NFS,NIS,SAMBA,POSTFIX,SENDMAIL,QMAIL

What is NFS?

NFS stands for Network File System. NFS was originally developed by Sun Microsystems in the 1980's. NFS allows remote hosts to mount file systems over a network and interact with those file systems as though they are mounted locally. This enables system administrators to consolidate resources onto centralized servers on the network.

Which NFS versions are available?

  • NFS Version 2
  • NFS Version 3
  • NFS Version 4

What is different between NFS Version 2 & 3 ?

NFS 2 default 8kb transfer rate, it did not check the authentication at the time connection. Client wants to access unauthorized file it shows error messages like "write error","read error" nfs 3 32kb transfer rate. It check at the time connection- ACL Support

What is the role of "all_squash" option?

Treat all client users as anonymous users. Map all user and group IDs to the anonymous user and group ID.

What is the role of "root_squash" option?

All requests from the user root are translated or mapped as if they came from the user anonymous (default).

Explain "exportfs" command?

The exportfs command is used to maintain the current table of exported file systems for

Difference between nfs soft and hard mounting points?

Hard mount option:- If the client fails to access the server, then connection hang it, after the system up then it access the server. Soft:- If the client failed to connect the server it Immediately gives the error report, and close the connection.
To retrieve a list of clients connected to the NFS server use show mount command from Shell prompt. Showmount -a

Name of the configuration file for NFS server?

     /etc/exports/

Can we grant access based on user name and password?

No, access is granted only for IP address

Explain command /usr/sbin/exportfs -f ?

It will flush everything out of the kernel export tab

Explain Hard and Soft Mounting in NFS?

If a file request fail, the NFS client will report an error to the process on the client machine requesting the file access. If it cannot be satisfied the it quite. This is called Soft mounting.
If a file request fails, NFS client will report an error to the process on the client machine requesting the file access. If cannot be satisfied, then it will not quit until the request if satisfied. This is called hard mounting.

What is portmap?

The portmapper keeps a list of what services are running on what [ports .The list is used by a connecting machine to see what ports it wants to talk to access certain services.

Which SELinux ports Samaba server works?

Samba_share_t

On which Ports SAMBA server works?

  • UDP port 137 for NetBIOS-ns, NETBIOS name Service
  • UDP port 138 for netbios-dgm, NetBIOS Datagram service
  • TCP port 139 for netbios-ssn , NETBIOS session service
  • TCP port 445 for microsoft-d, Microsoft domain service

What are the Security or Authentication mode for SAMBA server?

  • ADS
  • DOMAIN
  • SERVER
  • USER
  • SHARE

What are the SAMBA server types ?

  • Primary Doman controller
  • Backup Domain controller
  • ADS domain controller

Which protocol SAMBA Server uses?

SMB, which stands for server Message block, is a protocol for sharing printers, serial ports and communication abstraction such as named pipes and mail slots between computers.

How SMP protocol works?

There will be three stages in creating SM connection between a client and specific shares on the server The first stage in connecting to an SMB share is to negotiate the SMB protocol dialect to use. IN the request packet the client send a text listing all the SMB dialects that it understands. The server selects the most advanced protocol that it knows and responds to the client specifying the protocol number from the list .At this point the client and server have agreed SMB commands can be used for the remainder of the conversation.
The second stage is to create a session connection between the client and server. To do this the client issues a session setup request .which included a surname and some proof of validity such as password .The server attempts to validate requesting user. IF successful the server then returns a session UID to client .This UID is unique for each session and has no relation to the server internal representation of user.
Third stage before access to file on a remote share is allowed si for the client to make successful tree connection to the shared resource .The client sends to the server a tre connect request, which includes the UID previously issued by the server .At this stage the server verifies that the authenticated user is authorized to access the requested resource. If the user has sufficient privileges to access the share, the client is issued a tree connection ID. The TID is used in all request files contained in the resource to which the TID referees.

How many Section Samba Configuration File (Smb.conf) contains?

  • [Global] - Contains Settings that determines samba overall behavior
  • [Homes]- A default share for providing a home directory for all users
  • [Printers] - A default share for Exporting All printer on the host via CIFS.

What is SWAT?

Swat is GUI based administration toll for Samba

What is the roles for NTLM?

The chanllange/repsonse authentication protocol available to windows clients and server for validating connection request.

What is nbd daemon?

This daemon handles all name registration and resolution request .It is the primary vehicle involved in network browsing .It handles all UDP based protocol. The nmbd daemon should be first command to start as a part of the samba start up process.

What is smdb daemon?

This daemon handles all TCP/IP based connection services for file and print based operation .It also manages local authentication. It should be started immediately following the start up of nmbd.

what are the daemons running In NIS? how to do u create NIS users and update Maps?

Below daemons will run the NIS
  • ypservd
  • ypxfrd
  • yppasswd
  • ypbind

What is the difference between TFTP and FTP servers?

Both are file transfer servers but slight difference is TFTP server uses UDP protocol and FTP uses TCP protocol. TFTP is good for slow connection paths.

What is the port no for FTP?

20 for Data and 21 for Control(normally when an interviewer ask's ftp port number just say 21.

What is the port no for TFTP?

How to restrict users to their home directories?

By setting up "chroot_local_user=YES".

How to restrict total number of users accessing FTP server?

If Vsftpd is running under xinted service, then you can use xineted to get per-service per IP connection limits or If you run vsftpd in "standalone" mode with the "setting listen=YES", then you can investigate the setting (e.g.) : "max_clients=10"

I want to copy multiple files with out prompting for any info, how can I do that one?

Simply do "ftp -i ftpserver" this command will suppress any info displayed on ftp server or you can just type prompt ftp prompt to suppress info messages have a look here.

Some times Local users cannot log in. How to resolve this issue?

Check "local_enable=YES" in your /etc/vsftpd/vsftpd. conf to allow local users to log in.

In which port telnet is listening?

23

How do we integrate with LDAP( Lightweight Directory Access Protocol )users and login?

Use vsftpd's( Very Secure FTPD) PAM(Pluggable Authentication Modules) integration to do this, and have PAM authenticate against an LDAP repository.

What is sand witch configuration in qmail?

Qmail + Clam + Spamassassin- This is normally called Sandwitch configuration in qmail.

Advantages of Qmail?

More secure, better designed, modular, faster, more reliable, easier to configure, don’t have to upgrade it every few months or worry about being vulnerable to something due to some obscure feature being enabled qmail supports host and user masquerading, full host hiding, virtual domains, null clients, list-owner rewriting, relay control, double-bounce recording, arbitrary RFC 822 address lists, cross-host mailing list loop detection, per-recipient checkpointing, downed host backoffs, independent message retry schedules, etc. qmail also includes a drop-in “sendmail” wrapper so that it will be used transparently by your current UAs.

What is the difference between POP3 and IMAP ?

The Difference
POP3 works by reviewing the inbox on the mail server, and downloading the new messages to your computer. IMAP downloads the headers of the new messages on the server, then retrieves the message you want to read when you click on it.
When using POP3, your mail is stored on your PC. When using IMAP, the mail is stored on the mail server. Unless you copy a message to a “Local Folder” the messages are never copied to your PC.
Scenarios of Use
POP3 You only check e-mail from one computer. You want to remove your e-mail from the mail server.
IMAP You check e-mail from multiple locations. You use Webmail.

How to block and open relay?

Open relays are e-mail servers that are configured to accept and transfer e-mail on behalf of any user anywhere, including unrelated third parties.
The qmail-smtpd daemon will consult the rcpthosts control file to determine valid destination addresses, and reject anything else.

Which Groups and Users are required to start QMAIL Server?

Groups :- nofiles , qmail Users :- qmaild alias qmaill qmailp qmailq qmailr qmails

What is the role of "qmail-send" process ?

qmail-send - deliver mail messages from the queue

How to check, qmail server is up or down?

We can use qmailctl command to check the status of qmail server.
       qmailctl stat
         /service/qmail-send: up (pid 30303) 187 seconds
         /service/qmail-send/log: up (pid 30304) 187 seconds
         /service/qmail-smtpd: up (pid 30305) 187 seconds
         /service/qmail-smtpd/log: up (pid 30308) 187 seconds
         messages in queue: 0
         messages in queue but not yet preprocessed: 0

On which port Send mail and SSL works?

By default Sendmail uses TCP and UDP port 25 for non encrypted transfers. If the sendmail server is configured to use SLL for encrypting email Send and received it uses port 465.

Explain use of trusted-user file?

List of users that can send email as other users with out a warning including system users such as apache for the Apache http server

Explain the use for “local-host -name" ?

If the mail server should be known by different hostnames, list the host names in this file, one line per hostname.

Explain the use of access file?

Can be used to redirect email from one user to another. By default it included redirects for system accounts to the root user.

What is the role of MUA?

An MUA (Mail user agent) with access to the mail box file, directly or through a network file system, can read message form the dist and display them for the user.

What is the location of postfix mail server queue?

By Default the post-fix mail ques are /var/spool/postfix directory. Message queue is created as a separate sub directory within this directory .Each message is stored as a separate file in the sub directory, using unique identifier for the file name.

What is LMTP?

The local Mail Transport Protocol is different mail transport protocol described in RFC 2033.LMTP utilizes as a set protocol similar to SMTP for delivering messages to the local host .Postfix can be configured to deliver messages to local users.

What is canonical Table?

The clean up program uses the canonical table to rewrite message address contained in the message header .The mail administrator can use one canonical lookup table for both received messages and sent messages or separate tables for each.

What is the difference between Postfix and Sendmail?

The mail difference between Postfix and Sendmail is Postfix Modularity .Just as the Unix system broke up email functionality between modules, postfix extends that practice to the MTA program. This allows each modular program to be smaller and quicker than on e large.
Postfix is more secure than sendmail.Postfix uses separate userID to be adds to the mail server. Each module runs under this user id.

Comments

  1. Hello There,


    Linux Administration being contrived to exist for many projects simply so it can be run will be the first to hit the wall, but those projects where the functions to make existing transactions cheaper in real world applications will find the elusive real world demand.

    I just got Linux for my Samsung chrome book, I used Crouton with the interface xfce. However, when I turn off the device and turn it on I enter a factory reseted device and have to redo the whole process. I'm I doing something wrong or do I have to redo everything every single time?
    Thank you very much and will look for more postings from you.


    Merci,
    Abhiram

    ReplyDelete

Post a Comment

Popular posts from this blog

Docker ,MakeFile and Jenkins pipeline

Networking Basics

Continuous Deployment - Jenkins , Capistrano And Docker.