Difference between revisions of "OPS235 Lab 5 - Fedora17"

From CDOT Wiki
Jump to: navigation, search
(OPS235 Lab 5 - Loopback Filesystems, Archives, Compiling from Source)
Line 1: Line 1:
 
=OPS235 Lab 5 - Loopback Filesystems, Archives, Compiling from Source=
 
=OPS235 Lab 5 - Loopback Filesystems, Archives, Compiling from Source=
 
+
[[Category:OPS235]][[Category:OPS235 Labs]]
  
 
==Objectives==
 
==Objectives==

Revision as of 19:27, 14 February 2010

OPS235 Lab 5 - Loopback Filesystems, Archives, Compiling from Source

Objectives

  1. To create and use loopback filesystems in read-write mode
  2. To create and use archive files (tar and tar.gz)
  3. Compiling software from source code
  4. Customizing system startup


References

Required Material

  • SATA Hard Disk with Fedora 12 (the same one used for Lab 3 and 4)
  • Lab log book

Prerequisites

  • Completion of Labs 1-4

Introduction

There are two techniques used to place multiple files within one file: the first is to create a filesystem within a file, and the second is to use an archive program to create an archive file. Archive files are often used to contain source code for software; in this lab you will also be compiling software from a source code archive. Finally, you will modify your system startup to eliminate unnecessary services and configure your system to automatically mount a partition.

Investigation 1: How do you create and use a filesystem in a regular file?

Note.png
Use fedora3
Perform these steps in the fedora3 virtual machine.
  1. Login using your Learn ID
  2. Create an empty file that is exactly 3 MB in size:
    • dd if=/dev/zero of=/tmp/fstest bs=1k count=3072
  3. How does this command ensure that the file is 3 MB in size? What is in the file at first?
  4. Create an ext3 filesystem within the newly-created file /tmp/fstest. Note the warning message/question that appears
  5. Mount the filesystem (remember to use the loopback option; refer to Lab 1 if required). Use a mountpoint of your choosing.
  6. Copy the files /etc/services and /etc/protocols to the filesystem mounted in the previous step
  7. Unmount the filesystem
  8. Test your filesystem to be sure that the files /etc/services and /etc/protocols were in fact copied into the filesystem within the file named /tmp/fstest.
  9. How much space is left in that filesystem? (Hint: df -h).

Make sure that your lab notes answer the Investigation 1 question.

Investigation 2: How do you create an archive file?

Note.png
Use fedora3
Perform these steps in the fedora3 virtual machine.
Important.png
Warning!
Don't miss the . at the end of the tar commands below! It specifies what should go into the archive: the contents of the current directory.
  1. Change your working directory to /usr/share/doc/sudo*
  2. Use the tar (tape archiver) command to create an archive file named /tmp/archive1.tar
    • tar cvf /tmp/archive1.tar .
  3. What do the options c, v, and f mean?
  4. Record the archive file size.
  5. Compress the file using gzip:
    • gzip /tmp/archive1.tar
  6. Record the archive file size after compression.
  7. Make sure you're still in /usr/share/doc/sudo* and then create a compressed archive:
    • tar cvzf /tmp/archive2.tgz .
  8. What does the z option do?
  9. Compare the sizes of /tmp/archive1.tar.gz and /tmp/archive2.tgz. Why are they so close in size?

Answer the Investigation 2 question.

Investigation 3: How do you restore files from an archive?

Note.png
Use fedora3
Perform these steps in the fedora3 virtual machine.
  1. Create the directory /tmp/extract1 and make it your current working directory (change into that directory).
  2. Unzip the first archive you created:
    • gunzip /tmp/archive1.tar.gz
  3. Extract the files from the first archive:
    • tar xvf /tmp/archive1.tar
  4. Are all the files there?
  5. Compare /tmp/extract1/README and /usr/share/doc/sudo*/README. Are they exactly the same? Why?
  6. Create the directory /tmp/extract2 and make it your current working directory.
  7. Extract the files from the second archive:
    • tar xvzf /tmp/archive2.tgz
  8. Note that this time a separate gunzip command was not needed. Why?
  9. Compare the README file in this directory with the original file. Are they exactly the same?

Answer the Investigation 3 question.

Investigation 4: How do you build software from source code?

Note.png
Use fedora2
Perform these steps in the fedora2 virtual machine.
Note.png
Compiling requires the correct tools to be installed.
In order to build software from source code, you must have the appropriate software development tools (such as make and gcc) and libraries (such as GTK) installed. The required tools will vary depending on the computer languages used in the software being built.
Important.png
Software Development Tools Required
You may need to install gcc (GNU C Compiler) and ncurses-devel (Development Library) in order to complete this investigation successfully. Use yum to install these packages if you get an error message saying the cc command was not found or the ncurses library is not found.
  1. Go to the directory /tmp
  2. Use the wget command to download the "tar ball" that contains the source code for the NLED text editor.
  3. Extract the files. Change to the newly-extracted directory (/tmp/nled-2.52)
  4. Check to see if there is a file named configure. If so, run it; if not, skip this step. (Most but not all source code archives contain this file)
  5. Check to see if there is a file named Makefile or makefile. If so, type the command:
    • make
  6. What does make do?
  7. Some software distributed as source code can automatically install itself. Try this command:
    • make install
  8. Most but not all source code archives include the capability of installing themselves this way.
  9. If the command make install does not work (how can you tell?), copy the nled program manually:
    • cp nled /usr/local/bin
  10. Test nled to make sure it works.

Answer the Investigation 4 question.


Investigation 5: How do we turn system services on and off?

Note.png
Use fedora2
Perform these steps in the fedora2 virtual machine.
Important.png
Security Advice
We have seen that maintaining unneeded users and groups can be a security risk due to the unnecessary increase in the complexity of your system. Similarly, it is also unnecessarily hazardous, and even more so, to leave unneeded services running. In this investigation, we will learn how to control services, and turn off those that we think are not necessary.
  1. Determine your current runlevel using the runlevel command.
  2. Change to the appropriate startup directory in a terminal window. For example, if your runlevel is 4, change to /etc/rc.d/rc4.d
  3. Observe the names of the symbolic links in that directory.
  4. Where do the links link to?
  5. Run the menu option System>Administration>Services. You will then see the Service Configuration screen.
  6. Find the bluetooth service and select customize from the tool bar. and deselect the checkbox for your runlevel from step 1. Quit the app.
  7. Return to the terminal window you used in Step 2. Get a listing of the symbolic links in the startup directory. Is it any different from what you observed previously?
  8. Using the Service Configuration screen, re-enable the bluetooth service.
  9. Check the symbolic links again. What has changed this time?
  10. Run this command:
    • chkconfig bluetooth off
  11. Now what has changed in the directory?
  12. Run this command:
    • chkconfig bluetooth on
  13. Now what has changed?
  14. Run the command:
    • chkconfig --list
  15. What does the output show?
  16. What is the relationship between the Service Configuration tool, the symbolic links in the startup directory, and the chkconfig command?
  17. You can also use chkconfig to set services to be on or off for certain runlevels. For example, to turn httpd on for runlevel 4, we issue the command:
    • chkconfig --level 4 httpd on
  18. To turn it off, we type:
    • chkconfig --level 4 httpd off
  19. To increase your computer's security, make sure these services are disabled:
    • btseed, bttrack, cups, irda, mdmonitor, netfs, nfs, nfslock, pcscd, rpcgssd, rpcidmapd, rpcsvcgssd, sendmail, ypbind.
Note.png
Carefull
You should understand that while most services in this list are often not needed, or are needed under circumstances different than those which occur here, there may be situations in which some of them are required, and it may be up to you as an administrator to determine which services are needed, and which should be turned off.

Answer the Investigation 5 question.


Investigation 6: How do we automatically mount a new partition in Fedora?

Note.png
Use fedorahost
Perform these steps on the Fedora Host.
  1. Create the empty directory /lab5
  2. Reformat /dev/sda5 as ext3
  3. Check the man page for /etc/fstab by entering the command <cdoe>man fstab</code>
  4. Edit your /etc/fstab file to mount the partition /dev/sda5 to /lab5
  5. Issue this command:
    • mount -a
  6. What does that command do?
  7. Confirm that the partition mounted and copy some files to it.

Answer the Investigation 6 question.

Completing the Lab

Arrange evidence for each of these items on your screen, then ask your instructor to check each item:

  1. [ ] /tmp/fstest filesystem counted with files copied to it.
  2. [ ] nled is installed
  3. [ ] Correct services are disabled
  4. [ ] /lab5 has an entry in /etc/fstab

Preparing for the Quizzes

  1. What is the advantage of disabling services such as bluetooth?
  2. What is the difference between a .tgz file and a .tar.gz file? What do these stand for?
  3. How do you ensure that a filesystem is mounted every time the system is started?
  4. How is creating and using a filesystem in a file different from creating and using a filesystem in a block device (such as a partition)?
  5. What is source code?
  6. How do you build software from source code?
  7. Which is preferred: installing from an RPM file, or installing from source code? Why?
  8. How do you use chkconfig?
  9. The startup directory for each runlevel contains symbolic links. Where are the targets of the symbolic links?
  10. When you use the menu option System>Administration>Services, what program is run?
Important.png
Backup your work
Backup your disk images for fedora2 and fedora3 Virtual Machines.