www.SYS-CON.com

Transcription

www.SYS-CON.com
L
TI
S UN
ER Y 4
IL A
A PL 00
ET S , 2
R DI 30
SE NE
EA JU
PL
‘INSANELY GREAT’ LINUX DEVICES?
WWW.LINUXWORLD.COM
THE LEADING MAGAZINE FOR ENTERPRISE AND IT MANAGEMENT
MAY 2004 VOL.2 ISSUE 5
Meet tomorrow’s requirements with today’s technologies...
Beyond Technical Measures
The culture of a truly secure organization
$9.99US $9.99CAN
0
09281 02976
05
2
The Functionality
of the Future Is Here
Linux and clustered blade servers make distributed
virtual computing a reality
SECURITY:
s
e
g
n
lle
x
u
n
i
e
L
h
of t udit
A
e Cha
Th
Protecting the keys to your kingdom
TABLE OF CONTENTS
Inside...
What’s
THE LEADING MAGAZINE FOR ENTERPRISE AND IT MANAGEMENT
MAY 2004 VOL.2 ISSUE 5
[7]
[44]
From the Editor
Insanely Great Linux Devices?
BY KEVIN BEDELL
[9]
Guest Editorial
Open Standards vs Open Source
BY TYLER JENSEN
[10]
CGL
Linux Gains Momentum in Telecom
BY IBRAHIM HADDAD
[60]
Debian GNU/Linux
Exclusive Interview
Linux in ‘its purest form’
Dr. Frederick H. Berenstein, director of Xandros, Inc.
BY JALDHAR H. VYAS
INTERVIEW BY KEVIN BEDELL
[16]
Virtualization
The Functionality of the Future Is Here
BY SAM GREENBLATT
[20]
Dr. Migration
Guide to Linux on the
Business Desktop Part 2 of 3
BY MARK R. HINKLE
[32]
Exclusive Interview
Francois Bancilhon on
Mandrakesoft
INTERVIEW BY KEVIN BEDELL
[34]
Policy
Security: Beyond Technical Measures
BY RUSS ROGERS
[26]
TELECOM: Moving Toward Open Platforms
[36]
Security Viewpoint
An Approach That Works
BY STEVE SUEHRING
[42]
BY IBRAHIM HADDAD
JBoss
Following in Linux’s Footsteps
BY BOB BICKEL
[48]
[38]
Security
Securing a Tightly Integrated OS
BY BRAD DOCTOR
[50]
Gaming
Linux on the Back End: Dark Age of Camelot
INTERVIEW BY DEE-ANN LEBLANC
[52]
Product Review
EmergeCore’s IT in a Box
BY MARK R. HINKLE
[54]
Book Rookery
Linux for Dummies, 5th Edition
INTERVIEW BY KEVIN BEDELL
SECURITY: The Challenges of the Linux Audit
BY RICHARD WILLIAMS
MAY 2004
4
[64]
Around the LinuxWorld
Brought to You by...
Linux Business Week
www.LinuxWorld.com
If you’re paying unreasonable licensing fees for software that constantly needs security patches, you’re getting eaten alive. But there’s a solution. With SUSE® LINUX,
Novell® can help you unleash the cost-saving power of a flexible, end-to-end open source strategy. Only Novell supports Linux from desktop to server, across multiple
platforms. We’ll integrate our industry-leading security, management and collaboration tools seamlessly into your environment. We’ll provide award-winning technical
support 24/7/365, and train your IT staff to deploy Linux-based solutions. And we’ll make sure your open source strategy actually meets your number-one business
objective – making money. Call 1-800-513-2600 to put some teeth back into your tech strategy, or visit www.novell.com/linux
w e s p e a k y o u r l a n g u a g e.
©2004 Novell is a registered trademark of Novell, Inc. in the United States and other countries. SUSE is a registered trademark of SUSE AG, a Novell company.
FROM THE EDITOR
[
EDITORIAL BOARD
]
Editor-in-Chief
Kevin Bedell [email protected]
Senior Editor
James Turner [email protected]
Health Care and Biotechnology Editor
Dan Bent [email protected]
Industry News Editor
Steven Berkowitz [email protected]
LAMP Technologies Editor
Martin C. Brown [email protected]
Desktop Technologies Editor
Mark R. Hinkle [email protected]
Gaming Industry Editor
Dee-Ann LeBlanc [email protected]
Advocacy Editor
Steve Suehring [email protected]
Contributing Editors
Ibrahim Haddad [email protected]
Bruce Byfield [email protected]
Rachel Morrison-Walker [email protected]
Maria Winslow [email protected]
[INTERNATIONAL ADVISORY BOARD]
Wim Coekaerts, Director of Linux Engineering
Oracle
Brian E. Ferguson, Partner
McDermott, Will & Emery
John Fowler, CTO, Software
Sun Microsystems
Gaël Duval, Cofounder/Director of Communication
MandrakeSoft
Samuel J. Greenblatt, Senior Vice President
and Chief Architect, Linux Technology Group
Computer Associates
Scott Handy, Director of Linux Software Solutions
IBM
Bruce Perens
Perens, LLC
Simon Phipps, Chief Software Evangelist
Sun Microsystems
Stacey Quandt, Principal Analyst
OSDL
Thomas Reardon, VP and General Manager,
Client Product Group
Openwave Systems
Alan Williamson
SYS-CON Media
John Weathersby, Executive Director
Open Source Software Institute
[
EDITORIAL
]
Managing Editor
Jennifer Van Winckel [email protected]
Editors
Gail Schultz [email protected]
Nancy Valentine [email protected]
Jamie Matusow [email protected]
Jean Cassidy [email protected]
Research Editor
Bahadir Karuv, PhD [email protected]
[
OFFICES
]
SYS-CON MEDIA
135 Chestnut Ridge Rd. • Montvale, NJ 07645
Telephone: 201 802-3000 • Fax: 201 782-9600
LinuxWorld Magazine
(ISSN #1544-4511)
is published monthly (12 times a year)
by SYS-CON Publications, Inc.
Postmaster send address changes to:
LINUXWORLD MAGAZINE
SYS-CON MEDIA
135 Chestnut Ridge Rd. • Montvale, NJ 07645
COPYRIGHT © 2004 BY SYS-CON PUBLICATIONS, INC.
ALL RIGHTS RESERVED. NO PART OF THIS PUBLICATION
MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR
BY ANY MEANS, ELECTRONIC OR MECHANICAL, INCLUDING
PHOTOCOPY OR ANY INFORMATION, STORAGE AND
RETRIEVAL SYSTEM, WITHOUT WRITTEN PERMISSION.
FOR PROMOTIONAL REPRINTS, CONTACT REPRINT
COORDINATOR.SYS-CON PUBLICATIONS, INC., RESERVES
THE RIGHT TO REVISE, REPUBLISH AND AUTHORIZE ITS
READERS TO USE THE ARTICLES SUBMITTED FOR
PUBLICATION. ALL BRAND AND PRODUCT NAMES USED
ON THESE PAGES ARE TRADE NAMES, SERVICE MARKS,
OR TRADEMARKS OF THEIR RESPECTIVE COMPANIES.
WORLDWIDE NEWSSTAND DISTRIBUTION
CURTIS CIRCULATION COMPANY, NEW MILFORD, NJ
NEWSSTAND DISTRIBUTION CONSULTANT
GREGORY ASSOCIATES / W.R.D.S.
732-607-9941 – [email protected]
FOR LIST RENTAL INFORMATION:
Kevin Collopy: 845 731-2684, [email protected]
Frank Cipolla: 845 731-3832, [email protected]
LINUX IS A REGISTERED TRADEMARK OF LINUS TORVALDS
LINUXWORLD® IS THE REGISTERED TRADEMARK OF
INTERNATIONAL DATA GROUP, INC.
SYS-CON IS USING THE MARK PURSUANT
TO A LICENSE AGREEMENT FROM IDG
www.LinuxWorld.com
Insanely Great
Linux Devices?
I’m waiting for Linux’s Steve
electronics with advanced features,
but primative form and style.
But now combine these ideas with
Jobs to arrive.
some of the great innovations happening in porting Linux to custom
ou know what I mean? A
hardware platforms and things start to
person who can take this
look a little different.
technology and turn it into
For example, Cyclades is now sellsome amazing consumer
ing a small console server that’s a
products. “Insanely Great”
BY KEVIN BEDELL
Linux-based device about the size of a
products.
pack of cigarettes. Another example is
“Insanely Great” was what Steve
demanded of his engineers at Apple when they cre- the Motorola A760 cell phone. Both of these are
custom pieces of hardware that run Linux, are easy
ated the Mac together. “Insanely Great” meant that
to use, and have stability requirements far beyond
it was so advanced it was easy. It was better than
the average Windows-based PC. Both of these also
anything the competition was doing by far.
offer feature sets that are far beyond similar, nonLinux is capable now of being used to build
Linux-based products.
insanely great machines. I know it is. I’ve seen what
What would happen if we were to
so many people are doing with Linux; I’m concombine these ideas? We’d get Linuxvinced of it.
based consumer electronics that are easy
But to do so will require a complete
to use, are highly stable, and have capachange of mindset.
bilities far beyond other products.
For example, I recently reviewed
For example, what if someone crethe book Linux Toys: 13 Cool
ated a custom device the size of an
Projects for Home, Office and
iPod with 50 Gig of hard drive space, a
Entertainment by Christopher
built-in wireless network connection, a
Negus and Chuck Wolber (ISBN
voice modem, and an embedded Linux
0764525085). In it were a bunch of
distribution?
really cool, nerdy projects like
Then you could have a high-end voice
building a digital video recorder,
mail system that you could simply plug
or a digital jukebox, or digital picyour phone line into and configure from a
ture frame display out of old combrowser on your desktop. It could send your
puters running Linux and free/open
voice messages to you via e-mail and archive years
source software.
worth of old messages if you wanted it to.
Another really neat project was to build a full
Now, that would be insanely great.
featured voice mail system with multiple mailboxes, the ability to check your voice mail over
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
the Internet, and automatic e-mailing of voice
A B O UT TH E E D ITO R
messages to your e-mail box.
The only problem was that they were all cobKevin Bedell is editor-in-chief of LinuxWorld
bled together with whatever parts happened to be
Magazine. He holds a BS degree in engineering from
lying around; they took hours to build; and they
Michigan Tech and an MBA from The Crummer
took pretty deep knowledge to make them work.
Graduate School of Business at Rollins College. Kevin
(Of course, if you’re a computer nerd like me then
is a seasoned software professional who has coauthat’s just a pretty decent way to kill a few hours
thored books for SAMS and O’Reilly Associates and
over a weekend...)
who writes and speaks on Linux, open source, and
Regardless of how clunky they may be, they are
other software development topics.
still all actual, working devices. They’re consumer
[email protected]
Y
7
MAY 2004
Network backup seems insurmountable
if you don’t have the right solution.
Introducing Arkeia 5.2
The right solution.
files within a single directory and up to 50 times faster for
150,000 files!
If you’re responsible for protecting your company’s heterogeneous
network, the Arkeia 5.2 Linux or Unix backup server solution is
just what you’ve been looking for.
We’ve also expanded GUI capabilities for maximized security.
You can easily clone tapes for off-site storage. Combine this
with Arkeia’s Disaster Recovery module, and you can
automatically rebuild servers from scratch if they are destroyed
or stolen.
Arkeia has always been noted for powerful, scalable, reliable and
cost-effective backup solutions. Now we’ve added even more
options to give you greater control and ease of use.
New features, greater benefits
Our completely redesigned reporting functions allow you to
produce highly customizable machine-based reports as well as
more developed messages that inform you about successful
operation completion.
Quantum DLTSage™ support for SDLT tape devices helps you
predict and prevent storage system errors.
An optimized catalog algorithm lets you dramatically increase
backup speed for large file servers—five times faster for 10,000
In addition, a new hot backup plug-in is available for
MS-Exchange that complements our online backup solutions
for Oracle, Lotus, DB2 and MySQL.
Try Arkeia 5.2 for 30 days. Free!
The best way to prove that Arkeia 5.2 is the right solution for
you is to let you try it—
FREE—for 30 days. We’ll
even include free installation
tech support. Simply
download the demo version
www.arkeia.com
at www.arkeia.com.
GUEST EDITORIAL
The World’s Leading i-Technology Publisher
President & CEO
Fuat Kircaali [email protected]
Open Standards vs Open Source
VP, Business Development
Grisha Davida [email protected]
Group Publisher
Jeremy Geelan [email protected]
[
The benefits and market
]
ADVERTISING
Senior VP, Sales & Marketing
Carmen Gonzalez [email protected]
VP, Sales & Marketing
Miles Silverman [email protected]
Director of Sales and Marketing
Megan Mussa [email protected]
Advertising Director
Robyn Forma [email protected]
Advertising Sales Managers
Alisa Catalano [email protected]
Carrie Gebert [email protected]
Associate Sales Managers
Kristin Kuhnle [email protected]
Beth Jones [email protected]
[
PRODUCTION
]
Production Consultant
Jim Morgan [email protected]
Art Director
Alex Botero [email protected]
Associate Art Directors
Louis F. Cuffari [email protected]
Richard Silverberg [email protected]
Tami Beatty [email protected]
[
]
SYS-CON EVENTS
President, Events
Grisha Davida [email protected]
Conference Manager
Lin Goetz [email protected]
National Sales Manager
Sean Raman [email protected]
[
C U S T O M E R R E L AT I O N S
]
Circulation Service Coordinators
Shelia Dickerson [email protected]
Edna Earle Russell [email protected]
Linda Lipton [email protected]
[
]
SYS-CON.COM
VP, Information Systems
Robert Diamond [email protected]
Web Designers
Stephen Kilmurray [email protected]
Christopher Croce [email protected]
Online Editor
Lin Goetz [email protected]
[
ACCOUNTING
]
Financial Analyst
Joan LaRose [email protected]
Accounts Receivable
Charlotte Lopez [email protected]
Accounts Payable
Betty White [email protected]
[
SUBSCRIPTIONS
]
[email protected]
For subscriptions and requests for bulk orders,
please send your letters to Subscription Department
Cover Price: $5.99/issue
Domestic: $49.99/yr (12 issues)
Canada/Mexico: $79.99/yr
all other countries $99.99/yr
(U.S. Banks or Money Orders)
Back issues: $12 U.S. $15 all others
www.LinuxWorld.com
Would IBM give up its quest to
dominate the hardware and services
market if open source and Linux had
opportunities provided by open
never come along? Would Oracle throw
in the towel and stop selling its datastandards far outweigh those derived
base for proprietary operating systems?
Would Amazon.com close its virtual
from open source. While the software
doors? Would governments cease critical services if they could not install an
development market has certainly
BY TYLE R J E N S E N
operating system without paying a
license fee for it?
benefited remarkably from open
The real question is where would we be without
open standards? Without HTTP there would be no
source, open standards and protocols such as
Amazon.com. Without TCP/IP there would be no
Internet. Without SMTP there would be no spam.
TCP, HTTP, and XML have made it possible for
Well, okay, maybe that would not be such a bad
thing. Without Ethernet there would be no LAN for 20
developers and software vendors to participate
bucks a node. Without XML there would be no easy
way for disparate systems to work together. Without
in the most rapid technological progression of
SOAP there would be no Web services. Without SSL
there would be no e-commerce. Without develophumanity in the history of the world.
ment language standards such as ANSI, C++, and
SQL 93, people like me would be lost in a sea of proithout question open source has
prietary languages and unique development tools.
been a boon to software developers. While you may not find many Indeed, without all of these open standards and
more, open source would be without purpose or
lines of Linux code in the propridirection, without a skeleton on which to build the
etary applications software sold
muscle and sinew that brings technology to life.
for systems running Linux and
Standards bodies such as ANSI, ISO, ECMA, W3C,
other operating systems, you will undoubtedly
and IEEE are the guardians and keepers of the techfind developers and software products that have
nological compacts that have made it possible for
benefited either directly or indirectly from the
us to leap from the punch cards of 40 years ago to
buoyant properties of the open source communiwhere we are today. Let us salute them and their
ty and its shared intellectual library of solutions to
many members who work tirelessly to the benefit of
common software development challenges.
us all. Because of their work, I can plug my computAn understanding of the underpinnings of the
er into an Ethernet jack anywhere in the world and
operating system and its source code levels the
be on the network. I can buy books from Amazon.
playing field for the applications market. This may
com securely with the browser software of my
even lead vendors of proprietary operating syschoice. And I can jump on the Internet with a wiretems, who also compete in the applications marless card in any one of thousands of locations
ket, to think twice before taking unfair advantage
across the globe to check my e-mail, chat with
of insider knowledge.
friends, post a letter to the editor, or just catch up
Despite the sizable contribution of open source to
on the news in my small rural hometown.
the world of technology, the assumption that open
source and Linux are responsible for an economic
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
bonanza for those companies that have embraced
A B O UT TH E A UTH O R
them is questionable. One must ponder the possibility that HP would have sold $2.5 billion in hardware,
Involved in enterprise application architecture and
proprietary software, and services referred to as
development for over 10 years, Tyler Jensen is a
“Linux-based” with an alternative operating system
senior technical consultant in a large health
if Linux and the open source concept did not exist
intelligence company, designing and developing
because HP’s customers would have required those
claims processing and analysis software. In his spare
goods and services regardless of the existence of
time he does a little writing and outside consulting.
open source and Linux.
[email protected]
W
9
MAY 2004
CGL
Linux Gains
Momentum in Telecom
What do carrier grade environments
require from Linux?
OSDL’s Carrier Grade Linux working group is hard at work on an open source
BY
I B R A H I M
H A D D A D
Cluster Project (see references), which aims
to develop clustering services for Linux.
platform for the telecom industry. This article describes the goals, structure, and
CGL Subgroups
working groups of CGL; presents the CGL architecture; and provides an overview of
the CGL 2.0 requirements.
he Linux kernel does not meet telecom requirements in various areas,
including reliability, security, and
scalability. Open Source
Development Labs (OSDL) has
established the Carrier Grade Linux
(CGL) working group to specify and help
implement an open source platform targeted
for the communication industry that is highly
available, secure, scalable, and easily maintained. CGL is composed of several member
companies that are contributing to the
requirement definition of CGL, helping open
source projects to meet these requirements,
and in some cases starting new open source
projects such as the OSDL cluster project.
Many of the CGL member companies have
contributed technologies to open source to
allow the Linux kernel to be a viable option
for telecom platforms. For instance, Ericsson
has contributed the Telecom IPC, the
Asynchronous Event Mechanism, and the
T
Distributed Security Infrastructure. In parallel, Linux distributions such as MontaVista
are providing distributions based on the CGL
requirement definitions. As for deployment,
quite a few companies are evaluating, experimenting with, or deploying CGL.
CGL Working Group
Ibrahim Haddad, contributing editor of LWM,
is a researcher in the Research & Innovation
Unit at Ericsson Research in Montreal, Canada.
He contributed to Richard Petersen’s books,
Red Hat Linux Pocket Administrator and
Red Hat Enterprise Linux & Fedora Edition:
The Complete Reference (DVD Edition),
published by McGraw-Hill/Osborne. Ibrahim is
currently a Dr. Sc. Candidate at Concordia
University in Montreal.
[email protected]
Carrier Grade Linux (CGL) is a working
group in OSDL that was established in
January 2002. The group aims to enhance the
Linux operating system with carrier grade
characteristics; it is defining specifications for
an operating system with carrier grade characteristics as well as tools to support software
development for carrier grade systems.
CGL has the vision that next-generation
communication services can be delivered
using open standards and Linux-based platforms on carrier grade equipment. To
achieve this goal, the working group is defining the requirements and architecture for
the Carrier Grade Linux platform, upon
which commercial components and services
can be deployed.
As part of creating the requirements definition, the group is identifying existing
open source projects that support the
roadmap and implement required components and interfaces. When an open source
project does not exist to support a certain
requirement, OSDL CGL launches (or supports the launch of) new open source projects to implement missing components
and interfaces. One example is the OSDL
MAY 2004
10
A B O UT
TH E
A UTH O R
The CGL working group consists of three
distinct subgroups that work together:
Specifications, Proof-of-Concept, and
Validation. Explanations of the responsibilities of each subgroup follow.
• Specifications: The specifications subgroup is responsible for defining the
requirements that lead to enhancements
in the Linux operating system that are
useful for carrier grade implementations
and applications.
• Proof-of-Concept: This subgroup drives
the implementation and integration of
core carrier grade enhancements to
Linux as identified and prioritized by the
requirement document. The group is
also responsible for ensuring that integrated enhancements pass the Carrier
Grade Linux validation test suite and for
establishing and leading an open source
umbrella project to coordinate implementation and integration activities for
Carrier Grade Linux enhancements.
• Validation: This subgroup defines standard test environments for developing
validation suites. It develops validation
suites to ensure that all of the Carrier
Grade Linux requirements are covered.
CGL 2.0 Contributors
The key participants in the CGL working
group include:
• Network equipment providers: Alcatel,
Cisco, Ericsson, Fujitsu, Hitachi, and Nokia
• System integrators: HP, IBM, and Sun
• Platform providers: Intel and Force
Computers
• Linux distributors: MontaVista, Miracle
Linux, SUSE, and TurboLinux. CGL works
www.LinuxWorld.com
CGL
closely with Linux distributions to
ensure that CGL functionality is adopted
in their offerings.
As for new contributors to CGL 3.0, the
following companies have recently joined
OSDL in contributing to CGL: NTT,
WindRiver, TimeSys, and Ulticom.
Target CGL Applications
CGL 2.0
Requirements Definition
The requirements definition document of
CGL version 2.0 introduces new and
enhanced features to support Linux as a carrier grade platform. The complete requirements
document is available for download from the
OSDL Web site. It consists of 105 pages; the
following brief summary of the main categories should satisfy the impatient for now.
and provide special mechanisms at kernel
level to be used by telecom applications.
Standards
These requirements specify standards
that are required for compliance. Examples
of these standards include:
• Linux Standard Base
• POSIX Timer Interface
• POSIX Signal Interface
• POSIX Message Queue Interface
• POSIX Semaphore Interface
• IPv6 RFCs compliance
• IPsecv6 RFCs compliance
• MIPv6 RFCs compliance
• SNMP support
• POSIX threads
Clustering
These requirements support the use of
multiple carrier server systems to provide
higher levels of service availability through
redundant resources and recovery capabilities, and to provide a horizontally scaled environment supporting increased throughput.
Security
The security requirements are aimed at
maintaining a certain level of security while
not endangering the goals of high availability, performance, and scalability. The requirements support the use of additional security
mechanisms to protect the systems against
attacks from both the Internet and intranets,
Platform
OSDL CGL specifies requirements that
support interactions with the hardware
platforms making up carrier server systems.
Platform capabilities are not tied to a particular vendor’s implementation. Examples
of the platform requirements include:
• Hot insert: Supports hot-swap insertion
of hardware components
• Hot remove: Supports hot-swap removal
of hardware components
• Remote boot support: Supports remote
booting functionality
• Boot cycle detection: Supports detection
of reboot cycles due to recurring failures
Software Development Tools
The CGL working group has identified
three main categories of application areas
in which they expect the majority of applications implemented on CGL platforms to
fall.
• Gateways: Bridges between two different
technologies or administration domains.
A gateway processes a large number of
small messages received and transmitted
over a large number of physical interfaces. Gateways perform in a timely
manner, very close to hard real time.
• Signaling servers: These handle call control, session control, and radio recourse
control. Signaling servers require soft
real-time response capabilities and may
manage tens of thousands of simultaneous connections. A signaling server
application is context switch and memory intensive due to requirements for
quick switching and a capacity to manage large numbers of connections.
• Management servers: These handle traditional network management operations, as well as service and customer
management. Typically, management
applications are data and communication intensive.
Linux Requirements Definition, version
2.0 (CGL 2.0). This latest requirement
definition for next-generation Carrier
Grade Linux offers major advances in
security, high availability, and clustering.
Applications
Carrier Grade Linux Architecture
Figure 1 presents the scope of the CGL
working group, which covers two areas:
• Carrier Grade Linux: Various requirements, such as availability and scalability, are related to the CGL enhancements
to the operating system. Enhancements
may also be made to hardware interfaces, interfaces to the user level, or
application code and interfaces to development and debugging tools. In some
cases, to access the kernel services, userlevel library changes will be needed.
• Software development tools: These tools
will include debuggers and analyzers.
On October 9, 2003, OSDL announced
the availability of the OSDL Carrier Grade
MAY 2004
HA, Management,
and Services Middleware
Standard Interfaces
(LSB, POSIX...)
High Availability Interfaces
Service Interfaces
Linux Kernel with Carrier Grade Enhancements
Hardened Device Drivers
Hardware Configuration &
Management Interfaces
Co-Processor Interfaces
High Availability Hardware Platforms
FIGURE 1
CGL SCOPE AND ARCHITECTURE
12
www.LinuxWorld.com
CGL
• Diskless systems: Support for diskless
systems, which load and run applications via the network
• Support for remote access to event log
information
Performance
Availability
The availability requirements support
heightened availability of carrier server systems by improving the robustness of software components or by supporting recovery from failure of hardware or software.
Examples of these requirements include:
• RAID 1: Support for RAID 1 offers mirroring to provide duplicate sets of all
data on separate hard disks.
• Watchdog timer interface: Support for
watchdog timers to perform certain specified operations when timeouts occur.
• Support for disk and volume management: To allow grouping of disks into
volumes.
• Ethernet link aggregation and link
failover: Support bonding of multiple
NIC for bandwidth aggregation; also
provide automatic failover of IP addresses from one interface to another.
• Support for application heartbeat monitor: Monitor application availability
and functionality.
Serviceability
The serviceability requirements support
servicing and managing hardware and
software on carrier server systems. These
are wide-ranging requirements that, when
put together, help support the availability
of applications and the operating system.
Examples of these requirements include:
• Support for producing and storing kernel dumps
• Support for dynamic debug of the kernel
and running applications
• Support for platform signal handler,
enabling infrastructures to allow interrupts
generated by hardware errors to be logged
using the event-logging mechanism
OSDL CGL specifies the requirements
that support performance levels necessary
for the environments expected to be
encountered by carrier server systems.
Examples of these requirements include:
• Support for application (pre)loading
• Support for soft real-time performance
through configuring the scheduler to
provide soft real-time support with
latency of 10 ms
• Support for kernel preemption
• Raid 0 support to enhance performance
Scalability
These requirements support vertical and
horizontal scaling of carrier server systems,
such as the addition of hardware resources
for increased capacity.
Tools
The tools requirements provide capabilities to facilitate diagnosis. Examples of
these requirements include:
• Support for the usage of a kernel debugger
• Support for kernel dump analysis
• Support for debugging multithreaded
programs
CGL 3.0
CGL activities are providing momentum for
Linux in the telecom space, allowing it to be a
viable option to proprietary operating systems. The work on the OSDL CGL requirements, version 3.0, started in January 2004
with focus on the following requirement areas:
1. APIs/specifications/standards:
References to useful and necessary existing standards and interface specifications
2. Availability: Useful and necessary functionality for single-node availability and
recovery
3. Clustering: Useful and necessary components to build a clustered set of individual systems
4. Hardware: Useful and necessary hardware-specific support that affects the
expected carrier operating environment
5. Performance: Useful and necessary features that contribute to adequate performance of a system
6. Security: Useful and necessary features
for building secure systems
7. Serviceability and tools: Useful and necessary features for servicing and maintaining a system, and coverage of tools
that support this as well as support the
other sections
The official release of CGL 3.0 is expected
in October 2004.
Open Invitation to Participate
Linux with carrier grade characteristics
provides an essential building block that will
allow us to build open communication platforms. CGL is a community effort, based on
cooperation between companies and individuals, and participation is open to everyone. Please consider this as an invitation to
get involved in this effort and contribute to
the making of Linux as an alternative operating system for communication platforms.
Is this a step for Linux toward world
domination? Only time will tell...
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
References
• OSDL: www.osdl.org
• CGL: www.osdl.org/lab_activities/
carrier_grade_linux
• MontaVista: www.mvista.com
• Open System Lab: www.linux.ericsson.ca
• TIPC: http://tipc.sourceforge.net
• AEM: http://aem.sourceforge.net
• DSI: http://disec.sourceforge.net
• Linux kernel: www.kernel.org
“CGL activities are providing momentum for
Linux in the telecom space, allowing it to be a
viable option to proprietary operating systems”
www.LinuxWorld.com
13
MAY 2004
Advertorial
GO-Global Solutions for Linux
Simple and affordable cross-platform application publishing
Applications
run on
Windows
Server
Applications
run on
Linux or
UNIX Server
The GO-Global® family from
Near-Zero-Footprint
Only display commands
GraphOn® is a fast, simple,
Network
Network
and mouse/keyboard
Clients
events are transmitted
affordable application publishing
GO-Global provides you with
over the network
and Web-enabling solution. Using
advanced, near-zero-footprint
advanced server-based computing
clients. You simply use a Java
technology and near-zero-footprint
applet, a browser plug-in, or a
clients, GO-Global enables easy,
tiny native client to run your
Linux or UNIX clients display
Windows clients display Linux
cross-platform application access
applications on any networkWindows application GUI
or UNIX application GUI
from anywhere in the world –
attached device.
regardless of connection, location
or platform. So now you can run Windows
Completing the Linux Desktop
Eliminating WTS and Citrix
programs on your Linux and UNIX clients –
GO-Global for Windows is the ideal complement
GO-Global for Windows eliminates the need
and Linux and UNIX programs on your
to Linux desktop environments. Now your
for additional infrastructure such as Windows
Windows clients – without modifying a single
Linux desktops have easy access to Windows
Terminal Services (WTS) or Citrix MetaFrame.
line of code or adding infrastructure such as
applications, including productivity tools such
And unlike WTS, multiple GO-Global sessions
Citrix, Windows Terminal Services, or local
as Microsoft Office.
can run with a single instance of the 32-bit
X Server software.
Windows subsystem.
Deploying Linux Applications
GO-Global for Windows
No Local X Server Software
GO-Global for UNIX makes it easy to deploy
■ Provides instant access to Windows
Linux and UNIX applications to your local,
Deploying, maintaining and managing X
applications from Linux and UNIX platforms,
remote and mobile users, regardless of their
Server-based applications can be costly and
while retaining 100% of the application’s
device, platform or operating system.
time-consuming. And the high bandwidth
features, functions and branding
requirements dictate a LAN connection. With
Increasing Efficiency
■ Provides Linux desktop users with familiar
GO-Global’s simplified, near-zero-footprint
The GO-Global family greatly increases your
clients, the X Server software runs only on the
productivity tools such as Microsoft Office
operational
efficiency.
With
highly
scalable,
server. So your organization saves time, money
■ Eliminates the need for Microsoft Windows
centralized
application
deployment,
the
ability
and IT resources.
Terminal Services, Citrix MetaFrame, or other
to
leverage
corporate
networks
and
the
Web,
infrastructure
The Invisible Solution
and easy cross-platform access, you’ll be able to
■ Publishes application GUI only, not the entire
reduce operating costs, lower bandwidth
GO-Global is invisible to your users. WebWindows desktop
consumption, and eliminate retraining and
enabled applications look and feel exactly the
■ Integrates fully with existing management
reengineering costs. What’s more, GO-Global
same as natively running applications. And as an
publishes only the application’s user interface
ISV or an enterprise, you can private label the
infrastructure
across the network, not the entire desktop. This
solution to promote your own branding.
GO-Global for UNIX
greatly improves speed and performance.
For More Information
■ Provides instant access to Linux and UNIX
The Secure Solution
Call GraphOn at 1.800.GRAPHON or visit
applications from any PC or device, while
Unlike distributed applications, with GO-Global’s www.graphon.com/linux
retaining 100% of the application’s features,
unique architecture your applications and
functions and branding
mission-critical data remain secure on the server
■ Eliminates the need for local X Server software
behind your corporate firewall. Only the
■ Maximizes investments in existing Linux and
application’s user interface is transmitted to
UNIX applications, eliminating the need for
your remote devices. All transmissions are
rewrites or add-ons
fully encrypted, with GO-Global for UNIX
Access to Applications Anywhere.
■ Publishes application GUI only, not the entire
supporting Secure Socket Layer (SSL)
technology.
www.graphon.com/linux
Linux or UNIX desktop
W
I
N
D
O
W
S
A
N
D
L
I
N
U
X
I
N
Linux on your
office desktop.
T
E
G
R
A
T
I
O
N
Office on your
Linux desktop.
®
Good Move.
Genius Move.
GO-Global makes it easy to run MS Office (or any other Windows applications) on your Linux desktop.
Linux on your desktop is a great idea. An even better idea is the ability to instantly access your favorite
Windows® programs. GO-Global® from GraphOn® is a fast, simple, affordable application publishing and
Web-enabling solution. Using advanced server-based computing technology and near-zero-footprint clients,
GO-Global enables application access from anywhere in the world – regardless of connection, location or
platform. So now you can finally run Windows programs on your Linux and UNIX clients. And UNIX
and Linux programs on your Windows clients. All without modifying a single line of code – or adding infrastructure such as Citrix,® Windows Terminal Services, or local X Server software. To download your free
trial, visit www.graphon.com/linux or call 1.800.GRAPHON. Then you’ll be the one they call a genius.
Access to Applications Anywhere.
© 2004 GraphOn Corp. All rights reserved. GraphOn, the GO logo, and GO-Global are trademarks or registered trademarks of GraphOn Corporation. Citrix is a registered trademark of Citrix Systems. Windows and Office are registered trademark of Microsoft Corporation. All other trademarks belong to their respective owners.
W
W
W .
G
R
A
P
H
O
N
.
C
O
M
/
L
I
N
U
X
VIRTUALIZATION
The Functionality
of the Future Is Here
With the advent of Linux and clustered blade servers,
distributed virtual computing has become a reality
Computing virtualization is a popular term these days, but the concept is far
from new. Back in the sixties, Star Trek’s Captain Kirk had the ideal virtual computer.
Aboard ship, he called out his question or command and the computer responded.
He never had to tell it which drive to access, which application to load, or what
routing to take when he wanted to see something up on screen. And he never
worried about where or how the computer did its job.
ack when Gene Roddenberry created that show, such a computer
probably seemed far-fetched. But
while no one can say when someone will discover transporters,
warp drives, or dilithium crystals,
virtual computing is becoming a reality. The
combination of the Linux operating system
with clustered blade servers means that distributed virtual computing is fast becoming
a means of high-performance, always available, ubiquitous computing.
B
“virtualized environments” in which all
resources are available in parallel to any
other resource in a compute area network.
In the mid-sixties the Massachusetts
Institute of Technology (MIT) developed
what was known as CP-67 and later evolved
into IBM’s Virtual Machine Architecture. It
A New Model
BY
S A M
G R E E N B L AT T
technical issue; it was also a financial one.
The key was to reduce the cost of administration, the network, storage, software, and
hardware. Doing this would free up money
for companies to spend on the new applications that they needed.
Now, with the advent of Linux and clustered blade servers, distributed virtual
computing has become a reality. This architecture leverages resource virtualization,
bringing together both the manageability of
centralized infrastructure and the flexibility
of compute area networks.
This concept goes by many different
names. Computer Associates calls it
Management On Demand, Hewlett-Packard
uses the term Utility Computing, IBM calls
it On Demand, and at Sun Microsystems it’s
Grid Computing. Whatever name you prefer to use, they all describe the ability of
enterprises to deploy resources when and
where needed. Rather than the old paradigm where the users send the work to a
particular resource, under the new model,
the resources move to where the work is.
The Technology Trio
Since the inception of the modern-day
computing model we have strived to create
Sam Greenblatt, senior vice president and
chief architect for CA’s Linux Technology
Group, is responsible for the company’s
cross-brand integration of Linux technology.
He joined CA in 1994 and has held senior
management positions in cross-platform
product strategy and development. Prior to
CA, Sam was chief technology officer and vice
president of research and development
at Candle Corporation. He has also held
management positions at ARCO, Commodore
International, and Arthur Andersen.
[email protected]
was an excellent architecture for provisioning a large set of resources centralized in a
single processor. This model reduced the
cost of infrastructure by centralizing
administration while distributing resources.
But while the virtual machine architecture works great for mainframe computing,
it did not lend itself to the complexity of
services that were required for a distributed
computing environment. So, for the next 40
years the search was on for a way to make
the virtual paradigm available within a distributed environment. This was not just a
Creating such a network is not a hardware problem – enterprises already have
plenty of that. They spend fortunes on idle
CPUs, empty disks, and unused bandwidth
just to make sure that any server or connection can handle that random peak load that
might come its way. Instead virtual computing poses a management problem –
how to continually reallocate resources for
maximum effect. On Demand computing
breaks the lock that any single device has
on the ability to provide a service. Strength
is then measured not by a component’s
specifications, but by the power of the
entire network. This requires a new level of
management capability.
MAY 2004
16
www.LinuxWorld.com
A B O UT
TH E
A UTH O R
NOT
NOT
NOT
NOT
NOT
NEW
EXCITING
COMPLEX
IMPROVED
FLASHY
(proven)
(no surprises)
(easy to install, configure)
(same consistent technology)
(just plain works)
For more than 20 years, Comtrol has delivered consistent, reliable device connectivity
technology without a lot of marketing hype.
Look to the serial device networking specialists for multiport and multimodem
expansion cards, USB-connected multiport serial hubs, and
Ethernet-attached device and application servers.
For free phone consultation contact Comtrol today.
w w w. c o m t r o l . c o m
800-926-6876
Products manufactured and supported in the U.S.A.
© 2004 by Comtrol Corp. All rights reserved.
VIRTUALIZATION
Computer Associates, like other management software companies, has redefined the reality and economics of On
Demand. Using management software on
top of Linux can reduce both capital and
operational costs. Also, management of
Linux optimizes the availability of every
application on multiple platforms. This is
done by creating a complete family of software that exploits Linux clustering technology, network technology, and storage
subsystems. It gives enterprises the ability
to dynamically provision the compute area
network.
Creating such a network requires the
technology trio of storage virtualization,
network virtualization, and finally, compute virtualization.
Compute Virtualization
The Management Evolution
Compute virtualization is the third component necessary to effectively achieve scaling,
whereby rather than having a predetermined
set of processors assigned to a particular user
or task, the system dynamically assigns
processors, bringing additional power to a
process through the use of clustering technology. An “enterprise workload dispatcher”
routes work based upon resources and utilization. This requires the ability to monitor
the resource utilization of a transaction and
correlate it to its service level.
These three components are the foundation for managing virtual computing.
A virtualized Linux environment is a
breakthrough in hardware and software
built for scalable applications, but it only
works when overseen by enterprise-class
tools offering functions such as load balancing, security, storage, and database
management in a virtualized environment.
Being able to dynamically provision a
user’s resources and security will drive the
utilization rate from the current low of 20%
up to a high 90% range. The ability to
dynamically shift processors to the work
means a business no longer has to buy significant excess peak capacity. With dynamic
provisioning of a compute area network,
providing new servers can be achieved in
minutes and new processors are then placed
in a pool. This enables businesses to focus
on the scale of applications that previously
were neither economic nor plausible.
Computer Associates, along with other
vendors, is providing the management
infrastructure which sits above the virtualized environment and enables the evolution in enterprise-class computing. These
virtualization toolsets completely aggregate
processing, storage, and networking into
resource pools that are allocated based
upon workload. The tools encompass IP
and storage networking, clustering, load
balancing, hardware failover, management
consoles, and secure partitioning.
Virtualization replaces static, physical
hardware with dynamic software equivalents.
A server is no longer dedicated to individual
applications, and services are not tied to specific hardware or network paths. Virtualization software automatically reprovisions and
reallocates resources based on service-levels
required to meet business requirements. It
provides adaptable, high-quality services at a
lower total cost of ownership since it prevents resource overprovisioning.
With the management tools in place,
administrators can move to a higher level of
resource management. It is no longer a matter of just dealing with boxes and their interconnections. Instead the job evolves into
one of strategically administering services
through a geographically dispersed set of
computing resources running homogeneous
platforms such as Linux. And that moves us
one step closer to the level of functionality
enjoyed by Captain Kirk and the Starship
Enterprise.
Enter the Penguin
Network virtualization drives storage virtualization by providing a multi–point-topoint connection that enables any system
to access any storage at any point on the
network. In Linux, the virtualization is realized through virtual servers using technology such as bonded dual nets and routed
mesh networks. Balancing the network traffic requires a heuristic approach based on
service levels. With network virtualization,
administrators are able to prioritize service
levels within a domain or within a system
of the enterprise.
Virtualization answers questions about utilization of the enterprise infrastructure, and
the fact that infrastructure is unresponsive to
changes in the environment. An underutilized
and unresponsive infrastructure seriously
impacts quality of service, which then
impacts the bottom line. Linux helps reduce
infrastructure complexity – the Linux platform delivers a common denominator that
can run on multiple platforms and enables a
view of Linux clusters as a single system.
Virtualization with Linux drives toward having the resources from all enterprise data centers appear within a single resource pool. That
pool can then be utilized in projects based on
business requirements. The resources allocated to projects are determined by policy-driven services that intelligently monitor and
manage the overall computing environment.
The architecture requires that the environment be broken down into provisioning, policy-driven business initiatives, automation,
and use of resources directly derived from
these areas. Hiding the complexity of the
network, storage, processor, database, Web
applications, and host-based applications is
critical to creating this environment. The
ability to connect all these pieces is mandatory in order to translate a unit of work within a business process to the enterprise.
The architecture enables both high availability and security. Using Linux projects
such as Beowulf, Cplant, Paris, Linux High
Availability, and Linux Virtual Server creates
this new platform. CA is currently developing
the infrastructure to manage the clustered
environment, which will enable companies
to use blades or enterprise servers such as
Egenera Blade Frame and IBM z to leverage
Linux for mission-critical applications.
MAY 2004
18
Storage Virtualization
Companies are looking for an end-toend storage solution that has the ability to
provision within the context of the complete system – including resources external
to the enterprise. That’s not how it is done
today. Today storage is generally provisioned on a per-user basis, without considering application usage or placement within the network. A better approach is to provision based on context rather than require
a Storage Area Network or a rigid file system. This can be done using a database or
metadata approach incorporating Storage
Networking Industry Association (SNIA)
standards for interoperability and storage
management. This approach is necessary
to realize such an end-to-end solution in
which storage resource management
extends beyond the virtualization concept
and into the area of analyzing the utilization of storage across the network, the
transaction, and the users.
Network Virtualization
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
Now, Raritan
gives the
serial world
complete
control.
© 2004 Raritan Computer, Inc.
TM
The New Dominion SX Secure Console Server.
If you can access the Internet, you can control everything, both near and far. No extra client software. No server software.
Just secure and convenient access from a JavaTM – enabled browser, delivering secure console access and direct command
line control of every device.
Everything you expect in an enterprise-class secure console server, plus advanced features that you don’t always find:
128-bit SSL security with RC4 encryption, custom TCL scripting for streamlined
administration, and an integrated modem for complete network independence.
Available with 4, 8, 16 or 32 ports. And like every Raritan product, it provides the
flexibility to be deployed individually or integrated in an enterprise-wide data
center management solution.
Schedule an Online Demo from
your desktop and get a FREE
USB Memory Stick key chain.
call1-800-724-8090 x902
or visit www.raritan.com/902
DR. MIGRATION
Guide to Linux on the
Business Desktop Part 2 of 3
Adventures in laptop shopping
BY
In Part 1 of this series (LWM Vol. 2, issue 4), Dr. Migration analyzed some
M A R K
R.
H I N KL E
for you. This month, he takes a look at some of the major vendors’ Linux desktop
core business – no matter what it is.
People ranging from PR representatives
to insurance claims processors to tractor
suppliers have contacted me for advice
on Linux solutions.
offerings and begins to explore the Linux laptop.
Name-Brand PC Manufacturers
common Linux distributions with the goal of helping you figure out which is right
Many of the large manufacturers of
laptops have been advertising their
Linux offerings during sporting events
and a variety of other venues. Their
apparent intent is to make you aware of
Linux as a server offering, not a desktop
solution. Linux servers on Intel hardware
are without a doubt a robust and costeffective solution. However, when you try
to find a Linux desktop, or harder still, a
laptop available from these same manufacturers, you may have quite an adventure. This is disheartening; as they’re
pushing Linux servers out the door at an
increasingly fast pace, their desktop
offerings lack the options that many of
us would like when purchasing a PC. I
know that many of you have bought
these companies’ products for years and
have extra power supplies, docking stations, and possibly even a relationship
with their support organizations.
However, the ability of large, namebrand manufacturers to service the Linux
desktop doesn’t meet the standards set
for their commercial OS offerings. I find
that name-brand PC manufacturers are
not supporting Linux on the desktop and
laptop at the level at which they support
the server. Here’s a quick synopsis of
where they stand.
have been a loyal consumer of desktop PCs, laptops, and servers from
one vendor for almost 10 years. As I
started my search for Linux PC manufacturers, I looked for a vendor to
supply me with not only a Linux
solution, but one that they could support
with the same level of competence that
I’ve come to rely on for commercial operating systems like Windows (I realize that
this may not be a good thing for those who
have received Windows support).
I also thought about those of you who
read LinuxWorld Magazine and send me
correspondence regarding problems running Linux – correspondence that indicates that there are sophisticated users
who may or may not have a technical
aptitude. My indication is that LWM
readers are a mobile workforce who rely
heavily on PCs, and they don’t always
have the ability to fix their IT problems
without some assistance. With this in
mind I tried to find a group of solutions
to address these needs. Ideally, you
should have reliable supply channels and
receive quality technical support, and do
so with minimal interruption to your
I
A B O UT
TH E
A UTH O R
Mark Hinkle, desktop technologies editor of
LinuxWorld Magazine, is vice president of
operations for NeTraverse, a Linux software
company that specializes in Windows-to-Linux
migration. Mark is on the Formation Board of
the Desktop Linux Consortium.
[email protected]
MAY 2004
Dell
Based on my conversations with Dell
representatives, they have little to offer in
pre-installed Linux distributions. For large
clients they will gladly preload anything
you like onto the PCs, as those of you par-
20
www.LinuxWorld.com
DR. MIGRATION
“Fortunately, as Linux gains popularity,
a growing number of quality vendors cater
to the Linux crowd”
ticipating in those programs probably
already know. The rest of us may want to
look at their FreeDOS (www.freedos.org)
offering, which is their solution for those of
us who don’t want Windows installed on
our PCs. The Dell n-Series features select
popular models from the Dimension,
OptiPlex, and Precision desktop lines sold
without a Microsoft operating system. Dell
has also started to acknowledge the
demand for Linux by creating a community
site that provides a forum to discuss running Linux on Dell (http://linux. dell.com).
There are resources on this Web site for all
manners of desktops, laptops, and servers
running Linux, but the bottom line seems
to be that if you want to run Linux on a Dell
desktop or laptop, you may have to supply
some of the expertise yourself.
HP
HP has made some recent positive
announcements regarding the availability
of Linux PCs. In addition, they have published a Linux client matrix (www.hp.com/
wwsolutions/linux/products/clients/client
scert.html#compaqlaptops). This details
the models that support Linux and the various distributions that are HP supported
and Linux-vendor supported, and those
models that have future Linux support
plans. Of the large name-brand PC manufacturers, your best bet for finding PCs with
manufacturer support is HP.
IBM
Despite IBM’s commitment to Linux on the
server, they have yet to show a significant
commitment to a PC or laptop offering,
though IBM’s ThinkPad series is one of the
most popular laptops among the Linux user
community. We hope to see some laptop offerings pre-installed with Linux in the future, but
at the time of this writing there are none.
Overall, the name-brand PC manufactur-
MAY 2004
ers offer great customizable hardware solutions but do not offer a broad range of
Linux desktop solutions. If you’re not able
to provide substantial Linux expertise yourself, you should look at the following Linuxoriented vendors.
Linux-Oriented Vendors
Since the demand for Linux on the desktop is dwarfed by the demand for Windows
on the x86 desktop, your ability to find a
desktop Linux business solution from a
name-brand manufacturer may be limited
Product Review: EmperorLinux
www.emperorlinux.com
In my search for the ultimate Linux desktop replacement or high-performance laptop, I
turned to the folks at EmperorLinux, located in Atlanta, Georgia. EmperorLinux supplied me with
their version of the cutting-edge Dell Latitude D800 rebranded by Emperor as the Rhino
(www.emperorlinux.com/ rhino.php). What’s appealing to me is being able to acquire a laptop
from a hardware vendor I trust (Dell), without the hassle of installing Linux and finding the
appropriate patches and support for all the devices that the laptop is equipped with.
EmperorLinux is a unique vendor in the sense that they focus on providing solutions from vendors including Sharp, Dell, IBM, and Sony, but these are tailored to the Linux user market.
EmperorLinux has been in business for more than four years, with steady growth as the demand
for Linux, and especially Linux laptops, has grown. Lincoln Durey and the crew have built a
strong following. Not only does the EmperorLinux staff supply a fully installed Linux laptop complete with patches for power management and support for wireless access, they also offer their
own Linux distribution, EmperorLinux (based on Fedora Core 1), which is designed with the
mobile Linux user in mind. I was fortunate enough to receive a top-of-the-line laptop
with Fedora Linux installed as well as the EmperorLinux Care Package (www.emperorlinux.com/
care_package.php). I also asked that it be installed, which you might like if you’re migrating
from Windows to Linux (after all, I am Dr. Migration).
The configuration was a dual-boot Windows XP and Fedora Core 1 Linux configuration with a FAT32
data partition. This may not seem very Linux-centric, but I felt that if I was going to continue to look
at the migration path between operating systems, I would have to continue to compare migration
strategies between the two operating systems. Also, as many of you who already own laptops know, the
migration of data and applications is going to be the key factor in your Linux success. A bridge
between the two operating systems is critical.
My initial experiences with my laptop from EmperorLinux have been positive. The staff took my
order and helped me decide which configuration would best serve my needs. Calls to inquire about my
laptop were always answered in the first couple of rings, often by EmperorLinux’s president Lincoln
Durey. After processing my order I received confirmation of the PC and upon shipping I was sent status to track my PC – all the same things I would expect of large PC vendors (even though the tagline
at the bottom of the invoice noted that it was generated while the author lay in a hammock listening
to MP3s). Finally, when I did receive the laptop, it included a comprehensive guide outlining the steps
to take to install and set up my laptop. I thought this was a nice touch, and by following these steps
I was up and running in less than 15 minutes. That’s a feat for any new PC, let alone one as complex
as the Rhino laptop. Overall, my experience so far has been excellent; next month’s article will be
more detailed as I tweak the laptop for business use. I encourage you to check next month’s issue for
the update and for more information about EmperorLinux and my adventure with the Rhino.
22
www.LinuxWorld.com
June 28–
July 1, 2004
Everywhere starts here
Moscone Center
San Francisco, CA
JavaTM technology is everywhere, improving the digital experience
for everyone. It all starts at the JavaOneSM conference, your
source for cutting-edge knowledge and proven solutions.
Discover from the experts how to deploy Web services and connect the world securely; you’ll learn to code simpler and faster,
and bring higher efficiency and profitability to your business.
Save $200! Register by May 31, 2004,
and receive the Early-Bird price for the full
Conference package. Registration code: ADCUZKND
Join James Gosling, the father of the Java Programming Language
Register at
java.sun.com/javaone/sf
Sponsored by
Produced by
Copyright © 2004 Sun Microsystems, Inc. All rights reserved. JO040051. Sun, Sun Microsystems, the Sun logo, Java, the Java Coffee Cup logo, JavaOne, the JavaOne logo, Java
Developer Conference, all Java-based marks and logos, and J2SE are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries.
The JavaOne conference offers hundreds of in-depth technical
sessions in:
Topic 1—The Foundations: Core J2SETM Technologies
Topic 2—Core Enterprise Technologies
Topic 3—JavaTM Technology on the Desktop
Topic 4—Java Technology for the Web
Topic 5—Java Technology for Mobility
Topic 6—Dissecting the Implementation: Solutions
Topic 7—Intriguing and Unexpected: “New and Cool”
DR. MIGRATION
at best. But for smaller specialty vendors,
Linux desktops and laptops are becoming
viable. The number of Linux desktop suppliers is too great to mention them all, but
notables are Linare (www.linare.com),
Microtel’s offering available with
LindowsOS (www.lindows. com, available
from www.walmart.com), and CPU
Builders by Stratitec (www.cpu builders.
com, see my review of their Linux PCs in
the January issue of LinuxWorld Magazine).
Fortunately, as Linux gains popularity, a
growing number of quality vendors cater
to the Linux crowd. The problem they’re
beginning to solve is this: the tech-savvy
Linux crowd is often mobile and in need of
a laptop solution. None of the name-brand
vendors offers a robust solution in this
arena. The remainder of this article focuses
on helping those who want to convert to
Linux find the high-performance products
they need.
Desktop Replacement
Laptop Vendors
linux.com) offers name-brand laptops
rebranded and optimized for Linux.
EmperorLinux supplies laptops from
Sony, Dell, IBM, and Sharp. They stand
behind their products in conjunction
with the manufacturer, so your security
when buying one of their laptops is doubled. In addition to a guarantee, they
offer a dedication to service and a great
deal of technical expertise. Their customized Linux kernel (the empkernel),
which is optimized for mobile computing, solves many of the problems that
Linux laptop users face when installing
their first Linux distribution on a laptop
(the kernel includes the appropriate
patches and drivers for the hardware
they ship and solves the problems
associated with customizing standard
Linux distributions). Extensive testing
from EmperorLinux makes it possible
for them to provide a high-quality
business-class laptop.
LinuxCertified –
Training and a Free Laptop
In my quest for a good desktop replacement laptop I had a hard time finding a
hearty solution. I did find many offerings,
but they seemed to be limited in terms of
features and offered very little in the way of
support. I was hard pressed to find a range
of laptops from one vendor that comprises
the entry-level notebook as well as the
desktop replacement. And in the age
of the superstore that wants to service your
every need, I found there’s still room for the
mom-and-pop shop, or the guy who’s big
enough to meet your needs but small
enough to react to your specific requests.
That’s why I was pleased to find Lincoln
Durey and the folks at EmperorLinux, the
offerings from Chander Kant at LinuxCertified, and Tadpole Computers’ Sun Java
Desktop–equipped Talin.
Chander Kant started LinuxCertified
(www.linuxcertified.com) to serve the need
for Linux training. LinuxCertified initially
found that supplying a Linux laptop (refurbished IBM ThinkPad) to their students
allowed the students to get more out of the
class and provided the opportunity for longterm hands-on experience. The result of this
is a very successful training company and a
core of Linux laptop customers looking for
more in the way of a Linux laptop supplier.
Chander decided to investigate producing
their own laptops optimized for Linux; now
Linux laptops are LinuxCertified’s most
profitable business. Also, LinuxCertified will
be glad to customize your Linux laptop to
your specifications or supply other customized installation services.
EmperorLinux – Name-Brand Laptops
Optimized for Linux
Tadpole – Engineering Laptops Powered
by the Sun Java Desktop System
EmperorLinux (www.emperor
Unix laptop maker Tadpole (www.tad
polecomputer.com) has recently
thrown their hat in the ring with
their Talin notebook running Sun’s
Java Desktop. The makers of the Talin
are experienced Unix laptop providers
who already have a track record in
that market and hope to make a
splash as a Linux laptop provider.
While they have a relatively limited
offering, they do have the expertise in
the *nix space that should make them
successful.
The Verdict
It’s only a matter of time until Linux
on the desktop becomes pervasive,
but as we wait for that day, there are
some very high-quality vendors addressing the current needs of the Linux
desktop PC/laptop market.
I use Linux on my laptop every day
and am always looking for hardware
that can keep up with the optimizations
offered by the ever-advancing Linux OS.
The vendors highlighted in this article
are good places to start when searching
for Linux desktops. I encourage you to
speak with as many as you can to find
the right fit for your company. Also, if
you want to find out more about your
existing laptop compatibility or other
tips and tricks for Linux on the laptop,
visit www.linux-laptop.net. Now that
I’ve explored the options for hardware
and operating systems, I encourage
you to tune in to next month’s edition
of “Dr. Migration,” which will be dedicated to software and the tuning of
your desktop Linux setup. I’m very
excited to share with you how I’ll be
tweaking my brand new EmperorLinux Rhino to provide an example
of how a former Windows user can
migrate to Linux with confidence –
and have an experience that’s just as
good, if not better, than what they
experience today.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
“It’s only a matter of time until Linux on the
desktop becomes pervasive”
MAY 2004
24
www.LinuxWorld.com
TELECOM
MOVING TOWARD
Meet tomorrow’s requirements
with today’s technologies
OPEN
PLATFORMS
This article explores the recent trend toward open telecom platform solutions as
proposed by three key industry consortia – PICMG, OSDL, and the SA Forum – working in
the areas of highly available hardware, middleware, and carrier grade operating systems.
Introduction
BY
I B R A H I M
A B O UT
TH E
H A D D A D
A UTH O R
Ibrahim Haddad, contributing editor of LWM,
is a researcher in the Research & Innovation
Unit at Ericsson Research in Montreal, Canada.
He contributed to Richard Petersen’s books
Red Hat Linux Pocket Administrator and
Red Hat Enterprise Linux & Fedora Edition:
The Complete Reference (DVD edition),
published by McGraw-Hill/Osborne.
Ibrahim is currently a Dr. Sc. Candidate
at Concordia University in Montreal.
[email protected]
MAY 2004
Traditionally, communications and data
service networks were built on proprietary
platforms that had to meet very specific
availability, reliability, performance, and
service response time requirements. Now,
communications service providers are challenged to cost effectively meet their needs
for new architectures, new services, and
increased bandwidth, all while maintaining
highly available, scalable, secure, and reliable systems that have predictable performance and are easy to maintain and upgrade.
The demand for rich media and enhanced
communications services is leading to significant changes in the communications
industry, such as the convergence of data
and voice technologies. The transition to
packet-based, converged, multiservice IP
networks requires a carrier grade infrastructure based on interoperable hardware and
software building blocks, management middleware, and applications, all implemented
with standard interfaces (see Figure 1).
26
Meeting
Tomorrow’s Requirements
One frequently asked question is: How
can we meet tomorrow’s requirements
using existing infrastructures and technologies? Proprietary platforms are closed
systems; they are expensive to develop
and often lack the support of the current
and upcoming standards.
The current trend is to deliver nextgeneration multimedia communication
services using open standard, carrier
grade platforms. A uniform, open software environment with the characteristics
demanded by telecom applications, combined with commercial off-the-shelf software and hardware components, is a necessary part of these new architectures.
Open platforms are expected to reduce
the costs and risks of developing and
delivering rich media and enhanced
telecommunications services, enable
faster time to market, and ensure portability and interoperability.
www.LinuxWorld.com
TELECOM
Open and Standardized Solutions
There are many forces motivating the
migration toward open and standardized
platforms, all of which are designed and
implemented using commercial off-the-shelf
software and hardware components as building blocks. Such motivations include lower
costs, better interoperability with third-party
software, and faster time to market.
Three key industry consortia are defining
hardware and software high-availability
specifications that are directly related to
telecom platforms:
• The PCI Industrial Computer Manufacturers Group (PICMG) defines
standards for high-availability
hardware.
• Open Source Development Labs
(OSDL) has a Carrier Grade Linux
(CGL) working group defining specifications for an operating system with
carrier grade characteristics and tools
to support the software development
for carrier grade systems.
• The Service Availability Forum (SA Forum)
defines the interfaces of the middleware
and focuses on APIs for hardware platform
management and for application failover in
the application API. SA-compliant middleware provides services to an application
that needs to be highly available in a
portable way. The middleware is responsible for the management of the system components, including the application components, to ensure that the application qualifies to be highly available.
Figure 2 illustrates a generic platform
architecture. Throughout this article, I use
this architecture to point to the blocks that
are being specified by the different consortia.
Service & Application Layer
Proprietary Middleware
“The demand for rich media and
enhanced communications services
is leading to significant changes
in the communications industry”
PCI Industrial Computer
Manufacturers Group
PICMG is a consortium of more than 600
companies who collaboratively develop
specifications for high-performance
telecommunications and industrial computing applications (see Figure 3). The goal
of PICMG is to offer equipment vendors
common specifications, thereby increasing
availability and reducing costs and time to
market.
PICMG has developed the specifications
for the next-generation of telecommunications equipment, called Advanced
Telecommunications Computing
Architecture (AdvancedTCA), with a new
form factor and based on switched-fabric
architectures. The AdvancedTCA effort
began early in 2001 with a small working
group outside of PICMG (the Santa Barbara
group) who determined the need for “an
open platform standard that meets the
needs of telecom infrastructure equipment
for the next ten years.” The initial group
included a cross section of industry interests, including both telecom and computer
companies. In November 2001, the Santa
From proprietary
solutions to open
and standardized
solutions
Service & Application Layer
Service Availability Forum APIs
Service Availability Forum
Compliant Middleware
Proprietary Operating Middleware
OSDL Carrier Grade Linux
Operating System
Proprietary Hardware
PICMG AdvancedTCA
FIGURE 1
FROM PROPRIETARY SOLUTIONS TO OPEN SOLUTIONS
www.LinuxWorld.com
27
Barbara group turned its groundwork over to
the PICMG organization, which kicked off
the development of the PICMG 3.x series of
specifications.
The focus of the AdvancedTCA work within PICMG was to define a telecom hardware
platform. While the AdvancedTCA platform
may be useful in other contexts, all necessary tradeoffs were made in favor of the telecom industry requirements. The working
group wanted to provide a structured growth
path for the next decade or more. As a result,
AdvancedTCA supports multiple switch fabrics while maintaining standard mechanics,
backplane, system management, power distribution, and cooling.
AdvancedTCA is defined by a set of specifications: a base specification that includes
a common backplane and separate fabric
specifications that detail how specific
switch fabrics can be implemented on the
standard backplane. Since the summer of
2003, a complete set of specifications and a
number of products have gone through
interoperability testing.
The full range of specifications
includes:
• PICMG 3.0: The AdvancedTCA base
specification master document; it
defines everything with the exception of
the implementation of specific switch
fabrics.
• PICMG 3.2: Defines 1 and 10 Gigabit
Ethernet fabrics and an option for Fiber
Channel.
• PICMG 3.2: Defines how to build systems using InfiniBand switch fabrics.
• PICMG 3.3: Defines how to build systems using StarFabric switch fabrics.
• PICMG 3.4: Defines the use of PCI
Express Advanced Switching.
• PICMG 3.5: Defines the use of RapidIO
on the AdvancedTCA backplane.
MAY 2004
TELECOM
ATCA technology, most hardware is interoperable and the mechanicals, software, pin
assignments, and so on, are all defined specifications. This is not the case when trying to
mix and match with proprietary systems.
Proprietary solutions can often handle the
higher speeds, but they have disadvantages,
such as the high cost of prototyping and
low- to medium-volume production. In
comparison, ATCA offers open standards
with dozens of vendors, ensuring competitive pricing. Compatibility is an important
issue. With an entire community serving the
Open Source Development Labs
OSDL is a nonprofit organization founded in 2000 to accelerate the growth and
adoption of Linux in the enterprise. It is
sponsored and supported by a several IT
and telecom industry leaders and provides
state-of the-art computing and test facilities in the United States and Japan to developers from around the world.
OSDL has two working groups:
1. Data Center working group: This working group was established in August
2002 to develop the roadmap for Linux
platform software that supports commercial software products and corporate
IT requirements, enabling developers to
create Linux-based solutions for the
data center market segment.
2. Carrier Grade Linux (CGL) working
group: This working group was established
in January 2002 with the goal of enhancing
the Linux operating system to achieve an
open source platform that is highly available, secure, scalable, easily maintained,
and suitable for carrier grade systems.
3. Desktop Linux working group:
Announced on January 20, 2004, this is
the latest initiative from OSDL. The working group will be focusing on greater use
Software Development Tools
Applications
High Availability Management
and Services Middleware
Linux Kernel with Carrier Grade Enhancements
High Availability Hardware Platforms
FIGURE 2
A GENERIC PLATFORM ARCHITECTURE
Software Development Tools
Applications
High Availability Management
and Services Middleware
Linux Kernel with Carrier Grade Enhancements
High Availability Hardware Platforms
Scope of the PICMG
FIGURE 3
SCOPE OF PICMG
LINUX KERNEL DEVELOPMENT PROCESS
PRODUCTION
KERNEL
MARKETPLACE
SOURCE
CODE
SOURCE
CODE
CONTRIBUTORS
SUBSYSTEM
MAINTAINERS
FIGURE 4
2003 Open Source Development Labs
©Verbatim
copying of this document is permitted
in any medium, provided this notice is included
OPEN DEVELOPMENT PROCESS AND PEER REVIEW
MAY 2004
Motivations for Linux
Why consider Linux as a potential
replacement for proprietary operating systems in carrier grade systems? Several factors motivate the use and deployment of
Linux on carrier grade systems. These motivations include:
• Cost: Linux is available free of charge in
the form of a downloadable package
from the Internet.
• Availability of source code: With Linux,
you gain full access to the source code,
allowing you to tailor the kernel to your
needs.
• Open development process: The development process of the kernel is open to
anyone to participate and contribute.
The process is based on the concept of
“release early, release often.”
• Peer review and testing resources: With
access to the source code, people using a
wide variety of platforms, operating systems, and compiler combinations can
compile, link, and run the code on their
systems to test for portability, compatibility and bugs.
• Vendor independent: With Linux, you no
longer have to be locked into a specific
vendor. Linux is supported on multiple
platforms.
• High innovation rate: New features are
usually implemented on Linux before
they are available on commercial or proprietary systems.
Other contributing factors include Linux’s
support for a broad range of processors and
peripherals, the availability of commercial
support, its high performance networking,
and the proven record of being a stable, and
reliable server platform. Figure 4 illustrates
the Linux kernel development process.
Carrier Grade Linux Architecture
DEVELOPMENT
KERNEL
Ongoing peer review of code
Continuously available online
for public review
of Linux on desktops throughout the
enterprise. The goal with this initiative is
to create a forum where a range of desktop usage models can be studied, with
recommendations on improvements to
encourage broader adoption of Linux.
28
The CGL working group has identified
three main application areas that will run on
CGL platforms: gateways, signaling, and
management servers. The CGL working group
will focus initially on Linux platform requirements to support applications in these areas.
www.LinuxWorld.com
TELECOM
Figure 5 highlights the scope of the
CGL Working Group, which covers two
areas:
• Carrier grade Linux: CGL enhancements to the operating system
are related to various requirements
listed in later sections, such as availability and scalability. Enhancements
may also be made to hardware interfaces, interfaces to the user level
or application code, and interfaces
to development and debugging tools.
In some cases, user-level library
changes will be needed to access the
kernel services.
• Software development tools: These tools
include debuggers and analyzers.
Why Support Clustering?
Today’s telecommunication environments are increasingly adopting clustered servers to gain benefits in performance, availability, and scalability. A cluster is a collection of servers that share
resources and work together to solve a
problem. The benefits of a cluster are
greater and more cost-efficient than
what a single server can provide.
Furthermore, the telecommunication
industry’s interest in clustering originates from the fact that clusters address
carrier-class characteristics – such as
guaranteed service availability, reliability,
and scaled performance – using costeffective hardware and software. They
can be divided into three categories:
short failure detection and failure recovery, guaranteed availability of service,
and short response times.
The most widely adopted clustering
technique is use of multiple interconnected “loosely coupled, nothing shared”
nodes to a single highly available system.
A node is a stand-alone server (a computing unit) or an SMP machine; therefore,
the cluster can be either a collection of
servers or a collection of SMP machines,
or even a mix of both.
The advantages of clustering in telecom
servers include:
• High availability through redundancy
and failover techniques, which isolate or
reduce the impact of a failure in the
machine, resources, or device
• Manageability through appropriate system management facilities that reduce
system management costs and balance
loads for efficient resource utilization
• Scalability and performance through
expanding the capacity of the cluster
by adding more servers, adding more
processors, memory, storage, or other
resources to support growth and to
achieve a higher level of performance
In addition, the use of commercial offthe-shelf building blocks in clustered systems has a number of advantages, including a better price/performance ratio when
compared to specialized parallel supercomputers, deployment of the latest massmarket technology as it becomes available
at low cost, and added benefits from latest
standard operating system features as they
become available.
A generic cluster model is presented in
Figure 6. Using loosely coupled nodes as
Software Development Tools
On October 9, 2003, OSDL announced
the availability of the OSDL Carrier Grade
Linux Requirements Definition version 2.0
(CGL 2.0). This latest requirements definition for next-generation carrier grade
Linux offers major advances in security,
high availability, and clustering.
The requirements definition version 2.0
introduced new and enhanced features to
support Linux as a carrier grade platform; it
is divided into three sections:
• Clustering: The clustering requirements support the use of multiple carrier server systems for higher levels of
service availability through redundant
resources and recovery capabilities,
and to provide a horizontally scaled
environment supporting increased
throughput.
• Security: The security requirements are
aimed at maintaining a certain level of
security while not endangering the
goals of high availability, performance,
and scalability. The requirements support the use of additional security
mechanisms to protect the systems
against attacks from both the Internet
and intranets, and provide special
mechanisms at kernel level to be used
by telecom applications.
• General system: The general system
requirements support interactions with
the hardware platforms. They include
requirements for standards, performance, availability, scalability, serviceability, and tools.
ed in January 2004 with focus on advanced
requirement areas such as manageability,
serviceability, tools, security, standards,
performance, hardware, clustering, and
availability.
Applications
High Availability Management
and Services Middleware
Standard Interfaces
(LSB, POSIX...)
High Availability Interfaces
Service Interfaces
Linux Kernel with Carrier Grade Enhancements
Hardened Device Drivers
Hardware Configuration
& Management Interfaces
Co-Processor Interfaces
High Availability Hardware Platforms
Scope of the OSDL Carrier Grade Linux Working Group
FIGURE 5
SCOPE OF OSDL CGL WORKING GROUP
Applications
Middleware
Operating System
Processor
Reliable and Fault-tolerant Node Interconnect
Reliable and Fault-tolerant Storage (RAID/SAN/...)
The work on the next version of the
OSDL CGL requirements, version 3.0, start-
www.LinuxWorld.com
FIGURE 6
A GENERIC CLUSTER MODEL
29
MAY 2004
TELECOM
the other nodes. As for hardware upgrades,
each node is upgraded separately without
affecting service availability. In addition,
you can increase the number of nodes in
the cluster as the load/traffic demand
increases.
This generic model eliminates the node
being a single point of failure and provides
means to achieve high performance, reliability and scalability. To respond to the need for
clustered platforms in a telecom environment, the CGL clustering requirements are
aimed at supporting clustered applications
in a carrier grade environment as an effective
way to achieve highly available services.
the base of the clustering solution gives
more flexibility than a tighter coupling
between nodes. The loosely coupled cluster model is also suitable for the type of
applications CGL servers host. In this
model, the probability of a failed shared
component affecting the availability of the
service or the availability of the system
does not exist. As for performing software
or kernel upgrades, the procedure is executed on each node separately without
affecting the availability of the service. In
the case of a hardware fault, a specific node
is affected; it can be replaced or fixed without affecting the uptime (no unscheduled
downtime is allowed). On the other hand,
in the case of a software fault or bug on one
node, the specific node is affected. The
platform will still provide service through
Carrier Grade Linux Enhancements
Several enhancements to the Linux kernel are required by the communications
industry to help them adopt Linux on
their carrier grade platforms and support
their telecom applications. These
enhancements fall into the following categories: high availability, security, serviceability, performance and scalability
enhancements, reliability, standards, and
clustering (see Figure 7).
The implementations providing these
enhancements are open source projects
and are planned for integration with the
Linux kernel when they are mature and
ready for merging with the kernel code. In
some cases, bringing projects to the
required maturity level takes a considerable amount of time. Nevertheless, some
of the enhancements are targeted for
inclusion in kernel version 2.7. Other
enhancements will follow in later kernel
Carrier Grade
Enhancements
Standards
(POSIX, LSB, IETF)
Persistent
Device Naming
Security
Performance
Linux Kernel
Reliability
Memory
Management
Serviceability
Process
Management
Clustering
Support
FIGURE 7
CARRIER GRADE ENHANCEMENT AREAS
Hardware Platform
Interface Specification
2
Application Interface
Specification
Application Services
2
Application
Management
and High
Availability
Services
Middleware
Database
Communication
Directory
Protocols
1
Platform
Management
Middleware
System Management
1
Linux Kernel with Carrier Grade Enhancements
High Availability Hardware Platforms
FIGURE 8
SCOPE OF SA FORUM INTERFACE SPECIFICATIONS
MAY 2004
30
Software Development Tools
Applications
SA Forum Interfaces:
releases. Meanwhile, all enhancements, in
the form of packages, kernel modules, and
patches, are available from their respective
project Web sites.
Possible Concern
The usage of Linux is being expanded
day after day; Linux is running on desktops,
servers, mobile phones, personal digital
assistants, and other specialized embedded
and industrial devices. Linus Torvalds, the
creator of Linux and development leader, is
responsible for the roadmap of the official
Linux kernel (www.kernel.org). Linus has
always expressed his interest in targeting
the kernel development for high-end desktops. Consequently, if a feature is not widely used and if it does not benefit almost
everyone using Linux, then it may be very
hard to integrate this feature with the kernel; this is the case with specific requirements that target specialized markets such
as telecom, embedded, data centers, and
so on.
The concern in this area is whether
there will be a fork of the kernel source
tree to specialized kernel trees. Will this
fork happen? If so, when? Who will be
responsible for new kernel tree(s)? How
will this affect the open development
process of the resulting specialized kernels? These questions may or may not be
a major concern now; however, they will
be valid questions in the very near future.
Service Availability Forum
The SA Forum is a consortium of communications and computing companies
that are working together to develop open
standard interface specifications to promote the rapid development of cost-effective solutions that deliver highly dependable voice, data, and multimedia services
over fixed and wireless IP networks.
The scope of the SA Forum is highlighted in Figure 8. In such an open buildingblock design, the middleware manages all
critical resources to enable ultra-dependability of delivered services. The hardware
platform interface specification provides a
standardized interface between the middleware and the platform. The use of standard interfaces enables carrier grade systems to run on cost-effective commercial
off-the-shelf building blocks, while making management middleware independent
of any particular hardware platform.
www.LinuxWorld.com
TELECOM
The SA Forum is working on different
interface specifications and has publicly
announced the Hardware Platform
Interface (HPI) specification and the
Application Interface Specification (AIS).
The Hardware Platform Interface
(HPI) Specification
The HPI specification hides hardware
platform–specific or proprietary features
from availability middleware and applications, and allows the use of commercial
off-the-shelf middleware building blocks.
The HPI specification allows you to manage a carrier grade hardware platform independently of any particular hardware. It represents the platform-specific characteristics
of the physical hardware in an abstract
model, and based on that model it provides
standard functions for monitoring and controlling of any specific hardware. It enables
interfaces the middleware provides services
essential to making applications highly
available, e.g., managing failovers, event
delivery, etc., in a vendor-independent way.
As such, it supports portability of applications across high-availability middleware
supplied by different vendors.
The application interface specification
defines APIs that an application programmer can use in conjunction with a vendor’s
high-availability middleware that implements the specifications. The application
interface specification defines APIs for the
availability management framework, cluster membership service, checkpoint service, event service, message service, and
lock service.
As promoted by the SA Forum, the benefits of the AIS will include lower development costs, accelerated time-to-market,
enhanced portability and integration capa-
The activities of these bodies will allow all
players to have a common set of modular
software and hardware building blocks. These
building blocks will also help in the process
of migrating from proprietary platforms to
open and standardized platforms. This
process is associated with several challenges;
however, it also promises advantages that are
expected to be enormous and compensating.
The PICMG AdvancedTCA, the SA
Forum interfaces, and the OSDL Carrier
Grade Linux are expected to be successful;
however, as history has taught us, the best
technology does not necessarily always
win – timing is an important factor.
References
• OSDL: www.osdl.org
• CGL: www.osdl.org/lab_activities/
carrier_grade_linux
• PICMG: www.picmg.org
“Today’s telecommunication environments
are increasingly adopting clustered servers
to gain benefits in performance,
availability, and scalability”
bilities, increased resources focused on
innovation of solutions, and limited technology risks through the choice of compatible commercial off-the-shelf components.
As a result, network equipment providers
and telecom equipment manufacturers
adopting the application interface specification will speed up and simplify development, in addition to enabling open solutions that are composed of portable, carrier
grade building blocks.
• SA Forum: www.saforum.org
• Linux Kernel: www.kernel.org
• “AdvancedTCA: Next Generation
Architecture for Communication
Application,” white paper from NMS
Communications.
• Jokiaho, Timo; Herrman, Fred; Penkler,
Dave; Reitenspiess, Manfred; and Moser,
Louise. “The Service Availability Forum
Specification For High Availability
Middleware,” Service Availability Forum.
Conclusion
Acknowledgments
The application interface specification
(AIS) standardizes the interface between
compliant high-availability middleware and
(service) applications. It defines a standard
for high-availability management middleware through its interfaces. Through these
The general technology trend is toward
building reusable, flexible, stable, and powerful standard platforms from modular
hardware and software kits. PICMG, OSDL,
and SA Forum are three major efforts in this
direction with support from the telecom
industry.
The author would like to acknowledge all
the reviewers with special thanks to Peter
Badovinatz (IBM), Andre Beliveau (Ericsson),
John Cherry (OSDL), Makan Pourzandi
(Ericsson), and Maria Toeroe (Ericsson) for
their contributions and reviews.
www.LinuxWorld.com
31
the design of highly reliable infrastructure
products at a more abstract level without
the limitations of proprietary interfaces.
The hardware platform interface specification is expected to provide several benefits, such as shorter development cycles,
reduced time-to-market due to the ability to
use standard building blocks, a lower total
cost of ownership, improved design flexibility, faster validation of products using standard interfaces, and faster innovation since
focus will be on differentiating features.
The Application Interface Specification
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
MAY 2004
EXCLUSIVE INTERVIEW
Francois Bancilhon
on Mandrakesoft
The friendly Linux operating system
is going strong
In this interview, LWM Editor-in-Chief Kevin Bedell speaks with Francois
Bancilhon, CEO of Mandrakesoft, about the success they’ve had over the past
year...and how they plan to build upon it.
LWM: Tell us a little bit about
Mandrakesoft and how you got involved
with them.
Francois Bancilhon: I’ve been with
Mandrakesoft for about a year. I joined
at a time when the company was in
deep financial trouble, and I joined to
help fix it. That’s what we’ve done over
the year. We announced today our first
positive financial result over a quarter
in the last five years. It’s a result of very
hard work from the entire team; moreover, it’s a signal that we’ve fixed the
company and brought it back from
where it was. The company’s generating
more cash than it’s spending.
LWM: Congratulations. You’re a Parisbased company, correct?
Bancilhon: We’re Paris based; we have people all over the place in the U.S. and
Canada. We’re a truly international company in the sense that we do less than 15% of
our revenues in France. We do about 45% in
North America, 35% all over Europe, and
the remainder in the rest of the world. We
pride ourselves on being a truly international, global distribution, with more than
63 languages, and we sell online in about
150 countries worldwide.
have to understand two things: there are
the people who use the system and people who pay for the system. In terms of
usage, today we average roughly 10,000
downloads a day, which means it’s somewhere between 3 and 4 million a year.
This goes up to more than 50,000 when a
new version comes out and goes down to
7,000 at the end of a cycle. That’s a really
broad reach, and it’s roughly distributed
FRANCOIS BANCILHON
CEO OF MANDRAKESOFT
Kevin Bedell is editor-in-chief of LWM.
[email protected]
as I mentioned in terms of country and
geography. Out of these 4 million people
who use Mandrakelinux, 1.5% actually
pay something – which is an interesting
ratio. It shows that the model works
and makes sense. We need to keep
improving on that. We’re truly 100%
committed to this open source approach;
we’ll keep providing a free download
version to all our users, and we’ll keep
maintaining it and providing the security
updates. That’s part of what we believe
the open source model is, and that’s part
of what we’ll do. On top of that, we’ll keep
MAY 2004
32
LWM: That’s quite a broad reach.
Bancilhon: In terms of distribution you
A B O UT
TH E
I NTE R V I E W E R
I NTE R V I E W
BY
KE V I N
B E D E L L
providing services and products that are
complementary to that distribution.
That’s what we’ve been doing over the
past year, and that’s what has brought us
to where we are – we’re a profitable,
healthy company now.
LWM: In addition to selling the product,
you actually have an online subscription
service. Can you tell us a little bit about
that?
Bancilhon: We have a club; the
Mandrakelinux Club is what helps
Mandrakesoft in difficult times. We
have about 20,000 members right now.
These people get free products or discounts on products, online services –
essentially anything else we do. The
Mandrakelinux Club is growing at a
fast pace. Our goal is to try to double
the number this year, and it seems that
we’re on target to do that. More and
more we treat the club as the forefront
of our users and supporters; they help
us with their advice, suggestions, and
so on. When we do something wrong,
they make sure they yell at us very quickly, and we listen and fix it. I think that’s
the right way of doing things. The beauty
of the system is that we can be in tune
with the people, who react very quickly
if we do something wrong. In addition,
when they tell us we’re doing things the
right way, we try to continue in that
direction.
LWM: I’m a Mandrakelinux user myself.
I’ve heard that Mandrakelinux’s strengths
are the ease of installation and maintenance. What do you see as the strengths of
your product?
Bancilhon: First of all, our mission is to
try to bring Linux technology to the mass-
www.LinuxWorld.com
EXCLUSIVE INTERVIEW
es, and we do that in two ways. The first is
to give away a free downloadable version
of the system to everybody who needs it.
Second, we make the technology as easy
as we can – to use, to administer, and to
install. That’s where the focus of the company is in terms of technology, and that’s
where we’ll keep working very hard. For
instance, 9.2 came out with a product
named Discovery, where the main
emphasis is to make Linux for beginners –
make a system incredibly simple by
choosing very simple and well-integrated
applications. And that’s working very well
in retail stores and the online store.
LWM: So you’re finding that most of your
customers are people who come to
Mandrakelinux because of your reputation for ease of use and simplicity?
Bancilhon: Today 50% of our people
doing downloads are new Mandrakelinux
users. That shows the growth of the system, and it shows we’re on the right track.
Out of all these people, I would say that
less than 50% are in businesses, and a little more than 50% are individual users.
These are our users; they are the ones
who got us to where we are. We’re grateful
to them and we’ll keep providing good
services. We think the company should
also make progress in providing better
services to the enterprise world, which is
why we’ve created this new line of products, the corporate server product, the
MNF [Multi Network Firewall], and the
clustering mechanism. We’ll keep adding
products to that with a release cycle that
is longer and more adapted to the corporate world.
LWM: I know the traditional Mandrakelinux user was an individual who was
looking for an easy-to-use, easy-to-install
distribution. Do you see that continuing
to be your focus?
Bancilhon: I think it’s going to continue –
you don’t want to abandon your installed
base. These are the people who helped us,
who appreciate us, so we’ll keep serving
them. We want to develop a new set of
customers in the enterprise world by
addressing what the corporate world
needs. That’s what we’re working on now,
and 10.0 will have a new set of features
and functionality more targeted at the
enterprise world.
www.LinuxWorld.com
LWM: What kind of new features are you
looking at for the business world?
Bancilhon: We’ve chosen specific software
for our groupware, which will be very
nicely integrated with our mailing system.
We strongly believe that in the Linux
world, less is more. A huge distribution
with 3,000 applications is very nice for
some people, but other people will want
something more focused, where they
know exactly the service it’s going to provide for them. We’ll be providing more
focused and targeted distributions for different roles, for example, a mail server.
LWM: So for the business world you’re
going to be providing more tightly focused
desktops that are more targeted toward
the specific needs of business users?
Bancilhon: Absolutely. The other piece,
which is very interesting right now, is the
extremely positive feedback we’re receiving on Mandrakemove – it’s a live CD, so
the system boots directly from the CD
reader. It comes with a USB key in which
you can store your preferences and data.
You can travel around with your CD and
your USB key, in which you have your
preferences and your key data, and on the
CD you have the system. It’s the ultimate
way to travel. We put that on the market
in early December. It’s getting a very
warm response from everybody who’s
reviewed it, and it’s selling like hotcakes
on our Web site. We’re very happy with it.
LWM: I can take my desktop with me?
Bancilhon: Absolutely. When I go home in
the evening, instead of carrying my laptop
I just carry my CD and USB key, and I use
my wife’s computer to do whatever I need
to do. We’ve added a nice, fun touch – the
CD from which you boot can be ejected,
so you can listen to your favorite CD while
you run your computer. We think it’s fun;
we’re getting very strong feedback on that
product; and we’re already starting to
think about the next version and how to
improve it.
LWM: What do you see in the future for
Mandrakesoft?
Bancilhon: We’ll be coming out with a
corporate desktop that will be the companion product to our corporate server,
targeted toward the corporate world. We'll
have a few very focused distributions on
some vertical markets, and some specific
functionality and so on. We believe
Mandrakesoft will be successful by heavily investing in technology. We’re doing a
lot of joint R&D projects with a number of
U.S. organizations, and that’s how we
think we’ll be successful. In terms of
developing the company, we have great
opportunities to expand our business on
the service side. Right now, we’re doing
less than 10% of our business in services,
while most of our competitors do business on the service side. There’s a good
opportunity there and we’ve taken a few
steps; we’re getting extremely good feedback on expanding our business to the
corporate world by providing a comprehensive set of services. We’ve accomplished the first step, which was to fix the
company, to bring it to a normal stage.
Now we’re ready to take it to a higher
level.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
“We’ve accomplished the
first step, which was to fix
the company, to bring it to a
normal stage. Now we’re ready
to take it to a higher level”
33
MAY 2004
POLICY
Security: Beyond
Technical Measures
Steps toward a comprehensive
information security policy
BY
Linux folks tend to have a better eye on security. I realize that’s an
R U S S
R O G E R S
Russ Rogers is CEO & CTO of Security Horizon,
Inc. He is a technology veteran with over
12 years of technology and information
security experience. He has served in multiple
information security positions to include
support of the National Security Agency and
the Defense Information Systems Agency.
He is a certified instructor for the
NSA INFOSEC Assessment Methodology (IAM)
and has recently coauthored
Security Assessment: Case Studies for
Implementing the NSA IAM, available
from Syngress Publishing.
[email protected]
Not only do these tools provide the ability to secure my organization at a fraction of
the cost of the more commercially based
tools, but they also let me see what they’re
doing. They have nothing to hide. In the
end, I can know everything I want to know
about my own security.
But let’s step away
from the technical
aspects of security for
just a moment. The
Linux community has
been great at addressing our technical problems, but it’s missing
another piece of the
puzzle that simply
cannot be addressed
by software: the organization itself.
Organizations need to
have the underlying
policies, procedures,
and culture associated
with security or else it
becomes a simple matter of “user = bad
password” or “screen = unlocked” and all
of our network security measures have
been compromised.
Coming from a technical background
myself, this was the hardest nut for me to
crack. Dealing with policies and procedures was always something that managers were supposed to do. I don’t do policies. But it occurred to me in a moment of
great enlightenment (OK, I’ll admit it, it
was actually over a Mountain Dew and a
Soft Taco Supreme) that most managers
can’t understand the security side like
many technical people can. So who’s
going to translate reality into potential
policies for the managers? In the end, it
falls to those technical individuals willing
to take up the banner of information
security and endure the pains of policy
and management.
The National Security Agency (NSA)
developed a system, years ago, called
the INFOSEC Assessment Methodology
(IAM) that can be used
to conduct assessments against the
organizational side
of each company.
The system doesn’t
deal directly with
the technical side
of security assessments but instead
strives to answer questions about organizational policy, procedure, and culture.
The IAM is based
on the very same
procedures that NSA
uses to assess the security of military and federal sites
all around the world.
The IAM is used to determine the actual
security posture of an organization based
on how it addresses security within its
MAY 2004
34
www.LinuxWorld.com
overwhelmingly general and wide-sweeping statement, but that’s my opinion.
I’ve been working with Linux for a very long time, and most of the other users in
the community tend to be highly technical and thus aware of many of the security
concerns facing the networked world today. And let’s be honest, there’s a reason
we all choose to use an open source operating system that allows direct access
to the kernel source code and its modules.
inux allows us to build robust
firewalls, intrusion detection, and
file system integrity checkers. The
firewall I’ve installed at my own
company is based on a Slackware
9.1 iptables implementation. The
Linux world has provided us with forensic
tools, vulnerability scanners, network analyzers, and more. I can now test my network, scan for security issues, resolve
those issues, and investigate potential
compromises, all from the comfort of my
shell prompt.
L
A B O UT
TH E
A UTH O R
www.linuxworld.com
POLICY
policies and procedures. What’s actually
covered within the organizational security
policy? What’s missing? Are any of these
things actually enforced? How? What
security regulation is our organization
required to adhere to?
The IAM breaks down this analysis into
three phases: the Pre-Assessment phase,
the On-Site phase, and the PostAssessment phase. The Pre-Assessment
phase consists of activities that try to get
the customer to sit down and decide what
information is critical to the organization’s
business. The goal is to get the customer to
start thinking in terms of confidentiality,
integrity, and availability. We start by getting customers to ask themselves questions
like “What is the impact to my organization
if I lose integrity of these customer
records?”
In most cases, these decisions have to be
made by upper management–level personnel who understand the ins and outs of the
business process. But what the IAM delivers at the end of this phase is an easy-toread matrix that lists the most critical
information types along with the customer
ratings for the impact each one would
have on the organization if it were compromised.
One of the most useful aspects of the
IAM is that it also gets the customer to
sit down and list the specific systems
within their own networks that contain
each of these critical pieces of information. So now we know which information
is critical to the organization, what
impact it would have on the organization
if we had a compromise, and where that
information exists. This provides a great
starting point for technical assessment
activities because the customer has identified the most critical servers and network components.
The On-Site phase is used to verify policies and regulations and to determine the
actual level of adherence to these things.
The activities include documentation
review, interviews, system demonstrations, and review of network documents.
The NSA IAM has worked with the
National Institute of Standards and
Technology (NIST) to generate a list of
areas that are covered during these activities. These areas are broken into three
areas: Management, Technical, and
Operational.
www.LinuxWorld.com
•
•
•
•
Management:
INFOSEC documentation
INFOSEC roles and responsibilities
Contingency planning
Configuration management
•
•
•
•
•
•
•
•
•
Technical:
Identification and authentication
Account management
Session controls
Auditing
Malicious code protection
Maintenance
System assurance
Networking and connectivity
Communications security
Next
Issue!
•
•
•
•
•
Operational:
Media controls
Labeling
Physical environment
Personnel security
Education training and awareness
Coming Hot off
As you can see from the list above, the
IAM allows for a complete organizational
assessment while still allowing for the flexibility of customization for each independent organization.
Finally, the Post-Assessment phase
is generally used for creating recommendations for areas that are not being
addressed appropriately and could lead
to an impact on the business. With the
appropriate management buy-in at this
point, the final report that is produced
in the Post-Assessment phase can be
used as a roadmap for the organization
to an increased security posture. The management buy-in is especially vital when we
consider the significant cultural and policy
change that should occur in response to an
assessment process of this magnitude.
I think we all agree that great technology is a wonderful thing, but if we stop
and really analyze the entire situation, we
find that we need both sides of the puzzle
if we’re to have the best security possible
for our organization. Using a methodology like the IAM can help your organization take the next steps toward a comprehensive information security program
and augment your technical measures.
For more information on the NSA IAM,
please visit www.iatrp.com or www.secu
rityhorizon.com.
the press here’s a
sneak peek at the
next issue of LWM!
PERFORMANCE
Scaling Linux to the Extreme
______________
OEM
Commercial DVD Software on Linux
______________
SECURITY
The New Paradigm for
Clustered Systems
______________
GAMING
Anarchy Online:
Linux-Powered Science Fiction
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
35
The World’s Leading i-Technology Publisher
SECURITY VIEWPOINT
An Approach That Works
Comparing open and closed source security
Seemingly everyone has insight into the open source versus closed source
security debate. Each side provides plausible arguments for the benefits of their own
model and points out drawbacks of the other. The proponents of open source argue
that the source code is open and available for anyone to see, for many sets of eyes
to examine, and is therefore more secure. Opponents of open source say that this
“many eyes” theory is irrelevant since the vast majority of users will never look at
the source code. Countless arguments ensue from there and can get quite derived,
much like arguments over the exact number of episodes of Star Trek.
Steve Suehring is advocacy editor of
LinuxWorld Magazine. A technology architect
and engineer with a solid background in many
areas of computing encompassing both open
and closed source systems, he has worked with
a variety of companies to help them integrate
systems and provide the best use of available
technologies. Steve has written magazine
articles as well as a book on the MySQL
database server. He has also performed
technical editing on a number of other titles.
[email protected]
Debian. Some of this software isn’t even
Linux specific but runs on other operating
systems as well, including Microsoft
Windows. Microsoft releases patches only
for Microsoft-specific software.
With the thousands of software packages
available with Debian, security bugs are
impossible to avoid. Most updates are not
specific to Debian but rather affect the software as it runs on Linux, Mac OS X, and
Microsoft Windows alike. Regardless, the
software updates become available to users
of Debian Linux through the apt package
utility. Even if the problem isn’t directly
related to operating system functionality,
the update is easily downloaded and automatically installed. On the other hand,
updates for Microsoft through the default
“Automatic Update” service consist of what
Microsoft terms to be core functions. These
core functions include updates to bundled
products such as Internet Explorer and
Media Player but don’t include updates to
other Microsoft software such as Microsoft
Office, Exchange, SQL Server, and others.
Security flaws in this additional software
can lead to full compromise of the computer and the data contained therein, as is the
case with operating system flaws.
The timing of security updates best
reveals the differences in how the two models approach security. One of the aspects of
open source security is transparency – vir-
MAY 2004
36
ooking past these arguments, it’s
helpful to examine the theory of
security as it is approached by open
and closed source software organizations. To that end I’ll look at the
security approach of the Debian
Linux project as compared to the security
approach of Microsoft – I’ll use Microsoft
as an example acknowledging the important
role that they play as a target of securityrelated attacks due to their market share in
the desktop operating system environment.
Security for both Debian and Microsoft is
chiefly accomplished through the use of
software patches. Debian issues patches for
Debian-specific software problems as well
as non-Debian-specific problems. These
patches run the gamut of any of the thousands of software packages available with
L
A B O UT
TH E
A UTH O R
BY
STE V E
S U E H R I N G
tually as soon as a security flaw, theoretical
or practical, is reported, it’s released to the
general public so that users of the software
can take steps to mitigate the effects of the
security flaw. A patch follows very shortly
after for all of the popular open source software packages. If a patch isn’t readily available within hours, the community frequently steps up to release an intermediate
patch and to help others mitigate problems
associated with the flaw.
On the other hand, Microsoft has undertaken the policy of releasing patches only
monthly for the operating system functions. While this results in fewer security
notices to the public, it does nothing to
enhance security. In fact, releasing patches
on a monthly cycle rather than as necessary
increases the possibility of exploit. The only
people who know about the exploit are the
people responsible for finding it and
Microsoft. Of course, the people who find
software exploits are all honest individuals
with no ill intentions, right? Imagine that a
burglar found a new way to pick door locks
and shared this information with their
friends-in-crime, and the police found out
about the impending crime spree. Now
imagine the police did nothing to alert the
public about this danger because they only
talked to the public monthly. Transparency
and openness of security flaws and defects
in products should be demanded by customers for their own safety.
Comparing the security approaches of
open and closed source software organizations illustrates the inherent structural differences between the two models. Open
source organizations such as Debian
believe in greater protection, openness, and
transparency of the security process so that
their users can protect themselves. Closed
source organizations such as Microsoft
believe that they know best how, where,
and when to disseminate information
about security flaws. Unfortunately for
users, this means quietly, discreetly, and
belatedly.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
304,187 of the World’s Foremost IT Professionals
DIRECT MAIL, EMAIL OR MULTI-CHANNEL
Target CTOs, CIOs and CXO-level IT professionals and developers
who subscribe to SYS-CON Media’s industry leading publications
Java Developer's Journal...
The leading publication aimed
specifically at corporate and
independent java development
professionals
LinuxWorld Magazine...The
premier monthly resource of Linux
news for executives with key
buying influences
Web Services Journal...The
only Web Services magazine for
CIOs, tech, marketing & product
managers, VARs/ISVs, enterprise/
app architects & developers
for those who design, build,
customize, deploy, or administer
IBM’s WebSphere suite of
software
resource for corporate and
independent enterprise
client/server and
web developers
dedicated to ColdFusion web
development
leading XML resource for CEOs,
CTOs, technology solution
architects, product managers,
programmers and developers
WebSphere Developer’s
Journal...The premier publication
PowerBuilder Developer’s
Journal…The only PowerBuilder
ColdFusion Developer's
Journal...The only publication
XML-Journal...The world's #1
WebLogic Developer’s
Journal…The official magazine
for BEA WebLogic application
server software developers, IT
management & users
Wireless Business &
Technology... The wireless
.NET Developer’s Journal…
The must read iTechnology
publication for Windows
developers & CXO management
professionals
magazine for key corporate &
engineering managers, and other
executives who purchase
communications products/services
Recommended for a variety of offers including Java, Internet, enterprise computing, e-business applications, training, software, hardware,
data back up and storage, business applications, subscriptions, financial services, high ticket gifts and much more.
NOW AVAILABLE!
The SYS-CON
Media Database
For postal information:
For email information:
304,187 postal
contact Kevin at 845-731-2684
contact Frank at 845-731-3832
addresses
[email protected]
[email protected]
epostdirect.com 800-409-4443 fax845-620-9035
edithroman.com 800-223-2194 fax845-620-9035
s
e
g
n
e
SECURITY
l
l
ha
x
u
n
i
e
L
h
t
of udit
A
eC
h
T
em
t
s
y
s
e
ecur
s
a
r
fo
Steps
As a decision maker in your IT organization, you’re aware that your Linux
systems share is growing (if your enterprise follows today’s business trend). Linux
installations are now available on every major hardware platform. New projects in
development include Linux systems in an increasing share, and you’re challenged
with incorporating these Linux systems seamlessly into your operations and business
BY
R I C H A R D
W I L L I A M S
processing.
hese Linux systems must also
now be included as part of
your IT audit. IT audits are
increasingly performed by
cross-functional teams rather
than by operations, networks,
applications, or database management
teams. The cross-functional audit teams
have the scope and purview to examine
each area of operations. Since your skilled
operations teams aren’t responsible for
policing their own house, they can remain
focused on their core skill sets.
The audit teams make scheduled passes,
with strategic focus on physical security,
network security, applications security, systems security, and whatever else is part of
your enterprise security plan. The report is
T
A B O UT
TH E
A UTH O R
Richard Williams is director of education for
Symark Software in Agoura Hills, California.
With over 20 years of experience in systems
administration, architecture, and design,
Richard oversees the development and delivery
of Symark’s University Training Program in
providing customer support to
global enterprise customers.
[email protected]
MAY 2004
38
digested and parsed by the audit team
leader or information security manager,
who tactfully disseminates the information
to the appropriate team leaders.
The first challenge emerging from this
vision of corporate information systems
unity is that the operations teams will
potentially mistrust, hate, fear, or otherwise
loathe the audit teams. This humanistic certainty is based on the perception that
someone is trying to find something wrong
so that blame can be assigned. Overcoming
this challenge, while not a typical strategic
audit goal, is important since you want the
audit teams to have unfettered access, and
you want their work to be supported and
adopted by the operations teams. The audit
teams’ reports must become meaningful
www.LinuxWorld.com
SECURITY
input for operations teams, who will review
a report and mitigate the threats instead of
putting out fires later because important
audit information was not heeded.
Using your vision, sensibility, and other
executive powers, you’ve attained respectful buy-in from the teams – you can now
move forward to meet other challenges.
party products to give you more auditability
when users gain or use elevated privilege.
This particular product will log all standard
input, output, and errors, as well as a complete report regarding the secured task:
$ pbrun GIMMIEROOT
Enter your reason for accessing this policy: I
need to edit the /etc/passwd file
The Audit
One problem identified during Linux
audits is that too many people know the
root password and other elevated-privilege
account passwords. These passwords are
the electronic keys to the kingdom in Linux,
and taking back control of these accounts is
a top audit priority. Typically, everyone who
has the root password knows why they
shouldn’t pass it out or overuse it.
There’s limited accountability in most
native Linux operating systems, including
the lack of a cogent audit trail. The native
auditability is primarily centered around the
syslog and sulog facilities, which cannot
describe the interactive actions of the root
user with the system at the level required by
the HIPPA, Sarbanes-Oxley, and NISPOM
Chapter 8 requirements, to mention only a
few. For example, Figure 1 shows a sample
sulog, revealing a not very detailed snapshot
of users using su on a system.
While they’re better than nothing, the
sample log entries don’t describe what
actions were taken after the SU command
occurred. (For the uninitiated, the + or –
tells you if the SU request was successful.)
The syslog example may be roughly
equivalent (see Figure 2).
The example in Figure 2 also indicates
privilege being elevated, but does not
describe (or require) a reason. Additionally,
the file(s) produced by the syslog daemon
may contain information not germane to
your audit, but again, some information is
certainly better than nothing. You can significantly improve the auditability in your
enterprise by adding third-party software
that captures all standard input, output, and
errors, including everything the user does
with the elevated privilege.
The example below is from a policy created
on a Linux system (salmon.mydomain. com),
using a Symark product called PowerBroker,
(version 3.2.1). It provides a root shell for any
user authorized to run the command pbrun
GIMMIEROOT. The policy creates an audit
file akin to others available in some third-
Figure 3 shows what the resultant logfile
includes. Note that the “who, what, when,
where, and why” are evident in the log
output.
I truncated the log file, but you can see
that your audit team has the ability to see it,
and to tell the who, what, when, where, and
why for any elevated-privilege or vital-asset
access. In addition to third-party products,
Linux vendors are working hard to provide
this functionality. This functionality significantly improves your teams’ ability to take
back the root and other elevated-privilege
accounts by granting elevated privilege only
when the user accesses certain commands
or assets (within their normal job descriptions, for example). When access is complete, normal privilege resumes, and the
user never knows the elevated password.
So you’re familiar with elevated-access audit
control; is your audit team is as well? Basic
audit tenants include reading the documentation to determine what to audit, but what documentation do you have that describes who
can access what, when, where, and why?
Your systems, applications, and networks
team can collaborate to create a document
like Table 1.
Your teams may have used any visualization method, but the output is a matrix of
your systems (vertical axis), and your user
community (horizontal axis). Notice that
www.LinuxWorld.com
39
Feb
Feb
Feb
Feb
Feb
Feb
Feb
Feb
Feb
Feb
Feb
29
29
29
29
29
29
29
29
29
29
29
17:16:50
17:17:01
17:17:10
17:19:15
17:19:20
17:19:26
17:19:29
17:21:11
17:21:41
17:22:39
17:23:50
FIGURE 2
halibut
halibut
halibut
halibut
halibut
halibut
halibut
halibut
halibut
halibut
halibut
each login/access method is described, as
well as which system each user can access,
from which system, by which method. Once
users are on the systems, executable commands are listed, as well as any elevated
privilege required. With this documentation,
your audit team now knows which systems
to go to, which accounts to scrutinize, which
commands should normally be allowed as
the user, and which commands require elevated privilege. This documentation is simple but effective in meeting the requirement
to report upward and manage outward.
Another important problem that surfaces
in a Linux audit is the publication of passwords, which often happens inadvertently
via secure applications scripts (Web startup
or shutdown, middleware startup or shutdown, database startup or shutdown, etc.).
Information synchronization routines
(such as NIS or LDAP v2) also place assets
at risk, as they pass account, system, and
other enterprise information around the
LAN or WAN in clear case. (In the case of
passwords specifically, the encrypted value
is sent, but agile information bandits know
the difference between a crypt, bigcrypt, or
MD-5 hash. When the rest of the information is in clear case, encrypting only the
password may provide little safety.)
SU
DATE
TIME
RESULT
PORT
USER NEWUSER
SU
08/19
15:07
+
pts/4
root-eshalov
SU
08/19
15:09
+
pts/2
eshalov-root
SU
08/19
15:24
+
pts/4
eshalov-root
SU
08/19
16:18
+
pts/4
root-eshalov
SU
08/19
16:26
+
pts/3
cgotcher-root
SU
08/19
16:36
-
pts/6
rwilliam-root
SU
08/19
16:36
-
pts/6
rwilliam-root
SU
08/19
16:46
+
pts/5
root-eshalov
FIGURE 1
SAMPLE SULOG
su: [ID 366847 auth.notice] 'su root' succeeded for pbtester on /dev/pts/1
su: [ID 366847 auth.info] 'su pbtester' succeeded for pbtester on /dev/pts/1
last message repeated 10 times
inetd[169]: [ID 965992 daemon.error] sypbguid/tcp: unknown service
su: [ID 366847 auth.info] 'su pbtester' succeeded for pbtester on /dev/pts/1
pbrun3.1.0-05: [ID 635269 auth.error] 3005 Request ended unexpectedly
su: [ID 366847 auth.info] 'su pbtester' succeeded for pbtester on /dev/pts/1
last message repeated 2 times
su: [ID 366847 auth.notice] 'su root' succeeded for pbtester on /dev/pts/3
su: [ID 366847 auth.info] 'su pbtester' succeeded for pbtester on /dev/pts/3
last message repeated 3 times
SAMPLE SYSLOG
MAY 2004
SECURITY
Once passwords are obtained by a nontrusted source (someone leaves a file containing a password world-readable, for example), valuable assets are at risk on numerous
fronts, including easy access to critical
files/data. When an asset can be accessed by
a user in masquerade, the asset is at risk. The
insertion of a Trojan program, the destruction
of an application, and the alteration of data
are all undesirable options. Whether compromised by the pad of paper in the machine
room, the e-mail to the group alias with a
defunct (but still receptive) recipient, the
generic account password used by consultcommand
'GIMMIEROOT'
cwd
'/home/rwilliam'
date
'2004/03/08'
eventlog
'/var/log/pb.eventlog'
host 'salmon.mydomain.com'
hour
16
keystrokelog
'/var/log/pb.rwilliam.GIMMIEROOT.salmon
.mydomain.com.040308.164656.TZs2RH'
masterhost 'salmon.mydomain.com'
policyUse
' I need to edit the password file'
requestuser 'rwilliam'
runeffectiveuser 'root'
runhost
time
'salmon.mydomain.com'
'16:46:46'
ants nationwide when installing the new software on your enterprise server, or some other
method, the untrusted source now has the
ability to log in to one or more systems as
someone other than themselves. No audit
could save you at this point, as activity performed under the guise of a trusted user is
now suspect.
Fortunately, your systems audit includes
the regular checking for ownership, permissions, checksums, and other embedded safety mechanisms to keep data and applications in a known good state. Program files,
executables, even operating system and
patch levels are being recorded and compared from audit to audit, and maintained at
the most current secure levels. The LDAP
directory is scrutinized for the dysfunction
that occurs between Human Resources and
Information Systems, causing transferred or
even terminated employees to be removed to
systems, but allowed to remain in the LDAP
directory. This step eliminates the ability for
a transferred or terminated employee to gain
access to assets via an LDAP-credentialed
application. You have delegated and empowered effectively, your audit team is passing
back the appropriate report to the systems
managers, and the integrity of the systems
and programs is secure.
Conclusion
FIGURE 3
RESULTANT LOGFILE
TABLE 1
AUDIT DOCUMENT
MAY 2004
As a quick summary, your internal teams
40
periodically perform these audits:
• Physical security
• Operating system
• Network security
• Others as you require
Each team has a specific focus and reports
to you for dissemination and mitigation. A
periodic review of your documentation will
reveal newly emerging systems, network
components, or applications requiring audits,
and your appropriate team will incorporate
them as needed. The process feeds itself, as
each successive audit both addresses issues
and reveals an emerging strength of operations as a cohesive unit, with assets protected
in concentric rings of recurring audits.
Your charter to your auditors is multifold,
as they assess each aspect of today’s
increasingly complex information systems
nervous system. The audits should be periodic, focused on a specific aspect of the
larger picture, and as unintrusive as possible. They should yield a systematic and
repeatable report, which is then passed
back into the system for assessment and
mitigation. Your audit teams use a documentation tool to determine who, what,
and how to audit your assets, and the result
is that the external audit becomes a quality
checkpoint rather than an item causing
worry, fear, or loathing.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
LOOK FOR YOUR FREE...
Coming this
SPRING!
© 2004 SYS-CON MEDIA. ALL RIGHT RESERVED. ALL BRAND AND PRODUCT NAMES USED ARE TRADE NAMES, SERVICE MARKS, OR TRADEMARKS OF THEIR RESPECTIVE COMPANIES.
JBOSS
Following in
Linux’s Footsteps
How open source Java technology
is shaking up the market
BY
Is open source and the commoditization of certain technologies cannibalizing
B O B
B I C KE L
software license revenue? Possibly, but many argue that this market dynamic
been cleared and the open source OS has
already been embraced by mainstream
enterprises.
stimulates many vendors to accelerate innovation and to create new technologies
Where It’s Successful
Bob Bickel is vice president of strategy and
corporate development for JBoss, Inc., provider
of the most popular Java-based application
server. In addition to his role as an advisor,
Bickel is responsible for establishing
technology partnerships and alliances,
as well as helping drive corporate
marketing initiatives. Bickel previously
was general manager of the
HP Middleware.
[email protected]
standards and an excellent way to achieve
true definitions of the standards. Of
course, the consumers of open source
benefit from the low cost. Proprietary
vendors are grappling with the commoditization of infrastructure software that
today is firmly entrenched as a large,
macro-economic force.
In the case of application server technology, some other key factors are
accelerating its commoditization, including the Java 2,
Enterprise Edition ( J2EE)
platform. This standard has
been widely accepted by
multiple
application
servers,
which levels the
playing field among vendors and makes
portability of applications relatively
straightforward.
In addition, Linux has played the role
of a big brother, paving the way for
young newcomers. Little brothers and
sisters usually get to drive the car sooner
or stay out later – the older sibling greases the wheel and makes life easier for
them. So, the adoption of open source
middleware is going much faster than
Linux since the pathway has already
On the server side, combining open
source with Java has pushed the limits of
what modern middleware technology can
do. JBoss, a Java-based, open source application server that has achieved 4 million
downloads since 2001 so far, is a popular
application server for companies that
want a high-quality, cost-effective platform for developing scalable, secure Web
applications.
This is also happening on the database
front. According to an
August 2003 brief by
Forrester
Research’s Ted
Schadler,
with the
open source
database
MySQL “….nipping at the heels
of commercial databases, IBM,
Microsoft, Oracle, and Sybase
will ramp up their already busy research
teams.”
Furthermore, SAP has recently handed
its SAPDB database software to the open
source development community and
keeps 100 developers working on the
software. Anyone can download the
database from the SAP Web site, and the
company provides support for its ERP
software customers who are using the
database.
In fact, MySQL AB now offers MaxDB.
MaxDB is the result of an alliance between
MySQL and SAP to jointly develop and
market an enterprise open source database.
MAY 2004
42
www.LinuxWorld.com
and applications. And, while this market dynamic can be disruptive, it creates a
roaring buyer’s market for IT decision makers.
owhere is the case for this
more apparent than in the
middleware and application
server sectors. Falling prices
and a maturing market are also
resulting in consolidation
among the vendors. At the same time,
open source alternatives, combined with
tightening IT budgets, are changing the
application server software market.
N
The Times –
They Are A-Changin’
The Internet and open source make it
possible to economically produce and distribute software. This is especially true
with middleware, where stable standards
are defined and open source is both a
high-quality way of implementing these
A B O UT
TH E
A UTH O R
www.linuxworld.com
JBOSS
Free, high-quality products like this
are changing the competitive landscape.
Two years ago there were 30 application
server vendors; today there are less than
10 proprietary vendors and only 4 have
significant market share. At this rate,
JBoss may become to application servers
what Apache is to Web servers – a dominant open source platform in critical IT
infrastructure and a deciding force in
promoting open standards on the
Internet.
What’s a
Commercial Vendor to Do?
Increased competition from both
commercial and open source companies
is pushing everyone to continue innovating and improving their technology. As
a result, many vendors are now trying
to differentiate themselves by adding
extensions to their application servers.
Although, according to Gartner’s 2003
Enterprise Application Server Magic
Quadrant, “The mainstream majority
of enterprise projects will succeed
equally well using an application server,
embedded into a larger framework of
tools, applications, or infrastructure
technologies.”
Other industry experts predict the
emergence of specialized application
servers dedicated to presenting database information to a variety of handheld devices, for example. Some are
even rethinking the traditional practice
of tying software licenses to mandatory
service.
The Net-Net
The consumer, a discriminating
IT buyer in a down market, is tired
of multiple startups and even established
vendors putting out the same technology
and noise. As a result, the IT buyer is
increasingly looking to open source products. At the same time, many proprietary
vendors, losing market share due to the
commoditization of such technologies
are redirecting R&D into new Web services, integration, and portal technology,
which ultimately may also benefit end
users as well.
Like the Internet itself, the modern
enterprise now increasingly relies on
successful open source projects. Plus,
the commoditization of operating systems, compilers, and servers is only
the beginning. Many forms of infrastructure software can benefit from
the open source model. Even nonproprietary business software likely
to have a large user base may soon be
ripe for commoditization too.
Ultimately, all this new thinking and
ingenuity gives consumers increased
choices, better products and services,
and more cost-effective ways for building cutting-edge IT infrastructures
and the next wave of distributed
applications.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
Industry
Newsletter!
The insider intelligence
you need to keep
ahead of the curve
FREE
e-Newletters...sign up today!
Go to www.SYS-CON.com
The most innovative products, new releases,
interviews, industry developments, and
plenty of solid i-technology news can be
found in SYS-CON Media’s Industry Newsletters.
Targeted to meet your professional needs, each
e-mail is informative, insightful, and to the
“JBoss may become to
application servers what Apache
is to Web servers –
a dominant open source platform
in critical IT infrastructure”
www.LinuxWorld.com
43
point. They’re free, and your subscription is just
a mouse-click away at www.sys-con.com.
Select the
Industry
Newsletters
that match
your needs!
Choose one –
or try them all!
The World’s Leading i-Technology Publisher
DISTRIBUTIONS
Debian
GNU/
/
Linu
All you need to know to get started
with Linux in ‘its purest form’
Linux is rapidly becoming a household name. More and more people are aware of
the various distributions that make up the Linux scene – but until now the vaguely
science-fictionish sounding Debian has not entered the public consciousness in the way
of names like Red Hat or SUSE. Through this article I hope to help LinuxWorld Magazine
readers enter the world of what many consider to be Linux in its purest form.
BY
J A L D H A R
H.
V YA S
The Debian Project:
History and Aims
A B O UT
TH E
A UTH O R
Jaldhar Vyas is a consultant and Hindu priest
who has been a member of the Debian Project
since 1997. He lives in Jersey City, New Jersey
with his wife and daughter.
[email protected]
MAY 2004
If you think Linux is hard to install today,
pity the poor pioneers of the early '90s.
They had to scour the Internet to find software to run, porting and integrating it
themselves. There were a few fledgling distributions that made the task easier, but
Linux was still only for
the most dedicated and knowledgeable.
In 1993, an Indiana college student
named Ian Murdock became dissatisfied
with the existing Linux offerings and decid-
44
ed to create a Linux distribution that was
community based, composed entirely of
free software, and technically excellent. The
name Debian (pronounced “deb-ee-an”
with stress on the first syllable) is a contraction of the names of Ian and his wife Debra.
The new project attracted a lot of interest
from like-minded Linux enthusiasts and
began to grow steadily. Its fervent stance in
favor of free software attracted the attention
of Richard Stallman’s Free Software
Foundation (see www.gnu.org), which
sponsored it for a while. Although that for-
www.LinuxWorld.com
DISTRIBUTIONS
mal relationship has ended, Debian still
shares many of the FSF’s aims. The FSF’s
GNU project also provides much of the core
software that makes up Debian, so the
developers were proud to formally name
the distribution Debian GNU/Linux.
Today, despite its lack of glitz and PR,
Debian is estimated to be the second- or
third-most popular Linux distribution and
the only major noncommercial one. It is
committed to supporting the Linux Standard
Base (see www.freestandards.org) and takes
part in other initiatives to enhance the Linux
operating system. It has also become the
base for other distributions: from commercial desktop-oriented products like Libranet,
Lindows, and Xandros to government-sponsored efforts such as Spain’s LinEx and
Scandinavia’s Skolelinux, and live CDs such
as KNOPPIX and Morphix.
In 1997, the Debian developers decided
to formally state their goals in a social contract with the free software community. A
set of guidelines as to what the project considers to be free software was also issued.
The Debian Free Software Guidelines
(DFSG) later became the source of the
Open Source Definition.
The Debian GNU/Linux
Social Contract
The Debian Project is an association of
individuals who have made common cause
to create a free operating system. This is the
“social contract” we offer to the free software community.
1. Debian will remain 100% free software:
We promise to keep the Debian
GNU/Linux Distribution entirely free
software. As there are many definitions
of free software, we include the guidelines we use to determine if software is
“free” below. We will support our users
who develop and run nonfree software
on Debian, but we will never make the
system depend on an item of nonfree
software.
2. We will give back to the free software
community: When we write new components of the Debian system, we will
license them as free software. We will
make the best system we can, so that
free software will be widely distributed
and used. We will feed back bug-fixes,
improvements, user requests, etc., to the
“upstream” authors of software included
in our system.
www.LinuxWorld.com
3. We won’t hide problems: We will keep
our entire bug-report database open for
public view at all times. Reports that
users file online will immediately
become visible to others.
4. Our priorities are our users and free
software: We will be guided by the needs
of our users and the free software community. We will place their interests first
in our priorities. We will support the
needs of our users for operation in many
different kinds of computing environments. We won’t object to commercial
software that is intended to run on
Debian systems, and we’ll allow others
to create value-added distributions containing both Debian and commercial
software, without any fee from us. To
support these goals, we will provide an
integrated system of high-quality, 100%
free software, with no legal restrictions
that would prevent these kinds of use.
5. Programs that don’t meet our free
software standards: We acknowledge
that some of our users require the use of
programs that don’t conform to the
Debian Free Software Guidelines. We
have created “contrib” and “nonfree”
areas in our FTP archive for this software.
The software in these directories is not
part of the Debian system, although it
has been configured for use with Debian.
We encourage CD manufacturers to read
the licenses of software packages in these
directories and determine if they can distribute that software on their CDs. Thus,
although nonfree software isn’t a part of
Debian, we support its use, and we provide infrastructure (such as our bugtracking system and mailing lists) for
nonfree software packages.
1. Free redistribution: The license of a
Debian component may not restrict any
party from selling or giving away the
software as a component of an aggregate software distribution containing
programs from several different sources.
The license may not require a royalty or
other fee for such sale.
2. Source code: The program must include
source code, and must allow distribution
in source code as well as compiled form.
3. Derived works: The license must allow
modifications and derived works, and
must allow them to be distributed
under the same terms as the license of
the original software.
4. Integrity of the author’s source code:
The license may restrict source code
from being distributed in modified
form only if the license allows the distribution of “patch files” with the
source code for the purpose of modifying the program at build time. The
license must explicitly permit distribution of software built from modified
source code. The license may require
derived works to carry a different name
or version number from the original
software. (This is a compromise. The
Debian group encourages all authors
to not restrict any files, source or binary, from being modified.)
5. No discrimination against persons or
groups: The license must not discriminate
against any person or group of persons.
6. No discrimination against fields of
endeavor: The license must not restrict
anyone from making use of the program
in a specific field of endeavor. For
example, it may not restrict the program
from being used in a business, or from
being used for genetic research.
7. Distribution of license: The rights
attached to the program must apply to
all to whom the program is redistributed without the need for execution of
an additional license by those parties.
8. License must not be specific to Debian:
The rights attached to the program
must not depend on the program’s
being part of a Debian system. If the
program is extracted from Debian and
used or distributed without Debian but
otherwise within the terms of the program’s license, all parties to whom
the program is redistributed should
have the same rights as those that are
granted in conjunction with the
Debian system.
9. License must not contaminate other
software: The license must not place
restrictions on other software that is
distributed along with the licensed software. For example, the license must not
insist that all other programs distributed on the same medium must be free
software.
10. Example licenses: The “GPL,” “BSD,”
and “Artistic” licenses are examples of
licenses that we consider “free.”
45
MAY 2004
The Debian Free Software
Guidelines
DISTRIBUTIONS
Debian Packages
The software provided by Debian is
packaged in a special binary format called
deb (after the .deb extension of package file
names) which, much like the rpm packages
used by other distributions, makes it easy
to install, uninstall, and upgrade. Although
rpms and debs cannot be used interchangably, there is a utility called alien that
converts between the two. Debian has a
written policy manual (see www.debian
.org/doc/debian-policy) that strictly
defines how packages should behave and
thus ensure they will work well together.
A common difficulty with binary software packages is that of satisfying dependencies. A particular piece of software may
require a certain library to work correctly or
two programs may conflict with each other.
Debian has developed an advanced packaging tool, aptly named apt, that solves this
name, taken from characters in the Pixar
animated film Toy Story, which a former
Debian project leader worked on.
Publicly released distributions also have
a version number, with sub-version numbers (X.Y or X.Y rZ) to indicate updated
point releases that are not complete new
versions.
Currently the three distributions are:
1. Stable (Woody or 3.0 r2): This is the version usually found on CDs. It is the most
recent officially released Debian distribution and is suitable for production
servers and other environments where
high reliability is essential. No new code
is added to a stable release except for
fixes of security vulnerabilities, which are
back-ported from newer versions. While
this conservative approach may appear to
make stable lag behind other Linux distributions, it ensures that it is as bug-free as
“Debian is estimated to be the
second- or third-most popular
Linux distribution and the only
major noncommercial one”
You can find older Debian distributions
at www.debian.org/distrib/archive. A listing of third-party packages is available at
www.apt-get.org.
Within each distribution, there are three
sections:
1. Main: The official distribution made
up entirely of free software packages.
2. Nonfree: For packages that fail the
DFSG.
3. Contrib: For those that are free but
depend upon a nonfree component.
Debian has been ported to many different architectures:
• i386: Intel’s 80386 and its descendants
and clones. Binaries optimized for
Pentiums, AMD’s Athlons, etc., are not
provided, but can be created by the
user.
• m68k: Motorola 68000 chips as used in
Sun3, early Apple Macintosh, Atari, and
Amiga machines.
• sparc/sparc64: Systems based on Sun
Microsystems’ 32- and 64-bit SPARC
processors.
• alpha: Compaq’s (formerly Digital’s)
Alpha processors.
• powerpc: IBM and Motorola PowerPC
processors used in IBM servers and
newer Apple Macintoshes.
• arm: ARM processor used in the
Netwinder and many embedded
devices.
• mips/mipsel: MIPS processors which
can be big-endian (as used in SGI
machines) or little-endian (e.g.,
DECStations).
• hppa: Hewlett-Packard’s PA-RISC architecture.
• ia64: Intel’s 64-bit Itanium processor.
AMD’s Opteron is not yet supported, but
a port to that architecture has just begun
and may be available by the time you
read this.
• s390: IBM’s S/390 mainframes.
• sh: Hitachi Super/H chips as used in the
Sega Dreamcast.
At any given time, there are actually
three Debian distributions: stable, testing, and unstable. Each distribution has a
possible. It is possible to run some of the
latest Linux software on Woody thanks to
the third-party Debian Backports Project
(see www.backports.org).
• Unstable (Sid): This is where new development takes place. Although there
might be occasional breakage, unstable
refers to the fact that this distribution is
constantly in flux with new packages
being added, bugs fixed, etc., not to the
quality of its software. Developers and
other power users tend to use unstable.
• Testing (Sarge): This distribution
attempts to fall between stable and
unstable. When packages in unstable are
deemed sufficiently bug-free, they are
added to testing. When testing itself is
bug-free and any other release goals are
met, it becomes the next stable distribution. It is a good choice for desktop
users.
Debian is branching beyond Linux
with ports in progress to the GNU Hurd,
FreeBSD, and NetBSD kernels. For more
information on each port, such as exactly
which hardware is supported, see www.
debian.org/ports.
Support for such a wide variety of often
quite esoteric hardware may seem like a
MAY 2004
46
www.LinuxWorld.com
problem. When you install a package using
the command-line program apt-get or one
of the graphical apt front ends, the most
recently packaged version is downloaded
from the Debian servers along with any
other packages it may depend on. You are
also prompted to remove any conflicting
packages. This ensures your system is in a
consistent state at all times with a minimum amount of manual intervention.
Needless to say, this idea has proven to be
quite popular. Other distributions either
developed their own variations on the
theme or ported apt. Even Apple’s Mac OS
X has an apt port (see http://fink.sourceforge.net).
Debian Distributions and Ports
www.linuxworld.com
DISTRIBUTIONS
waste of time. However, apart from the
innate geek appeal, porting to exotic hardware has advantages even for people who
will never use anything other than a standard PC because the porting process often
picks up subtle bugs that would otherwise
go unnoticed.
Obtaining Debian GNU/Linux
Debian makes its distribution available
for free on the Internet for all to use as
they wish without licenses or royalties.
You can download it as a set of software
packages by rsync or anonymous FTP
(see www.debian.org/distrib/ftplist for
servers) or as ISO9660 images suitable for
burning on to CD-ROMs (see http://
cdimage.debian.org). If you don’t have
Internet connectivity or it is too slow for
large downloads, you can get Debian by
purchasing a CD set from a third-party
vendor (see www.debian. org/CD/
vendors). Many vendors allow you to
make a donation to the Debian Project
along with your order.
Getting Help
Most of Debian’s business is conducted
via public e-mail discussion lists. A full list
plus subscription info can be obtained
from www.debian.org/MailingLists. Here
are some of the major ones. (Those marked
with a * are moderated or otherwise
restricted.)
• debian-announce*: Important
announcements from the Debian Project.
• debian-changes*: Notice of new or
updated packages in stable.
• debian-devel-announce*: Announcements from the Debian project of interest to Debian developers.
• debian-devel-changes*: Notice of new
or updated packages in unstable.
• debian-devel: Technical discussion
among Debian developers.
• debian-news*: A weekly roundup of
what’s going on in the Debian world.
• debian-policy: Discussion of Debian
policy and proposed amendments to it.
• debian-project: Discussions concerning the operation of the Debian Project.
• debian-security-announce*: Security
advisories from the Debian Project.
• debian-security: Open discussion of
security issues.
• debian-user: The main discussion and
support list for users.
www.LinuxWorld.com
Support is available via IRC in channel
#debian on the Freenode IRC network.
(For a list of servers, see www.freenode.
org.)
The Debian Web site www.debian.
org is your starting point to learn about
all things Debian. For the benefit of
international users, it is translated into
almost 20 different languages. Some
third-party Web sites focusing on
Debian are Debian Planet (www.debian
planet.org) and Debian-Help (www.
debianhelp.org).
You can contact the maintainer
of any Debian package by using our
public bug-tracking system at http://
bugs.debian.org or by sending an
e-mail to packagename@packages.
debian.org
See www.debian.org/consultants/ for
a list of companies and consultants who
provide paid support.
How to Help the Debian Project
To this day, Debian remains a community project without paid staff. It depends on
the help of volunteers and well-wishers to
further its aims. There are several ways in
which you can support the activities of the
project:
• Join us as a developer: www.debian.
org/join/newmaint describes the
process for becoming a member of
our team.
• Help with support and quality assurance: You don’t have to be a Debian
developer to help improve our operating system. See http://qa.debian.org/
howto. html for instructions and a
TODO list. Or you can assist users by
answering questions on the mailing
lists or by sharing a copy of Debian
with them.
• Donate money or resources: Debian
relies on donations of cash, servers,
bandwidth, etc., for its operation.
You are under no obligation to contribute, but if you would like to do
so, a noprofit organization registered
in New York, called Software In The
Public Interest Inc., has been set up
to accept donations on behalf of the
Debian Project. For further details,
see www.spi-inc.org/donations
or send an e-mail to treasurer@
spi-inc.org.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
47
Subscribe
Today!
Connect online
for fastest service...
don’t miss another
issue of LWM!
SAVE 30%
OFF!
REGULAR ANNUAL COVER PRICE $71.76
YOU PAY ONLY
49
99
$
12 ISSUES/YR
*OFFER SUBJECT TO CHANGE WITHOUT NOTICE
LOG ON
TO
www.LinuxWorld.com
The World’s Leading i-Technology Publisher
SECURITY
Securing a Tightly
Integrated OS
Protect your system with a layered approach
As the state of the art in operating systems (OS) continues to advance, an
unnerving trend has emerged: vulnerabilities in tightly integrated operating systems.
How do you address this? With an effective combination of educated staff, proper
procedures, and technology.
ather than being a collection of
separate utilities and daemons,
the modern OS is moving toward
a highly integrated system with
numerous dependencies. As a
result, the core of the OS is more
easily exposed to a broader range of vulnerabilities. While Linux still largely a collection of separate components, Microsoft
Windows is at the forefront of this design
principle and, in fact, is moving to an even
more tightly integrated system. The risks
can become significant. Whenever a vulnerability is found in one of the core components of a tightly integrated OS, interdependent components are vulnerable as a
result. Developing an appropriate approach
to protecting systems with tightly integrated OSs is the key to maintaining a secure
and safe network environment.
The rationale for a tightly integrated
operating system is sound – reduced
development costs and effort, a reduction
in portability issues, and fewer components to break. The flip side is unprece-
R
A B O UT
TH E
A UTH O R
dented exposure to vulnerabilities. In the
past, when a single system component
had a vulnerability the impact was isolated to that single component. However,
due to the dependencies introduced by
extensive integration, that one component may now impact multiple applications. It is this chain of dependencies that
presents enormous risk.
A Practical Approach to
Isolating the Exposures
Brad Doctor, CISSP, is StillSecure’s director of
security research. He has been involved in IT
security for more than 10 years. Prior to
StillSecure, Brad consulted for such companies
as Apple Computer, Phoenix Technologies,
and the Monster Board, fulfilling network
and host-based security needs. In addition to
traditional IT security, Brad also worked with
Quova, Inc., as the director of research.
[email protected]
A number of approaches exist for isolating – or at least reducing – your exposure in cases such as these. For the purposes of this article, the assumption is
that it is impossible to catch every security flaw during development and that
organizations will need to take measures
to protect themselves until patches or
upgrades are available that solve the
security flaw.
MAY 2004
48
BY
B R A D
D O C TO R
The simplest approach to dealing with
exploits aimed at integrated OSs is to turn
off any services not required or restrict
access to those services via network firewalls or network intrusion prevention systems (IPSs). Turning off a service entirely is
rarely a practical option for Web servers or
file servers. In the specific case of a Web
server, doing so would certainly solve the
problem, but then you wouldn’t have a
Web server!
A layered approach consisting of the following primary components is the most
practical solution:
1. Education of your network and system
administrators
2. A baseline of the current state of your
network
3. Proper configuration of the host operating system, including current patches
and service packs
4. Proper configuration of the network
service being hosted
5. A generic network firewall to allow only
specific traffic in and out
6. An IPS to cover the bases left open by
the network firewall
7. An on-board firewall for each device
(IPtables in Linux, TCP Filters in
Windows)
8. In the case of a Linux system, a chrooted
environment for each available network
service, and optionally physical separation from the internal network
Having an educated and security-conscious staff is the most important of these
options. The ability to recognize, understand, and correct a potential security
exposure or configuration error is much
more valuable than any technology solution. Your staff is truly the first line of
defense.
Knowledge is power! Knowing your
current exposures and configuration
www.LinuxWorld.com
www.linuxworld.com
SECURITY
issues should be on your short list,
regardless of how far into this process
you may go. Rectifying the issues found
should be the immediate next step –
directly followed by another baseline to
once again ascertain any new issues.
Automated vulnerability management
tools can help make this process straightforward and manageable.
Current shipping distributions of Linux
as well as current shipping versions of
Windows still contain many services that
are not useful or appropriate for a device
that will host publicly accessible network
services. You should identify and disable
these services before the device is ever connected to any network. Linux is able to fully
function with far fewer resources than
Windows, and you should take advantage
of this. If the first step (i.e., a well-educated
staff) was successful, your administrators
will be able to identify which services to
safely disable.
The network service itself, for example
a Web server, should also be properly
configured. No prepackaged examples or
documents should be present anywhere
within the document root, nor should
any of this data be accessible by anyone
over the network. For example, many
exploits exist that rely upon these stock
examples being installed in a default
installation of the Microsoft IIS Web
server.
Every network that is to be interconnected with any other network should have a
firewall at the gateway. The firewall should
be configured to only allow specific traffic
both into and out of the network. Nearly
every firewall controls inbound traffic, but
few are configured to also control outbound traffic. For example, should an
internal system ever be infected with a
worm (as has happened both with Linux
and Windows), the outbound controls will
hopefully limit the impact and propagation of the worm.
An intrusion prevention system (IPS) is
a great tool to fill in the cracks that a firewall leaves open. As most firewalls do not
normally perform any type of content
inspection (or very limited if they do), the
allowed traffic is by no means assured to
be free of malicious content or exploits.
This is where an IPS really shines – the
ability to inspect all traffic for attacks.
Most IPS products also allow the traffic to
www.LinuxWorld.com
be blocked, hence the prevention in intrusion prevention system. The value of an
IPS is often discounted or misunderstood,
yet for those in the know, an IPS represents a 24/7 partner that never stops preventing the malicious traffic from entering
your network.
An on-board firewall is a critical component that will shield your organization
from the inevitable configuration error. By
restricting which types of network traffic
may be passed into and out of each endpoint, you greatly reduce your exposure.
Windows and Linux have this capability.
Most Linux distributions use this out of
the box; however, Windows must be configured after the fact to leverage this capability, although Service Pack 2 for Windows
XP will change that.
Chrooted environments are an
extremely effective means to isolate
processes on a Linux system. Linux has
native support for chrooted environments
and most distributions ship with tools out
of the box that will allow you to do this for
nearly any network service (or any
process for that matter!). Unfortunately,
Windows has no good way to implement a
chrooted environment. A somewhat feasible option for Windows includes running
VMware, but the resources required are
often too much, making this impractical.
The primary benefit of a chrooted environment is the logical separation: if a
process or application is exploited, the
damage is limited to the chrooted environment, significantly reducing the
impact to the rest of the system. How-to’s
exist for popular Linux network services
and a quick search on Google will find
those.
Conclusion
The rate of exploit attempts and network worms is rising and will continue to
rise. The attack vectors are continually
increasing in their sophistication, and
attacks are becoming much more difficult
to prevent or even contain. Both Linux
and Windows can be made insecure in a
network environment – and both can also
be made secure enough to be safe.
Regardless of your chosen platform, the
most important tool available to you is an
effective combination of your staff, proper
procedures, and technology.
Subscribe
Today!
Operators are
standing by...
don’t miss another
issue of LWM!
SAVE 30%
OFF!
99
$
49
REGULAR ANNUAL COVER PRICE $71.76
YOU PAY ONLY
12 ISSUES/YR
*OFFER SUBJECT TO CHANGE WITHOUT NOTICE
CALL
CUSTOMER SERVICE
AT
1-888-303-5282
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
49
The World’s Leading i-Technology Publisher
GAMING
Linux on the Back End:
Dark Age of Camelot
Rob Denton on how Mythic Entertainment
lets you live the legends
Rumor has it that many MMORPGs (Massively Multiplayer Online Role-Playing
Games) are using Linux on the back end to run their worlds, so your humble Gaming
Industry editor decided to start knocking on some doors. The first kind folks to
answer were those at Mythic Entertainment (www.mythicentertainment.com), who are
I NTE R V I E W
BY
D E E-A N N
L E B L A N C
LWM: What were some of the challenges
involved in building your MMORPG?
Were any of them Linux-specific?
Denton: The challenge in building a game
of this type is the game design. Technology
is very important – the game must be stable
– but making the game fun is the game
developer’s greatest challenge.
the creators of the popular Dark Age of Camelot (DAOC, www.darkageofcamelot.com)
game. Rob Denton, chief technology officer of Mythic Entertainment, took a few
moments to answer some questions.
LWM: Please tell us briefly about Dark Age
of Camelot. It’s an MMORPG, correct?
Rob Denton: Yes, Dark Age of Camelot is a
massively multiplayer online role-playing
game, where people can create characters in
a fantasy world based on Arthurian myths
and legends (as well as Viking and Celtic
lore). They can adventure with friends, make
enemies, fight one another, and basically
grow their characters in this online world.
LWM: Where is Linux involved in DAOC’s
back end?
Denton: Our game and Web servers are all
running Red Hat Linux. Because we are an
online game, we rely extensively on our server technology for game rules, logging, and
billing. All of this is done on Linux servers.
A B O UT
TH E
I NTE R V I E W E R
Dee-Ann LeBlanc, gaming industry editor of
LinuxWorld Magazine, has been involved with
Linux since 1994. Dee-Ann is the author of 12
books and 130 articles, and has more of both
coming. She is a trainer, a course developer –
including the official Red Hat online courseware at DigitalThink – a founding member of
the AnswerSquad, and a consultant.
[email protected]
MAY 2004
LWM: Why was Linux selected to handle
the back-end tasks that it handles?
Denton: Well, first and foremost because it
is free – that and because we had been
using Linux for a few years as back-end
server technology for other smaller titles
we published. We were very comfortable
with developing on that platform and rely
on its stability.
LWM: What other titles had you used
Linux with?
Denton: We used Linux for back-end
game servers on many titles between 1996
and 2001, when Camelot launched. They
are: Darkness Falls; Darkness Falls: the
Crusade; Magestorm Millenium;
Splatterball Plus; and Spellbinder: the
Nexus Conflict. DF and DFC were textbased online role-playing games;
Magestorm, Splatterball, and Spellbinder
are first-person shooters.
LWM: Why were the other back-end
platforms selected to handle what
they handle?
Denton: We don’t have any other back-end
server technology at all in Dark Age of
Camelot – it’s all Linux based.
50
LWM: What technical lessons have you
learned along the way?
Denton: We’re constantly learning lessons
not only about game design, but also about
the technology that our game uses.
LWM: Could you share a couple of
examples with us, in both the game
design and the technology?
Denton: The best example of this is when
we found that we can support many more
players on a server than we allow. So, we
made a game decision to limit the amount
of players simultaneously connected to
one of our “shards” to 3,500. There’s no
strict technical reason for this; it’s just
that when more players than that connect, the world starts to feel crowded and
it is harder to find places to go that aren’t
overrun with other players. Simply, it’s not
fun to play an online game when it is
overcrowded.
LWM: What business lessons have you
learned along the way?
Denton: Keeping your customers happy is,
in our experience, the number-one challenge. Camelot is a subscription-based
service, and we know that without our subscription-paying community, the game
would quickly become unprofitable. So we
spend lots of resources on updating the
game, fixing bugs, and ensuring that our
server code is stable and reliable.
www.LinuxWorld.com
GAMING
LWM: Is there a Linux client?
Denton: No, currently we run only on MS
Windows, since we utilize DirectX.
LWM: Do you plan to provide a Linux client?
Denton: When there is sufficient demand
for one. This is a risky thing for us – it
would take a lot of work to develop a new
client, and of course support it over the
years that Camelot will continue to be
played. Camelot was written using a commercial graphics engine API called
NetImmerse that “sits” on top of DirectX.
When we start thinking about porting the
client to another OS, we’ll have to come up
with another graphics engine solution, and
that will be time consuming.
LWM: If you don’t plan to provide a Linux
client at the moment, what would have
to change in order for you to consider
such a move?
Denton: Having a huge upswing in the
amount of Linux desktop machines, plus a
commercially accepted 3D graphics standard that we could port to. We are very
happy with Linux as a back-end server
technology – our entire business is based
on it – but we feel that Linux client technology is lagging a bit behind. It’ll catch up
soon enough, and when it does, we’ll think
about porting.
LWM: OpenGL is the standard used
for both OS X and Linux games, and is
heavily backed by game companies like
id Software. id doesn’t use DirectX at all
to my understanding, they use entirely
OpenGL, even for Windows.
Denton: That’s true, but id is in the business of making graphics engines that they
license to other companies (as well as
developing games, of course). Mythic is
not in that business; we licensed an
engine technology to develop Spellbinder
and Camelot with, and that happens to be
based on DirectX on the Windows platform. Of course it’s possible for us to
www.linuxworld.com
license another technology that is
more portability friendly, but we need
to have a compelling business reason to
do so.
LWM: Have the changes in Red Hat (the
split between its community Fedora
Project and its non-free RHEL) caused you
any concern over which Linux platform
you will use for your next offering, or for
your current platform?
Denton: Yes, we’re very concerned over
the RHL/RHEL/Fedora split. It has caused
us to closely re-examine our choice in
both Linux distribution and server hardware vendor (due to support issues with
alternate Linux distributions as we move
forward). As of now we still haven’t made
a decision as to what we’re doing, but
we’re leaning toward creating and supporting our own internal Linux distribution rather than moving forward with
RHEL or Fedora.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
LinuxWorld Magazine
There is no escaping the penetration of Linux into the corporate world. Traditional
Regular features
models are being turned on their head as the open-for-everyone Linux bandwagon rolls forward.
Linux is an operating system that is traditionally held in the highest esteem by the
include:
hardcore or geek developers of the world. With its roots firmly seeded in the open-source
Advice on Linux Infrastructure
model, Linux is very much born from the “if it’s broke, then fix it yourself” attitude.
Major corporations including IBM, Oracle, Sun, and Dell have all committed significant
Detailed Software Reviews
resources and money to ensure their strategy for the future involves Linux. Linux has
Migration Advice
arrived at the boardroom.
Yet until now, no title has existed that explicitly addresses this new hunger for
Hardware Advice
information from the corporate arena. LinuxWorld Magazine is aimed squarely at providing
this group with the knowledge and background necessary to make decisions to utilize
CEO Guest Editorials
the Linux operating system.
Look for all the strategic information required to better inform the community on how
Recruiting/Certification Advice
powerful an alternative Linux can be. LinuxWorld Magazine does not feature low-level code
snippets but focuses instead on the higher logistical level, providing advice on hardware, to
Latest News That Matters
software, through to the recruiting of trained personnel required to successfully deploy a
Case Studies
Linux-based solution. Each month presents a different focus, allowing a detailed analysis
of all the components that make up the greater Linux landscape.
LINUXWORLD® IS THE REGISTERED TRADEMARK
OF INTERNATIONAL DATA GROUP, INC.
SAVE 30%
The Leading Magazine
for Enterprise and
IT Management
OFF!
REGULAR ANNUAL COVER PRICE $71.76
YOU PAY ONLY
$
4999
12 ISSUES/YR
*OFFER SUBJECT TO CHANGE WITHOUT NOTICE
LINUXWORLD® IS THE REGISTERED TRADEMARK
OF INTERNATIONAL DATA GROUP, INC.
SUBSCRIBE
TODAY!
WWW.SYS-CON.COM
OR CALL
1-888-303-5282
FOR ADVERTISING INFORMATION:
CALL 201 802.3020 OR
VISIT WWW.SYS-CON.COM
The World’s Leading i-Technology Publisher
www.LinuxWorld.com
51
MAY 2004
PRODUCT REVIEW
EmergeCore’s
IT in a Box
Linux servers made easy
BY
EmergeCore’s president and CEO, Dave Brown, learned that in the ISP business,
reliability and value were keys to success for his customers. That’s why he chose
Linux as the operating system to power his IT in a Box IT-100. The IT-100 is
a “Swiss Army Knife” of Linux servers and services. The small-footprint server
appliance functions as a firewall and router for your office LAN with an
integrated four-port 10/100 Ethernet hub and wireless gateway. Additionally,
the IT-100 offers a full suite of Linux-powered services, including Web and
e-mail.
Easy Administration
As you read in LinuxWorld Magazine
every month, more and more people are
turning to Linux to provide business solutions – but there’s one small problem. They
must go through a learning curve that is
intimidating for many familiar with using
other operating systems and software. Fear
no longer, the IT-100 makes implementing
a Linux server and other services very easy.
EmergeCore’s biggest value is that they
have done the heavy lifting for you with
respect to assembling a complete Linux
infrastructure package including file sharing, Web server, mail server, firewall, and
wireless gateway to name but a few. They
then pair that with a central Web interface
that even a naïve user could use to configure the server. Initially you configure the
device via the included crossover cable
A B O UT
TH E
A UTH O R
Mark Hinkle, desktop technologies editor of
LinuxWorld Magazine, is vice president of
operations for NeTraverse, a Linux software
company that specializes in Windows-to-Linux
migration. Mark is on the Formation Board of
The Desktop Linux Consortium.
[email protected]
MAY 2004
connected to your PC or laptop’s network
card. Once configured the device can be
managed from the local area network from
any Web browser.
IT in a Box virtually pays for itself in time savings and ease of administration. Not only does
it supply all the IT services required by most
small businesses, but it does so at a
surprisingly affordable price.
Price: $1,395
Web: www.emergecore.com
52
M A R K
R.
H I N KL E
Feature Rich
Naming all the features available on the
small IT-100 is a substantial task as the unit
is more than a simple network server.
Besides the Web server, e-mail, firewall, and
wireless gateway the IT-100 offers many
additional features. Some of the most
notable are:
• E-mail features: IT in a Box mail server
offers both POP and IMAP mail with
virus-scanning abilities. The virus definitions for the e-mail server can be downloaded manually or set to download during a regular intervals daily, weekly, or
monthly. Also, besides the ability to scan
mail for viruses, the IT-100 also allows
for the enablement of server-side spam
filtering through SpamCop.
• Web features: IT in a Box does offer the
ability to host Web sites, and for a small
business with relatively light traffic it’s
probably a good choice. Domains can be
configured to point right to IT in a Box
whether you have a top-level domain or
want to use a dynamic DNS service like
TZO.com. IT in a Box can help you provide a public face via a Web site with no
problem. Besides serving Web pages, IT
in a Box can function as a proxy server to
seamlessly cache and filter Web content
to your LAN. And the add-ons don’t stop
there: the Web site builder tools come
with a wizard that allows you to set up a
Web presence through a template and
wizard system.
• Miscellaneous features: Besides the features I have already mentioned, IT-100
also offers features that some advanced
users may find useful. The ability to set
up a VPN to the IT-100 allows remote
access through a secure tunnel. Back-up
and restore faculties are provided to
restore the box to default settings or to
back up all data on the box to an
attached USB device.
www.LinuxWorld.com
PRODUCT REVIEW
Excellent Value
It’s important to realize the true value
of the IT-100. Not just in terms of the
affordable price, but also the actual longterm savings you will realize from such a
system.
• Labor: There is a short learning curve
for self-administration, or companies
can hire one of EmergeCore’s partners
to install the device. Either solution is
more cost effective than keeping a fulltime IT person. The simplicity of the IT100 allows tasks to be accomplished
quickly, keeping bills for IT services
low.
• Consolidated device: One factor to consider when buying IT infrastructure is
that multi-use devices can have a number of benefits. First, a device such as IT
in a Box will take up much less room
than having multiple devices, and it will
consume less power.
• Uptime: I have been testing the IT in a
Box IT-100 for over a month with zero
downtime. I have been able to configure
the device in minutes when I wanted to
add a forwarded port or e-mail account,
and I am able to do so through a menudriven interface. The only time I have
taken the device down was to load system updates, which is a simple procedure that requires a reboot. Otherwise,
I’ve been able to use the IT-100 without
failure despite heavy Internet traffic.
If your time is valuable, your business
relies on access to the Internet, and you
don’t require a complex setup, I believe
you would be hard pressed to find a
cheaper solution when you factor in
the time associated with set-up and
administration.
Areas for Improvement
For the most part I found little to complain about with respect to the IT-100; however, I ran into trouble acquiring a signal
from my cable modem. If the cable modem
dropped signal my only way to get the IT100 back online was via a reboot. Also, I
noticed that despite the presence of a parallel port there was no print server available on the IT-100. This seems to be one of
the key functions I would like to see added
to the box. Otherwise it’s hard to complain
about the package, it works well out of the
box and configuration is a breeze.
www.LinuxWorld.com
The IT-100 administrative interface includes a system summary showing WAN and LAN traffic,
memory usage, and disk space
This isn’t so much an area for improvement as a word of caution: if you are looking for a highly customizable solution,
this isn’t the solution for you. While you
can configure most any aspect of the IT100 with ease, it’s definitely not a customizable solution like you might find
with a Linux distribution and an Intel
server.
Summary
The IT-100 is an ideal solution for a
small office with anywhere from 2 to 75
users. Besides being easy to use, the IT-100
is very inexpensive – you could run all
your IT services from a central box for
$1,395. On top of that, this is the beginning of an expanding product line that in
the future will include more storage and
most likely other enhancements to the
base unit. I’ve seen very few products that
offer all the advantages of Linux with an
extremely easy and intuitive interface, but
once I test drove the IT in a Box IT-100, I
knew that any small business user could
benefit from Linux with a minimal
Linux is #1 for EmergeCore
amount of hassle.
President and CEO Dave Brown
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
53
MAY 2004
BOOK ROOKERY
Linux for Dummies,
5th Edition
Everything a beginner needs to install
and run Linux
I NTE R V I E W
BY
KE V I N
B E D E L L
In this installment of the Book Rookery, Kevin Bedell speaks with LWM’s own
Dee-Ann LeBlanc about the latest edition of Linux for Dummies, which features
expanded coverage of the Linux desktop, among other things.
Can people without a lot of computer
experience really install and use Linux for
everyday tasks?
Sure! I won’t claim that it’s “tie both
hands behind your back” easy to learn
Linux, but installation has never been simpler in most cases, and you point and click
your way through things just like you do in
Windows and Mac OS X – unless you’re
really into learning the ol’ tried-and-true
command line. Some people are.
Does the book cover just Linux, or does it
cover other applications, such as
OpenOffice?
There’s a nice meaty chapter on
OpenOffice.org and all of the programs in
that suite. There’s also a ton of material on
multimedia stuff, and other fun tools that I
thought folks might like to know more
about. I’d say it’s about half and half. The
other half of the book contains things
about using Linux in the GUI and command line, customizing the GUI, and other
tasks that will help you feel more comfortable.
What has changed from previous editions
of Linux for Dummies?
In the early editions, we tried to cover
everything, from desktop to server. The
5th edition is the culmination of my decision last time around to bring this book
A B O UT
TH E
I NTE R V I E W E R
Kevin Bedell is editor-in-chief of LWM.
[email protected]
MAY 2004
more and more to a desktop focus. That
lets me zoom in on enough interesting
stuff that it’s not just some quick survey
that has no real details. There are lots of
books that have information on how to set
up servers. There’s still not much that
focuses on the desktop. Removing the
more server-based content has let me
expand the OpenOffice and multimedia
coverage, in particular.
What are the biggest challenges that most
beginning users have installing and using
Linux?
Sometimes a particular version of
Linux and a particular hardware setup
just don’t seem to get along. Without
being there in person, I can’t be sure what
happens, but it’s happened to me too.
( Just as some computers don’t seem to
get along well with Windows.) I’ve talked
to some Linux users who had to try more
than one distribution before they found
one they really liked.
As far as using Linux, it’s important to
remember that learning Linux is like
learning a whole new language if you’ve
never done anything in Unix. These are
some of the things I try in particular to
address, by helping readers to understand
some of the terminology and how things
are seen and done a bit differently in the
Linux world.
Is Linux ready for the desktop for average
users?
You’d kind of have to define an average
54
user for me. A lot of average folks write
me to thank me for the book, saying
they’re set up and happily playing with
Linux. Other people write to me with
problems, and I help them as best I can.
The biggest problem is in the area of
installation; if something goes wrong it
can really go wrong. However, people forget that most users don’t install their own
Windows boxes. They just buy them preinstalled.
Once people get their Linux boxes set up,
the average user really seems to have no
trouble as long as no one talked them into
trying a more advanced distribution.
Debian is great for the server, but it’s not
something that I would hand to someone
new to Linux who just wants to try something out on the desktop.
If I buy this book, do I get everything I need
to install and run Linux?
You get Fedora Core 1 on DVD, so you get
the entire Fedora distribution, and even the
www.LinuxWorld.com
previewing may 11, 2004, at networld+interop, las vegas
Information
Storage+Security
Journal!
&2%%2%3/52#%#$).#,5$%$
)NTHIS
ISSUE
)03TORAGE
3!..!3
$ISASTER
2ECOVERY
%NTERPRISE
3ECURITY
)NFOSECURITY
WWW)33*OURNALCOM
02%-)%26/,)335%
-ICROSOFT
23!
3ECURITY
3ECURE)$FOR 7INDOWS
3!.
.!3
%MERGINGTECHNOLOGYTRENDS
ANDMARKETMANEUVERS
for more information visit
www.ISSJournal.com
From the World’s Leading i-Technology Publisher
©COPYRIGHT 2004 SYS-CON MEDIA. ALL BRAND AND PRODUCT NAMES ARE TRADE NAMES, SERVICE MARKS OR TRADEMARKS OF THEIR RESPECTIVE COMPANIES.
BOOK ROOKERY
“Learning Linux is like
learning a whole new language
if you’ve never done anything
in Unix”
source code if you really want to play with
it for some insane reason.
Can I call you if I have problems?
I do answer e-mail, though not
always as quickly as I might like (sometimes
I’m on the road or under heavy deadlines).
I’m also part of the AnswerSquad
(www.answersquad.com), which is a paid
support team that can handle all kinds of
questions, not just Linux ones. Since it’s paid
I make sure to answer questions faster there,
and if I’m not around to do so immediately,
there are other people who can. It's a nice
way for me to pool my services with other
folks so I have time to write and work as well.
Is Linux better than Windows? If so, why?
For some this is a religious question! My
general response to this is, “Well, what are
MAY 2004
you trying to do?” I try to remember that
computers are just tools, as are operating systems. Personally, I prefer Linux. I find it more
stable, and better built in terms of security. I
also prefer the philosophy behind the free
software and open source communities to
the “What’s mine is mine, and what’s yours is
mine” approach taken by many powerful
closed source computer companies.
I know this is a very diplomatic answer,
but I’m a very shades-of-gray kind of person. The world isn’t black and white.
Though I suppose Tux, the Linux mascot, is.
any desktop system, no matter what OS you
use, you generally want to have as powerful a
computer as you can manage, just because it’s
got to run a GUI, hold five windows with different programs open at once, play games,
and more. If you don’t need a high-end desktop system though (say you just want to use it
for word processing), then Linux on an older
system can be perfect – especially if you take
the time to customize your GUI to the point
where it’s using very small components.
I don’t get into this level of GUI customization in the book since it’s more advanced, but
I do tell you how to turn the GUI off completely. Now there’s a nice, light interface!
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
LINUX FOR DUMMIES
Copyright ® 2003 by Wiley Publishing, Inc.
Reproduced here by permission. All rights
reserved. For Dummies is a registered trademark
of John Wiley & Sons, Inc. and/or its affiliates in
the U.S. and other countries.
ABOUT DEE-ANN LEBLANC:
I’ve heard I can install and run Linux on
older and less powerful computers. Will
this book help me do this?
You sure can do this. You’ll find the best use
for older computers to be on the server front,
where you don’t need a GUI. I find that with
Dee-Ann LeBlanc, gaming industry editor of
LinuxWorld Magazine, has been involved with
Linux since 1994. Dee-Ann is the author of
12 books, 130 articles, and has more of both
coming. She is a trainer, a course developer –
including the official Red Hat online courseware
at DigitalThink – a founding member of the
AnswerSquad, and a consultant.
[email protected]
56
www.LinuxWorld.com
*
FREE CD! (
)
$198.00
VALUE!
Secrets of the Linux Masters
Every LWM Article on One CD!
— The Complete Works —
CD is edited by LWM Editor-in-Chief Kevin Bedell and organized
into 38 chapters containing more than 2600 exclusive LWM articles!
All in an easy-to-navigate HTML format! BONUS: Full source code included!
ORDER AT WWW.SYS-CON.COM/FREECD
*PLUS $9.95 SHIPPING AND PROCESSING (U.S. ONLY )
©COPYRIGHT 2004 SYS-CON MEDIA. WHILE SUPPLIES LAST. OFFER SUBJECT TO CHANGE WITHOUT NOTICE. ALL BRAND AND PRODUCT NAMES ARE TRADE NAMES, SERVICE MARKS OR TRADEMARKS OF THEIR RESPECTIVE COMPANIES.
Only from the World’s Leading i-Technology Publisher
A LIMITED TIME SAVINGS OFFER FROM SYS-CON MEDIA
SUBSCRIBE TODAY
TO MULTIPLE MAGAZINES
RECEIVE
YOUR DIGITAL
EDITION
ACCESS CODE
INSTANTLY
WITH YOUR PAID
SUBSCRIPTIONS
AND SAVE UP TO $400 AND *
RECEIVE UP TO 3 FREE CDs! 3-Pack
Pick any 3 of our
magazines and save
up to $27500
Pay only $175 for a
1 year subscription
plus a FREE CD
• 2 Year – $299.00
• Canada/Mexico – $245.00
• International – $315.00
*
*
*
*
*
*
Pick a 3-Pack, a 6-Pack or a 9-Pack
CALL TODAY! 888-303-5282
■ MX Developer’s Journal
U.S. - Two Years (24) Cover: $143
U.S. - One Year (12) Cover: $72
Can/Mex - Two Years (24) $168
Can/Mex - One Year (12) $84
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
Digital Edition - One Year (12)
You Pay: $49.99 / Save: $167 + FREE $198 CD
You Pay: $29.99 / Save: $60
You Pay: $79.99 / Save: $137 + FREE $198 CD
You Pay: $49.99 / Save: $40
You Pay: $89.99 / Save: $127 + FREE $198 CD
You Pay: $59.99 / Save: $30
You Pay: $19.99
■ Linux World Magazine
U.S. - Two Years (24) Cover: $143
U.S. - One Year (12) Cover: $72
Can/Mex - Two Years (24) $168
Can/Mex - One Year (12) $84
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
Save: $63 + FREE $198 CD
Save: $32
Save: $48 + FREE $198 CD
Save: $4
Save: $40 + FREE $198 CD
Save: $8
You Pay: $89 /
You Pay: $49.99 /
You Pay: $119.99 /
You Pay: $79.99 /
You Pay: $176 /
You Pay: $99.99 /
Save: $55 + FREE $198 CD
Save: $22
Save: $48 + FREE $198 CD
Save: $4
Save: $40 + FREE $198 CD
Save: $8
You Pay: $99.99 /
You Pay: $69.99 /
You Pay: $129 /
You Pay: $89.99 /
You Pay: $170 /
You Pay: $99.99 /
Save: $68 + FREE $198 CD
Save: $14
Save: $63 + FREE $198 CD
Save: $6
Save: $46 + FREE $198 CD
Save: $8
U.S. - Two Years (24) Cover: $168 You Pay: $99.99 /
U.S. - One Year (12) Cover: $84 You Pay: $69.99 /
Can/Mex - Two Years (24) $192 You Pay: $129 /
Can/Mex - One Year (12) $96
You Pay: $89.99 /
Int’l - Two Years (24) $216
You Pay: $170 /
Int’l - One Year (12) $108
You Pay: $99.99 /
Save: $68 + FREE $198 CD
Save: $14
Save: $63 + FREE $198 CD
Save: $6
Save: $46 + FREE $198 CD
Save: $8
■ .NET Developer’s Journal
■ XML-Journal
U.S. - Two Years (24) Cover: $168
U.S. - One Year (12) Cover: $84
Can/Mex - Two Years (24) $192
Can/Mex - One Year (12) $96
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
■ U.S. ■ Can/Mex ■ Intl.
■ U.S. ■ Can/Mex ■ Intl.
■ U.S.■ Can/Mex ■ Intl.
•Choose the Multi-Pack you want to order by checking
next to it below. •Check the number of years you want to
order. •Indicate your location by checking either U.S.,
Canada/Mexico or International. •Then choose which
magazines you want to include with your Multi-Pack order.
U.S. - Two Years (24) Cover: $360
U.S. - One Year (12) Cover: $180
Can/Mex - Two Years (24) $360
Can/Mex - One Year (12) $180
Int’l - Two Years (24) $360
Int’l - One Year (12) $180
You Pay: $169.99 /
You Pay: $149 /
You Pay: $179.99 /
You Pay: $169 /
You Pay: $189.99 /
You Pay: $179 /
Save: $190 + FREE $198 CD
Save: $31
Save: $180 + FREE $198 CD
Save: $11
Save: $170 + FREE $198 CD
Save: $1
■ ColdFusion Developer’s Journal
■ Web Services Journal
U.S.- Two Years (24) Cover: $168
U.S. - One Year (12) Cover: $84
Can/Mex - Two Years (24) $192
Can/Mex - One Year (12) $96
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
TO
ORDER
■ 1YR ■ 2YR
■ 1YR ■ 2YR
■ 1YR ■ 2YR
■ WebLogic Developer’s Journal
You Pay: $79.99 /
You Pay: $39.99 /
You Pay: $119.99 /
You Pay: $79.99 /
You Pay: $176 /
You Pay: $99.99 /
■ Java Developer’s Journal
U.S. - Two Years (24) Cover: $144
U.S. - One Year (12) Cover: $72
Can/Mex - Two Years (24) $168
Can/Mex - One Year (12) $84
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
■ 3-Pack
■ 6-Pack
■ 9-Pack
U.S. - Two Years (24) Cover: $216
U.S. - One Year (12) Cover: $108
Can/Mex - Two Years (24) $240
Can/Mex - One Year (12) $120
Int’l - Two Years (24) $264
Int’l - One Year (12) $132
You Pay: $129 /
You Pay: $89.99 /
You Pay: $159.99 /
You Pay: $99.99 /
You Pay: $189 /
You Pay: $129.99 /
Save: $87 + FREE $198 CD
Save: $18
Save: $80 + FREE $198 CD
Save: $20
Save: $75 + FREE $198 CD
Save: $2
■ Wireless Business & Technology
U.S. - Two Years (24) Cover: $144
U.S. - One Year (12) Cover: $72
Can/Mex - Two Years (24) $192
Can/Mex - One Year (12) $96
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
You Pay: $89 /
You Pay: $49.99 /
You Pay: $139 /
You Pay: $79.99 /
You Pay: $170 /
You Pay: $99.99 /
Save: $55 + FREE $198 CD
Save: $22
Save: $53 + FREE $198 CD
Save: $16
Save: $46 + FREE $198 CD
Save: $8
■ WebSphere Developer’s Journal
U.S. - Two Years (24) Cover: $360
U.S. - One Year (12) Cover: $180
Can/Mex - Two Years (24) $360
Can/Mex - One Year (12) $180
Int’l - Two Years (24) $360
Int’l - One Year (12) $180
You Pay: $169.99 /
You Pay: $149 /
You Pay: $179.99 /
You Pay: $169 /
You Pay: $189.99 /
You Pay: $179 /
Save: $190 + FREE $198 CD
Save: $31
Save: $180 + FREE $198 CD
Save: $11
Save: $170 + FREE $198 CD
Save: $1
■ PowerBuilder Developer’s Journal
You Pay: $99.99 /
You Pay: $69.99 /
You Pay: $129 /
You Pay: $89.99 /
You Pay: $170 /
You Pay: $99.99 /
Save: $68 + FREE $198 CD
Save: $14
Save: $63 + FREE $198 CD
Save: $6
Save: $46 + FREE $198 CD
Save: $8
U.S. - Two Years (24) Cover: $360
U.S. - One Year (12) Cover: $180
Can/Mex - Two Years (24) $360
Can/Mex - One Year (12) $180
Int’l - Two Years (24) $360
Int’l - One Year (12) $180
You Pay: $169.99 /
You Pay: $149 /
You Pay: $179.99 /
You Pay: $169 /
You Pay: $189.99 /
You Pay: $179 /
Save: $190 + FREE $198 CD
Save: $31
Save: $180 + FREE $198 CD
Save: $11
Save: $170 + FREE $198 CD
Save: $1
*WHILE SUPPILES LAST. OFFER SUBJECT TO CHANGE WITHOUT NOTICE
Subscribe Online Today www.sys-con.com/2001/sub.cfm
6-Pack
Pick any 6 of our
magazines and save
up to $35000
Pay only $395 for a
1 year subscription
plus 2 FREE CDs
• 2 Year – $669.00
• Canada/Mexico – $555.00
• International – $710.00
9-Pack
Pick 9 of our
magazines and save
up to $40000
Pay only $495 for a
1 year subscription
plus 3 FREE CDs
• 2 Year – $839.00
• Canada/Mexico – $695.00
• International – $890.00
EXCLUSIVE INTERVIEW
Xandros on the Desktop
Means Business
A talk with Dr. Frederick H. Berenstein,
director of Xandros, Inc.
With a new business desktop, a “Best Front Office Solution” award, and an
expanding product line, things are looking good for Xandros. LWM Editor-in-Chief
Kevin Bedell spoke with Dr. Frederick H. Berenstein at LinuxWorld Expo; here he
shares the history of Xandros and, more important, what he sees in the future.
LWM: So, Frederick, tell us a little bit about
Xandros and where it came from.
Berenstein: Xandros originally came from
the acquisition of the former Corel Linux
Business Division by a group of investors
called Linux Global Partners. That took
place in 2001, and it was sort of the last
major acquisition that Linux Global
Partners did after they invested in and
started some of the best-known companies in the Linux world today. For
instance, Linux Global Partners started
Ximian, which was sold to Novell this past
summer, and Linux Global Partners also
started CodeWeavers, which is famous for
the CrossOver Office applications.
LWM: That’s pretty interesting; I hadn’t
realized they were involved in those other
projects. So you acquired what had been
the Linux group from Corel – what was the
motivation behind that?
Berenstein: When Linux Global Partners
was originally started, our idea was that
in order to make a viable alternative to
the Windows desktop we would need to
invest in the technologies and applications that we felt were essential for people using a desktop on a day-to-day basis.
Our ultimate idea at that point, that was
1998, was that at sometime in the future
A B O UT
TH E
I NTE R V I E W E R
Kevin Bedell is editor-in-chief of LWM.
[email protected]
MAY 2004
DR. FREDERICK H. BERENSTEIN
DIRECTOR OF XANDROS, INC.
we would take all of these applications
and technologies, and go to one of the
major distributors and say, “Let’s do a
joint venture – your distribution, our
applications.” But what happened was
Corel came out with an award-winning
Linux desktop, and after a year of very
60
I NTE R V I E W
BY
KE V I N
B E D E L L
successful selling, they came to us and
said, “Let’s do a joint venture.” Along the
way Corel ran into some financial difficulties; they took an investment from
Microsoft and decided to divest themselves of the Linux Business Division,
which gave us the opportunity to acquire
a distribution rather than do a joint venture. After that acquisition, we renamed
the company Xandros, and that’s how
Xandros was born.
LWM: There are so many distributions –
how would you position Xandros among
the different distributions available
today?
Berenstein: I think of the commercially
viable distributions, the real difference is
that Xandros has an extended business
plan that is logically thought out. We
started with the consumer market, precisely because the consumer is in one or
another way the most demanding user.
He’s the most dependent; he needs to
have things done mostly for him. We
wanted a proof-of-concept that if we put
out a desktop that was easy to install,
totally familiar to Windows users, and
totally compatible with Microsoft files,
that people would simply be able to
install it and go back to work. This has
garnered reviews from people saying
about our 1.0 product, “It just works.”
Everything works right out of the box.
About our 2.0 product we got a review
yesterday that said “If you’re coming
from Windows to Linux, this is the distro
to buy. It’s that good.” So we felt that if
we could make that proof-of-concept,
which is what we’ve basically spent the
first year and a half doing, we would then
move on in our logical chain to enterprise products.
www.LinuxWorld.com
ers
evelop
D
:
N
ATT
EXCLUSIVE INTERVIEW
P
U
P
E
T
So the mike
We announced today the Xandros Business Desktop and
the Xandros Desktop Management Server, or xDMS. We have
further plans down the road obviously for server products.
There’s a logical progression here. I think the other major
distributions primarily started off saying, “Let’s go after the
server market, it’s the low-hanging fruit,” and that’s why
they’re there. Now they’re having second thoughts and saying,
“Well, maybe we should do a desktop.” It’s not because it was
thought out that way from the beginning, but simply because
it seems to suddenly be a very big and appealing market.
t
and be...
http:/
!
D
R
A
HE
Calling Sleek Geeks
Everywhere!
LWM: I’ve also heard wonderful reviews from people
who have used the product. I understand that one of
its real strong points is how Windows applications
or Windows files can still be used within the Xandros
distribution. Can you comment a little on that? Was it
a conscious decision?
Berenstein: That was a very conscious decision. Right at the
beginning, and several years before Xandros became Xandros,
the philosophy that I and Will Rosen, my partner at Linux
Global Partners, had adopted was this: the position that other
Linux companies were taking at the time of “We’re going to give
you Linux; it’s so much more stable; it’s so much more secure;
you’ll learn how to do things our way and you’ll love it,” was the
wrong way to go.
You have to be realistic and realize that no matter what you’re
doing, you’re selling into a Windows world. Every article about
PCs always says Microsoft has 92% of the market, 94% of the
market – it’s always over 90%, and so the reality is that you’re
selling into a Windows world. Everybody out there is using a box
with Windows on it. So when 1.0 came out it was, amazingly, the
only distribution in 2001 that had automatic domain authentication against Microsoft servers. With every other distribution,
even if they would allow you to recognize it through one technology or another, you had to go in each time; you had to identify yourself; and you had to authenticate yourself. But the
Xandros 1.0 product did automatic domain authentication.
Similarly, when 1.1 came out last April very quietly in response
to our corporate customers, it was the only Linux distribution –
and it’s possibly the only one today – that had automatic support for Active Directory Servers. And our feeling is that anybody who doesn’t offer those things is pretending that they’re
not selling into a Windows world. We know we’re selling into a
Windows world.
As far as support for Microsoft Office files, we put that capability in as well as the ability to install Microsoft Office directly
on the Xandros desktop because, at least for the foreseeable
future, those are the applications that a lot of people use. Those
are the applications where they have 10 or 12 years of data files
in Word format and in Excel format, and those are the files that
they cannot lose and don’t have time to change to some other
format. They can’t afford to filter them through some other
application, with the result being that they sort of get the document but maybe the formatting doesn’t come out right, or
maybe the macros don’t work. They have to just be able to put in
the Xandros desktop and go back to work. So it was a very conscious decision.
www.LinuxWorld.com
om
Go t/odeveloper.sys-con.c
Make sure you have your finger on
the pulse of i-Technology...bookmark
http://developer.sys-con.com today.
i-Technology
News
i-Technology
Views
i-Technology
Comment
i-Technology
© COPYRIGHT 2003,
SYS-CON MEDIA
WWW.SYS-CON.COM
Debate
LWM Advertiser Index
Advertising Partner
Web Site URL
Phone #
Page #
ARKEIA
WWW.ARKEIA.COM
760-431-1319
8
CLEARNOVA
WWW.CLEARNOVA.COM/THINKCAP
770-442-8324
57
COMPUTER ASSOCIATES
WWW.CA.COM/LINUX
631-342-6000
68
COMTROL
WWW.COMTROL.COM
800-926-6876
17
FREE SOFTWARE FOUNDATION
WWW.GNUPRESS.ORG
617-542-5942
25
GRAPHON
WWW.GRAPHON.COM/LINUX
800-GRAPHON
14-15
INFORMATION STORAGE + SECURITY JOURNAL
WWW.ISSJOURNAL.COM
888-303-5282
55
INSTALLSHIELD
WWW.INSTALLSHIELD.COM/SOLUTION
847-466-4000
11
IT SOLUTIONS GUIDE
WWW.SYS-CON.COM/IT
888-303-5282
41
JAVAONE
WWW.JAVA.SUN.COM/JAVAONE/SF
888-886-8769
23
LINUX RESOURCE CD
WWW.SYS-CON.COM/FREECD
888-303-5282
58
LINUXWORLD MAGAZINE
WWW.LINUXWORLD.COM
888-303-5282
47,49,51
MONARCH COMPUTER SYSTEMS
WWW.MONARCHCOMPUTER.COM/LW
800-611-0875
2-3
MSI COMPUTER CORPORATION
WWW.MSI.COM.TW
408-941-0808
21
NOVELL
WWW.NOVELL.COM/LINUX
800-513-2600
5
RARITAN
WWW.RARITAN.COM/902
800-724-8090 X902
19
REVELATION SOFTWARE
WWW.REVELATION.COM/LWPRINT/LWHOME
800-262-4747
6
RLX
WWW.RLX.COM
281-863-2100
67
SYS-CON INDUSTRY NEWSLETTERS
WWW.SYS-CON.COM
888-303-5282
43
SYS-CON MEDIA LIST RENTAL
WWW.SYS-CON.COM
800-223-2194
37
SYS-CON PUBLICATIONS
WWW.SYS-CON.COM/2001/SUB.CFM
888-303-5282
59
WEB SERVICES JOURNAL
WWW.WSJ2.COM
888-303-5282
63
General Conditions: The Publisher reserves the right to refuse any advertising not meeting the standards that are set to protect the high editorial quality of. All advertising is subject to approval by the Publisher. The Publisher assumes no liability for any costs or damages incurred if for any reason the Publisher fails to publish an advertisement. In no event shall the Publisher be liable for any costs or damages in excess of the cost of the advertisement as a result of a mistake in the advertisement or for
any other reason. The Advertiser is fully responsible for all financial liability and terms of the contract executed by the agents or agencies who are acting on behalf of the
Advertiser. Conditions set in this document (except the rates) are subject to change by the Publisher without notice. No conditions other than those set forth in this “General
Conditions Document” shall be binding upon the Publisher. Advertisers (and their agencies) are fully responsible for the content of their advertisements printed in
ColdFusion Developer’s Journal. Advertisements are to be printed at the discretion of the Publisher. This discretion includes the positioning of the advertisement, except
for “preferred positions” described in the rate table. Cancellations and changes to advertisements must be made in writing before the closing date. “Publisher” in this
“General Conditions Document” refers to SYS-CON Publications, Inc.This index is provided as an additional service to our readers. The publisher does not assume any
liability for errors or omissions This index is provided as an additional service to our readers. The publisher does not assume any liability for errors or omissions.
61
MAY 2004
EXCLUSIVE INTERVIEW
LWM: So where is Xandros at today – what
do you have going on now, and what do
you see happening over the next 12
months?
Berenstein: Just on behalf of all the
developers we have, the most important
thing that’s happened in the last day is
that we won the “Best Front Office
Solution” award here at LinuxWorld
Expo. It was a real tribute to the men we
have working up in Canada and to their
managers; all of them are down here at
the show. As far as the future goes, we
have announced today the Xandros
Business Desktop; we announced xDMS,
which is Xandros’ wide area deployment
manager for enterprises, and we also
announced a little bit of the future in
terms of thin clients and future server
that you can schedule to run, for example,
every day at midnight. Actually, in the
Xandros management server you can
make a perfect PC protocol, take a snapshot of it, and deploy that over any number of servers in a network, any number of
hosts, or any group of hosts. You can also
define specifically, “Okay, this is the perfect arrangement for people who are doing
word processing all day; this is the perfect
arrangement for people in the accounting
department.” And you just deploy those
specific systems that you’ve put together
to those specific PCs. With the remote
management control, for instance, on
Xandros networks if you go in and there
are security patches or kernel updates,
they’re automatically downloaded and
installed. You can download these things
pounded Annual Growth Rate] of about
33%. Currently, the CAGR of Linux on the
desktop is 44%, so I think what you’re
going to see is the kind of algorithmic
deployment of Linux on both the desktop
and the server over the next three to four
years. It’s going to go from a very small
percentage to upwards of 40% on a global
basis.
LWM: What industries or markets do you
think are going to be the earliest
adopters?
Berenstein: I think that governments,
because of cost issues as well as security
issues, are major Linux clients. Linux is a
very cost-effective solution for computers in the school systems. As of this date,
24 countries have had national votes to
“We started with the consumer market,
precisely because the consumer is
in one or another way the
most demanding user”
products. We’re basically growing our
product line as we see that the way
we’ve done things has been successful
for consumers, who are the most needy
and the most dependent. We’re now
growing the product line out so that
ultimately Xandros will provide an
end-to-end solution for every type
of user.
LWM: What’s the idea behind the Business
Desktop? Does it have remote management, remote deployment of applications,
remote control of policies? How does that
all work?
Berenstein: The Business Desktop
includes a variety of features in terms of
operating within a mixed network environment that aren’t in the Deluxe or
Standard versions. The wide area deployment and enterprise management tools
are going to be a separate xDMS product
MAY 2004
to the management server and you can
schedule this – for example, every day at
midnight. If there are any critical patches
or kernel patches, you can simply apply
them to all the PCs that are attached to
the management server. So it has very
powerful wide area deployment tools and
very powerful remote management tools.
LWM: It sounds like you’re really listening
to the corporate users and trying to
provide tools for them to manage whole
departments. What’s in store for the future?
Berenstein: I think what’s going to be in
store for the future is continued growth
of Linux both on the server side and on
the desktop side. I think everybody is
kind of familiar with Linux’s astronomical growth on the server side – from
about 2% of the server market to almost
30% of the server market. And that’s basically been based on a CAGR [Com-
62
wire their school systems to the Internet
using Linux. So they’re already going to
have all these students sitting in front of
boxes using Linux to do searches on the
Internet, and it’s a logical progression
that they’ll use Linux desktops and Linux
applications to integrate those results
into spreadsheets, reports, and things
like that. I think that when you realize
that supposedly there are 500 million
PCs in use, and that the number of students represented by the 24 countries
that have decided to do this is larger
than that number, you realize that in 10
or 12 years you’re going to have 600 or
700 million students who spent their
entire school life in front of a Linux computer, not a Windows computer. I think
that there’s just astronomical growth and
that it’s going to be totally algorithmic
from this point on.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
The B
est
LEARN WEB SERVICES. GET A NEW JOB !
.NET
Cove
ra
ge
Guar
antee
d!
SUBSCRIBE TODAY TO THE WORLD’S
LEADING WEB SERVICES RESOURCE
Get Up to Speed with the Fourth Wave in Software Development
• Real-World Web Services: XML’s Killer App!
• How to Use SOAP in the Enterprise
• Demystifying ebXML for success
• Authentication, Authorization, and Auditing
• BPM - Business Process Management
• Latest Information on Evolving Standards
• Vital technology insights from the nation’s
leading Technologists
• Industry Case Studies and Success Stories
• Making the Most of .NET
• Web Services Security
•
•
•
•
•
How to Develop and Market Your Web Services
EAI and Application Integration Tips
The Marketplace: Tools, Engines, and Servers
Integrating XML in a Web Services Environment
Wireless: Enable Your WAP Projects and Build
Wireless Applications with Web Services!
• Real-World UDDI
• Swing-Compliant Web Services
• and much, much more!
On
1 yealy $69.99 f
r (12
or
* New
i
s
sstand
s
u
e
price
s)*
$83.8
8f
or 1 y
Subsc
ear
ribe o
nline
www.
wsj2
at
call 8
.com
or
88 30
*Offer
3-525
subject
to chan
2
ge with
out noti
ce
SYS-CON Media, the world's leading i-technology publisher of developer magazines and journals,
brings you the most comprehensive coverage of Web services.
As Linux moves in everywhere within enterprise computing – in embedded
solutions, on the desktop, in distributed applications, and on mainframes –
NEWS
HA-OSCAR 1.0 Beta Release
(Ruston, Louisiana) – The eXtreme
Computing Research (XCR) group at
Louisiana Tech University is pleased to
announce the first public release HAOSCAR 1.0 beta. High Availability Open
Source Cluster Application Resource (HAOSCAR) is an open
source project that aims
for nonstop services in
the HPC environment through a combined
power of high availability and performance
computing solutions. The goal is to enhance
a Beowulf cluster system for mission-critical
applications and downtime-sensitive HPC
infrastructures. To achieve high availability,
component redundancy is adopted in an
HA-OSCAR cluster to eliminate single point
of failures, especially at the head node. HAOSCAR also incorporates a self-healing
mechanism; failure detection and recovery;
automatic failover; and fail-back.
The 1.0 beta release supports new highavailability capabilities for Linux Beowulf
clusters based on OSCAR 3.0. It provides
an installation wizard GUI and a Webbased administration tool that allows a
user to create and configure a multihead
Beowulf cluster. A default set of monitoring services is included to ensure that critical services, hardware components, and
important resources are always available
at the control node. New services can be
configured and added via a WebMin-based
HA-OSCAR administration tool.
http://xcr.cenit.latech.edu/ha-oscar
DataMAX Software Group, Inc., and
AML Announce Global Partnership
(Euless, TX) – AML, a developer and man-
the Linux Business Week News Desk brings you all the latest developments.
ufacturer of data collection products, has
announced a global partnership with The
DataMAX Software Group, Inc. Under the
new partnership,
DataMAX becomes a
worldwide distributor for
AML’s RF data collection hardware and
will offer AML hardware to its existing VAR
channel and customers.
“AML is delighted to announce our
worldwide distributor agreement with
DataMAX Software Group,” said Mike
Kearby, AML president. “Our new partnership with DataMAX provides an exceptional
opportunity to work with a market leader in
ADC development systems to extend the
availability of AML wireless data collection
hardware to a worldwide customer base.”
AML is a manufacturer of high-performance bar code and data collection products. Since 1983, AML and its partners have
helped companies increase business efficiency and productivity – in manufacturing, warehousing, retail, health care,
finance, government, and education. AML
products are made in the United States and
backed with lifetime, toll-free technical
support.
www.amltd.com
LPI-US Launches National Linux
Training Partner Program
(Hattiesburg, MS) –
The Linux
Professional Institute’s United
States Affiliate (LPI-US) is
pleased to announce that The Training
Camp has been approved to receive designation as an LPI-US Approved Training
Partner (LATP).
“The LATP program was established to
identify and support professional IT training centers that demonstrate a higher level
of commitment to LPI and IT professionals,” said LPI-US program manager Wesley
Duffee-Braun. “We have tremendous support for the LATP program throughout the
country, and we’re pleased and honored to
have The Training Camp serve as the inaugural member.”
Participation in the LATP program
requires that the training center use third–
party approved training materials, use LPI
certified instructors, and adhere to the LPI
Training and Academic Code of Ethics.
“The LATP designation shows that a
training center is committed to offering the
highest level of professional Linux training,” said Duffee-Braun. “By partnering
with LPI-US as a LATP, The Training Camp
has committed to leading the way for vendor-neutral Linux certification in the
United States.
www.trainingcamp.com
www.lpi-us.org
Novell Announces Expanded
Commercial Agreement With IBM
(Salt Lake City) – Novell has
announced an agreement
with IBM enabling IBM to
ship SUSE LINUX
Enterprise Server, which
customers license from Novell, with IBM’s
servers. This agreement will provide Novell
an exciting new channel to supply SUSE
LINUX to businesses around the world.
As part of the agreement, IBM can ship or
preload SUSE LINUX Enterprise Server
across its entire server line, including IBM
NetZyme Enterprise Version 6 – ‘Any to Any’ Middleware
enterprise application integration (EAI) problem: the real-time convergence of data between hardware, software, communication
paradigms, and mobile as well as embedded devices. NetZyme
Enterprise is a fully extensible integration broker middleware
that allows legacy applications to be transformed automatically, such that multiple distributed clients can access their data
and functionality dynamically, bi-directionally, securely, in real
time, and with mission-critical reliability.
www.creativescience.com
(San Jose, CA) – Creative Science Systems, Inc., has announced that
it will begin shipping the latest version of its flagship product, NetZyme Enterprise Version 6. NetZyme
Enterprise is an integration middleware that seamlessly integrates systems across platforms, protocols,
and programming languages. NetZyme Enterprise can
be operated on any version of Windows, any flavor of
Unix and Linux, and mainframes.
NetZyme Enterprise resolves the toughest and most prevalent
MAY 2004
64
www.LinuxWorld.com
AROUND
THE
eServer iSeries, pSeries, xSeries, and zSeries,
as well as IBM’s eServer BladeCenter systems. The parties have extended IBM’s existing agreement with SUSE LINUX, and
Novell will continue to develop and support
SUSE LINUX on all IBM server platforms.
“The momentum behind Linux in the
marketplace continues to grow,” said Jack
Messman, chairman and CEO of Novell.
“Novell is working with companies like IBM
to deliver the powerful, fully supported
SUSE LINUX platform on leading enterprise
servers. Customers know that they’re getting
top-quality performance backed by the
global technical support and services they
need from Novell. This marks a critical step
in making Linux mainstream in the corporate data center.”
www.novell.com
www.ibm.com
MontaVista Software Unveils
Embedded Linux Board Support
Toolkit and Certification Program
(Sunnyvale, CA) – MontaVista Software, Inc.,
has announced the
establishment of the
MontaVista LSP
Certification Program. In support of the program, which is the first of its kind in the
embedded Linux industry, MontaVista
Software has also announced the MontaVista
Board Support Toolkit (BST) for MontaVista
Linux Professional Edition. Designed for
Independent Hardware Vendors (IHVs) and
embedded developers, the BST delivers the
test and verification tools needed to accelerate generation of custom Linux support
packages (LSPs) for certification with
MontaVista Linux.
Using the MontaVista Board Support
Toolkit, board and system vendors can now
create custom Linux support packages for
their specific chips and boards, which can
then be certified by MontaVista. MontaVista
Software will provide direct technical customer support for all such certified LSPs.
Embedded developers building devices
powered by MontaVista Linux can use the
BST to do their own debugging and Q&A,
accelerate their product time–to-market,
and mitigate unnecessary risk. They can
test LSPs on their own custom hardware
platforms and improve the efficiency of the
porting process while leveraging their own
www.LinuxWorld.com
LINUXWORLD
in-house expertise to validate their own
LSPs for MontaVista Linux.
The MontaVista LSP Certification
Program lets IHVs recognize the competitive advantage of supporting MontaVista
Linux. More important, they can control
their own development schedule and costs,
streamlining time-to-market and focusing
resources on their own unique value-add.
www.mvista.com
TimeSys Delivers Embedded Linux
RTOS and TimeStorm Development
Tools for the Pentek Model 4294
VME Board
(San Francisco) – TimeSys Corporation has
announced that it has delivered a ready-torun Linux RTOS Software Development Kit
(SDK) and TimeStorm tools for Pentek’s
Model 4294 VME Board, a high-performance VME bus single-board computer
used in applications requiring supercomputing power and intensive communications capabilities. The new TimeSys Linux
RTOS SDK and TimeStorm development
and testing tools will help embedded system developers to more quickly and easily
develop embedded Linux applications on
the Pentek Model 4294 VME platform.
Pentek’s Model 4294 Quad PowerPC
AltiVec 6U VME board incorporates a
unique blend of powerful resources coupled through high-speed data paths to revolutionize next-generation, real-time
embedded DSP systems. To accelerate
development cycles for products utilizing
the Pentek board, the new
Linux RTOS SDK from
TimeSys provides a singlekernel Linux real-time operating system,
certified device drivers, Windows- and
Linux-hosted cross-platform GNU tool
chains, hundreds of Linux utilities and
libraries, and the powerful GUI-based
development tool, TimeStorm IDE.
www.timesys.com
Storix, Inc., Announces Version 5.1
and a New Licensing Option
(San Diego) – Storix, Inc., has announced
the release of Storix System Backup
Administrator (SBA) version 5.1, a backup
and disaster recovery solution for AIX and
Linux. In addition to the many new product features, Storix has added an afford-
65
NEWS
able licensing option for Linux desktop
users.
“The benefits of using
the Linux operating system
are no longer limited to the
business community. We are noticing the
migration from MS Windows to Linux and
we have tailored our new version 5.1 to not
only meet the demands of business, but
also meet the needs of the home user,”
explained Anthony Johnson, president and
CEO of Storix, Inc.
One of the major changes implemented
was the support of spare disks as a backup
medium. “Home users do not usually own
expensive tape drives, but they often have a
spare hard disk that they could use to store
backup data. The purchase of a spare disk
is often far less expensive than most tape
drives,” explained Rich Turner, director of
product development at Storix, Inc. “SBA
version 5.1 adds the ability to send full-system backups to a bootable spare hard disk,
from which the user can reinstall the entire
system or restore selective files. For corporate users, this provides the ability to clone
or migrate systems to new hardware using
SAN attached or removable hard disks.”
www.storix.com
Mobility Electronics Announces
Support for Red Hat Linux
Operating System
(Scottsdale, AZ) – Mobility Electronics, Inc.,
a leading provider of innovative portable
computing solutions for the mobile electronics device user, has announced that it
has added support for the Red Hat Linux 9
operating system in its MAGMA PCI-to-PCI
Expansion Systems.
In the past, Mobility Electronics’ MAGMA
operating system support has backed the
Windows, Mac OS, and Solaris environments. Adding Red Hat Linux to the list of
supported operating systems will allow
Mobility Electronics to support a substantial user base with a new method to add
more PCI slots to their Linux-based desktop
computer or server.
Mobility Electronics’ MAGMA-branded
line of patented PCI expansion products
provide a cost-effective method to add
additional
PCI slots
to desktop
MAY 2004
NEWS
computers and servers, and eliminate the
need to purchase a high-end, expensive
host machine.
“Red Hat Linux support has been
released in response to customer demand
to use our PCI-to-PCI Expansion products
with host computers running under the
Linux operating system,” said Charlie
Mollo, chief executive officer of Mobility
Electronics. “By offering support to the
Linux community, we will be able to target
new customers in robust application environments used by the military, scientific,
and university markets.”
www.mobilityelectronics.com
nodes, scaling to hundreds of Intel
Itanium 2 microprocessors. Each node in
an SGI Altix 3000 supercluster can combine up to 256 processors in a single
Linux operating system image. With its
unique global shared-memory capabilities
and industry-leading SGI NUMAlink
interconnect fabric, the SGI Altix 3000
supercluster is ideal for managing complex data sets and complete workflows,
enabling the highest levels of innovation
for technical users. The Parallel
Computing Research Infrastructure (PCRI)
project at Strathclyde University covers a
multitude of scientific projects. For
instance, researchers will leverage the SGI
Altix 3000 supercluster to study virtual
photonics, in which numerical models
simulate new laser systems.
Launched at the beginning of 2003, the
SGI Altix 3000 family of products has
already been adopted by more than 200
customers, including more than 25 major
research organizations around the world,
such as the University of Tokyo’s
Earthquake Research Institute, the
Queensland Parallel Supercomputer
Foundation, the University of Cambridge’s
COSMOS project, and the UK academic
supercomputing service, CSAR, based at
the University of Manchester.
www.sgi.com
Strathclyde University Scientists to
Deliver Faster Research Projects
with New SGI Altix 3000
Novell to Cross NetWare with SUSE to Create Hybrid
(Mountain View, CA, and London) –
Silicon Graphics has announced that
physics, chemistry, mathematics, and
biology researchers at the University of
Strathclyde in Glasgow, Scotland, will run
a wide range of applications on a new SGI
Altix 3000 supercluster, which was
installed in December 2003. Deployed by
the academic consortium of the Faculty
of Science, headed by the Department of
Physics, the Linux OS–based SGI Altix
3000 system will help university scientists
to develop a number of
research projects with the
help of high-performance
parallel computing. The new
Altix system is powered by 28 Intel
Itanium 2 processors and 36GB of system
memory, and leverages an SGI
InfiniteStorage solution with 1TB of
capacity.
The university is using the Altix system’s
open source environment to make it easily available to high-performance computing (HPC) applications in multiple disciplines, including mathematics, statistics,
virtual photonics, atomic physics, chemistry, biology, and even architecture.
Strathclyde selected Altix 3000 over a PCbased cluster solution because of its flexibility in accepting different numerical
codes, easy administration, low latency,
and peak power performance.
The SGI Altix 3000 supercluster offers
global shared memory across multiple
Novell talked up a combined NetWare-SUSE product dubbed Open Enterprise Server (OES) at
its recent BrainShare user conference. It expects to have it in the can at the end of the year.
It says this bridge between its past and future will deliver networking capabilities associated
with NetWare 7, SUSE Enterprise Server 9, and Ximian.
The once-great NetWare, whose demise has been announced as many times as Frank
Sinatra retired, is now supposed to vanish as a stand-alone product at the end of the year.
As the foundation of this new OES stuff, however, it’ll keep being upgraded, Novell said.
Novell said NetWare 7 won’t be ready until the end of the year, which is a year better than
the schedule.
Novell said the hybrid will provide all the components necessary to establish a manageable,
low-cost infrastructure for hosting mission-critical networking services.
Novell’s new Nterprise Linux Services is supposed to transparently interoperate between the
two environments. For example, if you have NetWare servers delivering print services and SUSE
servers running the file system, or vice versa, you can print between the two, independent of
where the files are.
The company said Open Enterprise Server is packaged to get NetWare customers to start
migrating to Linux. It’s supposed to let them move
at their own pace. Novell is converging the license
used with NetWare to cover both operating systems.
There are no prices yet, but the widgetry is
supposed to be free to NetWare customers under maintenance
and available on either a per-user or per-server basis to new
implementations. Novell will be sending maintenance customers a copy of Linux to warm
them up.
Credit Suisse says comparing the prices of OES against Red Hat will be “extremely difficult,”
but considers Novell/SUSE more pragmatic about pricing than Red Hat, whose Enterprise pricing is “less granular.”
The broker is expecting Novell to take market share in Linux by converting some of its
NetWare base to SUSE and to take some share outside its base in Linux servers used for infrastructure services.
www.novell.com
www.suse.com
MAY 2004
66
www.LinuxWorld.com
Web Footed
The right management software allows you to
seamlessly integrate Linux into your infrastructure.
Linux Management Software
No matter what type of Linux implementation you have planned, you’ll still need management software to ensure
that it’s seamlessly integrated across your enterprise. Our management software solutions help maximize
the potential of Linux across your entire business by letting you take full advantage of its unique scalability and
open-source programming. As a result, you can increase productivity while decreasing total cost of ownership.
To find out more about our continuing commitment to Linux innovations, go to ca.com/linux today.
© 2003 Computer Associates International, Inc. (CA). All rights reserved.
Web Savvy