1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
|
# COMP-325 Assignment 3 - System Administration - mo khan (3431709)
## Lab 1
1. Research several Linux distributions (CentOS, Debian, Fedora, Gentoo, Mandriva, OpenSUSE, RedHat, Slackware, TurboLinux, Ubuntu, and so on) and recommend a distribution for each of the following applications. Explain your choice.
a. A single user working in a home office
b. A university computer science lab
c. A corporate web server
2. What is the current status of Linux kernel development? What are the hot issues? Who are some of the key players? How is the project managed?
3. Draw a dependency graph that shows which daemons must be started before other daemons on your Linux system.
## Lab 2
Linux installation can happen smoothly and automatically, but sometimes there are problems to be solved.
Write a professional report on the installation process of Linux/UNIX on your system.
Include as much of the following as is relevant to your installation.
There may be many other issues not listed below that you had to deal with.
Include those as well.
Your report should include advice to other people attempting to do the same.
1. List required hardware and the hardware provided by your system. In particular, the a. CPU
b. floppy disk drive
c. bootable CD drive
d. RAM
e. space allocated on the hard disk drive
2. Indicate software requirements according to the system you have used: a. Windows
b. stand-alone Linux
c. separate partition
d. dedicated hard disk
e. resized Windows partition
3. Provide details of CD ROM, hard disk, and mouse information: a. SCSI CD-ROM
b. swap partition
c. mouse model
d. time zone
e. the port that the mouse uses
4. Provide video and monitor details:
a. monitor manufacturer and model b. X-windows configuration
c. chipset used by the video
d. the vertical refresh rate
5. Include network configuration: a. DHCP server
b. computer name
c. domain name
d. IP address
e. the netmask
f. the broadcast address g. the NIS domain
h. the Samba server
## Lab 3
1. Study the system configuration files and answer the following questions:
a. What startup style does your system most resemble, BSD or AT&T?
b. Why? Give at least two reasons for your answer above. (Examples would be presence or absence of /etc/inittab, init.d scripts, etc.)
c. Which directory contains the rc.d (or similar file)? Explain the contents of the rc.d (or the file/s) that does the same in your setup.
d. What is stored in rc0.d? Execute the ls command while in rc0.d, and say what is common among all the files stored there.
e. What is the function of files stored in init.d and the /etc/inittab?
f. How do you enable/disable the CTRL-ALT-DELETE as an alternative to shutdown?
2. Read the main page for the shutdown command.
a. How do you shut down the system to a single-user mode? Try it and present results.
b. What’s difference between single-user mode and how the system normally runs?
c. Explain options in the command “shutdown -t 100 +3 -h”.
d. How do you boot into single-user mode?
e. What, if anything, do you notice that is different about booting into single-user mode compared to shutting down to single-user mode?
f. Shut the system down; then boot it normally. Look in the file /var/log/messages (often /var/adm/messages on some systems). How does the information in the “messages” file compare with what appears on the screen during boot?
3. Linux Startup
a. Run the dmesg command, and list which devices are assigned to each of CD-ROM, HD, and floppy disk.
b. What do you think the following (or a similar line) in dmesg output means?
Linux version 2.6.5-1.358 (bhcompile@bugs.build.redhat.com) (gcc version 3.3.3 20040412 (Red Hat Linux 3.3.3-7)) #1 Sat May 8 09:04:50 DT 2004
c. Is there an Ethernet card detected on the system?
## Lab 4
Rootly Powers and Processes
1. Use the find command with the -perm option to locate five setuid files on your system. For each file, explain why the setuid mechanism is necessary for the command to function properly.
2. Enumerate a sequence of commands that let you modify someone’s password entry, and show how you could cover your tracks. Assume you had only sudo power (all commands allowed, but not shells or su).
3. Create two entries for the sudoers configuration file:
a. One entry that allows users Matt, Adam, and Drew to service the printer, to unjam the printer, and to restart printer daemons on the machine printerserver.
b. One entry that allows Drew, Smihgr, and Jim Lane to kill jobs and then reboot the machine.
## Lab 5
1. Write a shell script to help monitor the health of your /etc/passwd file.
a. Find entries that have UID 0.
b. Find entries that have that have no password (needs /etc/shadow).
c. Find any sets of entries that have duplicate UIDs.
d. Find entries that have duplicate login names.
e. Find entries that have no expiration date (needs /etc/shadow).
|