
Table 10.1
Backup Files
Backup File
Old File
/etc/krb5.conf.heimdal
/etc/krb5.conf
/etc/krb5.keytab.heimdal
/etc/krb5.keytab
The client configuration (
/etc/krb5.conf
) is very similar to the one of heimdal.
If nothing special was configured, it is enough to replace the parameter
kpasswd_server
with
admin_server
.
It is not possible to copy the server-related (kdc and kadmind) data. After the system
update, the old heimdal database is still available under
/var/heimdal
. MIT kerberos
maintains the database under
/var/lib/kerberos/krb5kdc
. For more informa-
tion, see
Chapter 45, Network Authentication—Kerberos
(page 833) and
Chapter 46,
Installing and Administering Kerberos
(page 841).
10.3.8 Hotplug Events Handled by the udev
Daemon
Hotplug events are now completely handled by the udev daemon (
udevd
). The event
multiplexer system in
/etc/hotplug.d
and
/etc/dev.d
is no longer used. Instead,
udevd
calls all hotplug helper tools directly according to its rules. Udev rules and
helper tools are provided by udev and various other packages.
10.3.9 Firewall Activation During the
Installation
To increase security, the enclosed firewall solution SuSEFirewall2 is activated at the
end of the installation in the proposal dialog. This means that all ports are closed initially
and can be opened in the proposal dialog if necessary. By default, you cannot log in
from remote systems. It also interferes with network browsing and multicast applications,
such as SLP, Samba ("Network Neighborhood"), and some games. You can fine-tune
the firewall settings using YaST.
214
Installation and Administration
Summary of Contents for LINUX ENTERPRISE SERVER 10 - INSTALLATION AND ADMINISTRATION 11-05-2007
Page 1: ...SUSE Linux Enterprise Server www novell com 10 May 11 2007 Installation and Administration...
Page 14: ......
Page 19: ...Part I Deployment...
Page 20: ......
Page 60: ......
Page 128: ......
Page 243: ...Part II Administration...
Page 244: ......
Page 274: ......
Page 312: ......
Page 348: ......
Page 380: ......
Page 381: ...Part III System...
Page 382: ......
Page 438: ......
Page 452: ......
Page 478: ......
Page 486: ......
Page 498: ......
Page 512: ......
Page 558: ......
Page 559: ...Part IV Services...
Page 560: ......
Page 652: ......
Page 670: ......
Page 742: ......
Page 754: ......
Page 796: ......
Page 817: ...Part V Security...
Page 818: ......
Page 858: ......
Page 886: ......
Page 910: ......
Page 911: ...Part VI Troubleshooting...
Page 912: ......
Page 924: ......