|Historical||Debian information||What now?|
|General information||Installing Debian||Help for beginners|
|Further information||Network addressing||FOSS index|
|Distributions||Using Knoppix||Main site index|
This is not intended to be more than a few notes for information, and it is important to read the latest full instructions provided for your microprocessor group on the official Debian website http://www.debian.org. together with information about other installation methods, known problems and work-arounds, (see "errata" and the Release Notes). There is additional more detailed information in http://www.debian.org/doc/manuals/debian-handbook/
The installation process is designed to automatically configure as much as possible yet allow for personal preferences, a wide range of hardware, and a huge range of possible uses.
There are general guides and HOWTOs which are not specific to Debian at The Linux Documentation Project, http://www.tldp.org
It is possible to view the installation log later, but you may wish to make paper notes as you proceed. Installation pages may carry important information for possible reconfiguration. You may wish to treat your first installation as just a test, to be repeated fairly soon afterwards, perhaps selecting a different desktop to try. The installer is modular, and may be available complete at the start of the process, or various components may be obtained via a network connection during the installation.
A new installer was designed for Debian 3.1 "Sarge" which was easier to use than that provided with the previous 3.0 "Potato". Textual information and instructions are shown on screen. Later versions are provided with each Debian release. It is still under development, and the installer development team request an installation report for all attempts at installation, whether failed or successful, using the facility provided which can add details of the hardware involved.
There are several ways to start the installation, including a facility to start an installation from within a running Microsoft system, a "live" image with a specific desktop version or a small "netinst" CD image plus a network or internet "mirror" server, or the first of a full set of installation BD's, DVD's, or CD's if you do not have a convenient fast internet connection. The BIOS provided with the computer may allow booting from USB.
Debian installers are provided for many different processor types, including the 32-bit x86 AMD/Intel compatibles, and 64-bit AMD/Intel compatibles which use pairs of 32-bit units on the same chip, while the multi-arch "netinst" can be used to install both 32-bit and 64-bit versions.
The 64-bit version also carries facilities to run 32-bit software.
Installation information is normally supplied on the installation medium and can be read by opening, not running, the installer medium from any operating system.
Although it is usually possible to upgrade an earlier distribution of Debian to the next, the effective limit may be reached when later versions require more RAM than can be installed in older hardware.
The initial base system is now so large that it will not fit on a single CD with all possible basic options. Alternative versions are available for use from a USB memory or an installation from an internet mirror site or a local network server. The choice of netinst images includes a multi-arch version containing software required for both "amd64" 64-bit and "i386" 32-bit systems (although the Linux kernel no longer provides software for 386 or 486 processors, so the 32-bit version is often referred to as "x86")
Images can be downloaded either as complete direct ISO images, assembled from a torrent data stream, or built from a "jigdo" (jigsaw downloader) skeleton file plus the individual software packages. The jigdo system is preferred because there are many more software mirror sites providing individual packages than those that are able to provide the full range of ISO images.
If you intend to install Debian on to more than one computer, software is available to build and maintain an up-to-date local partial mirror of the software. There are several mirror sites that provide either complete ISO images or the individual software packages, while the facilities to assemble and verify images are available using ftp or http from cdimage.debian.org/cdimage/ soon to be re-organised and re-named as get.debian.org. The software is protected by digital signatures to ensure that it is neither corrupted nor out of date when used. The main mirrors are updated several times per day, and a file may be rejected even if the package has not been updated recently but the digital signature is not up to date.
The software supplied as part of a full set of disks is arranged in priority order, most requested first. Disk images are supplied as complete ISO images, to be copied direct to disk as ISO images and not as files within a filing system. The disk images must be downloaded as unchanged binary data files, not text or "Word" files which could be changed by your operating system during the download. You are given the option to supply information about the packages you choose via an anonymous automatic process which will help the developers identify current trends.
Some computer hardware such as for wireless networking may need non-free drivers that require an End User Licensing Agreement (EULA), while other hardware, including graphics units, may only partially work with free open source drivers. Debian does not officially support hardware that requires non-free hardware drivers or firmware. Driver software can be downloaded from a commercial source and copied via another device such as a USB stick. You may find the required non-free firmware, or a modified version of the installer including non-free firmware, for download using ftp or http from cdimage.debian.org/cdimage/unofficial/non-free/
The standard installer does offer an option to allow or deny the installation of some non-free software after the base system is installed, and the file /etc/apt/sources.list will show whether the contrib(uted) and/or non-free options are available together with the main distribution. This selection will be available if the /etc/apt/sources.list lines finish with "main contrib non-free" instead of just "main".
You may need to refer to the documentation supplied with your computer for BIOS access and configuration. Recent computers may have "boot protection" enabled to force booting only from the hard disk, which may need to be disabled directly or using an installed Microsoft system before setting the "boot order" to give priority to your chosen installation method. As a last resort there may be a pair of pins on the motherboard which will set the BIOS to manufacturer defaults when shorted, or simply remove the battery for a few seconds, then reset to your own requirements.
Apple computers may only allow booting from a CD or DVD if the Alt key is held down as the computer is powered.
Unix compatible operating systems are happy with the CMOS clock set for UTC, (winter Greenwich Mean Time), and will correct for local time differences. It should be adjusted in the BIOS setup before beginning the installation so that all files are created with the correct date and timestamp. Recent versions of the installer may pause for some time as the battery maintained clock is corrected to match a reference clock via the internet. Microsoft may change the BIOS setting to suit local times, and possibly fall over as it does.
The Linux kernel will fully utilise any available RAM, and will normally make better use of it than the BIOS, so if possible do not allow the BIOS to set aside RAM for special uses such as video buffer. If you are not using a dual-boot system with Microsoft, do not allocate fixed areas of reserved memory for BIOS cache or video data, edit the BIOS and leave that job to the kernel. Linux does look at the BIOS information, but runs its own tests and ignores some of the BIOS settings. Linux does not use the BIOS once it is running, so do not load the BIOS into RAM.
Some "errors" found during BIOS checks could be ignored, while others should result in an immediate halt. For example you may wish to run a dedicated server without a keyboard, using remote access or a USB keyboard only when required.
Note that damage to a USB connector, or connecting a PS/2 keyboard or PS/2 mouse after the computer is powered, can short out the 5volt power supply and destroy your computer. These connectors may be powered from the standby section of the power supply, and are only safe when the mains power is completely removed.
Some motherboards offer BIOS selection of SATA disk support as either "emulation mode" which may cause problems, or "raw". You may need to make other selections, such as IDE "legacy mode". There is a list of known hardware problems in the "errata" section at the end of the Debian installation instructions. Laptop computers have more proprietary hardware, and are known to have more problems than normal boxes.
The BIOS backup battery may need to be replaced if settings are not retained.
Many hard disks have known faulty sectors replaced by alternatives located elsewhere. Every seek operation can take 1000 times the normal sector read time, so can cause problems for time-critical applications.
Specially designed disks are available for multimedia, video, and security applications that do not have replacement sectors well out of sequence, and care should be taken that the disk content is not fragmented in use.
Hardware RAID controllers may use different disk formats, even between apparently identical versions, so the RAID array may be unreadable if the controller fails. If a computer motherboard fails while running software RAID, the rest of the system can usually be transferred to another motherboard with just minor adjustments. Genuine hardware RAID controllers are very expensive, and most have a battery backup so that there is no chance of data corruption if there is a computer power problem while writing to disk. Many cheaper varieties are really hardware connection systems which require the main processor to do all the work, possibly under the control of an on-board BIOS. They are as close to real hardware RAID systems as WINmodems are to genuine hardware modems.
Hard disks are sometimes sold with a huge solid state cache memory which can make a relatively slow disk appear fast. Unfortunately they sometimes delay and attempt to combine several writes to the main disk, possibly resulting in file corruption. Reduce the risk by delaying file closures, and pause for a few seconds before computer shutdown, to force a final write.
Some discs are designed to lower their spin rate when idling, but tend to fail early because of repeated spin-up cycles.
A wireless link to the computer may break during an installation or software update, so if possible use a direct cable connection, even if only temporary for the duration of the installation, unless you are using an installation that is completely based on removable media. The installer will still try to obtain any recent updates via the internet, so it is best to provide a connection if possible.
Automatic hardware recognition is used to search for anything it can configure, so if possible make all connections to your network, modem, printer, etc, before starting the installation.
The installer is designed to quickly load a minimal basic system, and ask the minimum number of critical configuration questions, using general Debian defaults where possible. The downside of this is that more features may be left in a safe state, or effectively disabled, leaving the administrator to read the full installation instructions, release notes, errata, and other documentation, and then complete the configuration.
Many users will require more control over the installation and configuration process, and choosing "expert" mode will enable lower importance (medium or low priority) questions and choices. Standard installer modules to match the hardware found are loaded automatically, although additional modules are offered in "expert" mode in case of unexpected problems.
If multiple machines are to be loaded with a similar configuration, the installer can be modified with "pre-seed" instructions to enable easy duplication.
The source mirror to be used is chosen from a list, and an official mirror site is normally offered as default. A partial mirror of the Debian system can be built in a local machine using a package such as apt-proxy, apt-mirror, apt-cacher-ng, or ftpsync, which will download and maintain a local cache. You can then specify that as the source for all local machines during the initial build (define a local mirror and its access port manually at the top of the mirror list) or during later maintenance (see /etc/apt/sources.list).
A workstation "desktop" with window manager is not essential for a computer designed to be used only as a server, and will require some resources from the host computer, although an administrator may find it useful. A simple text terminal, possibly accessed via a network, may well be sufficient and faster.
The default minimal installation does not include any X-windows graphical user interface nor any window manager, but if one is chosen from the list it will bring its own selection of additional packages as a complete block selection.
Debian offers "Live" ISO images using various standard desktops which can be downloaded and burnt to BD's or DVDs, providing simple views of different desktops for comparison. If you install only from a full CD set there are alternative versions of CD 1 with different desktops, but all options are available if installation is started from a netinst CD and a network or internet mirror.
Other desktops, tasks, and packages can be added later using "tasksel", "aptitude", "synaptic", or "apt-get" from the Debian distribution.
Selecting a workstation with x-windows and desktop for installation on the older Sarge would load both the Gnome and KDE desktops and window manager systems, and every user could then choose which to run on each login. Recent distributions are not expected to install more than one desktop initially, although more could be added. Gnome and KDE are supplied with numerous additional packages, giving a complete "desktop environment", while lxde and xfce are more lightweight. Some people disliked the latest version of Gnome, and developed Mate which is more like previous designs but with updated software. There are now several fully maintained desktops available.
You may need details about the disk types available, such as SCSI version, IDE, SATA, or fibre connection, although this is normally discovered automatically, and should have details of the free disk space and your partitioning preferences. Partitioning options include the DOS Master Boot Record (MBR) system, but more recent options may be offered as replacement if it is deleted or for a new clean disk. Linux formats may not be usable by Microsoft.
The kernel will look for at least one specially formatted swap partition which has at least twice as much memory as there is computer RAM. It is now much more common to find huge amounts of RAM fitted, so there is a tendency to provide less swap partition space, although this may result in unexpected problems later.
Some directories such as user /home directories contain both visible, and "hidden" directories with names that begin with a ".", and all may contain configuration details only related to the current installation, as well as files and data which could be moved to space on server directories. Links can then be provided both from the original locations, and any future installations, with the old data retained on the server directories.
You can separate some software, variable data, user, and other categories of data, into multiple partitions on multiple disks for reliability, security, or convenience. For example a user could try to download a huge file, or a sudden deluge of junk emails may fill a partition dedicated to storing mail, without blocking the rest of the system.
If there is sufficient space you can choose to leave an unused partition for a later installation, which will then be able to access partitions created during the earlier installation without loss of their original contents. Most of the original partitions can continue to be used with the later installation with their original names, although I call the original / partition something like /oldroots in the later installation, and the unchanged original installation should still be offered for booting as required.
It has previously been possible to install a new Linux on to any suitable space available on an existing computer system, with each disk labelled according to the order used by the BIOS to search for resources. This had the disadvantage that if the order was changed, perhaps because another disk was added or a USB device was left connected during the initial boot, disk partitions could be mislabelled.
Starting with debian "squeeze" each disk partition, including the swap partition, will be given a unique label when it is formatted to be used for identification. Disks can then be moved or replaced without those changes affecting other devices. This resolves one problem but adds another because even any disk partition which does not have an existing unique label may be given one, which could affect an existing installation, especially if there are any shared partitions which could be re-labelled. It can be an advantage to make older partitions available to the new installation, under new names if necessary, but without re-formatting or changing the partition contents, and any references to shared partitions which have been re-labelled can then be edited to suit. If a new installation does change labels and does have access to the original it should be possible to edit the original file system list /etc/fstab to match using the later system.
Software RAID (Redundant Array of Inexpensive Disks to provide more reliable or faster disk storage across similar partitions on multiple disks) is available, including 0 (striped data across multiple disks to increase the effective access speed), 1 (mirrored partitions for data security), and 5 (striped across several disks giving additional data security with data recovery after a disk failure, but at a cost of increased processor load). Unused hot spare disks can be added.
There are now other possible problems due to the inability of the BIOS to access modern high capacity disks, with a common workaround using larger data block sizes. Linux can use hard disks much larger than could be handled by the BIOS of earlier computers, but the BIOS is important for starting the boot procedure. A re-boot error message towards the end of the boot start up could indicate a BIOS access problem.
It used to be possible to get round the problem with a small /boot partition (suggested between 20 and 100 MBytes) at the start of the disk where it is totally within the area accessible by the BIOS.
Another method is to fit a small bootable disk in the Primary Master position and a much larger second disk. If this causes the BIOS to hang, mark that position as empty/not installed and let the installer find the disk.
The GRand Unified Bootloader grub, and the completely re-written grub2, which are replacing the older LInux LOader LILO, are designed to be installed in the first few sectors of the disk, known as the Master Boot Record, mbr, with additional files in the / directory, but without a separate /boot partition. The / partition should contain all the directories required for booting.
If the hard disk is later required to be used only for Microsoft, the original mbr can be restored using the Microsoft facility fdisk\mbr.
Whole disc encryption may soon become a legal requirement for business use, especially when holding customer data. Encryption is an available option, but formatting will take a very long time because the entire disc will be encrypted, including the empty space, so that there is no obvious difference between occupied and empty space. Access will only be possible using the correct key. Consider perhaps daily backups, each to a different destination in rotation, if possible in separate locations.
Disks greater than about 2 TB require more address information than possible using a 32-bit computer and the standard MSDOS style Master Boot Record (MBR) and partitions, and are not usable. Recent computers can use the GPT partition system, UEFI boot procedures, and more recent disk formats designed to handle much larger disks. The installer should detect this and offer an alternative set of options.
The UEFI boot layout will include an additional small UEFI boot partition. You can select Manual partition layout in Expert mode, check what Guided partitioning would offer, then step back and make your own decisions.
Please check the current information regarding upgrades from grub to grub2 if there has been a previous installation.
The boot facility based on grub may be able to boot from a simple software RAID1 partition, but may have problems booting from other software RAID systems, or LVM within RAID, so you may need a separate / partition, which could be on either software RAID1, or a simple non-RAID partition and perhaps a backup copy on another disk. I try to leave an unused formatted but empty partition for a future installation, labelled something like /next, and keep as much as possible on a server partition, perhaps labelled /srv, to be shared with the later installation, with links or symlinks from both as required.
The first partition required for booting should be labelled as bootable while formatting, (this will be automatically set when UEFI booting is selected).
The overall layout can not be changed after creating the RAID devices, but each RAID device can be further subdivided into partitions and formatted as just another device.
Select and confirm the partitions to be used for RAID, then configure the software RAID, before making other choices.
Recent installers may be able to remove unwanted RAID or LVM partitions, but if really necessary they can be deleted by copying /dev/zero to the disk using dd:
# dd if=/dev/zero of=/dev/sd?
Logical Volume Management (LVM) can be used to combine multiple small partitions into larger units, adding more LVM partitions as required. This can work well, but any errors found when the computer is restarted will prevent access to all the linked partitions in a group. Both RAID and normal areas can be divided into LVM partitions before they are finally configured for use.
It can take some time and effort, but it may be possible to recover files from damaged discs using software such as "testdisk" on a working system.
If data security is important, perhaps also consider a UPS to provide reliable power, with automated shutdown when the battery is low.
Check the Release Notes and Errata for known hardware problems.
An example is that hardware differences allow some systems to work much faster if Direct Memory Access (DMA) is enabled for all drives, but this can cause problems with some older drives, and can prevent access to a CDROM. The work-around suggested in the errata can be used.
If hdx is the relevant drive, normally between hda and hdd (now often called sdx, sda to sdd)
Another problem, again involving loss of access to the CD, was solved using a hint from the errata and problems section. It suggested that I change to the second text screen using Alt+F2 to view dmesg using
dmesg | more
Towards the end of the file it reported an Interrupt Request (IRQ) problem and sugested that I should restart the installation including the command "irqpoll". It worked, and the installation completed without any other problems.
The installer will walk you through stage by stage, and in most cases the defaults shown will be reasonable.
Installation is controlled from the first of several virtual text terminals, with others providing information and commands if needed. Switch between them using Alt+F1, Alt+F2, etc. You will sometimes need to use the Tab key to move between items on screen, or choose several items from a list using the Space key to toggle selections. The installation log file can be viewed on the fourth terminal/console Alt+F4.
Any choices you make are saved to RAM at first, and the installation can be halted using the Escape key before the point of no return. Nothing is written to your hard disc until you confirm your disk formatting choices.
Read all the instructions provided on each page, and be aware that some pages do not display a slider at the side but may be unable to display all available options unless you scroll down using the keyboard arrow keys.
You may see a "continue" "OK" or "close" option on screen, but it may not be active until you highlight it using the Tab key.
The first page shows a number of installation options, some linking to other pages. Scroll down to ensure that there are no further options on each page, explore the various options, then go back to choose how to start the installation. The installation process will start when you select a line that does not have a link to another page, and then press Return to start the installation.
You may need the following details:
Will Debian be the only operating system available on the computer?
Language (British English?)
Location (Europe? UK? London?)
You have a choice of Locales, with different language and text coding options such as 7, 8, 16 bit. First a choice of standard default, and then any additional options, including two alternative English-GB versions and many others.
Keyboard type (Standard PC?) Note that damage to a USB connector, or connecting a PS/2 keyboard or PS/2 mouse after the computer is powered, can short out the 5volt power supply and destroy your computer. These connectors are usually powered from the standby section of the power supply to enable booting from a keyboard, and are only safe when the mains power is completely removed.
Keyboard layout. There are both UK (with " above the 2) and US (with @ above the 2) standard keyboards available in the UK.
(The installer will search for a CD ROM drive and possible USB memory, then attempt to load more installer components. All those required will normally be collected automatically, although others may be offered in case of unexpected problems.)
The full details of how the computer will connect to and access the internet and any local networks may be found automatically using DHCP, or you can choose to provide the information manually, including IP address, gateway, nameservers, etc. There are international rules which govern the names and addresses used in networking, and there are a few brief notes about networking and TCP-IP addressing in network~addressing but you may wish to refer to The Linux Documentation Project Network Administrators Guide. The safest, most secure, option is to specify the fixed DNS servers provided by your ISP as it will reduce the chances of DNS poisoning.
Computer name (what you intend to call the box)
Network "domain name" (the name of your local area computer network, or if it is to be the only computer, your allocated internet address, unless it is supplied automatically via DHCP).
The TCP-IP fixed numerical address, unless allocated by DHCP on connection.
Your ISP should supply any information required to access a DNS server. IPv6 is not yet generally available, although the installer is being developed and tested to use this protocol, and IPv6 is available on the installed system. See The Linux Documentation Project Linux+IPv6-HOWTO
Other possibilities include
other DNS servers for emergency use are 220.127.116.11 18.104.22.168 and 22.214.171.124
You will need to provide secure passwords for the system administrator, known as root, and ordinary users. Many distributions require between 6 and 8 characters, with a mixture of upper and lower case letters and numerals; some punctuation marks may also be accepted, but not the delete or backspace keys which continue to perform as normal, and should not be dictionary words in any human language or anything that can be easily guessed. Passwords should be replaced at frequent intervals, and whenever there is any suspicion about security problems. Lifetimes for passwords can be specified.
User names do not usually contain upper case (capital) letters, while one that begins with a numeral can cause unexpected problems. Each user will be allocated a numerical uid, and the same user and uid combination should be valid throughout a local network. The first user created by the installation procedure is assumed to be the ordinary username of the administrator and will be given a standard uid and membership to some standard groups, but other users must be allocated group memberships by the administrator (root), editing /etc/group using vigr with reference to the defaults applied for the first. Group memberships should be allocated only as required to
allow selected users access to necessary facilities.
A new user is created using adduser and will normally be allocated the next available UID, although that can be specified using
adduser --uid nnn username
You may wish to assume that the first user and all relevant files are just a test or guide, and may need to be removed by the administrator (root) to match network-wide uid, usernames, and group memberships, soon after the initial installation using
deluser --remove-all-files username
(replacing username with the actual username). The home directory for the user may then need to be deleted by root.
Note that root is not allowed to log in to the graphical user interface (GUI, X-windows) by default for security reasons, but a normal user can acquire administrator status in a "virtual terminal", see "su" or "sudo".
Is the clock set to GMT = Coordinated Universal Time, UTC?
The installer will search for disks to partition and use, listing the current configuration. It will offer help or guidance as well as full manual control. Move the cursor to any line and select Enter to modify the settings.
The original MBR layout can only create up to four Primary partitions on a single disk, so Logical partitions will be suggested. Your choice will depend on the expected total number of partitions.
You can select Guided partitioning to view what is suggested, then go back, choose your own Manual layout, and complete the formatting.
You reach the point of no return when you are required to confirm your partitioning choices as existing data will be lost during formatting.
Most software will work from its default location, although it could be relocated, and any files produced will be placed as configured.
Other software will dump its output in the current working directory. In this case, you will need to ensure that your current working directory is where you need to place the result (using cd).
The following is a typical Unix compatible main directory structure, to include all files required during the initial boot within the / partition. Beware that some computer manufacturers place a small partition at the beginning of the first hard disc containing configuration and maintenance facilities which should not be removed, and may need to be copied to any replacement disc.
The following additional directories would be available in a typical system, and could be located within the main / partition, or placed in separate partitions for convenience, speed, or extra security, (for example to avoid problems with a full directory if a user tries to save a very large amount of data, or a sudden deluge of junk emails fills the mail INBOX).
Others can be added manually.
Files or directories listed may only be a symbolic link (symlink) to the real one located somewhere else. This allows the current agreed standard position to be changed, while older packages can still find the correct files without having to know that they have been moved. Some files may be found in any one of several common locations, which will be listed in search order in a default configuration file.
Putting some directories in separate partitions away from the main / directory may be a good idea, but you may not know in advance how much space to allocate for each one. The simple Debian installation suggests a single / partition plus swap because it does not give individual partition free space problems until the complete disc is full, by which time an "expert" user might have some idea about what is wanted. The space actually taken in a running system can be displayed using the command du.
Another option is to create small partitions, perhaps leaving some spare space or another disc available, and then allocate them using the Logical Volume Manager, LVM, to the various named partitions. Additional unallocated space from any hard disc can be added later to extend the existing partitions. Note that all the sections allocated to a particular use must be present before access is possible, and that may rely on all relevant discs being available in full working condition, although each could be part of a RAID array.
There are filesystem checking and disaster recovery tools for the standard extended file system version 2, and a journal can be added which records the intention to, and completion of, write operations which assists this (it is then called extended version 3, e3fs instead of e2fs). The e3fs, and later e4fs, give greater file security, but the multiple writes can cause problems with streaming multimedia such as audio and video.
The partitioner screen display will show a number of options, move the highlight to any option and select return to enter the configuration dialogue for that option. Partitions to be used for a RAID system must be marked as "use for RAID", then you will be able to configure the multiple disc MD system. Any partition, including any software RAID partition, can then be configured as LVM, before finally selecting the format options for each partition.
Start by creating the main partitions, including any to be used as RAID devices or Swap space. Partitions can be created but left unallocated, (although to prevent error messages they should be formatted if they are to be included in the list of partitions in the new system), while existing partitions can remain as they are.
Next save the RAID configuration linking the various partitions, then each RAID group can be further partitioned or formatted as required.
Mark any partitions to be used for LVM, then configure the mount point and intended use of each partition, select those to be formatted or left with existing data, and the bootable partition (normally "/").
It is possible to encrypt entire partitions for maximum security, although this will require additional processor power. It will take a very long time to write encrypted zero bytes to the entire partition so that it is not easy to see where or how much real data is held.
The Debian Base system can be installed once formatting is completed.
You will be offered a kernel that matches the installed microprocessor. The standard kernels supplied are suitable for use with multiple processors, and the default shown will normally be correct. If in doubt, assume an older, simpler type and rely on a more extensive kernel to provide any replacement facilities required.
You will also be asked whether you wish to install all generic hardware driver modules to match the kernel, so that changed hardware will probably work immediately, or only those which match the installed hardware to save disk space.
Permission will be requested to send brief anonymous details of your choices of additional software to help the developers determine current trends, although the default is no.
You can accept or reject the option to allow non-free software to be offered for installation, and you will be offered a choice of several standard tasks, such as fileserver, mailserver, nameserver, webserver, database, and/or workstation with desktop window manager.
You may be asked for configuration choices, but most software will be installed with standard Debian defaults.
Default locations for GRUB installation will be offered, then it will be configured to boot any of the installations found on the computer, with the new system listed first.
The clock setting will be checked before the installation is tidied up, the computer shut down, and then restarted.
The current hardware is identified and logged during each boot process to confirm the facilities available, and messages about hardware quirks may appear on screen, although they do not necessarily indicate a fault condition. The administrator can view logs saved to /var/log/ or "pipe" the entire start-up message into more (or less) to show one screenful at a time
dmesg | more
It is possible to replace failed hardware, and the correct replacement software will be used if it is available.
After the initial installation, you may be presented with a plain text virtual terminal or an X-windows screen. Try the command "startx" if an installed X-windows system does not start automatically. You can move between virtual terminal screens using typically Alt+F1 to Alt+F6, with typically Alt+F7 going to the x-window graphical display if available, while you may need to use Ctrl+Alt+F1 to Ctrl+Alt+F6 to switch from a graphical screen to a text terminal. Any active processes should continue in each case, and you can return to them later.
Once the initial installation has been completed, the file /etc/apt/sources.list should be checked to ensure that the correct list of original Debian and other mirror sites is included. The Debian website provides security and other important updates for installed systems, and should be checked frequently.
If you wish to add other software I suggest you use the search facility on the Packages page of the Debian website to find relevant suggestions.
The default command-line package maintenance system is "apt". You may wish to update the list of available packages by running
see "man apt" for full instructions.
I use the installation and maintenance facility "aptitude" which runs in a text virtual terminal but gives the appearance of a graphical display. It is quick and easy to use, with simple commands and on-screen help. It may not be installed by default, and there are other similar packages such as synaptic.
Standard commands in aptitude include
The default mail transport system for Debian is exim4, or either exim4-light or exim4-heavy, although recent distributions may not suggest any default. You will need to know whether the computer is normally stand-alone, totally isolated, or has a permanent connection to any other system. It may send and receive all emails direct via SMTP, but many email connections go via a smarthost or mail exchange, usually one provided by the ISP. The computer can itself also act as a smarthost or mail gateway for others. You may wish to handle all local emails on a specific mailserver computer. Other email software such as SpamAssassin or antivirus can be incorporated, and can be configured to reject junk before the SMTP "Received" confirmation is sent. If you are unable to decide the correct entry in the exim configuration you could enter a space-holder long-form descriptions, such as "my_real_email_name". The configuration is usually saved in /etc/exim4/update-exim4.conf.conf which can be examined and copied for later reference under another name (perhaps add .original or .test to the original name), then either edit the original file to what you really want and follow the instructions on the file, or create a new file later using the original configuration procedure as in the initial installation using
A default installation of exim4-light may default to local mail only, a lower priority installation may not install any mail handler by default, leaving the full choice of system to you, or you can upgrade it to exim4-heavy to provide the full range of options.
If you have a DMZ provided by a firewall and a separate secure network you can have a mail gateway in the DMZ plus a mail server in the protected area, both running exim4-heavy. The gateway will notify the server (known as a hubbed host) that there is an email incoming and check that the recipient is known to the server. At this time the server has no way of checking the incoming email but it can send a local-rcpt-callout request back to the gateway to security check the sender and the email contents before accepting and forwarding the email. Spamassassin can check the email against internet reference sites, and clam anti-virus maintains a list of known problems, so that the email can be refused instead of accepted. The SA-exim version of spamassassin can even delay sending a refusal for a long time, which can be a problem for well-known senders of junk emails.
You may need to install and configure a separate mail collection system such as fetchmail after the initial installation if you need to collect mail from a server using a protocol such as POP3 or IMAP.
There are many packages available related to email, and you may wish to add something like Dovecot plus advanced security and authorization facilities to build a comprehensive mailserver.
The latest version 9 of debian, codename stretch, has introduced another management layer called systemd. The first problem I discovered was that packages may be configured to start immediately by default but do not, although they can be started manually. They require to be enabled by systemd using the command
systemctl enable servicename
There various manual pages available,
What do I do now?