Skip to main content

Linux Configuration Files

profileSystem wide environment and startup script program.
/dev/MAKEDEVThe /dev/MAKEDEV file is a script written by the system administrator that creates local only device files or links such as device files for a non-standard device driver.
/etc/aliasesWhere the user's name is matched to a nickname for e-mail.
/etc/bootptabThe configuration for the BOOTP server daemon.
/etc/crontabLists commands and times to run them for the cron deamon.
/etc/dhcpd.confThe configuration file for the DHCP server daemon.
/etc/ethersFile for RARP mapping from hardware addresses to IP addresses. See the man page ethers(5).
/etc/exportsThe file describing exported filesystems for NFS services.
/etc/fdprm The floppy disk parameter table. Describes the formats of different floppy disks. Used by setfdprm.
/etc/filesystemsCan be used to set the filesystem probe order when filesystems are mounted with the auto option. The nodev parameter is specified for filesystems that are not really locally mounted systems such as proc, devpts, and nfs systems.
/etc/fstabLists the filesystems mounted automatically at startup by the mount -a command (in /etc/rc or equivalent startup file).
/etc/groupSimilar to /etc/passwd but for groups rather than users.
/etc/groupsMay contain passwords that let a user join a group.
/etc/gshadowUsed to hold the group password and group administrator password information for shadow passwords.
/etc/host.confSpecifies how host names are resolved.
/etc/hostsList hosts for name lookup use that are locally required.
/etc/HOSTNAMEShows the host name of this host. Used for support of older programs since the hostname is stored in the /etc/sysconfig/network file.
/etc/inittabConfiguration file for init, controls startup run levels, determines scripts to start with.
/etc/inetd.confSets up the services that run under the inetd daemon.
/etc/issueOutput by getty before the login prompt. Description or welcoming message.
/etc/issue.netOutput for network logins with LINUX version
/etc/ld.so.confConfiguration file for ld.so, the run time linker.
/etc/lilo.confConfiguration file for LILO.
/etc/limitsLimits users resources when a system has shadow passwords installed.
/etc/localtimeIn Debian the system time zone is determined by this link.
/etc/login.defsSets user login features on systems with shadow passwords.
/etc/logrotate.confConfigures the logrotate program used for managing logfiles.
/etc/magicThe configuration file for file types. Contains the descriptions of various file formats for the file command.
/etc/motdThe message of the day, automatically output by a successful login.
/etc/mtabA list of currently mounted file systems. Setup by boot scripts and updated by the mount command.
/etc/named.confUsed for domain name servers.
/etc/networksLists names and addresses of your own and other networks, used by the route command.
/etc/nologinIf this file exists, non-root logins are disabled. Typically it is created when the system is shutting down.
/etc/nsswitch.confName service switch configuration file.
/etc/passwdThe user database with fields giving the username, real name, home directory, encrypted password and other information about each user.
/etc/printcapA configuration file for printers.
/etc/profile, /etc/cshlogin,
/etc/csh/cshrc
Files executed at login or startup time by the Bourne or C shells. These allow the system administrator to set global defaults for all users.
/etc/protocolsDescribes DARPA internet protocols available from the TCP/IP subsystem. Maps protocol ID numbers to protocol names.
/etc/rc or /etc/rc.d or /etc/rc?.dScripts or directories of scripts to run at startup or when changing run level.
/etc/rc.d/rc0.dContains files used to control run level 0. Usually these files are softlink files.
/etc/rc.d/rc1.dContains files to control run level 1. Scripts beginning with an S are for start, K for kill.
/etc/rc.d/rc.sysinitInit runs this when it starts.
/etc/resolv.confConfigures the name resolver, specifying the address of your name server and your domain name.
/etc/securettyIdentifies secure terminals from which root is allowed to log in.
/etc/servicesLists the network services that the system supports.
/etc/shadowShadow password file on systems with shadow password software installed. Shadow passwords move the encrypted password files from /etc/passwd to /etc/shadow which can only be read by root.
/etc/shadow.groupSystems with shadow passwords may have this file.
/etc/shellsLists trusted shells. The chsh command allows users to change their login shell to shells listed only in this file.
/etc/skel/.profileCan be used by administrator to set the editor environment variable to some editor that is friendly to new users.
/etc/sudoersA list of users with special privileges along with the commands they can execute.
/etc/smb.confThe configuration file for setting up Samba services.
/etc/sysconfig/amdUsed to configure the auto mount daemon.
/etc/sysconfig/clockUsed to configure the system clock to Universal or local time and set some other clock parameters.
/etc/sysconfig/i18nControls the system font settings.
/etc/sysconfig/initThis file is used to set some terminal characteristics and environment variables.
/etc/sysconfig/keyboardUsed to configure the keyboard.
/etc/sysconfig/mouseThis file is used to configure the mouse.
/etc/sysconfig/network-scripts/ifcfg-interfaceDefines a network interface.
/etc/sysconfig/pcmciaUsed to configure pcmcia network cards.
/etc/sysconfig//routed Sets up dynamic routing policies.
/etc/sysconfig/static-routesConfigures static routes on a network.
/etc/sysconfig/tapeUsed for backup tape device configuration.
/etc/X11/XF86ConfigThe configuration file for the X server.
/etc/syslog.confConfiguration file for the syslogd daemon.
/etc/termcapThe terminal capability database. Describes by what "escape sequences" various terminals can be controlled. See terminfo, termcap, curs_termcap man pages.
/etc/terminfoDetails for terminal I/O.
/etc/userttyThis file is used to impose special access restrictions on users.

Comments

Popular posts from this blog

How to configure multipath Debian CentOS for IBM Storage

This detailed how to guides to achieve high availability and performance on Debian and CentOS for accessing storage space at IBM DS8300 Data Storage Systems. Tested on Debian GNU/Linux 5.x Lenny 64 bits and CentOS 5.3 64 bits running on 8 cores blades, with Host Bus Adapters Qlogic and Emulex Light Pulse Fiber Channel in deployed systems at SERPRO . Observations showed that Debian Lenny has the best performance, for our app load profile and hardware. Also, there are listed a number of previously not clearly documented critical pitfalls to avoid. STUDY whole articles, hints, implications, and cited resources before planning your deployment. Every detail matters . Before start, you must have LUNs at IBM DS8300 storage configured for high availability and performance as explained at the article How to configure maximum performance storage space for Debian GNU/Linux on IBM DS 8300 Data Storage Systems . Multipath and storage basic concepts In order t...

Squid Access Lists

Access Lists There are a number of different access lists: http_access : Allows HTTP clients (browsers) to access the HTTP port. This is the primary access control list. http_reply_access : Allows HTTP clients (browsers) to receive the reply to their request. This further restricts permissions given by http_access , and is primarily intended to be used together with rep_mime_type acl for blocking different content types. icp_access : Allows neighbor caches to query your cache with ICP. miss_access : Allows certain clients to forward cache misses through your cache. This further restricts permissions given by http_access , and is primarily intended to be used for enforcing sibling relations by denying siblings from forwarding cache misses through your cache. cache : Defines responses that should not be cached. url_rewrite_access : Controls which requests are sent through the redirector pool. ident_lookup_access : Controls which requests need an Ident lookup. always_dire...

ipsec tunnel pfSense and Centos

pfSense 1.2.3 -------- external ip: 1.1.1.1 internal ip: 172.20.1.20 internal network: 172.20.1.0/24 Centos 5.5 -------- external ip: 2.2.2.2 internal ip: 172.20.2.1 internal network: 172.20.2.0/24 pfSense config from a reset. Firewall rule to allow all ipsec communication (all protocols). pfSense ipsec config -------------------- Mode: Tunnel Interface: WAN (I'm not sure this should be WAN, but changing it to LAN makes no difference) Local subnet: 172.20.1.0/24 Remote subnet: 172.20.2.0/24 Remote gateway: 2.2.2.2 Phase 1 Negotiation mode: agressive My identifier: My IP adress Encryption algorithm: 3DES Hash algorithm: SHA1 DH key group: 2 Authentication method: Pre-shared key Pre-Shared Key: secret Phase 2 Protocol: ESP Encryption algorithms: Rijndael (AES) Hash algorithms: SHA1 PFS key group: 2   Centos ipsec config ------------------- /etc/sysconfig/network-scripts/ifcfg-ipsec0 TYPE=IPSEC ...