Historical Debian information What now?
General information Installing Debian Help for beginners
Further information Network addressing FOSS index
Distributions Using Knoppix Main site index

What do I do now?

This is my suggested learning sequence using information already available on a basic Debian system, but please explore the much more comprehensive documentation available on the Debian website.

Important Do close all files after use. Removable storage devices, such as CDs, drives, and USB memory sticks, should be unmounted (umount, or using the desktop GUI) before they are removed.

Debian provides original plus debian-specific package defaults, with documentation in both /usr/share/doc/ and man pages. Some packages, and their original documentation, are large, but debian-specific documentation may be provided to help with initial configuration. Package updates will often include updated documentation.

If you are running in a Graphical User Environment (GUI) you may find various links to individual packages to do specific control tasks, but usually the quickest and best way is to use a textual interface known as a virtual terminal or console which presents one of the simple programmable environments, known as a shell

Log in to a virtual terminal, also known as console, as root and try some of the following commands, followed by Return. If you log in as an ordinary user and try to use a command restricted to the administrator, you are likely to be told that the command does not exist, instead of "you need root privileges to run the command". To give yourself administrator status enter
su
and you will then need to enter the administrator (root) password (which may not be visible as you type).

Every directory and file has its own access permissions as set by the owner. These allow or deny access for reading, writing, and running a file, for the owner, a group specified by the owner, and others. The defaults for creation of sub-directory and file ownerships (modes) can be set for any individual directory.

If enough of a directory or file name has been entered to uniquely specify it, the TAB key can be used to auto-complete it.

If you need to quit from any facility, try ":q" or "exit" or Control+c (but note that Control+c may not do a tidy close. In the very rare case that a process goes totally out of control, it is possible to find the process ID and issue a kill command).
Move backwards and forwards through the commands you have entered on a text terminal using the up and down arrow keys, then you can modify the command if required and press enter.

Most commands can be used in their simplest form, but have many other options available.

man man

man info
man more
man less
man zless

man ls
The "*" character can often be used as a "wildcard" replacing part of a name to include a number of alternatives.
man pwd
For any directory ./ refers to itself, ../ its parent directory, so absolute or relative locations can be used as convenient.
man cd
ls on its own means list the contents of the current working directory
ls /
ls -l /
~/ is my home directory, so
ls ~/ means ls my home directory
ls -a ~/ will also show "hidden" files which have names starting with "."
ls -al ~/ will list all the files in greater detail
If there are too many items to display on one screen you can pipe the output into either "more" or, if available, "less"
ls -al /usr/share/doc | more
(where | is often available via the key to the left of z on a UK keyboard or near backspace on a US keyboard) or
ls -al /usr/share/doc | less
ls -al /etc | more
ls /var/log
Some log files can be huge and still growing, yet you may only be interested in the last few lines, see
man tail
man cat
man grep
man cp
man mv
Note that files and directories are renamed by moving them
man rm
rm on its own without the recursive option will only remove single files and empty directories
apropos del
man ln
Note that the option -s can be used to link any part of the directory structure to another location, and individual items can be listed in all locations where they may be relevant, so a document could be indexed under multiple classifications, or a complete directory could be created in another location such as a website while still appearing to be local and remaining under the control of the owner.

man vi
The vi file editor leaves the original file in place and creates an edit file. Open a file using "vi filename", then place the cursor at the point you wish to begin editing. Enter the edit mode before (i) or after (a) the cursor, then Escape from edit mode before you try to change the current cursor position. Use ":w" to complete the write, and ":q" to quit. It may take a short time to get used to editing with vi but it is almost always available in a Unix-compatible system. Note that Debian supplies vim, vi-improved, listed as an alternative to vi. You may need to install the extra documentation available listed as vim-doc.

User names do not usually contain upper case (capital) letters, while one that begins with a numeral can cause unexpected problems. Each user will be allocated a numerical uid, and the same user and uid combination should be valid throughout a local network. The first user created by the installation procedure is assumed to be the ordinary username of the administrator and will be given a standard uid and membership to some standard groups, but other users must be allocated group memberships by the administrator (root), editing /etc/group using vigr with reference to the defaults applied for the first. Group memberships should be allocated only as required to allow selected users access to necessary facilities.
A new user is created using useradd, but Debian provides adduser which includes features from other commands, see

man adduser

You may wish to assume that the first user and all relevant files are just a test or guide, and may need to be removed by the administrator (root) to match network-wide uid, usernames, and group memberships, soon after the initial installation using

deluser --remove-all-files username

(replacing username with the actual username). The home directory for the user may then need to be deleted by root.

man vipw
man vigr
apropos group
man chown (change the ownership of a file or directory)
man chgrp (change the group details of a file or directory)
man chmod (change the access restrictions rwxXst for a file or directory)
man access
apropos access
man sudo
man su
man passwd
Note that separate additional passwords may be required for other packages including databases and samba

man df
man du
man free
man top
You may wish to try
du --max-depth=1 -hx /

Recovery of deleted files is not normally possible, so before you attempt to edit, move, or modify any file, display the filename using "ls filename" to check that it is entered correctly, then re-select that command using the "up" arrow key and change just the command. It may seem long-winded, but it can be much easier than deleting the wrong file and then sorting the mess.

Create backups by copying the original file with a serial number or date appended to the end of the filename. Note that while some terminals use colour coding, ls does not always distinguish between a file and a sub-directory, but ls -l will give full details of each, including the owner and group. If you enter enough of a filename to make it unique, you can press the Tab key which will complete the name for you, then add Enter.

If you edit a file, do add comments to remind yourself (and perhaps others) about what you have done, and perhaps what was the original default, just in case you hit an unexpected problem. Part of a line preceded by "#" or sometimes ";" is usually a comment, and anything following on the same line will be ignored, although some packages restrict this to whole lines only.

Important Note also the original owner, group, and access permissions, as they can be changed to match those of the current user (perhaps the root user) when re-saved. The original owner and group may be denied access to changed files or copies until reverted using "chgrp" or "chown".

You can usually mark text on screen using the left mouse button, then copy the marked text to another position on screen (even another desktop screen) using the middle mouse button.

Edit the following files as appropriate (suggest using vi, which may be an alias for vi-improved, vim, or some other more recent package as listed in /etc/alternatives, although it is possible to use other editors if they are available).
/etc/hosts
/etc/hosts.allow
/etc/hosts.deny
/etc/aliases
/etc/group (use vigr, see man vigr)
/etc/passwd (use vipw, see man vipw)

Another popular editor is emacs, which is self documenting, all inclusive, all enabled, etc. Most people seem polarised in favour of vi or emacs.

The standard Debian package manager is apt, but "aptitude" and "synaptic" are more user-friendly front-ends. See the top of the aptitude screen for a list of commands, including help. You may wish to edit /etc/apt/sources.list to add other mirrors of the Debian distribution. The sources may be listed for a particular generic distribution such as testing or stable, which are symlinks to the real name such as wheezy, jessie or stretch. Use the real name to prevent complications if it tries to upgrade immediately a new distribution replaces the old, then use apt-get or aptitude to perform the upgrade.

The installer assumes that the first user created is the administrator, so configures /etc/aliases so that emailed reports addressed to root are redirected to that user. Edit the file to ensure that all mail is redirected to the correct users. Mail is normally directed to a mailbox at /var/mail/username or a maildir in each user's home directory.

If you wish to add another pre-arranged task for the computer as in the original installation, you can re-run "tasksel" when logged in as root, or select the task from aptitude or synaptic.

Run aptitude, synaptic, or apt-get frequently to keep up with security updates.

Aptitude standard commands are

u
update list of available packages including security updates
U
mark all packages that have updates available to be updated
g
get the list of requested and dependant changes, scroll down to see any recommended extras.
g
get on with it
q
quit
Beware that although you may see a "continue" or "close" option on screen, it may not be active until you highlight it using the Tab key.

There have been several printer control packages, but CUPS, developed by Apple, is becoming the standard. Open the localhost web page at port 631, initially http://127.0.0.1:631 where you should find the relevant documentation.

There is a search facility plus a full list of available packages on the Debian website which is often easier to read and select additional or replacement packages. Some software operates as a server-and-client system, in which the server part is often called a daemon, and has a "d" as the last character in the name.

Some suggestions for additional packages if not already installed:

telnet-ssl
(encrypted where possible) to replace telnet (security risk, note that telnet may not be installed by default)
telnetd-ssl
(encrypted where possible) to replace telnetd (security risk)
openssh-client and openssh-server
secure remote login via SSH from openssh-client to an openssh-server
ntp and/or ntpdate, or chrony
to keep to the correct time, visit http://www.ntp.org to find a pool of public ntp servers for your location.
newbiedoc
extra documentation for new users
fetchmail-ssl
(encrypted where possible) instead of fetchmail
chkrootkit
makes regular checks for some known exploits
proftpd or wu-ftpd
recommended FTP servers
rsync
fast file and directory copying and updating package which can update just the altered sections of a previous copy

Many larger packages contain just the more important facilities, but with other facilities available as additional packages, including file format and encoding/decoding facilities not specific or vital to the main package. Some, but not all, are tailored to match a particular main package, others are general purpose packages, but may have specific configuration options.

Clam antivirus, developed by CISCO, is available, and you can use firewall configuration software such as shorewall on each individual computer, giving distributed protection rather than just a single firewall at the perimeter interface.

If you wish to install software that is not supplied as part of the Debian distribution, it should be placed in the relevant ..../local directories which can be searched by the system as it attempts to use those facilities but will be ignored by the usual automatic upgrade and maintenance procedures. The administrator is expected to maintain the local options and software.

It is assumed that any computer will be accessed by several users at the same time, both locally via multiple virtual terminals and via a network connection, it may also be providing various services to the network, so it is normal to leave the computer always switched on. It can look after its housekeeping when not busy or overnight, checking the HDD, etc. Some less urgent disc writes may be delayed, ensure that these are completed before removing power or resetting the computer. When you do need to re-boot or stop the computer, you can use the "shutdown" command, options include

-r
reboot
-h
halt
now
immediately start shutdown procedure (it may still take a while to close everything safely)
+mm
delay in minutes before shutdown, information messages are sent to users so they can finish before the shutdown begins
Do not remove power until the shutdown procedure has finished.
man shutdown

Some distributions restrict users allowed to give the command to shut down to root or any that have been given permission through the sudo command; others provide a graphical method as standard, or you may be able to use
Control+Alt+Delete
to do an emergency crash exit.

The option to log in from a remote terminal as root is normally blocked, so log in (ssh or telnet) as a normal user and either use sudo or su to attain root privileges. A text command can be entered from Microsoft Windows using
"Start" "Run"
Examples:
ssh numerical_ip_address
ssh box_name.domain_name
telnet numerical_ip_address
telnet box_name.domain_name
You will be asked for your username and password. Ensure that your Microsoft box does not have any security problems such as spyware or keyloggers that could collect your passwords.

Access from a Microsoft box is normally restricted because Microsoft is unable to handle the Unix style security. The methods available include
   Install an ftp server on the Linux box,
   Install a webserver on the Linux box and use http,
   Install Samba on the linux box with the full pedantic details in its configuration file of exactly which users are allowed to log in to access which parts of the filing system with which permissions, and set the smbpasswd for each user (see man samba). Samba uses an independent password system, and Samba user passwords must be set or changed separately. Set or change your standard password first using passwd then set or change your samba password using smbpasswd
   Install PuTTY on the Microsoft box which can cope with full access to a system running Linux, see http://www.chiark.greenend.org.uk/~sgtatham/putty/.

You can even do a remote recovery or shutdown via a network connection after a total loss of control from the local keyboard. (Note that plugging a keyboard or mouse into a running PC may damage the motherboard, and USB connectors are easily broken with a risk of power supply damage, so use a network connection instead).

The option to access an X-windows desktop from a remote terminal is normally blocked during the initial installation, and can be enabled using xauth by the administrator (root) if required. The local screen can even be viewed from a remote terminal by running "screen" from the local terminal.

Some commands that are normally restricted to the administrator, such as shutdown, can be enabled for selected users via "sudo" (see "man sudo" and use "visudo" to edit the configuration).

If you would like to know what is slowing your computer, run "top" in a terminal, "q" to quit.

"tail" can display the last few lines of a file, useful for monitoring progress through an open log file

You may be able to use FSView to see how much disc space is actually being used by each part of the system, although it takes some time to do a full search, and then a pop-up information label appears when you park a mouse over an area of the display. It may be run from the KDE filer index through Debian - apps - system - FSView, it may be different from Gnome or any other window manager.
An alternative text command is du.

You may wish to change the configurations of some packages. If you installed using the default auto-configuration using debconf, there is a series of commands such as

dpkg-reconfigure base-config
the complete initial setup
dpkg-reconfigure xserver-xorg
for X-windows configuration
dpkg-reconfigure exim4-config
the default mail transport system

Exim is capable of handling emails for a very large organisation, with many options available if required. The Debian default installation of exim4 uses a single "simple" configuration system, and you may see a request to instead use
dpkg-reconfigure exim4-config.config

Spam and virus protection such as spamassassin and clamav can be added, and there is a growing number of packages which provide email services.

There is a list of default packages to be started during the initial boot procedure, but you may need to restart a package to input any changes if you edit any relevant configuration file in /etc perhaps by using
/etc/init.d/packagename restart
Packages that are re-configured using dpkg-reconfigure will normally be re-started automatically.

Some commands require both the source and destination locations, other commands assume "standard input" and/or "standard output" and can be linked together to form a chain of commands to be run as one. Other commands always place the output in the current working directory, so you must change directory (cd) to where you require the output before running the command.

If you decide to set up a local DNS server, the default package is now bind9. This provides a huge range of options, including IPv6 and restricted access to data. FQDN is Fully Qualified Domain Name (full name and address).

Note: the computer will attempt to discover DNS data as configured in /etc/resolv.conf

There are different types of service offered by Domain Name servers, please see
/usr/share/doc/bind9
/usr/share/doc/bind9-doc
look for the very comprehensive arm (administrator reference manual)
You may wish to save the original default files, then edit and add as required:
/etc/bind/named.conf.options
/etc/bind/named.conf.local
/etc/bind/db. files for both networks by network name, and numerical reverse lookup

RR
resource record
IN
record type
A
official (canonical) name to IP address
CNAME
alias to official (canonical) name
SOA
start of authority
@
the domain name by itself
The addresses listed are assumed to be incomplete, and will be completed by default unless followed by a ".".
A name server can be shown as an IP address or its full local address, while one from another zone may be shown using a pair of "glue" records: NS to FQDN, plus an "A" record

db files in /etc/bind9 are 0644 (rw-r--r--) with root as both owner and group.

IMPORTANT: After all changes do tests using
named-checkconf
and
named-checkzone zonename filename
then force a reload using
rndc reload
then check using
host (hostname only or FQDN)

You would normally use the DNS servers provided by your ISP, but there are Open alternative DNS servers for emergency use at 4.2.2.1 4.2.2.2 and 4.2.2.3

There is a Unix tutorial for new users at http://www.ee.surrey.ac.uk/Teaching/Unix




Return to foss index

There are too many options and configurations possible to be more specific, please let me know if you think I should change anything above.

webmaster at chrisbell.org.uk