SULinux logo
SULinux logo
 [Home]  [Documentation]  [FAQ]  [Installation/Update]  [About SULinux]
Frequently Asked Questions
Questions
  1. What are the various Authentication options?
  2. Why is NFS disabled?
  3. WHy is autofs disabled?
  4. How do I re-enable NFS?
  5. How do I re-enable autofs?
  6. What is AFS?
  7. How do I enable AFS?
  8. How do I disable AFS?
  9. What is Kerberos?
  10. What is SSH?
  11. Who do I email for support?
  12. Is there a sulinux-help list archive?
  13. Why does libsafe make program (insert name here) coredump?
  14. What is libsafe?
  15. How can I retrieve my mail from the leland servers?
  16. How do I install Zephyr?
  17. Why did /usr/pubsw disappear when I updated via apt-get?
  18. How do I upgrade a SULinux 1.x-7.1 or RedHat 6.x-7.1 system to SULinux 7.2?
  19. How do I upgrade to SULinux 7.3 from a previous release of SULinux or RedHat Linux?
  20. I get an RPM dependency error when I try to install apt. How do I fix it?
  21. Why is NFS slow?

  1. What are the various authentication methods?
    There are two main authentication methods:
    a) local passwords - Do not use "AFS" passwords.
    b) AFS (kerberos) passwords
    Both are controlled via pam. When installing SULinux, you'll be asked if you want to use AFS passwords. This means that in /etc/pam.d/system-auth a line will be inserted that gives the following logic for login:
    • Does the account name exist? If no, you will not be able to log in
    • Is the login name "root"? If so, prompt only for local password
    • Prompt for "AFS Password", which is the kerberos password for the given ID. Note that if you duplicate a SUNeT ID on your machine, that SUNeT ID will be able to log into your system. AFS passwords are "sufficient" in the PAM sense, so if this password is correct, the person can log in
    • If the AFS password is wrong, prompt for local password.

    This may not be what you want. If you only want to use local passwords, do not use the AFS auth mechanism. Suppose you want to allow all SUNeT ID's to log in. You again use the PAM module, buth also run "authconfig" and configure hesiod support (just check it, the values should be filled in automatically). Hesiod will act as an addition to your /etc/passwd, mapping user names to home directories (AFS directories, mind you). Please see the hesiod documentation in redhat for more information on how hesiod works.

    Another possibility is you want the local users to auth using *both* their local ID and their SUNeT ID. To do this, you must edit the PAM configuration. I personally have not done this, but I believe all you should have to do is change the word "sufficient" for the PAM AFS module to "necessary". If you can confirm this, please email sulinux-help and let me know.

    The last possibility is you want leland system cluster solaris style auth, i.e. AFS passwords but reading .klogin to map user names to SUNeT IDs. Notice the subtle difference. In the default scheme, the username in /etc/passwd maps directly and automatically to a SUNeT ID for normal users. In this scheme, the username in /etc/passwd doesn't correspond to a SUNeT ID, but any principle (SUNeT ID) listed in the home directories .klogin file can log in. To enable this, replace /bin/login with /etc/leland/login.krb. NOTE: login.krb doesn't work with MD5 shadow files, so please make sure you use the old style "crypt()" passwords. Please make sure you know what you are doing, as you can mess up your system so you can only log in in single user mode until you fix it.

  2. Why is NFS/NIS disabled?
    NFS and other RPC based programs are a big security risk for several reasons. First, they have a less than admirable record. Most Linux compromises on campus come from users who have enabled NFS and other RPC services and forgot to patch them. Second, NFS and other RPC services have horrendous logging, which makes it difficult to track what is going on. Third, NFS has traditionally been hard to set up properly, though Linux is making strong in-roads in this department. Last, NFS just plain isn't needed by most people. You need not run the service if you only want to mount other hosts filesystems. You only need to run NFS if you absolutely must export one of your filesystems. Redhat (not us) by default disables NFS and their Medium or High Level firewall settings disable all RPC services, including NFS and NIS

  3. Why is autofs disabled?
    See the NFS answer above and substitute the word NFS for AutoFS.

  4. 2. How do I re-enable NFS?
    The most important step to re-enable NFS is to apply all updates to your system as detailed in the Installation/Update section.

    After installing the updates, run as root:

     # /sbin/chkconfig portmap on
     # /sbin/chkconfig nfs on
     # /etc/rc.d/init.d/portmap start
     # /etc/rc.d/init.d/nfs start
    
    You'll also need to make sure you are using the Stanford Default firewall setting in the /usr/sbin/sulinux configuration program. RedHat's settings disable inbound RPC packets by default and you must override this in /etc/sysconfig/ipchains or use the sulinux program to do this for you.

  5. How do I re-enable AutoFS?
    Again, the most important step to re-enable AutoFS is to apply all updates to the system.

    After installing the updates, run as root:

     # /sbin/chkconfig portmap on
     # /sbin/chkconfig autofs on
     # /etc/rc.d/init.d/portmap start
     # /etc/rc.d/init.d/autofs start
    
    The same issues associated with NFS firewall rulesets apply to autofs

  6. What is AFS?
    AFS is a distributed filesystem that enables co-operating hosts (clients and servers) to efficiently share filesystem resources across both local and wide area networks. AFS is provided and supported by Transarc Corporation.

    At Stanford, Leland Systems uses AFS to provide and maintain a campus-wide distributed filesystem -- the ir.stanford.edu AFS cell. This cell currently consists of twenty AFS servers, geographically distributed across campus, and one Terabyte of available diskspace, which is backed up nightly.

    Leland Systems uses this AFS cell to provide home directories for all Leland Accounts, many Stanford classes, and many Stanford University departments and campus organizations. Our AFS cell is also the home for our /usr/pubsw campus software service, which allows AFS client machines (for a variety of supported architectures) to access and use software compiled and maintained by Leland Systems personnel.

    Over a thousand machines on the Stanford campus run AFS client software, giving their users local access to their Leland Account home directory, all the software available in /usr/pubsw, and hundreds of other AFS cells worldwide.

  7. How do I enable AFS?
    First, verify that afs is installed. If the file /etc/rc.d/init.d/afs exists, it is installed on your system. If not, install it from the download page.

    To enable AFS, run as root:

        # /sbin/chkconfig afs on
        # /etc/rc.d/init.d/afs start
        

  8. How do I disable AFS?
    Disabling AFS is tricky, as once started it becomes part of the kernel. Therefore, you must:
    • touch /etc/noafs
    • reboot
    • run
      /sbin/chkconfig afs off

  9. What is Kerberos?
    Kerberos is the basis of Stanford's Campus Security Infrastructure. It provides encrypted communications channels and user and machine authentication services. The Kerberos authentication servers managed by Leland Systems keep track of all campus SunetID passwords.

  10. What is SSH?
    SSH (Secure Shell) is a secure telnet-like protocol. It encrypts your password so that eavesdroppers cannot steal it. More information on SSH is available at http://www.openssh.org

  11. Who do I email for support?
    If you have questions regarding the installation or use of RedHat linux, please consult the RedHat website at http://www.redhat.com

    If you have questions about the Kerberos, AFS, Security, or LibSafe package or other SULinux-specific question, email sulinux-help@stanford.edu

  12. Is there a sulinux-help list archive?
    There sure is! It is available in our mail archive section.

  13. Why does libsafe make program (insert name here) coredump?
    Libsafe protects against buffer overflow attacks. A buffer overflow is an exploit that executes code on the stack to give an intruder full access to your machine (usually).

    If a program isn't coded correctly, it may resemble an exploit. This is similar to a "segmentation violation" in C. Libsafe will force such a program to exit. Examples are old versions of netscape and adobe acrobat reader. Quite likely if you simply upgrade the package that is core dumping the problem will go away.

  14. What is libsafe?
    Libsafe protects against buffer overflow attacks by preloading certain dangerous C functions such as strcpy and sprintf. Libsafe will make programs exit instead of allowing them to be exploited.

    More information is available at http://www.avayalabs.com/project/libsafe/index.html

  15. How can I retrieve my mail from the leland servers?
    First, realize that only mail that is kept on one of the mail servers can be retrieved. Mail that you previous downloaded by running programs such as Eudora and pine will not be available.

    To get your mail, run:

    	$ /usr/bin/fetchmail -u (your sunet id) --ssl .pobox.stanford.edu
    	
    The first command gives you the mail server to type in for the second command.

  16. How do I install Zephyr?
    You can use apt-get as per usual to install the Zephyr packages. simply run as root:
    	# apt-get install zephyr-X11
    	
    All packages associated with zephyr will now be installed. This can be used for any package in the SULinux-specific and RedHat base repositories.

  17. Why did /usr/pubsw disappear?
    Under certain conditions, the links /usr/pubsw, /usr/newsw, etc are accidentally removed during an upgrade. To restore them, reinstall the package sulinux-afsconfig. The easiest way to do this is to run the following as root:
    # apt-get remove sulinux-afsconfig
    # apt-get install sulinux-afsconfig
    
  18. How do I upgrade a SULinux 1.x-7.1 or RedHat 6.x- 7.1 system to SULinux 7.2?
    An article covering upgrades from SULinux 1.2, 2.0, and 7.1, as well as equivalent RedHat releases, was posted on island.stanford.edu. This was put together by one of the SULinux maintainers on his security site.

  19. How do I upgrade to SULinux 7.3 from a previous release of SULinux or RedHat Linux?
    An article covering upgrades from SULinux 7.2 / RedHat 7.2 was posted on island.stanford.edu. This was put together by one of the SULinux maintainers on his security site. If you have an older release of SULinux or RedHat, see the previous question (above).

  20. I get an RPM dependency error when I try to install apt. How do I fix it?

  21. There are some problems with an updated version of RPM provided by RedHat that break dependencies in apt-get. When trying to install apt, you might see this error:

    rpm -ivh apt-0.3.19cnc55-1sp_su7x
    error: failed dependencies:
                librpm-4.0.3.so    is needed by apt-0.3.19cnc55-1sp_su7x
                librpmdb-4.0.3.so    is needed by apt-0.3.19cnc55-1sp_su7x
                librpmio-4.0.3.so    is needed by apt-0.3.19cnc55-1sp_su7x
    
    To fix this, you will need to install the latest version of apt instead of the default one provided by us. You can ftp it from linux.stanford.edu or run
    rpm -ivh ftp://linux.stanford.edu/pub/sulinux-7.2/stanford/apt-0.3.19cnc55-2sp_su7x.i386.rpm
    
  22. Why is NFS slow?

    This past weekend, the Graphics lab stumbled onto an apparent nfs bug in Redhat 7.3's new 2.4.18 kernel. This is standard on all RedHat (and thus SULinux) 7.3 systems. Apparently, an experimental patch (for 2.4.17) was applied providing NFS v3 over TCP. In that mode, a 32K buffer is a maximum. The default for UDP or TCP should be 4096K. Regardless, the kernel is attempting 32K packets over UDP (not TCP) and a lot of fragments cause the client to go to 100% of its network utilization, and the NetApp becomes unresponsive to other hosts.

    Solutions to date are to either force NFS v2 (option "v2" on mounts) and to mount affected file servers with "rsize=8192,wsize=8192". Just specifying 'v2' is not enough.

    Another solution that also seems to work wonders (I've tested it with compiles, etc) is to specify "tcp" as the only necessary option. Even at 32K packets, the NetApps work fine without performance issues when v3/tcp/32K is the applied combination.

    I'd advise all users to use tcp or enforce some w/rsize limits for NFS connections from RH 7.3 clients until a patch is posted. This is equivalent to a DoS attack.

    Update: SULinux 7.3 now provides a new kernel (2.4.18-5) that addresses this problem. Please upgrade to at least that version.



Site last modified: Wed Jun 26 12:00:00 PDT 2002