350 likes | 463 Views
Lecture 11: Sys Admin-C. System Updates Operating System Programs User/Group Creation/Deletion UID/GID Limits wrt Permissions. System Updates. From time to time, operating systems need to be updated Kernel core updates Kernel module updates 3 rd party software also needs updated
E N D
Lecture 11: Sys Admin-C • System Updates • Operating System • Programs • User/Group Creation/Deletion • UID/GID • Limits wrt Permissions
System Updates • From time to time, operating systems need to be updated • Kernel core updates • Kernel module updates • 3rd party software also needs updated • What mechanisms do we use to perform these updates?
Windows • Microsoft uses Windows update • What does it update? • Kernel core? • Kernel module updates? • 3rd party software?
Windows • Microsoft uses Windows update • What does it update? • Kernel core? Yes • Kernel module updates? Yes • 3rd party software? Some • Microsoft products
Windows • So how do non-Microsoft products get updated?
Windows • So how do non-Microsoft products get updated? • They self-update • User manually checks • Software checks on launch • Software updated via daemon • Pros/cons of each?
Linux • What mechanism does Linux use?
Linux • What mechanism does Linux use? • Package manager • Debian-based apt-get • RPM-based rpm/yum • There are GUI front-ends to these tools
Linux • What do these tools update?
Linux • What do these tools update? • “Everything”! • New kernels • Module updates • 3rd party software • 3rd party software • gedit • firefox • libjpeg • kronos • libcurl • …
Linux • There are things not included • Netbeans • … • For things that are included, where are updates coming from?
Linux • There are things not included • Netbeans • … • For things that are included, where are updates coming from? • Repositories!
Repositories • Each is a server that hosts software packages • Each hosts a “type” of update
Repositories • core • It’s the stuff required to run an OS • Also includes some networking • Allows connecting to internet (repo access) • extra • Stuff that is useful, but not entirely required • X11 stuff (GUIs are necessary) • Development tools • etc
Repositories • community • Community-based packages • Darwinism is controlling principle • They were essentially public packages in another repo • Became popular enough that a “Trusted User” brought it in here • multilib • Tools for building 32-bit libraries on 64-bit systems • “wine” is in here
Repositories • testing • Packages that will go into ‘core’ or ‘extra’ repos • They are put here because they need the bugs worked out first • community-testing & multilib-testing • Packages for ‘community’ & ‘multilib’
Repositories • These 7 are the “official” repositories for Arch Linux • Many servers “mirror” these repos • They copy the official repo and share • There are other repositories out there • You can enable them and then check stuff out • rpmforge, Nvidia, Dag RPM, etc
Users/Groups • Let’s do Windows first because it’s quick and easy. • 2 types of users • Administrator • Does lots of nifty admin-y things • Limited User • Doesn’t do many nifty things • Usually just wrecks the system
Linux Users/Groups • Usernames aren’t usernames • It’s an alias to a user id (UID) • On another computer, your same username may have a different UID • When you do something on your system, you do it with a UID • Usually, this is your own UID
Linux groups • They work the same way • Now it’s a group ID (GID) • We know we can join multiple groups • So how does this work?
Linux groups • They work the same way • Now it’s a group ID (GID) • We know we can join multiple groups • So how does this work? • We have a primary GID, and then other GIDs.
Username/Password Info • So where all this UID/GID stuff stored? • /etc/passwd • Let’s take a look at it!
/etc/passwd • Username
/etc/passwd • Password • ‘x’ means it’s encrypted in /etc/shadow
/etc/passwd • User ID
/etc/passwd • Group ID
/etc/passwd • Miscellaneous info
/etc/passwd • Home directory
/etc/passwd • Default shell
/etc/shadow • I won’t show you mine • It has my encrypted password • It’s encrypted. Why is the bearded man still squeamish about it?
/etc/shadow • I won’t show you mine • It has my encrypted password • It’s encrypted. Why is the bearded man still squeamish about it? • There is no encryption that can’t be broken • Brute force • Educated guess (dictionary, birthdates, etc)
/etc/group • Group name • Password • Group ID • Group list (members)
Creating User/Group useradd -d /my/home/dir -g myGroup -s /bin/shuserName