Linux Overview. Amir Hossein Payberah

Similar documents
Linux Kernel Architecture

Unit 10 : An Introduction to Linux OS

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture

CS197U: A Hands on Introduction to Unix

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.

Example of Standard API

elan Technology White Paper Why Linux?

Computers: Tools for an Information Age

Chapter 8 Operating Systems and Utility Programs

Ubuntu Linux Reza Ghaffaripour May 2008

LSN 10 Linux Overview

4.1 Introduction 4.2 Explain the purpose of an operating system Describe characteristics of modern operating systems Control Hardware Access

Outline: Operating Systems

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

A candidate following a programme of learning leading to this unit will be able to:

Introduction to Operating Systems

Chapter 2 System Structures

Lecture 6: Operating Systems and Utility Programs

Lecture 1: Introduction to UNIX

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

Kernel Types System Calls. Operating Systems. Autumn 2013 CS4023

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

After studying this lesson, you will have a clear understanding of, what an Operating System is. functions of an Operating System

Operating System Structures

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

Basic Installation of the Cisco Collection Manager

Caligare Flow Inspector

OPERATING SYSTEMS Software in the Background. Chapter 2

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

Chapter 4. System Software. What You Will Learn... Computers Are Your Future. System Software. What You Will Learn... Starting the Computer

Upon completion of this chapter, you will able to answer the following questions:

Preparing Your Computer for LFS101x. July 11, 2014 A Linux Foundation Training Publication

Operating Systems. Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first

Chapter 5: System Software: Operating Systems and Utility Programs

SAMBA VI: As a Domain Controller

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server

CHAPTER 15: Operating Systems: An Overview

Multiprogramming. IT 3123 Hardware and Software Concepts. Program Dispatching. Multiprogramming. Program Dispatching. Program Dispatching

SOCIETIC: A Model For E-Science

In this chapter, we want to make sure that your computer (and you) is ready for the Red Hat Linux installation.

Nixu SNS Security White Paper May 2007 Version 1.2

Star System Deitel & Associates, Inc. All rights reserved.

Operating Systems OS Architecture Models

CS3600 SYSTEMS AND NETWORKS

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

SOSFTP Managed File Transfer

RecoveryVault Express Client User Manual

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

Operating System Structure

Enabling Backups for Windows and MAC OS X

Security Correlation Server Quick Installation Guide

Chapter 7A. Functions of Operating Systems. Types of Operating Systems. Operating System Basics

Web-Based Data Backup Solutions

1. Product Information

Online Backup Client User Manual

Red Hat Linux 7.2 Installation Guide

Online Backup Client User Manual Linux

24x7 Scheduler Multi-platform Edition 5.2

Centrify-Enabled Samba

CSE 265: System and Network Administration. CSE 265: System and Network Administration

Secure Access Using VPN

CSE 265: System and Network Administration

CUIT UNIX Standard Operating Environment and Security Best Practices

Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux

SAMBA SERVER (PDC) Samba is comprised of a suite of RPMs that come on the RHEL/Fedora CDs. The files are named:

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Hardware and Software Requirements for Installing California.pro

HP Education Services

CS420: Operating Systems OS Services & System Calls

Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol

Bastille Linux: Security Through Transparency

PARALLELS SERVER BARE METAL 5.0 README

Fall Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

IT Essentials II: Network Operating Systems v3.0 Scope and Sequence

Features. The Samhain HIDS. Overview of available features. Rainer Wichmann

Worms, Trojan Horses and Root Kits

Lesson 06: Basics of Software Development (W02D2

System Structures. Services Interface Structure

Oracle Virtual Desktop Infrastructure. VDI Demo (Microsoft Remote Desktop Services) for Version 3.2

Online Backup Linux Client User Manual

CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Novell Open Workgroup Suite

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Author A.Kishore/Sachin VNC Background

SOLUTIONS INC. BACK-IT UP. Online Backup Solution

Operating System Today s Operating Systems File Basics File Management Application Software

Operating System Components

OnCommand Performance Manager 1.1

VMware Server 2.0 Essentials. Virtualization Deployment and Management

Discovering Computers

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

CS161: Operating Systems

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself

Online Backup Client User Manual

Transcription:

Linux Overview Amir Hossein Payberah payberah@gmail.com 1

Agenda Linux Overview Linux Distributions Linux vs Windows Linux Architecture Linux Security 2

What is Linux? Similar Operating System To Microsoft Windows, Sun Solaris, Mac OS But It Is Very Unique. Linux Source Code Is Completely Free! Many Distributions Built For All PC Architectures And Designs. Reliable, Efficient, Gaining Popularity. 3

Linux History History and People Richard M. Stallman No Free Unix Linus Travolds Alan Cox 4

Why Linux? It s free! Open Source (modifiability, extensibility, ) Works on several platforms Robustness Widespread Usage Tons Of Applications (Free). 5

Linux Features Monolithic kernel (but well-defined interfaces) Multi-tasking Multi-user capability Architecture Independence (PCs, Alpha, Sparc, ) Support for Posix standard Several Executables formats Several File Systems Several network protocols 6

Agenda Linux Overview Linux Distributions Linux vs Windows Linux Architecture Linux Security 7

Linux Distributions 8

Rank of Distributions 9

Debian Advantages: Stable server system Suitable for learning and engineering purposes Disadvantages: Non-friendly Detailed administration and installation 10

Mandrake Advantages: Excellent installer GUI Ease of administration Proper distribution for Desktop clients Disadvantages: Drawback in terms of software as a server 11

RedHat Advantages: Best known Linux distribution in corporate market Supported by the majority of software vendors Service level and support agreement Suitable for both desktop clients and servers Easy installation and administration 12

Suse Advantages: Widely used Linux distribution in corporate market Supported by the majority of software vendors Service level and support agreement Suitable for both desktop clients and servers Easy installation and administration Excellent graphical management tool both for administrators and end-users. 13

Which Distribution? SuSE is advised for new Linux users. Desktop users will like it. RedHat Server Edition is the best solution for servers. 14

Agenda Linux Overview Linux Distributions Linux vs Windows Linux Architecture Linux Security 15

Fundamental Difference between Linux & Windows One fundamental difference between the two systems is the fact that Linux is "open source". This means that unlike Windows where you only get access to the compiled programs that you run on your machine, with Linux you also get the original computer code to examine and tweak (modify) at your leisure. This also goes to show that Linux users are more advanced 16

Comparing Applications Linux falls short in the number of different applications available for it. There are much more various applications available for Microsoft since the population of Window s users is greater than Linux s. 17

Comparing Applications (Cont.) Linux programs are distributes freely since they are not developed by commercial software companies, but instead are created under the GNU Public License, which makes the software free Linux software lacks the GUI and is therefore not liked by many users Windows has its own share of problems the fact that some software is not compliant for different versions of windows (i.e. Windows 95/98) and that many times the GUI concept is overused such that command arguments cannot be passed to the program 18

Cost Comparison (in 1999) Item Server OS 10 Client access 10 Workstations OS Office Suite Total Linux $30 0 0 $1690 $1720 NT $700 $2700 $370 $4080 $9730 19

Comparing GUI Linux contains X-Windows with many interfaces GDK KDE Linux offers a choice of many desktops thus allowing the user to work in different windows on different desktop for convenience Windows, on the other hand, is limited to the way the application windows are laid out on the screen Windows GUI also has been known for its large memory requirements, where it usually uses a huge chunk of RAM for visual components 20

Linux GUI 21

22

Linux advantages in Kernel and the OS environment Linux support multiple architecture. Linux program installation seems to be easier since it only requires a restart when hardware device has been changed. Linux supports multiple copies of the Kernel on the system such that if an error is encountered and the Kernel becomes corrupted, a different copy of the Kernel can be used to boot up the system. 23

Security Comparison Linux seems to be more prepared for protecting itself because of the beginning developments of Linux, UNIX, and FreeBSD which were aimed at top notch security Linux allows does not create registry keys in a way Windows does allowing a user to browse installed components registry keys, which contain important information Linux is more virus proof since viruses malicious programs either cannot be run automatically on the Linux machine Windows is often known for a large amount of loop holes 24

Reliability Comparison OS it must not crash, even under extreme loads. OS should process requests even if the operating system or hardware fails Windows seems to be less stable even though the latest versions of Windows 2000 and XP are far more improved than the incredibly buggy Windows 95 25

Agenda Linux Overview Linux Distributions Linux vs Windows Linux Architecture Linux Security 26

What is Kernel? Modules or sub-systems that provide the operating system functions. The Core of OS 27

Type of Kernel Micro kernel (Modular kernel) Monolithic kernel 28

Micro Kernel It includes code only necessary to allow the system to provide major functionality. IPC Some memory management Low level process management & scheduling Low level input / output Such as Amoeba, Mach and 29

Monolithic Kernel It includes all the necessary functions. Such as Linux and 30

Monolithic vs Micro Kernel Micro Flexible Modular Easy to implement Monolithic Performance 31

Kernel Architecture User Space System Call Kernel Space Hardware 32

User Space The User Space is the space in memory where user processes run. This Space is protected. The system prevents one process from interfering with another process. Only Kernel processes can access a user process 33

Kernel Space The kernel Space is the space in memory where kernel processes run. The user has access to it only through the system call. 34

System Call User Space and Kernel Space are in different spaces. When a System Call is executed, the arguments to the call are passed from User Space to Kernel Space. A user process becomes a kernel process when it executes a system call. 35

Kernel Functional Architecture File System Process Management Device Control Memory Management Networking 36

Kernel Functional Architecture 37

File System It is responsible for storing information on disk and retrieving and updating this information. It manages all the different file system. In Linux everything is file. 38

Process Management The Unix OS is a time-sharing system. Every process is scheduled to run for a period of time (time slice). Kernel creates, manages and deletes the processes 39

Device Control On of the purpose of an OS is to hide the system s hardware from user. Instead of putting code to manage the HW controller into every application, the code is kept in the Linux kernel. It abstracts the handling of devices. All HW devices look like regular files. 40

Memory Management Physical memory is limited. Virtual memory is developed to overcome this limitation. 41

Networking Most network operations are not specific to a process: incoming packets are asynchronous events. The packets must be collected, identified, and dispatched before a process takes care of them. 42

Agenda Linux Overview Linux Distributions Linux vs Windows Linux Architecture Linux Security 43

Security Setup Boot Security Kernel Security Operating System Security User and Group Security Root Security File System Security Application Security Network Security 44

Boot Security Boot configuration is decided by LILO (Linux Loader) or GRUB (Grand Unified Boot Loader) Set boot loader password Set secure permission for configuration files (600) 45

Kernel Security One of the most important ways to keep Linux secure is to ensure a patched kernel Check your kernel version Third-party kernel patches for enhanced security: Linux Intrusion Detection System for en- suring integrity of critical files Secure Linux Patch prevent common buffer overflows, and simple security measures 46

Operating System Security Check processes Check installed software Check Cron and At Both can be misused to install time-bombs on the system. Do Linux auditing Using syslogd Recent logins Last login time for all users Last failed logins Security related events 47

User and Group Security User accounts are created in /etc/passwd Hashed passwords, password and account lockout policies are in /etc/shadow No dormant or generic accounts present All system (non-user) accounts have /bin/false for the shell Every account in passwd has a corresponding entry in shadow Only one line contains 0 in the uid field in the passwd file 48

Root Security No user must login directly as root Administrators must login with their own accounts, and then use su to become root. This ensures accountability Viable alternative is the sudo utility. 49

File System Security Unix Permissions are applicable to three entities: Owner of the file (everything in Unix is a file) Group owner of file Everyone else Three main permissions apply, with numeric representations Read = 4 Write = 2 Execute = 1 50

File System Security (Cont.) Disk usage can be periodically verified SUID and SGID files are executables that can be executed by anyone, but they execute with privileges of owner (usually root) or group very critical checks! File Integrity can be verified: Size and timestamp can be modified to fool the auditor MD5 hashes secured method, but tedious 51

Application Security Linux systems can be used as File Servers Samba Windows-compatible file server Print Servers lpd, cups, etc. Mail Server Sendmail, Qmail, Postfix VPN Server FreeS/WAN Databases PostgreSQL, MySQL, Oracle DNS Servers BIND LDAP Servers Time Servers 52

Network Security Services are started by /etc/rc.d scripts and xinetd Xinetd services are configured by individual files in /etc/xinetd.d/ Close unnecessary network connections Entries in /etc/hosts.equiv and /etc/hosts.lpd are critical They allow users from those hosts to connect without supplying a password! 53

Linux Security Conclusion Linux is not secure in default configuration Security can be added to a very high level, but must be balanced with functionality The correct Linux distribution must be chosen, and minimum installation done Patches must be diligently applied Syslog logs must be exported and analyzed periodically Network Services must be kept to a minimum User and groups must be periodically audited File/folder access control lists must be set File Integrity software may be used in high-security installations Application-specific security measures are also a must 54

Questions Comments 55