentication Protocol) is not an authentication
system but a protocol for transporting authentication information. WPA-EAP is
used to protect wireless networks in enterprises. In private networks, it is scarcely
used. For this reason, WPA-EAP is sometimes referred to as WPA “Enterprise”.
WPA-EAP needs a Radius server to authenticate users. EAP offers three different
methods for connecting and authenticating to the server:
Transport Layer Security (EAP-TLS): TLS authentication relies on the mutual
exchange of certicates for both server and client. First, the server presents its
certicate to the client where it is evaluated. If the certicate is considered valid,
the client in turn presents its certicate to the server. While TLS is secure, it
requires a working certication management infrastructure in your network.
This infrastructure is rarely found in private networks.
Tunneled Transport Layer Security (EAP-TTSL)
Protected Extensible Authentication Protocol (EAP-PEAP): Both TTLS and
PEAP are two-stage protocols. In the rst stage, a secure connection is estab-
lished and in the second the client authentication data is exchanged. They require
far less certication management overhead than TLS, if any.
20.4 Encryption
There are various encryption methods to ensure that no unauthorized person can read
the data packets that are exchanged in a wireless network or gain access to the network:
WEP (dened in IEEE 802.11)
This standard makes use of the RC4 encryption algorithm, originally with a key
length of 40 bits, later also with 104 bits. Often, the length is declared as 64 bits
or 128 bits, depending on whether the 24 bits of the initialization vector are included.
364 Reference
However, this standard has some weaknesses. Attacks against the keys generated
by this system may be successful. Nevertheless, it is better to use WEP than to not
encrypt the network at all.
Some vendors have implemented the non-standard “Dynamic WEP”. It works ex-
actly as WEP and shares the same weaknesses, except that the key is periodically
changed by a key management service.
TKIP (dened in WPA/IEEE 802.11i)
This key management protocol dened in the WPA standard uses the same encryp-
tion algorithm as WEP, but eliminates its weakness. Because a new key is generated
for every data packet, attacks against these keys are fruitless. TKIP is used together
with WPA-PSK.
CCMP (dened in IEEE 802.11i)
CCMP describes the key management. Usually, it is used in connection with WPA-
EAP, but it can also be used with WPA-PSK. The encryption takes place according
to AES and is stronger than the RC4 encryption of the WEP standard.
20.5 Conguration with YaST
IMPORTANT: Security Risks in Wireless Networks
Unencrypted WLAN connections allow third parties to intercept all network
data. Be sure to protect your network trafc by using one of the supported
authentication and encryption methods.
Use the best possible encryption method your hardware allows. However, to
use a certain encryption method, all devices in the network must support this
method, otherwise they cannot communicate with each other. For example, if
your router supports both WEP and WPA but the driver for your WLAN card
only supports WEP, WEP is the least common denominator you can use. But
even a weak encryption with WEP is better than none at all. Refer to Sec-
tion 20.4, “Encryption” (page 364) and Section 20.6.3, “Security” (page 374) for
information.
To congure a wireless LAN with YaST, you need to dene the following parameters:
Wireless LAN 365
IP Address
Use either a static IP address or let a DHCP server dynamically assign an IP address
to the interface.
Operating Mode
Denes how to integrate your machine into a WLAN, depending on the network
topology. For background information, refer to Section 20.2, “Operating Modes”
(page 362).
Network Name (ESSID)
Unique string identifying a network.
Authentication and Encryption Details
Depending on the authentication and encryption method your network uses, you
need to enter one or more keys and/or certicates.
Several input options are available for entering the respective keys: Passphrase,
ASCII (only available for WEP authentication methods), and Hexadecimal.
20.5.1 Deactivating NetworkManager
A WLAN card is usually detected during installation. If your machine is a mobile
computer, NetworkManager is usually activated by default. If instead you want to
congure your WLAN card with YaST, you need to deactivate NetworkManager rst:
1
Start YaST as user root.
2
In the YaST Control Center, select Network Devices > Network Settings to open the
Network Settings dialog.
If your network is currently controlled by NetworkManager, you see a warning
message that the network settings cannot be edited by YaST.
3
To enable editing with YaST, leave the message with OK and on the Global Options
tab, activate Traditional Method with ifup.
4
For further conguration, proceed with Section 20.5.2, “Conguration for Access
Points” (page 367) or Section 20.5.3, “Establishing an Ad-Hoc Network” (page 371).
Otherwise conrm your changes with OK to write the network conguration.
366 Reference
20.5.2 Conguration for Access Points
In this section, learn how to congure your WLAN card to connect to an (external)
access point or how to use your WLAN card as access point if your WLAN card supports
this. For conguration of networks without an access point, refer to Section 20.5.3,
“Establishing an Ad-Hoc Network” (page 371).
Procedure 20.1
Conguring Your WLAN Card for Using an Access Point
1
Start YaST and open the Network Settings dialog.
2
Switch to the Overview tab where all network cards are listed that have been detected
by the system. If you need more information about general network conguration,
refer to Section 9.4, “Conguring a Network Connection with YaST” (page 168).
3
Choose your wireless card from the list and click Edit to open the Network Card
Setup dialog.
4
On the Address tab, congure whether to use a dynamic or a static IP address for
the machine. Usually Dynamic Address with DHCP is ne.
5
Click Next to proceed to the Wireless Network Card Conguration dialog.
6
To use your WLAN card to connect to an access point, set the Operating Mode to
Managed.
If however you want to use your WLAN card as access point, set the Operating
Mode to Master. Note that not all WLAN cards support this mode.
NOTE: Using WPA-PSK or WPA-EAP
If you want to use WPA-PSK or WPA-EAP authentication modes, the operating
mode must be set to Managed.
7
To connect to a certain network, enter the Network Name (ESSID). Alternatively,
click Scan Network and select a network from the list of available wireless networks.
All stations in a wireless network need the same ESSID for communicating with
each other. If no ESSID is specied, your WLAN card automatically associates with
the access point that has the best signal strength.
Wireless LAN 367
NOTE: WPA Authentication Requires an ESSID
If you select WPA authentication, a network name (ESSID) must be set.
8
Select an Authentication Mode for your network. Which mode is suitable, depends
on your WLAN card's driver and the ability of the other devices in the network.
9
If you have chosen to set the Authentication Mode to No Encryption, nish the
conguration by clicking Next. Conrm the message about this potential security
risk and leave the Overview tab (showing the newly congured WLAN card) with
OK.
If you haven chosen any of the other authentication modes, proceed with Proce-
dure 20.2, “Entering the Encryption Details” (page 368).
Figure 20.1
YaST: Conguring the Wireless Network Card
Procedure 20.2
Entering the Encryption Details
The following authentication methods require an encryption key: WEP - Open, WEP -
Shared Key, and WPA-PSK.
368 Reference
For WEP, usually only key is needed—however, up to 4 different WEP keys can be
dened for your station. One of them needs to be set as the default key and is used for
encryption. The others are used for decryption. Per default, a key length of 128-bit is
used, but you can also choose to set the length to 64-bit.
For higher security, WPA-EAP uses a RADIUS server to authenticate users. For authen-
tication at the server, three different methods are available: TLS, TTLS and PEAP. The
credentials and certicates you need for WPA-EAP depend on the authentication method
used for the RADIUS server. Ask your system administrator to provide the needed in-
formation and credentials. YaST searches for any certicate under /etc/cert.
Therefore, save the certicates given to you to this location and restrict access to these
les to 0600 (owner read and write).
1
To enter the key for WEP - Open or WEP - Shared Key:
1a
Set the Key Input Type either to Passphrase, ASCII or Hexadecimal.
1b
Enter the respective Encryption Key (usually only one key is used):
If you have selected Passphrase, enter a word or a character string from which
a key is generated according to the specied key length (per default, 128-bit)
.
ASCII requests an input of 5 characters for a 64-bit key and 13 characters for
a 128-bit key.
For Hexadecimal, enter 10 characters for a 64-bit key or 26 characters for a
128-bit key in hexadecimal notation.
1c
To adjust the key length to a lower bit rate (which might be necessary for
older hardware), click WEP Keys and set the Key Length to 64 bit. The WEP
Keys dialog also shows the WEP keys that have been entered so far. Unless
another key is explicitly set as default, YaST always uses the rst key as de-
fault key.
1d
To enter more keys for WEP or to modify one of the keys, select the respective
entry and click Edit. Select the Key Input Type and enter the key.
1e
Conrm your changes with OK.
Wireless LAN 369
2
To enter a key for WPA-PSK:
2a
Select the input method Passphrase or Hexadecimal.
2b
Enter the respective Encryption Key.
In the Passphrase mode, the input must be 8 to 63 characters. In the Hexadec-
imal mode, enter 64 characters.
3
If you have chosen WPA-EAP authentication, click Next to switch to the WPA-EAP
dialog, where you enter the credentials and certicates you have been given by your
network administrator.
3a
Select the EAP Mode the RADIUS server uses for authentication. The details
you need to enter in the following depend on the selected EAP Mode.
3b
For TLS, provide Identity, Client Certicate, Client Key, and Client Key
Password. To increase security, you can also congure a Server Certicate
used to validate the server's authenticity.
TTLS and PEAP require Identity and Password, whereas Server Certicate
and Anonymous Identity are optional.
3c
To enter the advanced authentication dialog for your WPA-EAP setup, click
Details.
3d
Select the Authentication Method for the second stage of EAP-TTLS or EAP-
PEAP communication (inner authentication). The choice of methods depends
on the authentication method for the RADIUS server you selected in the
previous dialog.
3e
If the automatically-determined setting does not work for you, choose a spe-
cic PEAP Version to force the use of a certain PEAP implementation.
4
Conrm your changes with OK. The Overview tab shows the details of your newly
congured WLAN card.
5
Click OK to nalize the conguration and to leave the dialog.
370 Reference
20.5.3 Establishing an Ad-Hoc Network
In some cases it is useful to connect two computers equipped with a WLAN card. To
establish an ad-hoc network with YaST, do the following:
1
Start YaST and open the Network Settings dialog.
2
Switch to the Overview tab, choose your wireless card from the list and click
Edit to open the Network Card Setup dialog.
3
Choose Statically assigned IP Address and enter the following data:
IP Address: 192.168.1.1. Change this address on the second computer to
192.168.1.2, for example.
Subnet Mask: /24
Hostname: Choose any name you like.
4
Proceed with Next.
5
Set the Operating Mode to Ad-hoc.
6
Choose a Network Name (ESSID). This can be any name, but it has to be used on
every computer in the ad-hoc network.
7
Select an Authentication Mode for your network. Which mode is suitable, depends
on your WLAN card's driver and the ability of the other devices in the network.
8
If you have chosen to set the Authentication Mode to No Encryption, nish the
conguration by clicking Next. Conrm the message about this potential security
risk and leave the Overview tab showing the newly congured WLAN card with
OK.
If you haven chosen any of the other authentication modes, proceed with Proce-
dure 20.2, “Entering the Encryption Details” (page 368).
9
If you do not have smpppd installed, YaST asks you to do so.
Wireless LAN 371
10
Congure the other WLAN cards in the network accordingly, using the same
Network Name (ESSID), the same Authentication Mode but different IP addresses.
20.5.4 Setting Additional Conguration
Parameters
Usually there is no need to change the precongured settings when conguring your
WLAN card. However, if you need detailed conguration of your WLAN connection,
YaST allows you to tweak the following settings:
Channel
The specication of a channel on which the WLAN station should work. This is
only needed in Ad-hoc and Master modes. In Managed mode, the card automatically
searches the available channels for access points.
Bit Rate
Depending on the performance of your network, you may want to set a certain bit
rate for the transmission from one point to another. In the default setting Auto, the
system tries to use the highest possible data transmission rate. Some WLAN cards
do not support the setting of bit rates.
Access Point
In an environment with several access points, one of them can be preselected by
specifying the MAC address.
Power Management
When you are on the road, power saving technologies can help to maximize the
operating time of your battery. Using power management may affect the connection
quality and increase the network latency.
To access the advanced options:
1
Start YaST and open the Network Settings dialog.
2
Switch to the Overview tab, choose your wireless card from the list and click Edit
to open the Network Card Setup dialog.
3
Click Next to proceed to the Wireless Network Card Conguration dialog.
372 Reference
4
Click Expert Settings.
5
In Ad-hoc mode, select one of the offered channels (11 to 14, depending on your
country) for the communication of your station with the other stations. In Master
mode, determine on which Channel your card should offer access point functionality.
The default setting for this option is Auto.
6
Select the Bit Rate to use.
7
Enter the MAC address of the Access Point you want to connect to.
8
Choose if to Use Power Management or not.
9
Conrm your changes with OK and click Next and OK to nish the conguration.
20.6 Tips and Tricks for Setting Up a
WLAN
The following tools and tips can help to monitor and improve speed and stability as
well as security aspects of your WLAN.
20.6.1 Utilities
The package wireless-tools contains utilities that allow to set wireless LAN
specic parameters and get statistics. See http://www.hpl.hp.com/personal/
Jean_Tourrilhes/Linux/Tools.html for more information.
kismet (package kismet) is a network diagnosis tool with which to listen to the WLAN
packet trafc. In this way, you can also detect any intrusion attempts in your network.
More information is available at http://www.kismetwireless.net/ and in
the manual page.
Wireless LAN 373
20.6.2 Stability and Speed
The performance and reliability of a wireless network mainly depend on whether the
participating stations receive a clear signal from the other stations. Obstructions like
walls greatly weaken the signal. The more the signal strength sinks, the more the
transmission slows down. During operation, check the signal strength with the
iwconfig utility on the command line (Link Quality eld) or with the Network-
Manager applets provided by KDE or GNOME. If you have problems with the signal
quality, try to set up the devices somewhere else or adjust the position of the antennas
of your access points. Auxiliary antennas that substantially improve the reception are
available for a number of PCMCIA WLAN cards. The rate specied by the manufac-
turer, such as 54 Mbit/s, is a nominal value that represents the theoretical maximum.
In practice, the maximum data throughout is no more than half this value.
The iwspy command can displays WLAN statistics:
iwspy wlan0
wlan0 Statistics collected:
00:AA:BB:CC:DD:EE : Quality:0 Signal level:0 Noise level:0
Link/Cell/AP : Quality:60/94 Signal level:-50 dBm Noise level:-140
dBm (updated)
Typical/Reference : Quality:26/94 Signal level:-60 dBm Noise level:-90
dBm
20.6.3 Security
If you want to set up a wireless network, remember that anybody within the transmission
range can easily access it if no security measures are implemented. Therefore, be sure
to activate an encryption method. All WLAN cards and access points support WEP
encryption. Although this is not entirely safe, it does present an obstacle for a potential
attacker.
For private use, use WPA-PSK if available. Although Linux supports WPA on most
hardware components, some drivers do not offer WPA support. It may also not be
available on older access points and routers with WLAN functionality. For such devices,
check if WPA can be implemented by means of a rmware update. If WPA is not
available, WEP is better than no encryption. In enterprises with advanced security re-
quirements, wireless networks should only be operated with WPA.
374 Reference
Use strong passwords for your authentication method. For example, the Web page
https://www.grc.com/passwords.htm generates random 64 character pass-
words.
20.7 Troubleshooting
If your WLAN card is not automatically detected, check whether it is supported by
openSUSE. A list of supported WLAN network cards is available under http://en
.opensuse.org/HCL:Network_(Wireless). If your card is not supported, it
may be possible to make it work using the Microsoft Windows drivers with Ndiswrapper.
Please refer to http://en.opensuse.org/SDB:Ndiswrapper for detailed
information.
If your WLAN card fails to respond, check the following prerequisites:
1.
Do you know the device name of the WLAN card? Usually it is wlan0. Check with
the tool ifconfig.
2.
Have you checked your needed rmware? Refer to /usr/share/doc/
packages/wireless-tools/README.firmware for more information.
3. Is the ESSID of your router broadcasted and visible (not hidden)?
20.7.1 Check the Network Status
The command iwconfig can give you important information about your wireless
connection. For example, the following line displays the ESSID, the wireless mode,
frequency, if you signal is encrypted, the link quality, and much more:
iwconfig wlan0
wlan0 IEEE 802.11abg ESSID:"guest"
Mode:Managed Frequency:5.22GHz Access Point: 00:11:22:33:44:55
Bit Rate:54 Mb/s Tx-Power=13 dBm
Retry min limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
Link Quality:62/92 Signal level:-48 dBm Noise level:-127 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:10 Invalid misc:0 Missed beacon:0
Wireless LAN 375
You can also get the previous information with the iwlist command. For example,
the following line displays the current bit rate:
iwlist wlan0 rate
wlan0 unknown bit-rate information.
Current Bit Rate=54 Mb/s
If you want an overview how many access points are available, it can also be done with
the iwlist command. It gives you a list of “cells” which looks like this:
iwlist wlan0 scanning
wlan0 Scan completed:
Cell 01 - Address: 00:11:22:33:44:55
Channel:40
Frequency:5.2 GHz (Channel 40)
Quality=67/70 Signal level=-43 dBm
Encryption key: off
ESSID:"Guest"
Bit Rates: 6 Mb/s; 9 Mb/s; 12 Mb/s; 18 Mb/s;
24 Mb/s; 36 Mb/s; 48 Mb/s
Mode: Master
Extra:tsf=0000111122223333
Extra: Last beacon: 179ms ago
IE: Unknown: ...
20.7.2 Multiple Network Devices
Modern laptops usually have a network card and a WLAN card. If you congured both
devices with DHCP (automatic address assignment), you may encounter problems with
the name resolution and the default gateway. This is evident from the fact that you can
ping the router but cannot surf the Internet. The Support Database features an article
on this subject at http://old-en.opensuse.org/SDB:Name_Resolution
_Does_Not_Work_with_Several_Concurrent_DHCP_Clients.
20.7.3 Problems with Prism2 Cards
Several drivers are available for devices with Prism2 chips. The various cards work
more or less smoothly with the various drivers. With these cards, WPA is only possible
with the hostap driver. If such a card does not work properly or not at all or you want
to use WPA, read /usr/share/doc/packages/wireless-tools/README
.prism2.
376 Reference
20.8 For More Information
More information can be found on the following pages:
http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/
Wireless.html
The Internet pages of Jean Tourrilhes, who developed the Wireless Tools for Linux,
present a wealth of useful information about wireless networks.
tuxmobil.org
Useful hands-on information about mobile computers under Linux.
http://www.linux-on-laptops.com
More information about Linux on laptops.
http://en.opensuse.org/HCL:Network_(Wireless)
Lists supported WLAN network cards.
http://en.opensuse.org/SDB:Ndiswrapper
Offers a work-around for running unsupported WLAN cards with the Microsoft
Windows using Ndiswrapper.
Wireless LAN 377
21
Using NetworkManager
NetworkManager is the ideal solution for laptops and other portable computers. It
supports state-of-the-art encryption types and standards for network connections, includ-
ing connections to 802.1X protected networks. 802.1X is the “IEEE Standard for Local
and Metropolitan Area Networks—Port-Based Network Access Control”. With Net-
workManager, you do not need to worry about conguring network interfaces and
switching between wired or wireless networks when you are moving. NetworkManager
can automatically connect to known wireless networks or manage several network
connections in parallel—the fastest connection is then used as default. Furthermore,
you can manually switch between available networks and manage your network con-
nection using an applet in the system tray.
Instead of only one connection being active, multiple connections may be active at
once. This enables you to unplug your laptop from an Ethernet and remain connected
via a wireless connection.
21.1 Use Cases for NetworkManager
NetworkManager provides a sophisticated and intuitive user interface, which enables
users to easily switch their network environment. However, NetworkManager is not a
suitable solution in the following cases:
Your computer provides network services for other computers in your network, for
example, it is a DHCP or DNS server.
Your computer is a Xen server or your system is a virtual system inside Xen.
Using NetworkManager 379
21.2 Enabling NetworkManager
On laptop computers, NetworkManager is enabled by default. However, it can be at
any time enabled or disabled in the YaST Network Settings module.
1
Run YaST and go to Network Devices > Network Settings.
2
The Network Settings dialog opens. Go to the Global Options tab.
3
To congure and manage your network connections with NetworkManager, select
User Controlled with NetworkManager.
4
Click OK.
5
After choosing the method for managing network connections, set up your network
card using automatic conguration via DHCP or a static IP address or congure
your modem (for dial-up connections, use Network Devices > Modem). To congure
an internal or USB ISDN modem, select Network Devices > ISDN. To congure an
internal or USB DSL modem, select Network Devices > DSL.
Find a detailed description of the network conguration with YaST in Section 9.4,
“Conguring a Network Connection with YaST” (page 168) and Chapter 20, Wireless
LAN (page 361).
After having enabled NetworkManager, congure your network connections with the
NetworkManager as described in Section 21.3, “Conguring Network Connections”
(page 380).
If you want to deactivate NetworkManager and control network the traditional way,
choose the Traditional Method with ifup option in the Network Setup Method eld.
21.3 Conguring Network
Connections
After having enabled NetworkManager in YaST, congure your network connections
with the NetworkManager front-ends available in KDE and GNOME. The network
conguration dialogs for both front-ends are very similar. They show tabs for all types
380 Reference
of network connections, such as wired, wireless, mobile broadband, DSL, and VPN
connections. On each tab, you can add, edit or delete connections of that type. In the
KDE conguration dialog, the appropriate tabs are only active if the connection type
is available on your system (depending on hardware and software). By default, KNet-
workManager also displays comprehensive tooltips for the input elds and options
available on each tab.
NOTE: Bluetooth Connections
At the moment, Bluetooth connections cannot be congured with Network-
Manager.
To open the network conguration dialog in GNOME, open the main menu and click
the Network entry at the right. Alternatively, press Alt + F2 and enter
nm-connection-editor or select Hardware > Network Connections in the
GNOME Control Center.
Figure 21.1
GNOME Network Connections Dialog
If you use KDE, open the main menu and click System settings. In the Network and
Connectivity section select Network Settings > Network Connections to open the network
conguration dialog. Alternatively, press Alt + F2 and enter
kcm_networkmanagement or .
Using NetworkManager 381
Figure 21.2
KDE Network Conguration Dialog
Alternatively, you can also start the conguration dialogs from the NetworkManager
applet in the system tray. In KDE, left-click the icon and select Manage Connections.
In GNOME, right-click the icon and select Edit Connections.
NOTE: Availability of Options
Depending on your system set-up, you may not be allowed to congure con-
nections. In a secured environment, some options might be locked or require
root permission. Ask your system administrator for details.
Procedure 21.1
Adding or Editing Connections
When conguring network connections with NetworkManager, you can also dene
system connections that can be shared by all users. In contrast to user
connections, system connections are made available right after NetworkManager
is started—before any users log in. For more details about both types of connections,
refer to Section 21.7.1, “User and System Connections” (page 391).
Currently, the system connection option is not available in KDE. To set up system
connections, you need to use YaST in this case.
382 Reference
NOTE: Hidden Networks
To connect to a “hidden” network (a network that does not broadcast its ser-
vice) you have to know the Service Set Identier or Extended Service Set
Identier (SSID or ESSID) of the network because it cannot be detected auto-
matically.
1
To add a new connection or edit an existing one, click the tab for the connection
type you want to use and click Add or choose an existing connection and click Edit.
2
Enter a Connection Name and your connection details.
3
You can tie the connection to a certain device, if more than one physical device per
connection type is available (for example, your machine is equipped with two ethernet
cards or two wireless cards).
If you use KDE, do so by using the Restrict to Interface option. If you use GNOME,
enter the MAC address of the device you want to tie the connection to and conrm
your settings.
4
If you want NetworkManager to automatically use a certain connection, activate
Connect Automatically for this connection.
5
To turn a connection into a system connection activate Available to all users
(GNOME). To create and edit system connections, root permission is required.
After having conrmed your changes, the newly congured network connection appears
in the list of available networks you get by left-clicking the NetworkManager applet.
Using NetworkManager 383
Figure 21.3
KNetworkManager—Congured and Available Connections
21.4 Using KNetworkManager
The KDE front-end for NetworkManager is the NetworkManager plasmoid. If the net-
work has been set up for NetworkManager control, the plasmoid usually starts automat-
ically with the desktop environment and is shown as an icon in the system tray.
If your system tray does not show any network connection icon, the plasmoid is probably
not started. Click on the Panel Tool Box and choose Add Widgets. Double-click on the
Network Management entry and click on the Panel Tool Box again.
The NetworkManager front-end only shows wireless networks for which you have
congured a connection. It hides connections when you are out of range of a wireless
network, or when the network cable is disconnected, thus always giving you a clear
view of which connections may be used.
21.4.1 Managing Wired Network
Connections
If your computer is connected to an existing network with a network cable, use the
NetworkManager front-end to manage the network connection(s).
1
Left-click the NetworkManager icon to show a menu with available Connections
and Interfaces. Connections are being displayed in the right half of the plasmoid
384 Reference
window, while interfaces show up in the left half. The connection and interface
currently being used is marked with a blue globe.
2
Click on Networking Interface listed in the right half of the plasmoid window to get
detailed information and statistics for that interface. Switch back to the interface
overview by clicking on the blue arrow icon.
3
To disconnect an active connection, click on the red icon for the Networking Interface
in the right half of the plasmoid window.
4
If you want to use a different conguration with the wired network, click Manage
Connections and add another wired connection as described in Procedure 21.1,
“Adding or Editing Connections” (page 382). Click the NetworkManager icon and
select the newly congured connection to activate it.
5
To switch off all network connections, both wired and wireless, click the Network-
Manager icon and uncheck Enable Networking.
21.4.2 Managing Wireless Network
Connections
By default the NetworkManager frontend only lists connections that are already cong-
ured. The signal strength of each network is indicated by a series of bars, each one
representing 10%. Encrypted wireless networks are marked with a green (WPA) or
yellow (WEP) shield, while open networks are marked with a red shield.
Procedure 21.2
Connecting to a Wireless Network
1
Click Show More to display all visible wireless networks available.
2
Left-click on the network of your choice to open the network connection dialog. To
connect to a network that does not broadcast its service set identier ((E)SSID),
click on hidden network and press Enter. Fill in the connection details and proceed
with OK.
3
Based on your security settings for NetworkManager (see Section 21.7.2, “Storing
Passwords and Credentials” (page 392) for details), you may have to provide your
KWallet password.
Using NetworkManager 385
4
NetworkManager automatically connects to the congured network.
Procedure 21.3
Managing Active Wireless Connections
1
Click on WLAN Interface listed in the right half of the plasmoid window to get de-
tailed information and statistics for that interface. Switch back to the interface
overview by clicking on the blue arrow icon.
2
To disconnect an active connection, click on the red icon for the WLAN Interface.
3
To completely disable wireless networking, uncheck Enable Wireless. This can be
useful if you are on a plane or in any other environment where wireless networking
is not allowed.
A wireless network that has been chosen explicitly will remain connected as long as
possible. If a network cable is plugged in during that time, any connections that have
been set to Connect Automatically will be connected, while the wireless connection
remains up.
21.4.3 Conguring Your Wireless Card as an
Access Point
If your wireless card supports access point mode, you can use NetworkManager for
conguration.
NOTE: Availability of Options
Depending on your system set-up, you may not be allowed to congure con-
nections. In a secured environment, some options might be locked or require
root permission. Ask your system administrator for details.
1
Start the dialog for conguring network connections as described in Section 21.3,
“Conguring Network Connections” (page 380) and Add a Wireless connection.
2
On the Wireless tab provide a Connection name and an SSID. Set Method > Ad-hoc.
3
Set the encryption on the Wireless Security tab.
386 Reference
IMPORTANT: Unprotected Wireless Networks Are a Security Risk
If you set Security to None, everybody can connect to your network, reuse
your connectivity and intercept your network connection. To restrict access
to your access point and to secure your connection, use encryption. You
can choose between various WEP and WPA–based encryptions. If you are
not sure which technology is best for you, read Section 20.3, Authentication”
(page 363).
4
On the IP Address tab, make sure the Method option is set to Shared.
5
Conrm your conguration with OK.
21.5 Using GNOME NetworkManager
Applet
In GNOME, NetworkManager can be controlled with the GNOME NetworkManager
applet. If the network is set up for NetworkManager control, the applet usually starts
automatically with the desktop environment and is shown as an icon in the system tray.
If your system tray does not show any network connection icon, the applet is probably
not started. Press Alt + F2 and enter nm-applet to start it manually.
21.5.1 Managing Wired Network
Connections
If your computer is connected to an existing network with a network cable, use the
NetworkManager applet to choose the network connection.
1
Left-click the applet icon to show a menu with available networks. The currently
used connection is listed on top of the menu, followed by other active connections.
Inactive connections are listed under Available.
2
Right-click the applet and choose Connection Information to get detailed information
on all active interfaces.
Using NetworkManager 387
3
To disconnect an active connection, left-click the applet and choose its Disconnect
entry.
4
If you want to use a different conguration with the wired network, right-click the
applet, choose Edit Connections and add another wired connection as described in
Procedure 21.1, “Adding or Editing Connections” (page 382). Click the NetworkMan-
ager icon and select the newly congured connection to activate it.
5
To switch off all network connections, both wired and wireless, right-click the applet
icon and uncheck Enable Networking.
21.5.2 Managing Wireless Network
Connections
Available visible wireless networks are listed in the GNOME NetworkManager applet
menu under Available and More Networks. The signal strength of each network is also
shown in the menu. Encrypted wireless networks are marked with a lock icon.
Procedure 21.4
Connecting to a Wireless Network
1
To connect to a wireless network, left-click the applet icon and choose an entry from
the list of available wireless networks.
2
If the network is encrypted, a dialog opens. It shows the type of encryption the net-
work uses (Wireless Security) and holds a number of input elds according to the
respective encryption and authentication settings. Enter the appropriate credentials.
3
To connect to a network that does not broadcast its service set identier ((E)SSID)
and therefore cannot be detected automatically, left-click the NetworkManager icon
and choose Connect to Hidden Wireless Network.
4
In the dialog that opens, enter the ESSID and set encryption parameters on the
Wireless Security tab if necessary.
5
To disable wireless networking, right-click the applet icon and uncheck Enable
Wireless. This can be useful if you are on a plane or in any other environment where
wireless networking is not allowed.
388 Reference
A wireless network that has been chosen explicitly will remain connected as long as
possible. If a network cable is plugged in during that time, any connections that have
been set to Connect Automatically will be connected, while the wireless connection
remains up.
21.5.3 Conguring Your Wireless Card as an
Access Point
If your wireless card supports access point mode, you can use NetworkManager for
conguration.
NOTE: Availability of Options
Depending on your system set-up, you may not be allowed to congure con-
nections. In a secured environment, some options might be locked or require
root permission. Ask your system administrator for details.
1
Click the NetworkManager applet and select Create New Wireless Network.
2
Enter a Network Name and set the encryption to use with the Wireless Security drop-
down list.
Using NetworkManager 389
IMPORTANT: Unprotected Wireless Networks Are a Security Risk
If you set Wireless Security to None, everybody can connect to your network,
reuse your connectivity and intercept your network connection. To restrict
access to your access point and to secure your connection, use encryption.
You can choose between various WEP and WPA–based encryptions. If you
are not sure which technology is best for you, read Section 20.3, Authenti-
cation” (page 363).
21.6 NetworkManager and VPN
NetworkManager supports several Virtual Private Network (VPN) technologies. For
each technology, openSUSE comes with a base package providing the generic support
for NetworkManager. In addition to that, you also need to install the respective desktop-
specic package for your applet.
NovellVPN
To use this VPN technology, install
NetworkManager-novellvpn and
NetworkManager-novellvpn-gnome.
NovellVPN support for KDE is not available yet, but is currently being worked
on.
OpenVPN
To use this VPN technology, install
NetworkManager-openvpn and
NetworkManager-openvpn-kde4 or
NetworkManager-openvpn-gnome.
vpnc (Cisco)
To use this VPN technology, install
NetworkManager-vpnc and
390 Reference
NetworkManager-vpnc-kde4 or NetworkManager-vpnc-gnome.
PPTP (Point-to-Point Tunneling Protocol)
To use this VPN technology, install
NetworkManager-pptp and
NetworkManager-pptp-kde4 or NetworkManager-pptp-gnome.
After you have installed the packages, congure your VPN connection as described in
Section 21.3, “Conguring Network Connections” (page 380).
21.7 NetworkManager and Security
NetworkManager distinguishes two types of wireless connections, trusted and untrusted.
A trusted connection is any network that you explicitly selected in the past. All others
are untrusted. Trusted connections are identied by the name and MAC address of the
access point. Using the MAC address ensures that you cannot use a different access
point with the name of your trusted connection.
NetworkManager periodically scans for available wireless networks. If multiple trusted
networks are found, the most recently used is automatically selected. NetworkManager
waits for your selection in case that all networks are untrusted.
If the encryption setting changes but the name and MAC address remain the same,
NetworkManager attempts to connect, but rst you are asked to conrm the new en-
cryption settings and provide any updates, such as a new key.
If you switch from using a wireless connection to ofine mode, NetworkManager blanks
the ESSID. This ensures that the card is disconnected.
21.7.1 User and System Connections
NetworkManager knows two types of connections: user and system connections.
User connections are connections that become available to NetworkManager when the
rst user logs in. Any required credentials are asked from the user and when the user
logs out, the connections are disconnected and removed from NetworkManager. Con-
nections that are dened as system connection can be shared by all users and are made
Using NetworkManager 391
available right after NetworkManager is started—before any users log in. In case of
system connections, all credentials must be provided at the time the connection is cre-
ated. Such system connections can be used to automatically connect to networks that
require authorization. For information how to congure user or system connections
with NetworkManager, refer to Section 21.3, “Conguring Network Connections”
(page 380).
For KDE, conguring system connections with NetworkManager are currently not
supported (use YaST instead).
21.7.2 Storing Passwords and Credentials
If you do not want to re-enter your credentials each time you want to connect to an en-
crypted network, you can use the desktop-specic tools GNOME Keyring Manager or
KWalletManager to store your credentials encrypted on the disk, secured by a master
password.
Under KDE, you can congure if and how to store your credentials. To do so, left-click
the NetworkManager icon and select Manage Connections. Click Other > Connection
Secrets and select one of the following options:
Do Not Store (Always Prompt)
This is useful if you are working in an environment where storing credentials is
considered a security risk.
In File (Unencrypted)
If you choose this option, your passwords are stored unencrypted in the respective
connection le that is created for each connection.
WARNING: Security Risk
Storing your network credentials unencrypted is a security risk. Everybody
who has access to your computer can reuse your connectivity and intercept
your network connection.
In Secure Storage (Encrypted)
If you choose this options, your credentials are stored in KWalletManager.
392 Reference
21.8 Frequently Asked Questions
In the following, nd some frequently asked questions about conguring special network
options with NetworkManager.
How to tie a connection to a specic device?
By default, connections in NetworkManager are device type-specic: they apply
to all physical devices with the same type. If more than one physical device per
connection type is available (for example, your machine is equipped with two eth-
ernet cards), you can tie a connection to a certain device.
To do so in GNOME, rst look up the MAC address of your device by using the
output of the command line tool ifconfig). Then start the dialog for conguring
network connections and choose the connection you want to modify. On the Wired
or Wireless tab, enter the MAC Address of the device and conrm your changes.
If you use KDE, start the dialog for conguring network connections and choose
the connection you want to modify. On the Ethernet or Wireless tab, use the Restrict
to Interface option to select the network interface to which to tie the connection.
How to specify a certain access point in case multiple access points with the same ESSID
are detected?
When multiple access points with different wireless bands (a/b/g/n) are available,
the access point with the strongest signal is automatically chosen by default. To
override this, use the BSSID eld when conguring wireless connections.
The Basic Service Set Identier (BSSID) uniquely identies each Basic Service
Set. In an infrastructure Basic Service Set, the BSSID is the MAC address of the
wireless access point. In an independent (ad-hoc) Basic Service Set, the BSSID is
a locally administered MAC address generated from a 46-bit random number.
Start the dialog for conguring network connections as described in Section 21.3,
“Conguring Network Connections” (page 380). Choose the wireless connection
you want to modify and click Edit. On the Wireless tab, enter the BSSID.
How to share network connections to other computers?
The primary device (the device which is connected to the Internet) does not need
any special conguration. However, you need to congure the device that is con-
nected to the local hub or machine as follows:
Using NetworkManager 393
1. Start the dialog for conguring network connections as described in Section 21.3,
“Conguring Network Connections” (page 380). Choose the connection you
want to modify and click Edit. If you are using GNOME, switch to the IPv4
Settings tab and from the Method drop-down list, choose Shared to other com-
puters. If you are using KDE, switch to the IP Address tab and from the Method
drop-down list, choose Shared. That will enable IP trafc forwarding and run a
DHCP server on the device. Conrm your changes in NetworkManager.
2. As the DCHP server uses port 67, make sure that it is not blocked by the rewall:
On the machine sharing the connections, start YaST and select Security and
Users > Firewall. Switch to the Allowed Services category. If DCHP Server is
not already shown as Allowed Service, select DCHP Server from Services to
Allow and click Add. Conrm your changes in YaST.
How to provide static DNS information with automatic (DHCP, PPP, VPN) addresses?
In case a DHCP server provides invalid DNS information (and/or routes), you can
override it. Start the dialog for conguring network connections as described in
Section 21.3, “Conguring Network Connections” (page 380). Choose the connection
you want to modify and click Edit. If you are using GNOME, switch to the IPv4
Settings tab, and from the Method drop-down list, choose Automatic (DHCP) ad-
dresses only. If you are using KDE, switch to the IP Address tab, and from the
Method drop-down list, choose Automatic (DHCP) addresses only. Enter the DNS
information in the DNS Servers and Search Domains elds. From the drop-down
list at the top of the tab, select Routes if you want to Ignore automatically obtained
routes. Conrm your changes.
How to make NetworkManager connect to password protected networks before a user
logs in?
Dene a system connection that can be used for such purposes. For more
information, refer to Section 21.7, “NetworkManager and Security” (page 391).
21.9 Troubleshooting
Connection problems can occur. Some common problems related to NetworkManager
include the applet not starting or a missing VPN option. Methods for resolving and
preventing these problems depend on the tool used.
394 Reference
NetworkManager Desktop Applet Does Not Start
The GNOME and KDE NetworkManager applets start automatically if the network
is set up for NetworkManager control. If the applet does not start, check if Network-
Manager is enabled in YaST as described in Section 21.2, “Enabling NetworkMan-
ager” (page 380). Then make sure that the appropriate package for your desktop
environment is also installed. If you are using KDE 4, the package is
plasmoid-networkmanagement. For GNOME users the package is
NetworkManager-gnome.
If the desktop applet is installed but is not running for some reason, start it manually.
Under GNOME press Alt + F2 and enter nm-applet. Under KDE click on the
Panel Tool Box and choose Add Widgets. Double-click on the Network Management
entry and click on the Panel Tool Box again.
NetworkManager Applet Does Not Include the VPN Option
Support for NetworkManager, applets, and VPN for NetworkManager is distributed
in separate packages. If your NetworkManager applet does not include the VPN
option, check if the packages with NetworkManager support for your VPN technol-
ogy are installed. For more information, see Section 21.6, “NetworkManager and
VPN” (page 390).
No Network Connection Available
If you have congured your network connection correctly and all other components
for the network connection (router, etc.) are also up and running, it sometimes helps
to restart the network interfaces on your computer. To do so, log in to a command
line as root and run rcnetwork restart.
21.10 For More Information
More information about NetworkManager can be found on the following Web sites
and directories:
NetworkManager Project Page
http://projects.gnome.org/NetworkManager/
KDE NetworkManager Front-End
http://userbase.kde.org/NetworkManagement
Using NetworkManager 395
Package Documentation
Also check out the information in the following directories for the latest information
about NetworkManager and the GNOME and KDE NetworkManager applets:
/usr/share/doc/packages/NetworkManager/,
/usr/share/doc/packages/NetworkManager-gnome/.
396 Reference
22
Using Tablet PCs
openSUSE® comes with support for Tablet PCs. In the following, learn how to install
and congure your Tablet PC and discover some useful Linux* applications which
accept input from digital pens.
The following Tablet PCs are supported:
Tablet PCs with serial and USB Wacom tablet (pen based), touch-screen or multi-
touch devices.
Tablet PCs with FinePoint devices, such as Gateway C210X/M280E/CX2724 or HP
Compaq TC1000.
Tablet PCs with touch screen devices, such as Asus R2H, Clevo TN120R, Fujitsu
Siemens Computers P-Series, LG C1, Samsung Q1/Q1-Ultra.
After you have installed the Tablet PC packages and congured your digitizer correctly,
input with the pen (also called a stylus) can be used for the following actions and appli-
cations:
Logging in to KDM or GDM
Unlocking your screen on the KDE and GNOME desktops
Actions that can also be triggered by other pointing devices (such as mouse or touch
pad), for example, moving the cursor on the screen, starting applications, closing,
resizing and moving windows, shifting window focus and dragging and dropping
objects
Using Tablet PCs 397
Using gesture recognition in applications of the X Window System
Drawing with GIMP
Taking notes or sketching with applications like Jarnal or Xournal or editing larger
amounts of text with Dasher
22.1 Installing Tablet PC Packages
The packages needed for Tablet PCs are included in the TabletPC installation pat-
tern—if this is selected during installation, the following packages should already be
installed on your system:
cellwriter: a character-based hardwriting input panel
jarnal: a Java-based note taking application
xournal: an application for note taking and sketching
xstroke: a gesture recognition program for the X Window System
xvkbd: a virtual keyboard for the X Window System
x11-input-fujitsu: the X input module for Fujitsu P-Series tablets
x11-input-evtouch: the X input module for some Tablet PCs with touch screens
xorg-x11-driver-input: the X input module for input devices, including the
module for Wacom devices.
If these packages are not installed, manually install the packages you need from com-
mand line or select the TabletPC pattern for installation in YaST.
398 Reference
22.2 Conguring Your Tablet Device
During installation, your tablet or touch device is congured by default. If you have
trouble with the conguration of your Wacom device, you use xsetwacom on the
command line to change the settings.
22.3 Using the Virtual Keyboard
To log in to the KDE or GNOME desktop or to unlock the screen, you can either enter
your username and password as usual or via the virtual keyboard (xvkbd) displayed
below the login eld. To congure the keyboard or to access the integrated help, click
the xvkbd eld at the left lower corner and open the xvkbd main menu.
If your input is not visible (or is not transferred to the window where you need it),
redirect the focus by clicking the Focus key in xvkbd and then clicking into the window
that should get the keyboard events.
Figure 22.1
xvkbd Virtual Keyboard
If you want to use xvkbd after login, start it from the main menu or with xvkbd from
a shell.
22.4 Rotating Your Display
Use KRandRTray (KDE) or gnome-display-properties (GNOME) to rotate or resize
your display manually on the y. Both KRandRTray and gnome-display-properties are
applets for the RANDR extension of the X server.
Using Tablet PCs 399
Start KRandRTray or gnome-display-properties from the main menu, or enter
krandrtray or gnome-display-properties to start the applet from a shell.
After you have started the applet, the applet icon is usually added to your system tray.
If the gnome-display-properties icon does not automatically appear in the system tray,
make sure Show Displays in Panel is activated in the Monitor Resolution Settings dialog.
To rotate your display with KRandRTray, right-click the icon and select Congure
Display. Select the desired orientation from the conguration dialog.
To rotate your display with gnome-display-properties, right-click the icon and select
the desired orientation. Your display is immediately tilted to the new direction. The
orientation of the graphics tablet changes also, so it can still interpret the movement of
the pen correctly.
If you have problems changing the orientation of your desktop, refer to Section 22.7,
“Troubleshooting” (page 404) for more information.
22.5 Using Gesture Recognition
openSUSE includes both CellWriter and xstroke for gesture recognition. Both applica-
tions accept gestures executed with the pen or other pointing devices as input for appli-
cations on the X Window System.
22.5.1 Using CellWriter
With CellWriter, you can write characters into a grid of cells—the writing is instantly
recognized on a character basis. After you have nished writing, you can send the input
to the currently focused application. Before you can use CellWriter for gesture recogni-
tion, the application needs to be trained to recognize your handwriting: You need to
train each character of a certain map of keys (untrained characters are not activated and
thus cannot be used).
Procedure 22.1
Training CellWriter
1
Start CellWriter from the main menu or with cellwriter from the command line.
On the rst start, CellWriter automatically starts in the training mode. In training
mode it shows a set of characters of the currently chosen key map.
400 Reference
2
Enter the gesture you would like to use for a character into the respective character's
cell. With the rst input, the background changes its color to white, whereas the
character itself is shown in light gray. Repeat the gesture multiple times until the
character changes its color to black. Untrained characters are shown on a light gray
or brown background (depending on the desktop's color scheme).
3
Repeat this step until you have trained CellWriter for all characters you need.
4
If you want to train CellWriter for another language, click the Setup button and select
a language from the Languages tab. Close the conguration dialog. Click the Train
button and select the key map from the drop-down box at the bottom right corner of
the CellWriter window. Now repeat your training for the new map of keys.
5
After having nished the training for the map of keys, click the Train button to
switch to the normal mode.
In the normal mode, the CellWriter windows shows a couple of empty cells in which
to enter the gestures. The characters are not sent to another application until you click
the Enter button, so you can correct or delete characters before you use them as input.
Characters that have been recognized with a low degree of condence will appear
highlighted. To correct your input, use the context menu that appears on right-clicking
a cell. To delete a character, either use your pen's eraser, or middle-click with the mouse
to clear the cell. After nishing your input in CellWriter, dene which application
should receive the input by clicking into the application's window. Then send the input
to the application by clicking Enter.
Figure 22.2
Gesture Recognition with CellWriter
If you click the Keys button in CellWriter, you get a virtual keyboard that can be used
instead of the handwriting recognition.
To hide CellWriter, close the CellWriter window. The application now appears as icon
in your system tray. To show the input window again, click the icon in the system tray.
Using Tablet PCs 401
22.5.2 Using Xstroke
With xstroke, you can use gestures with your pen or other pointing devices as input for
applications on the X Window System. The xstroke alphabet is a unistroke alphabet
that resembles the Grafti* alphabet. When activated, xstroke sends the input to the
currently focused window.
1
Start xstroke from the main menu or with xstroke from a shell. This adds a pencil
icon to your system tray.
2
Start the application for which you want to create text input with the pen (for example,
a terminal window, a text editor or an LibreOfce Writer).
3
To activate the gesture recognition mode, click the pencil icon once.
4
Perform some gestures on the graphics tablet with the pen or another pointing device.
xstroke captures the gestures and transfers them to text that appears in the application
window that has the focus.
5
To switch focus to a different window, click the desired window with the pen and
hold for a moment (or use the keyboard shortcut dened in your desktop's control
center).
6
To deactivate the gesture recognition mode, click the pencil icon again.
402 Reference
22.6 Taking Notes and Sketching with
the Pen
To create drawings with the pen, you can use a professional graphics editor like GIMP
or try one of the note-taking applications, Xournal or Jarnal. With both Xournal and
Jarnal, you can take notes, create drawings or comment PDF les with the pen. As a
Java-based application available for several platforms, Jarnal also offers basic collabo-
ration features. For more information, refer to http://www.dklevine.com/
general/software/tc1000/jarnal-net.htm. When saving your contents,
Jarnal stores the data in an archive format (*.jaj) that also contains a le in SVG format.
Start Jarnal or Xournal from the main menu or by entering jarnal or xournal in a
shell. To comment a PDF le in Xournal, for example, select File > Annotate PDF and
open the PDF le from your le system. Use the pen or another pointing device to an-
notate the PDF and save your changes with File > Print to PDF.
Figure 22.3
Annotating a PDF with Xournal
Dasher is another useful application. It was designed for situations where keyboard input
is impractical or unavailable. With a bit of training, you can rapidly enter larger amounts
Using Tablet PCs 403
of text using only the pen (or other input devices—it can even be driven with an eye
tracker).
Start Dasher from the main menu or with dasher from a shell. Move your pen in one
direction and the application starts to zoom into the letters on the right side. From the
letters passing the cross hairs in the middle, the text is created or predicted and is
printed to the upper part of the window. To stop or start writing, click the display once
with the pen. Modify the zooming speed at the bottom of the window.
Figure 22.4
Editing Texts with Dasher
The Dasher concept works for many languages. For more information, refer to the
Dasher Web site, which offers comprehensive documentation, demonstrations and
training texts. Find it at http://www.inference.phy.cam.ac.uk/dasher/
22.7 Troubleshooting
Virtual Keyboard Does Not Appear on Login Screen
Occasionally, the virtual keyboard is not displayed on the login screen. To solve
this, restart the X server by pressing Ctrl + Alt + <— or press the appropriate key
on your Tablet PC (if you use a slate model without integrated keyboard). If the
virtual keyboard still does not show, connect an external keyboard to your slate
model and log in using the hardware keyboard.
404 Reference
Orientation of the Wacom Graphics Tablets Does Not Change
With the xrandr command, you can change the orientation of your display from
within a shell. Enter xrandr --help to view the options available. To simulta-
neously change the orientation of your graphics tablet, the command needs to be
modied as described below:
For normal orientation (0° rotation):
xrandr -o normal && xsetwacom --set "Serial Wacom Tablet" Rotate NONE
For 90° rotation (clockwise, portrait):
xrandr -o right && xsetwacom --set "Serial Wacom Tablet" Rotate CW
For 180° rotation (landscape):
xrandr -o inverted && xsetwacom --set "Serial Wacom Tablet" Rotate
HALF
For 270° rotation (counterclockwise, portrait):
xrandr -o left && xsetwacom set --"Serial Wacom Tablet" Rotate CCW
Note that the commands above depend on the output of the xsetwacom list
command. Replace "Serial Wacom Tablet" with the output for the stylus
or the touch device. If you have a Wacom device with touch support (you can use
your ngers on the tablet to move the cursor), you need to rotate also the touch
device.
Using Tablet PCs 405
22.8 For More Information
Some of the applications mentioned here do not offer integrated online help, but you
can nd some useful information about usage and conguration in your installed system
in /usr/share/doc/package/packagename or on the Web:
For the Xournal manual, refer to http://xournal.sourceforge.net/
manual.html
The Jarnal documentation is located at http://www.dklevine.com/general/
software/tc1000/jarnal.htm#documentation
Find the xstroke man page at http://davesource.com/Projects/
xstroke/xstroke.txt
Find a HOWTO for conguring X on the Linux Wacom Web site: http://
linuxwacom.sourceforge.net/index.php/howto/x11
Find a very informative Web site about the Dasher project at http://www
.inference.phy.cam.ac.uk/dasher/
Find more information and documentation about CellWriter at http://risujin
.org/cellwriter/
Information on gnome-display-properties can be found at http://old-en
.opensuse.org/GNOME/Multiscreen
406 Reference
23
Copying and Sharing Files
If using multiple operating systems (OS) simultaneously, it is often necessary to ex-
change les among them. Different systems may reside on different partitions on the
same machine or on different machines across your network. There are various approach-
es to le exchange with different basic instructions and possible pitfalls.
WARNING: Scenarios for Private Home Networks Only
Do not use the following scenarios in networks other than your own private
and trusted home network that is protected by a rewall. Implementing high
security measures for the congurations featured in the following sections is
beyond the scope of this document.
Exchanging data may encompass either one of the following tasks:
Copying
To copy your data means to transfer your data from one system to the other. This
results in identical objects on both the source and the target system.
Synchronizing data is a special way to copy data. If you change a le on one
computer, it is automatically changed on the other computer after the synchroniza-
tion. For example, think of a laptop that contains your modied les and you want
to have the same contents on your desktop computer.
Sharing
Sharing your les means establishing a client/server relationship. The server pro-
vides les that can be accessed by the client. When changing a le, you modify it
Copying and Sharing Files 407
on the server, not locally on the client. File servers typically serve a large number
of clients simultaneously.
23.1 Scenarios
The following list provides a number of possible scenarios involving le transfer:
Different OS on the Same Computer
Many users have an operating system preinstalled by their vendor and run Linux
in a separate partition. Refer to Section 23.4, “Accessing Files on Different OS on
the Same Computer” (page 412) for more information.
Different Computers Not Connected by a Network
Save the data to any media (CD, DVD, USB ash drive, or external hard disk) and
connect these to the target machine to copy your les. This solution is inexpensive,
intuitive, and straightforward. However, you need the appropriate drives or ports
on both computers. Additionally the operating systems have to understand the
lesystem.
Media are suited to occasional le transfers with limited le size. If you need a
more permanent solution, consider connecting them with a network.
Different Computers Connected to the Same Network
Set up a server of any kind on one computer, connect the server and the client, and
transfer the les from server to client. Choose from various protocols available and
pick the one that best matches your needs and expertise.
The client/server setup requires more expertise and maintenance efforts, but is
better suited to routine transfer needs and exchange with multiple systems. If you
are looking for a permanent le exchange, choose a client/server-based method.
This method does not impose any limits on the amount of data that can be trans-
ferred. See Section 23.2, “Access Methods” (page 409).
Different Computers on Different Networks
This scenario requires connection of different networks and is beyond the scope
of this document. Transfer les as if the computers were not connected to a network.
408 Reference
23.2 Access Methods
The following methods and protocols are well-suited to le transfer and sharing.
FTP
Use FTP (File Transfer Protocol) if you need to exchange les very often and with
different users. Set up an FTP server on one system and access it with clients. There
are many graphical client applications available for FTP on Windows*, MacOS,
and Linux. Depending on how your FTP server is used, enable read and write per-
missions. See Section 23.5.4, “Copying Files with FTP” (page 419) for more details
on FTP.
NFS
NFS (Network File System) is a client/server system. A server exports one or more
directories that can be imported by a client. For more information, see Chapter 14,
Sharing File Systems with NFS (page 259).
Use NFS if you share les very often and for different users. Generally, this protocol
is more common in the Linux world than in the Windows world. An NFS export
integrates well into your Linux system and you can browse the imported directory
structure like any other folder on your local machine. Depending on your congu-
ration, enable either read or write permissions or both on the server. In general, for
a home user it makes sense to allow read and write access.
rsync
Use rsync to transfer regularly large volumes of data that does not change consid-
erably. It is available on Linux and Windows. A typical use case for rsync is man-
aging data backups. Refer to the manual page of the rsync command and Sec-
tion 23.5.2, “Transferring Files with rsync” (page 415) for more information.
Unison
Unison is an alternative to rsync. It is used to regularly synchronize les between
different computers but has the advantage to behave bidirectionally. Refer to the
manual page of the Unison command and Section 23.5.3, “Transferring Files with
Unison” (page 416) for more information. Unison is available on Linux and Win-
dows.
Copying and Sharing Files 409
CSync
CSync is an alternative to Unison. Just like Unison it synchronizes les bidirection-
ally. However, its architecture is modular so it can be extended with plug-ins. See
http://www.csync.org for more details.
SMB
Samba is a client/server system and an implementation of the SMB protocol. It is
usually used in Windows networks, but is supported by several operating systems.
Refer to Chapter 15, Samba (page 275) for more information about Samba.
Use Samba if you need to share les very often and with different users, especially
to Windows systems. Samba as a Linux-only solution is uncommon, use NFS in-
stead. For more information about setting up a Samba server, refer to Section 23.8,
“Sharing Files between Linux and Windows with Samba” (page 425).
SSH
SSH (Secure Shell) enables a secure connection between computer. The SSH suite
consists of several commands and uses public key encryption to authenticate users.
For more information, see Chapter 12, SSH: Secure Network Operations (↑Security
Guide).
Use SSH if you copy les occasionally over an untrusted network and if you are
the only user doing so. Although there are graphical user interfaces available, SSH
is mainly considered a command line utility and is available on Linux and Windows.
23.3 Accessing Files Using a Direct
Connection
This section describes one way to exchange les between two computers using an
Ethernet crossover cable.
You need:
Ethernet crossover cable. For further information see: http://en.wikipedia
.org/wiki/Ethernet_crossover_cable
openSUSE on both computers
410 Reference
An established connection.
The SSH daemon running on both machines. To start the service, run the command
rcsshd start as root.
Proceed as follows:
Procedure 23.1
GNOME
1
Start Nautilus.
2
Click on File > Connect to Server.
3
Set the Service Type to ssh.
4
Enter the IP address and port of the remote computer (default is 22).
5
Specify the folder you want to open on the remote Computer.
6
Click Connect.
Procedure 23.2
KDE
1
Start Dolphin.
2
Click on Network, Add Network. Re-attach the pane if it is not available with View
> Panels > Places.
3
Set the type of network to Secure shell (ssh).
4
Enter any name and the correct user, IP address, port (default is 22) and folder of
the remote Computer. It is also possible to create an icon for this connection by en-
abling the checkbox below. This connection icon appears in the Network tab in
Dolphin.
5
Click on Save & Connect a dialog box opens and requests the password.
A new window containing the les of the remote computer will be opened.
Copying and Sharing Files 411
23.4 Accessing Files on Different OS
on the Same Computer
New computers generally ship with a preinstalled operating system, usually Windows.
If you have installed Linux on a different partition, you might want to exchange les
between the different operating systems.
Windows cannot read Linux partitions by default. If you want to exchange les between
these two operating systems, you have to create an “exchange partition”. For a more
direct approach, see http://www.fs-driver.org/ to get a driver supporting an
ext2 lesystem on Windows. The following le systems are used by Windows and can
be accessed from a Linux machine:
FAT
Various avors of this le system are used by MS-DOS and Windows 95 and 98.
You can create this type of le system with YaST. It is possible to read and write
les on FAT partitions from Linux. The size of a FAT partition (and even the
maximum size of a single le) is subject to restrictions, depending on the FAT
version. See http://en.wikipedia.org/wiki/VFAT for more information
about FAT le systems.
NTFS
The NTFS le system is used by Windows. openSUSE includes write access support
to the NTFS le system. See http://en.opensuse.org/SDB:NTFS for
more information about NTFS-3g.
During the installation of openSUSE, your Windows partitions are detected. After
starting your Linux system, the Windows partitions usually are mounted. These are
possible ways of accessing your Windows data:
KDE
Press Alt + F2 and enter sysinfo:/. A new window opens displaying the char-
acteristics of your machine. Disk Information lists your partitions. Look at those
that are of the le system type ntfs or vfat and click these entries. If the partition
is not already mounted, KDE mounts the partition now and displays the contents.
412 Reference
Command Line
Just list the contents of /windows to see one or more directories containing your
Windows drives. The directory /windows/c maps to the Windows C:\ drive,
for example.
NOTE: Changing the Accessibility of Windows Partitions
Initially, Windows partitions are mounted read-only for normal users to avoid
accidental damage to the le system. To grant normal users full access to a
mounted Windows partition, change the mount behavior of this Windows
partition. Refer to the manual page of the mount command for more informa-
tion on mount options for vfat and to the manual page of ntfs-3g on mount
options for NTFS.
23.5 Copying Files between Linux
Computers
Linux offers a rich set of protocols you can use to copy les between computers. Which
protocol you use depends on how much effort you want to invest and whether it needs
to be compatible with future Windows installations. The following sections feature
various methods to transfer les from and to Linux computers. Make sure that you have
a working network connection, because otherwise they will not work. All scenarios
rely on working name resolution in the network. If your network does not include a
name service, use IP addresses directly or add the IP addresses along with respective
hostnames to /etc/hosts on all clients.
The following example IP addresses and hostnames are used across this section:
jupiter.example.com
Target Hostname
192.168.2.100
Target IP
venus.example.com
Source Hostname
192.168.2.101
Source IP
Copying and Sharing Files 413
tux
User
23.5.1 Copying Files with SSH
The following requirements must be met on both computers that are accessed via SSH:
1.
If you use a hostname, make sure each hostname is listed in /etc/hosts on both
computers (see Section 9.6.1.6, /etc/hosts (page 197).) If you use SSH with
IP addresses, you do not need to change anything.
2.
If you use a rewall, open the SSH port. To do so, start YaST, and select Security
and Users > Firewall. Go to Allowed Services and check whether SSH is displayed
as part of the list. If this is not the case, select SSH from Service to Allow and click
Add. Apply your changes and leave YaST with Next and Finish.
To copy les from one computer to another, you need to know where the les are lo-
cated. For example, to copy the single le /srv/foo_file from computer
jupiter.example.com to the current directory, use the following scp command
(the dot represents the current directory as the copy target location):
scp tux@jupiter.example.com:/srv/foo_file .
To copy a whole directory structure, use the recursive mode of scp:
scp -r tux@jupiter.example.com:/srv/foo_directory .
If your network does not provide name resolution, use the server's IP address directly:
scp tux@192.168.2.100:/srv/foo_file .
If you do not know exactly where your les are, use the sftp command. Copying
les in KDE or GNOME with SFTP is very simple. Proceed as follows:
1
Press Alt + F2.
2
Enter the following at the address prompt (correct it to your own values):
sftp://tux@jupiter.example.com
3
Conrm the question regarding of authenticity and enter the password of tux on
jupiter.example.com.
414 Reference
4
Drag and drop the desired les or directories to your desktop or a local directory.
KDE provides another protocol called fish that can be used if sftp is not available.
The use of this protocol is similar to sftp. Just replace the sftp protocol prex of
the URL with fish:
fish://tux@jupiter.example.com
23.5.2 Transferring Files with rsync
rsync is useful for archiving or copying data and can also be used as a daemon to provide
directories to the network (see Procedure 23.3, “Advanced Setup for rsync Synchroniza-
tion” (page 416)).
Before using rsync to synchronize les and directories between different computers,
make sure that the following requirements are met:
1.
The package rsync is installed.
2. Identical users are available on both systems.
3. Enough disk space is available on the server.
4. If you want to benet from rsync's full potential, make sure that rsyncd is installed
on the system to use as the server.
23.5.2.1 rsync Basic Mode
The basic mode of operation of rsync does not require any special conguration. rsync
mirrors complete directories onto another system. Its usage is not much different from
a regular copying tool, such as scp. The following command creates a backup of the
home directory of tux on a backup server called jupiter:
rsync -Hbaz -e ssh /home/tux/ tux@jupiter:backup
Use the following command to restore your backup (without option -b):
rsync -Haz -e ssh tux@jupiter:backup /home/tux/
Copying and Sharing Files 415
23.5.2.2 rsync Daemon Mode
Start the rsyncd daemon on one of your systems to make use of the full functionality
of rsync. In this mode, it is possible to create synchronization points (modules) that can
be accessed without an account. To use the rsyncd daemon, proceed as follows:
Procedure 23.3
Advanced Setup for rsync Synchronization
1
Log in as root and install the rsync package.
2
Congure your synchronization points in /etc/rsyncd.conf. Add a point with
its name in brackets and add the path keyword like in the following example:
[FTP]
path = /srv/ftp
comment = An Example
3
Start the rsyncd daemon as root with rcrsyncd start. To start the rsync service
automatically during each system boot, run insserv rsyncd.
4
List all les located in the /srv/ftp directory (note the double colon):
rsync -avz jupiter::FTP
5
Initiate the transfer by providing a target directory (in this example, the current di-
rectory is represented by a dot):
rsync -avz jupiter::FTP .
By default, les are not deleted while synchronizing with rsync. To force le deletion,
add the --delete option. To make sure that --delete does not accidentally remove
newer les, use the --update option instead. Any conicts that arise must be resolved
manually.
23.5.3 Transferring Files with Unison
Before using Unison to synchronize les and directories between different computers,
make sure that the following requirements are met:
416 Reference
1.
The package unison is installed.
2. Enough disk space is available on your local and remote computer.
3. If you want to benet from Unison's full potential, make sure that Unison is also in-
stalled and running on the remote computer.
In case you need help, run Unison with the -doc topics option to get a full list of
available sections.
For permanent settings, Unison allows the creation of proles that specify Unison
preferences such as the directories (roots) to synchronize, which types of les to ignore,
and other options. The proles are stored as text les in ~/.unison with the le ex-
tension *.prf.
23.5.3.1 Using the GUI
To synchronize different directories with Unison's GUI, proceed as follows:
1
Start Unison by pressing Alt + F2 and entering unison.
2
If you run Unison for the rst time and without any further options, you are
prompted for a source directory. Enter the source directory you want to synchronize
and click OK.
3
Enter the target directory. It can be either local or remote. If you want to synchronize
to a remote directory, choose the method (SSH, RSH or Socket) and enter the host-
name and an optional user.
4
If you have not synchronized these two directories before, a warning dialog appears,
informing you that Unison will now compare the contents of those directories. Close
the warning with OK and wait until Unison has collected the information from both
directories and displays the differences in the main window.
The left column shows the source directory you have selected, the third column
shows the target directory. If there are differences between the directories, the Action
column shows a symbol, proposing an action. A green arrow indicates that a le has
been modied, added or deleted in the source or the target directory. The direction
of the arrow indicates the direction that the change would be propagated if you per-
Copying and Sharing Files 417
formed the synchronization now. A question mark indicates a conict (both les
have been changed and Unison cannot decide which one to overwrite).
Figure 23.1
File Synchronization Proposal
5
To modify the proposals Unison shows for each le (for example, if you want to
change the direction), select the le and click Right to Left or Left to Right. With
Skip, exclude a le from synchronization. The symbol in the Action column changes
accordingly.
6
To start the synchronization, click Go.
The next time you start Unison, a dialog box shows the existing proles, each specifying
a pair of directories to be synchronized. Select a prole or create a new prole (for
another pair of directories) and perform the synchronization as described above.
23.5.3.2 Using the Command Line
Unison can also be operated through the command line. To synchronize a local directory
to a remote computer, proceed as follows:
1
Open a shell and enter the following command:
unison -ui text DIR
ssh://tux@jupiter.example.com//PATH
Replace the placeholders with the respective values.
2
Unison asks you what to do with your les and directories, for example:
418 Reference
local jupiter
<---- new file dir [f]
3
Press F if you want to follow Unison's recommendation. For other commands, press
?.
4
Proceed with y, if you want to propagate your updates.
23.5.4 Copying Files with FTP
Before conguring your FTP server, make sure that the following requirements are
met:
1.
The package vsftp is installed.
2.
You have root access to your FTP server.
3. Enough disk space is available on your computer.
WARNING: For Home Networks Only
This setup is suited for use in home networks only. Do not deploy it to sites
unprotected by rewalls and do not enable world wide access.
To congure an FTP server, proceed as follows:
1
Prepare the FTP server:
1a
Open a shell, log in as root, and save a backup copy of /etc/vsftpd
.conf:
cp /etc/vsftpd.conf /etc/vsftpd.conf.bak
1b
Create an access point for anonymous FTP
mkdir ~ftp/incoming
chown -R ftp:ftp ~ftp/incoming
Copying and Sharing Files 419
2
Replace the conguration les according to the preferred scenario (refer to the
manual page of vsftpd.conf for advanced conguration options):
Allowing Anonymous Read and Write Access
#
listen=YES
# Enable anonymous access to FTP server
anonymous_enable=YES
#
local_enable=YES
# Enable write access
write_enable=YES
anon_upload_enable=YES
anon_mkdir_write_enable=YES
dirmessage_enable=YES
# Write log file
xferlog_enable=YES
connect_from_port_20=YES
chown_uploads=YES
chown_username=ftp
ftpd_banner=Welcome to FTP service.
anon_root=/srv/ftp
Grant Restricted Permissions to FTP Users (Home Only)
chroot_local_users=YES
3
Restart the FTP server:
rcvsftp start
On the client, just enter the URL ftp://HOST in your browser or FTP client. Replace
HOST with the hostname or IP address of your server. There are many graphical user
interfaces available that are suited to browsing the contents of your FTP server. For a
list of them, just enter FTP at the search prompt of the YaST package manager.
23.6 Copying Files between Linux and
Windows Computers with SSH
To transfer les from Linux to Windows using SSH, choose one of the following appli-
cations:
420 Reference
PuTTY
PuTTY is a suite of different command line tools for working with an SSH daemon.
Download it from http://www.chiark.greenend.org.uk/~sgtatham/
putty.html.
WinSCP
WinSCP is very similar to PuTTY, but includes a graphical user interface. Choose
from an Explorer or Norton Commander style. Download it from http://winscp
.net.
To copy a le from Windows to Linux with PuTTY, proceed as follows (on the Windows
machine):
1
Start PSCP.
2
Enter the hostname of your SSH server.
3
Enter your login and password to the SSH server.
To connect from Windows to Linux with WinSCP, proceed as follows (on the Windows
machine):
1
Start WinSCP.
2
Enter the hostname of the SSH server and username.
3
Click Login and acknowledge the resulting warning.
4
Drag and drop any les or directories from or to your WinSCP window.
NOTE: SSH Fingerprint
With both PuTTY and WinSCP, you must accept the SSH ngerprint when you
log in for the rst time.
Copying and Sharing Files 421
23.7 Sharing Files between Linux
Computers
The following sections feature various methods for sharing data. Use one of these if
you are looking for a permanent solution for data sharing.
23.7.1 Transferring Files with NFS
To congure the server, proceed as follows:
1
Prepare the system:
1a
Open a shell, log in as root, and grant write permissions to all users:
mkdir /srv/nfs
chgrp users /srv/nfs
chmod g+w /srv/nfs
1b
Make sure that your user name and user ID is known on the client as well as
on the server. Refer to Chapter 10, Managing Users with YaST (↑Start-Up)
for detailed instructions about how to create and manage user accounts.
2
Prepare the NFS server:
2a
Start YaST as root.
2b
Select Network Services > NFS Server (this module is not installed by default.
If it is missing in YaST, install the package yast2-nfs-server).
2c
Enable NFS services with Start.
2d
Open the appropriate rewall port with Open Port in Firewall if you are using
a rewall.
3
Export the directories:
3a
Click Add directory and select /srv/nfs.
422 Reference
3b
Set the export options to:
rw,root_squash,async
3c
Repeat these steps, if you need to export more than one directory.
4
Apply your settings and leave YaST. Your NFS server is ready to use.
To manually start the NFS server, enter rcnfsserver start as root. To stop
the server, enter rcnfsserver stop. By default, YaST takes care of starting this
service at boot time.
To congure the client, proceed as follows:
1
Prepare the NFS client:
1a
Start YaST as root.
1b
Select Network Services > NFS Client.
1c
Activate Open Port in Firewall if using a rewall.
2
Import the remote le system:
2a
Click Add.
2b
Enter the name or IP address of the NFS server or click Choose to automati-
cally scan the network for NFS servers.
2c
Enter the name of your remote le system or automatically choose it with
Select.
2d
Enter an appropriate mount point, for example /mnt. If you repeat this step
with another exported le system, make sure you choose another mount point
than /mnt.
2e
Repeat these steps if you need to import more than one external directory.
Copying and Sharing Files 423
3
Apply your settings and leave YaST. Your NFS client is ready to use.
To start the NFS client manually, enter rcnfs start.
NOTE: Consistent User Names
If your home network is used by just a small number of users, set up identical
users manually on all machines. If, however, you need a larger consistent user
base across a larger home network, consider using NIS or LDAP to manage user
data. For further information, refer to Chapter 3, Using NIS (↑Security Guide)
and Chapter 4, LDAP—A Directory Service (↑Security Guide).
23.7.2 Sharing Files with Samba
This sections introduces various methods to access les on a Samba server. Both KDE
and GNOME ship with graphical tools for working with Samba shares. There is also a
command line tool for accessing Samba servers.
23.7.2.1 Accessing Shares with KDE and GNOME
Both the KDE and GNOME desktops can access Samba shares through their le
browsers. To access your share, proceed as follows:
1
Press Alt + F2 and enter smb://jupiter.example.com/share.
The syntax of this URL is smb://HOST/SHARENAME with HOST representing
the hostname (jupiter.example.com) or IP address and SHARENAME repre-
senting the share. See Step 3b (page 426).
2
Log in with the username and password. The password is set in Step 4 (page 427) or
just hit Enter if no password is needed.
3
Drag and drop any les or directories from or to your window.
If you do not know your workgroup, enter smb:/ to list all workgroups available in
your network. The Smb4K tool (package smb4k) can also be used to display all
workgroups in your network and mount them on demand.
424 Reference
23.7.2.2 Accessing Shares from the Command Line
If you prefer using the command line, use the smbclient command. To log in to
your Samba server, run:
smbclient //jupiter/share -U tux
Omit the -U option if you are the current user tux. After logging in successfully, use
some basic commands like ls (list contents), mkdir (create directory), get (download
le), and put (upload le). Use help to display all commands. Refer to the manual
page of smbclient for more information.
23.8 Sharing Files between Linux and
Windows with Samba
Samba is the rst choice for transferring les between Windows and Linux machines.
These are the most common use cases for Samba:
Transferring Files from Linux to Windows with the SMB Scheme
In the easiest case you do not have to congure a Linux server. Use the smb:/
scheme. For more information, see Section 23.7.2.1, “Accessing Shares with KDE
and GNOME” (page 424). Make sure that your workgroup is identical on both
systems and that your directories are shared.
Transferring Files from Windows to Linux Using a Server
Congure a Samba server on your Linux computer. See Procedure 23.4, “Setting
Up a Samba Server” (page 426).
TIP: Using Default Registry Entries for Your Windows System
Some Windows versions (95, 98) require a small change in the registry for en-
abling a different password authentication method. Simplify this step by in-
stalling the samba-doc package and copy the le /usr/share/doc/
packages/samba/registry to your Windows drive. Start Windows and
incorporate the changes by double-clicking on this le.
Copying and Sharing Files 425
Procedure 23.4
Setting Up a Samba Server
To set up a Samba server, do the following:
1
Prepare the Samba server:
1a
Start YaST as root.
1b
Install the samba package.
1c
Create a directory (for example, /srv/share).
2
Create the server conguration:
2a
Select Network Services > Samba Server.
2b
Select one of the workgroups or enter a new one (for example, Penguin).
2c
Check Primary Domain Controller (PDC)
2d
Select During Boot if the Samba service should be started every time your
computer boots. Otherwise select Manually.
2e
Activate Open Port in Firewall if you use a rewall.
3
Create your Windows share:
3a
Change to the Shares tab and click Add.
3b
Enter a name and description. The Share Name is used for accessing the share
from your clients. Share Description describes the purpose of the share.
3c
Select your path (for example, /src/share).
3d
Proceed with OK.
3e
Activate Allow Users to Share Their Directories.
426 Reference
4
Provide a password for all users that are allowed to use this service:
smbpasswd -a tux
For easier conguration, just hit Enter to leave the password empty. Take into account
that the usernames on your Windows and Linux computers are probably different.
Conguring a consistent user base for both Windows and Linux is beyond the scope
of this document.
5
Start the Samba server:
rcnmb start
rcsmb start
To check if everything has been successfully congured, enter:
smbclient -L localhost
After you hit Enter, you should get something like the following:
Anonymous login successful
Domain=[PENGUIN] OS=[Unix] Server=[Samba 3.0.22-11-SUSE-CODE10]
Sharename Type Comment
--------- ---- -------
share Disk Shared directory
netlogon Disk Network Logon Service
IPC$ IPC IPC Service (Samba 3.0.22-11-SUSE-CODE10)
ADMIN$ IPC IPC Service (Samba 3.0.22-11-SUSE-CODE10)
Anonymous login successful
Domain=[PENGUIN] OS=[Unix] Server=[Samba 3.0.22-11-SUSE-CODE10]
Server Comment
--------- -------
SUSE-DESKTOP Samba 3.0.22-11-SUSE-CODE10
Workgroup Master
--------- -------
TUX-NET jupiter
Copying and Sharing Files 427
23.9 For More Information
http://en.wikipedia.org/wiki/VFAT
http://en.wikipedia.org/wiki/NTFS
http://en.wikipedia.org/wiki/Fstab
http://en.wikipedia.org/wiki/Network_File_System
http://en.wikipedia.org/wiki/File_Transfer_Protocol
http://en.wikipedia.org/wiki/SSH
http://en.wikipedia.org/wiki/Rsync
http://en.wikipedia.org/wiki/Samba_software
428 Reference
A
An Example Network
This example network is used across all network-related chapters of the openSUSE®
documentation.
B
GNU Licenses
This appendix contains the GNU General Public License version 2 and the GNU Free
Documentation License version 1.2.
GNU General Public License
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended
to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to
most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation
software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we arereferringto freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom
to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change
the software or use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions
translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must
make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute
and/or modify the software.
Also, for each author’s protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the
software is modied by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced
by others will not reect on the original authors’ reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individu-
ally obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone’s
free use or not licensed at all.
The precise terms and conditions for copying, distribution and modication follow.
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the
terms of this General Public License. The “Program”, below, refers to any such program or work, and a “work based on the Program” means either the
Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modications
and/or translated into another language. (Hereinafter, translation is included without limitation in the term “modication”.) Each licensee is addressed
as “you”.
Activities other than copying, distribution and modication are not covered by this License; they are outside its scope. The act of running the Program
is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been
made by running the Program). Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and
to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such
modications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modied les to carry prominent notices stating that you changed the les and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be
licensed as a whole at no charge to all third parties under the terms of this License.
c) If the modied program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the
most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying
that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
(Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to
print an announcement.)
These requirements apply to the modied work as a whole. If identiable sections of that work are not derived from the Program, and can be reasonably
considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as
separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must
be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who
wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to
control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a
storage or distribution medium does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1
and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above
on a medium customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing
source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above
on a medium customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for non-
commercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modications to it. For an executable work, complete source code means
all the source code for all modules it contains, plus any associated interface denition les, plus the scripts used to control compilation and installation
of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source
or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component
itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the
source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with
the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy,
modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received
copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the
Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the
432 Reference
Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, dis-
tributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor
to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise
of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are
imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions
of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as
a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program
by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain en-
tirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the
section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this
section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many
people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that
choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright
holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution
is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program species a version number of this License which applies to it and “any later
version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foun-
dation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for
permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions
for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing
and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT
PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER
PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR
ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE
OR LOSSES SUSTAINEDBY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software
which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source le to most effectively convey the exclusion
of warranty; and each le should have at least the “copyright” line and a pointer to where the full notice is found.
one line to give the program’s name and an idea of what it does.
Copyright (C) yyyy name of author
GNU Licenses 433
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details
type `show w’. This is free software, and you are welcome
to redistribute it under certain conditions; type `show c’
for details.
The hypothetical commands `show w’ and `show c’ should show the appropriate parts of the General Public License. Of course, the commands you use
may be called something other than `show w’ and `show c’; they could even be mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a “copyright disclaimer” for the program, if necessary.
Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright
interest in the program `Gnomovision’
(which makes passes at compilers) written
by James Hacker.
signature of Ty Coon, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may
consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public
License [http://www.fsf.org/licenses/lgpl.html] instead of this License.
GNU Free Documentation License
Version 1.2, November 2002
Copyright (C) 2000,2001,2002 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
PREAMBLE
The purpose of this License is to make a manual, textbook, or other functional and useful document “free” in the sense of freedom: to assure everyone
the effective freedom to copy and redistribute it, with or without modifying it, either commercially or noncommercially. Secondarily, this License preserves
for the author and publisher a way to get credit for their work, while not being considered responsible for modications made by others.
This License is a kind of “copyleft”, which means that derivative works of the document must themselves be free in the same sense. It complements
the GNU General Public License, which is a copyleft license designed for free software.
434 Reference
We have designed this License in order to use it for manuals for free software, because free software needs free documentation: a free program should
come with manuals providing the same freedoms that the software does. But this License is not limited to software manuals; it can be used for any
textual work, regardless of subject matter or whether it is published as a printed book. We recommend this License principally for works whose purpose
is instruction or reference.
APPLICABILITY AND DEFINITIONS
This License applies to any manual or other work, in any medium, that contains a notice placed by the copyright holder saying it can be distributed under
the terms of this License. Such a notice grants a world-wide, royalty-free license, unlimited in duration, to use that work under the conditions stated
herein. The “Document”, below, refers to any such manual or work. Any member of the public is a licensee, and is addressed as “you”. You accept the
license if you copy, modify or distribute the work in a way requiring permission under copyright law.
A “Modied Version” of the Document means any work containing the Document or a portion of it, either copied verbatim, or with modications
and/or translated into another language.
A “Secondary Section” is a named appendix or a front-matter section of the Document that deals exclusively with the relationship of the publishers or
authors of the Document to the Document’s overall subject (or to related matters) and contains nothing that could fall directly within that overall subject.
(Thus, if the Document is in part a textbook of mathematics, a Secondary Section may not explain any mathematics.) The relationship could be a matter
of historical connection with the subject or with related matters, or of legal, commercial, philosophical, ethical or political position regarding them.
The “Invariant Sections” are certain Secondary Sections whose titles are designated, as being those of Invariant Sections, in the notice that says that the
Document is released under this License. If a section does not t the above denition of Secondary then it is not allowed to be designated as Invariant.
The Document may contain zero Invariant Sections. If the Document does not identify any Invariant Sections then there are none.
The “Cover Texts” are certain short passages of text that are listed, as Front-Cover Texts or Back-Cover Texts, in the notice that says that the Document
is released under this License. A Front-Cover Text may be at most 5 words, and a Back-Cover Text may be at most 25 words.
A “Transparent” copy of the Document means a machine-readable copy, represented in a format whose specication is available to the general public,
that is suitable for revising the document straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for
drawings) some widely available drawing editor, and that is suitable for input to text formatters or for automatic translation to a variety of formats
suitable for input to text formatters. A copy made in an otherwise Transparent le format whose markup, or absence of markup, has been arranged to
thwart or discourage subsequent modication by readers is not Transparent. An image format is not Transparent if used for any substantial amount of
text. A copy that is not “Transparent” is called “Opaque”.
Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, LaTeX input format, SGML or XML
using a publicly available DTD, and standard-conforming simple HTML, PostScript or PDF designed for human modication. Examples of transparent
image formats include PNG, XCF and JPG. Opaque formats include proprietary formats that can be read and edited only by proprietary word processors,
SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML, PostScript or PDF produced
by some word processors for output purposes only.
The “Title Page” means, for a printed book, the title page itself, plus such following pages as are needed to hold, legibly, the material this License requires
to appear in the title page. For works in formats which do not have any title page as such, “Title Page” means the text near the most prominent appearance
of the work’s title, preceding the beginning of the body of the text.
A section “Entitled XYZ” means a named subunit of the Document whose title either is precisely XYZ or contains XYZ in parentheses following text
that translates XYZ in another language. (Here XYZ stands for a specic section name mentioned below, such as “Acknowledgements”, “Dedications”,
“Endorsements”, or “History”.) To “Preserve the Title” of such a section when you modify the Document means that it remains a section “Entitled
XYZ” according to this denition.
The Document may include Warranty Disclaimers next to the notice which states that this License applies to the Document. These Warranty Disclaimers
are considered to be included by reference in this License, but only as regards disclaiming warranties: any other implication that these Warranty Disclaimers
may have is void and has no effect on the meaning of this License.
VERBATIM COPYING
You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that this License, the copyright notices,
and the license notice saying this License applies to the Document are reproduced in all copies, and that you add no other conditions whatsoever to
those of this License. You may not use technical measures to obstruct or control the reading or further copying of the copies you make or distribute.
However, you may accept compensation in exchange for copies. If you distribute a large enough number of copies you must also follow the conditions
in section 3.
You may also lend copies, under the same conditions stated above, and you may publicly display copies.
COPYING IN QUANTITY
If you publish printed copies (or copies in media that commonly have printed covers) of the Document, numbering more than 100, and the Document’s
license notice requires Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover Texts on
the front cover, and Back-Cover Texts on the back cover. Both covers must also clearly and legibly identify you as the publisher of these copies. The
front cover must present the full title with all words of the title equally prominent and visible. You may add other material on the covers in addition.
Copying with changes limited to the covers, as long as they preserve the title of the Document and satisfy these conditions, can be treated as verbatim
copying in other respects.
GNU Licenses 435
If the required texts for either cover are too voluminous to t legibly, you should put the rst ones listed (as many as t reasonably) on the actual cover,
and continue the rest onto adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a machine-readable Transparent copy
along with each Opaque copy, or state in or with each Opaque copy a computer-network location from which the general network-using public has access
to download using public-standard network protocols a complete Transparent copy of the Document, free of added material. If you use the latter option,
you must take reasonably prudent steps, when you begin distribution of Opaque copies in quantity, to ensure that this Transparent copy will remain thus
accessible at the stated location until at least one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of
that edition to the public.
It is requested, but not required, that you contact the authors of the Document well before redistributing any large number of copies, to give them a
chance to provide you with an updated version of the Document.
MODIFICATIONS
You may copy and distribute a Modied Version of the Document under the conditions of sections 2 and 3 above, provided that you release the Modied
Version under precisely this License, with the Modied Version lling the role of the Document, thus licensing distribution and modication of the
Modied Version to whoever possesses a copy of it. In addition, you must do these things in the Modied Version:
A. Use in the Title Page (and on the covers, if any) a title distinct from that of the Document, and from those of previous versions (which should, if
there were any, be listed in the History section of the Document). You may use the same title as a previous version if the original publisher of that version
gives permission.
B. List on the Title Page, as authors, one or more persons or entities responsible for authorship of the modications in the Modied Version, together
with at least ve of the principal authors of the Document (all of its principal authors, if it has fewer than ve), unless they release you from this require-
ment.
C. State on the Title page the name of the publisher of the Modied Version, as the publisher.
D. Preserve all the copyright notices of the Document.
E. Add an appropriate copyright notice for your modications adjacent to the other copyright notices.
F. Include, immediately after the copyright notices, a license notice giving the public permission to use the Modied Version under the terms of this
License, in the form shown in the Addendum below.
G. Preserve in that license notice the full lists of Invariant Sections and required Cover Texts given in the Document’s license notice.
H. Include an unaltered copy of this License.
I. Preserve the section Entitled “History”, Preserve its Title, and add to it an item stating at least the title, year, new authors, and publisher of the
Modied Version as given on the Title Page. If there is no section Entitled “History” in the Document, create one stating the title, year, authors, and
publisher of the Document as given on its Title Page, then add an item describing the Modied Version as stated in the previous sentence.
J. Preserve the network location, if any, given in the Document for public access to a Transparent copy of the Document, and likewise the network
locations given in the Document for previous versions it was based on. These may be placed in the “History” section. You may omit a network location
for a work that was published at least four years before the Document itself, or if the original publisher of the version it refers to gives permission.
K. For any section Entitled “Acknowledgements” or “Dedications”, Preserve the Title of the section, and preserve in the section all the substance and
tone of each of the contributor acknowledgements and/or dedications given therein.
L. Preserve all the Invariant Sections of the Document, unaltered in their text and in their titles. Section numbers or the equivalent are not considered
part of the section titles.
M. Delete any section Entitled “Endorsements”. Such a section may not be included in the Modied Version.
N. Do not retitle any existing section to be Entitled “Endorsements” or to conict in title with any Invariant Section.
O. Preserve any Warranty Disclaimers.
If the Modied Version includes new front-matter sections or appendices that qualify as Secondary Sections and contain no material copied from the
Document, you may at your option designate some or all of these sections as invariant. To do this, add their titles to the list of Invariant Sections in the
Modied Version’s license notice. These titles must be distinct from any other section titles.
You may add a section Entitled “Endorsements”, provided it contains nothing but endorsements of your Modied Version by various parties--for example,
statements of peer review or that the text has been approved by an organization as the authoritative denition of a standard.
You may add a passage of up to ve words as a Front-Cover Text, and a passage of up to 25 words as a Back-Cover Text, to the end of the list of
Cover Texts in the Modied Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be added by (or through arrangements
made by) any one entity. If the Document already includes a cover text for the same cover, previously added by you or by arrangement made by the
same entity you are acting on behalf of, you may not add another; but you may replace the old one, on explicit permission from the previous publisher
that added the old one.
436 Reference
The author(s) and publisher(s) of the Document do not by this License give permission to use their names for publicity for or to assert or imply endorsement
of any Modied Version.
COMBINING DOCUMENTS
You may combine the Document with other documents released under this License, under the terms dened in section 4 above for modied versions,
provided that you include in the combination all of the Invariant Sections of all of the original documents, unmodied, and list them all as Invariant
Sections of your combined work in its license notice, and that you preserve all their Warranty Disclaimers.
The combined work need only contain one copy of this License, and multiple identical Invariant Sections may be replaced with a single copy. If there
are multiple Invariant Sections with the same name but different contents, make the title of each such section unique by adding at the end of it, in
parentheses, the name of the original author or publisher of that section if known, or else a unique number. Make the same adjustment to the section titles
in the list of Invariant Sections in the license notice of the combined work.
In the combination, you must combine any sections Entitled “History” in the various original documents, forming one section Entitled “History”; likewise
combine any sections Entitled “Acknowledgements”, and any sections Entitled “Dedications”. You must delete all sections Entitled “Endorsements”.
COLLECTIONS OF DOCUMENTS
You may make a collection consisting of the Document and other documents released under this License, and replace the individual copies of this License
in the various documents with a single copy that is included in the collection, provided that you follow the rules of this License for verbatim copying
of each of the documents in all other respects.
You may extract a single document from such a collection, and distribute it individually under this License, provided you insert a copy of this License
into the extracted document, and follow this License in all other respects regarding verbatim copying of that document.
AGGREGATION WITH INDEPENDENT WORKS
A compilation of the Document or its derivatives with other separate and independent documents or works, in or on a volume of a storage or distribution
medium, is called an “aggregate” if the copyright resulting from the compilation is not used to limit the legal rights of the compilation’s users beyond
what the individual works permit. When the Document is included in an aggregate, this License does not apply to the other works in the aggregate which
are not themselves derivative works of the Document.
If the Cover Text requirement of section 3 is applicable to these copies of the Document, then if the Document is less than one half of the entire aggregate,
the Document’s Cover Texts may be placed on covers that bracket the Document within the aggregate, or the electronic equivalent of covers if the
Document is in electronic form. Otherwise they must appear on printed covers that bracket the whole aggregate.
TRANSLATION
Translation is considered a kind of modication, so you may distribute translations of the Document under the terms of section 4. Replacing Invariant
Sections with translations requires special permission from their copyright holders, but you may include translations of some or all Invariant Sections
in addition to the original versions of these Invariant Sections. You may include a translation of this License, and all the license notices in the Document,
and any Warranty Disclaimers, provided that you also include the original English version of this License and the original versions of those notices and
disclaimers. In case of a disagreement between the translation and the original version of this License or a notice or disclaimer, the original version will
prevail.
If a section in the Document is Entitled “Acknowledgements”, “Dedications”, or “History”, the requirement (section 4) to Preserve its Title (section 1)
will typically require changing the actual title.
TERMINATION
You may not copy, modify, sublicense, or distribute the Document except as expressly provided for under this License. Any other attempt to copy,
modify, sublicense or distribute the Document is void, and will automatically terminate your rights under this License. However, parties who have received
copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
FUTURE REVISIONS OF THIS LICENSE
The Free Software Foundation may publish new, revised versions of the GNU Free Documentation License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to address new problems or concerns. See http://www.gnu.org/copyleft/.
Each version of the License is given a distinguishing version number. If the Document species that a particular numbered version of this License “or
any later version” applies to it, you have the option of following the terms and conditions either of that specied version or of any later version that has
been published (not as a draft) by the Free Software Foundation. If the Document does not specify a version number of this License, you may choose
any version ever published (not as a draft) by the Free Software Foundation.
ADDENDUM: How to use this License for your documents
To use this License in a document you have written, include a copy of the License in the document and put the following copyright and license notices
just after the title page:
Copyright (c) YEAR YOUR NAME.
GNU Licenses 437
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.2
or any later version published by the Free Software Foundation;
with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts.
A copy of the license is included in the section entitled “GNU
Free Documentation License”.
If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the “with...Texts.” line with this:
with the Invariant Sections being LIST THEIR TITLES, with the
Front-Cover Texts being LIST, and with the Back-Cover Texts being LIST.
If you have Invariant Sections without Cover Texts, or some other combination of the three, merge those two alternatives to suit the situation.
If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel under your choice of free software
license, such as the GNU General Public License, to permit their use in free software.
438 Reference
21

Hulp nodig? Stel uw vraag in het forum

Spelregels

Misbruik melden

Gebruikershandleiding.com neemt misbruik van zijn services uitermate serieus. U kunt hieronder aangeven waarom deze vraag ongepast is. Wij controleren de vraag en zonodig wordt deze verwijderd.

Product:

Bijvoorbeeld antisemitische inhoud, racistische inhoud, of materiaal dat gewelddadige fysieke handelingen tot gevolg kan hebben.

Bijvoorbeeld een creditcardnummer, een persoonlijk identificatienummer, of een geheim adres. E-mailadressen en volledige namen worden niet als privégegevens beschouwd.

Spelregels forum

Om tot zinvolle vragen te komen hanteren wij de volgende spelregels:

Belangrijk! Als er een antwoord wordt gegeven op uw vraag, dan is het voor de gever van het antwoord nuttig om te weten als u er wel (of niet) mee geholpen bent! Wij vragen u dus ook te reageren op een antwoord.

Belangrijk! Antwoorden worden ook per e-mail naar abonnees gestuurd. Laat uw emailadres achter op deze site, zodat u op de hoogte blijft. U krijgt dan ook andere vragen en antwoorden te zien.

Abonneren

Abonneer u voor het ontvangen van emails voor uw Suse openSUSE 12.1 bij:


U ontvangt een email met instructies om u voor één of beide opties in te schrijven.


Ontvang uw handleiding per email

Vul uw emailadres in en ontvang de handleiding van Suse openSUSE 12.1 in de taal/talen: Engels als bijlage per email.

De handleiding is 5,39 mb groot.

 

U ontvangt de handleiding per email binnen enkele minuten. Als u geen email heeft ontvangen, dan heeft u waarschijnlijk een verkeerd emailadres ingevuld of is uw mailbox te vol. Daarnaast kan het zijn dat uw internetprovider een maximum heeft aan de grootte per email. Omdat hier een handleiding wordt meegestuurd, kan het voorkomen dat de email groter is dan toegestaan bij uw provider.

Stel vragen via chat aan uw handleiding

Stel uw vraag over deze PDF

Andere handleiding(en) van Suse openSUSE 12.1

Suse openSUSE 12.1 Gebruiksaanwijzing - English - 282 pagina's


Uw handleiding is per email verstuurd. Controleer uw email

Als u niet binnen een kwartier uw email met handleiding ontvangen heeft, kan het zijn dat u een verkeerd emailadres heeft ingevuld of dat uw emailprovider een maximum grootte per email heeft ingesteld die kleiner is dan de grootte van de handleiding.

Er is een email naar u verstuurd om uw inschrijving definitief te maken.

Controleer uw email en volg de aanwijzingen op om uw inschrijving definitief te maken

U heeft geen emailadres opgegeven

Als u de handleiding per email wilt ontvangen, vul dan een geldig emailadres in.

Uw vraag is op deze pagina toegevoegd

Wilt u een email ontvangen bij een antwoord en/of nieuwe vragen? Vul dan hier uw emailadres in.



Info