On Mon, May 6, 2013 at 5:38 PM, Alessandro Selli
<alessandrose...@linux.com>wrote:

>  I would agree, however a similar proposal was already turned down on the
> grounds that Upstart
>
is too specific to just one major distribution, Ubuntu, and even there it's
> future is not granted to
>
be long term.  As LPI has to be vendor/distribution neutral, mention of
> Upstart was frowned upon.
>

Interesting.  From 2007-2011, Fedora was Upstart.  RHEL6 (2010-2016, if we
only look at Phases I & II) is Upstart as well.  Yes, Fedora/RHEL doesn't
make full use of Upstart as Ubuntu, but you still have to understand its
service init and events for almost half of the system (especially spawning
several things).

It's probably too late now, I agree.  But I'm still a bit dumbfounded the
"Ubuntu only" argument was used, at least 2007-2011, when Fedora adopted
it, and when it went into RHEL6.  This was before Fedora started the move
to a complete, DBus/Socket system manage framework (i.e., systemd et al.),
circa late 2011.

In reality, init and system management aspects should be rolled into one.
 Figuring out what is the init program, where are its configuration files
for init, events, etc... for services, etc...  I think that gets pretty
non-specific.  Especially the event-based stuff, that's not really
Upstart-specific.

I.e., I still have to go over this too many times with sysadmins, both
RHEL6 and Ubuntu, with Upstart.  We should have LPI professionals who
understand these details.  We're 3+ years in now.  ;)


> Well, LiLO too is still being maintained.  Should everything in this
> situation be part of LPI's objectives?
>

I absolutely don't see why we're covering LILO today.  It's way too small
of the installed base now.  Way too small.

I read the informative post exchange you had with David Evans about this.
> I personally think LPI-1,2 ought
>
to have no topic that is only relevant to legacy installations, even if
> they are on an artificially prolonged life-span.
>

I think when an Enterprise vendor declares something deprecated and only
included for purposes of migrating, it's a good sign that it's going away.
 In the case of ReiserFS, that was 2009.

And we have to seriously consider if an Enterprise Linux distro with such
support is even still in "Active" enhancement phases.  As I understand it,
only SLES 11 and RHEL 6 (with 5 Phase II

Last time I checked, only SLES 11, RHEL 5 (until 2014Q1) and RHEL 6 are the
only ones actively taking enhancements.  SLES 12 and RHEL 7 are possibly
due within the next year, although both vendors do not pre-announce
products.

I think topics should be covered that are default selections in at least a
> few of the major distributions.
>
What about having an LPI-3xx exam devoted to maintaining legacy
> installations/packages?
>

Considering SuSE and Red Hat have their own programs, I think that would be
redundant and wouldn't get much consideration.

> While that is actually a good idea, to cover basic storage targets like
> iSCSI, we may wish to seriously consider creating a new Storage-specific
> level 300 exam instead.
>
> +1
>
> [...]
>
> Just my $0.02, software-based storage is really a broad topic that could
> easily justify it's own exam, and it's getting to be of major importance
> that many sysadmins will soon be software-based storage admins as well.
>
>   I agree here.
>
> [...]
>

This is the new frontier.  Traditional storage cannot keep up.  At the same
time, application stack-designed storage has its limitations.  Hence why
software platform is the new innovator.

Summing things up, you're proposing basic file-sharing only in LPIC-2
> (SAMBA & NFS),
>
and authentication, id-remapping, Domain Controller stuff and the like in
> LPIC-3.
>
Sounds reasonable to me.
>

Yepper.  In my view, 200 level is how to pass the Domain/REALM in
/etc/samba/smb.conf, /etc/idmapd.conf, etc..., plus the gss entry required
in /etc/exports, and that's about it.  LPIC-2 sysadmins should understand
what Domains/REALMs are, how IDs basically work (including MS UPN / KRB
Principals nomenclature), but not how to configure the services.

What about having now SSSD in LPIC-3
>

Totally apples-and-oranges.  You don't have the same objectives at
different levels for "staging."  ;)

SSSD is 100% client-side.  It's not a server.  It's a set of local services
for the local system iteslf.  Think of SSSD, loosely, as the Linux
equivalent to NT's Local Security Authority Subsystem Service (LSASS) with
Security Service Provider Interfaces (SSPI).

Linux has never really had one, it's been piecemeal, with a lot holes
and/or not integrated with one another.  Now SSSD adds that, augmenting a
lot of existing libraries, still piecemeal, but designed to work together
(finally) -- benefits of both flexbility and integration now.

Windows, instead has opposite problem.  They've always had an integrated
one, and it's not very flexible, to the point even Domain models break down
(trusts so tightly woven into transitive trusts into global roles and other
things that don't always have the same schema).  Even Integrated Windows
Authentication (IWA) falls back to old NTLMv2 hashes via the NTLMSSP in
some cases.  E.g., virtually all of Microsoft's own "Federation" solutions
aren't to solve cross-platform issues, but cross AD-forest issues.  ;)

Now let's look at the details.  Take SSSD's LDAP module to start.  Most of
the configuration file settings in sssd.conf are almost the same as
ldap.conf.  Beyond the augmented features, there are just some security
default differences (e.g., CA validation is required by default in SSSD).
 Most of these are regulatory/compliance requirements any way, and good to
know.  Heck, the reason why the pam_ldap options and defaults differ is
largely because it's based on an older, deprecated defaults of the OpenLDAP
libraries.

Then you have the PAM aspects.  But then SSSD actually _simplifies_ that.
 And then the NSSwitch ... oh yeah, SSSD actually _simplifies_ that too.
 You don't have to get into the advance feature of SSSD to cover its
equivalents to various modules.  It's easy.  I don't know how else to say
it, SSSD is easier to cover than the endless, separate modules.  In fact,
what trips most people up when they first tackle SSSD is that they keep
using legacy components that have been replaces.

It's really a matter of recognizing SSSD is the only open source solution
out there, and re-writing the objectives for it.  Then cover the few,
legacy options for systems where SSSD isn't used for those functions.
 I.e., the power of SSSD is that you can _by-pass_ its modules if you want.
 You _can_ turn off its LDAP module and use legacy LDAP modules and their
configuration.  Again, why other distros have been (redacted) on anything
related to Red Hat is beyond me, the upstream is really wanting distros to
be involved, and are trying to write code that works on anything (even
beyond Linux, although PAM and other dependencies are involved).

It's really sad, because SSSD (let alone IPA for department-level
IdM/auditing) is really something every single network, from SMBs to
Enterprises, want.

 and the older pam_ldap/nss_ldap in LPIC-2
>

The problem is that it's more than just two (2) modules that it replaces.
 There's Winbindd to start, and that's look LPIC-2, even if advanced
aspects on the "services" side (Samba DC, OpenLDAP or even IPA) are 300
level.  Again, I'd honestly re-write the sucker to be SSSD, and then
contrast to the legacy.  But that's just me.  ;)

with provisions of moving the older stuff out of LPIC-2 when SSSD
> eventually becomes a widely
>
adopted default solution
>

Well ... if you want to go there ...  ;)

Because there are so many "holes" and/or complicated configuration
requirements for enterprise with open source solutions, much the Linux
world just uses _proprietary_ solutions, many with costly CAL licenses (and
their "Free" versions are often quite inferior to SSSD), instead.  Why?
 There is no open source option before SSSD.  E.g., there wasn't even a
good, easy-to-configure solution if your AD had IdM for UNIX installed and
the IETF RFC2307 POSIX attributes populated _until_ SSSD came along.  Now
there is.

So I think you're looking at this wrong.  There's no "equivalent" to SSSD
in the open source world.  Heck, even most of the proprietary solutions out
there are either AD-centric, or the vendor's own LDAP store-centric.
 That's it.  SSSD is the killer subsystem.  It does everything.  And it's
just using existing open source libraries and features, but augmenting with
centralize caching, migration, replacements where existing stuff doesn't
work well (several aspects of pam/nss_ldap, winbindd let alone it's
caching, etc...).

This scheme could be used for other things as well, like GRUB 0.97,
>

As I mentioned, drop GRUB 0.97 in the next rev.

SysV init, some filesystems (EXT3, NFS<4), Desktop Managers (XDM)...
>

SysV init concepts will _always_ be around.  Both Upstart and systemd
support SysV init scripts.  Heck, systemd can even monitor SysV init forked
processes by Socket dependencies (it automagically detects) without any
configuration.

NFSv3 will remain.  You cannot avoid it.  NFSv3 and NFS4 are easily covered
side-by-side.

X Display Managers (XDM) are all basically the same, as far as access and
other things.  Their spawning is the only thing that gets init-specific,
and differs, but that's related to init/service/system management.



--
Bryan J Smith - Professional, Technical Annoyance
b.j.smith at ieee.org - http://www.linkedin.com/in/bjsmith
_______________________________________________
lpi-examdev mailing list
lpi-examdev@lpi.org
http://list.lpi.org/cgi-bin/mailman/listinfo/lpi-examdev

Reply via email to