Another server came with specific hardware that require me to install CentOS 5.10 64 bit with base only package. Since CentOS 5 use PHP 5.1 by default so I decide to find a way for PHP 5.2.17 (latest version of PHP 5.2 generation).
I use Jason package from jasonlitka.com
# nano /etc/yum.repos.d/utter-ramblings.repo
fill these lines :
[utter-ramblings]
name=Utter Ramblings
baseurl=http://yum.jasonlitka.com/EL5/x86_64/
gpgkey=http://yum.jasonlitka.com/RPM-GPG-KEY-jlitka
enabled=1
gpgcheck=1
save.
Make sure to change to http://yum.jasonlitka.com/EL5/i386/ for baseurl if you use 32 bit.
Install PHP and friends
PHP 5.2.17
# yum install php php-mysql
MySQL
# yum install mysql-server
Run as service
# chkconfig httpd --add
# chkconfig httpd on --level 235
# chkconfig mysqld --add
# chkconfig mysqld on --level 235
2 = Multi-user mode console logins only (without networking)
3 = Multi-User mode, console logins only
5 = Multi-User mode, with display manager as well as console logins (X11)
Checking if already set as service
# chkconfig --list mysqld
mysqld 0:off 1:off 2:on 3:on 4:off 5:on 6:off
# chkconfig --list httpd
httpd 0:off 1:off 2:on 3:on 4:off 5:on 6:off
Checking installed httpd and mysql :
# rpm -qa | grep httpd
httpd-2.2.22-jason.1
# rpm -qa | grep mysql
mysql-server-5.1.58-jason.1
mysql-5.1.58-jason.1
php-mysql-5.2.17-jason.2
mysqlclient15-5.0.91-1.jason.1
Reboot.
P.S : in case you got error (refused connection) then iptables need to told about this service :
# iptables -I INPUT -p tcp -m tcp --dport 80 -j ACCEPT
# service iptables save
Saving firewall rules to /etc/sysconfig/iptables: [ OK ]
# service iptables restart
Flushing firewall rules: [ OK ]
Setting chains to policy ACCEPT: filter [ OK ]
Unloading iptables modules: [ OK ]
Applying iptables firewall rules: [ OK ]
Loading additional iptables modules: ip_conntrack_netbios_n[ OK ]
Update
Last check : date
# date
Rab Nov 12 18:20:19 WIT 2014
Checking BIOS time I see no error.
# rpm -qa | grep ntp
Since another process lock yum, I use quick way :
# date 111210212014
Rab Nov 12 10:21:00 WIT 2014
Yes, that command use following format
date MMDDhhmmYYYY
MM -> month (in two digit)
DD -> date (in two digit)
hh -> hour (in 24 hour format)
mm -> minutes (in 2 digit)
YYYY -> year (in 4 digit)
Check again after issue command.
# date
Rab Nov 12 10:25:21 WIT 2014
Yes, the result is match.
I’ll continue with ntp next time.
For quick dns setting I use maradns.
Update January 15 2015 :
I need fail2ban for this server :
Add server
#rpm -Uvh http://dl.fedoraproject.org/pub/epel/5/x86_64/epel-release-5-4.noarch.rpm
Retrieving http://dl.fedoraproject.org/pub/epel/5/x86_64/epel-release-5-4.noarch.rpm
warning: /var/tmp/rpm-xfer.UKJ53A: Header V3 DSA signature: NOKEY, key ID 217521f6
Preparing… ########################################### [100%]
1:epel-release ########################################### [100%]
Install fail2ban
# yum install fail2ban
Loaded plugins: fastestmirror, security
Loading mirror speeds from cached hostfile
* base: centos.biz.net.id
* epel: buaya.klas.or.id
* extras: centos.biz.net.id
* updates: centos.biz.net.id
Setting up Install Process
Resolving Dependencies
–> Running transaction check
—> Package fail2ban.noarch 0:0.8.14-1.el5 set to be updated
–> Processing Dependency: python-inotify for package: fail2ban
–> Running transaction check
—> Package python-inotify.noarch 0:0.9.1-1.el5 set to be updated
–> Processing Dependency: python-ctypes for package: python-inotify
–> Running transaction check
—> Package python-ctypes.x86_64 0:1.0.2-3.el5 set to be updated
–> Finished Dependency Resolution
Dependencies Resolved
========================================================================================================================================================================
Package Arch Version Repository Size
========================================================================================================================================================================
Installing:
fail2ban noarch 0.8.14-1.el5 epel 266 k
Installing for dependencies:
python-ctypes x86_64 1.0.2-3.el5 base 210 k
python-inotify noarch 0.9.1-1.el5 epel 86 k
Transaction Summary
========================================================================================================================================================================
Install 3 Package(s)
Upgrade 0 Package(s)
Total download size: 562 k
Is this ok [y/N]: y
Downloading Packages:
http://buaya.klas.or.id/epel/5/x86_64/python-inotify-0.9.1-1.el5.noarch.rpm: [Errno 12] Timeout: <urlopen error timed out>
Trying other mirror.
(1/3): python-inotify-0.9.1-1.el5.noarch.rpm | 86 kB 00:00
(2/3): python-ctypes-1.0.2-3.el5.x86_64.rpm | 210 kB 00:03
(3/3): fail2ban-0.8.14-1.el5.noarch.rpm | 266 kB 00:02
————————————————————————————————————————————————————————
Total 6.8 kB/s | 562 kB 01:22
warning: rpmts_HdrFromFdno: Header V3 DSA signature: NOKEY, key ID 217521f6
epel/gpgkey | 1.7 kB 00:00
Importing GPG key 0x217521F6 “Fedora EPEL <[email protected]>” from /etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL
Is this ok [y/N]: y
Running rpm_check_debug
Running Transaction Test
Finished Transaction Test
Transaction Test Succeeded
Running Transaction
Installing : python-ctypes 1/3
Installing : python-inotify 2/3
Installing : fail2ban 3/3
Installed:
fail2ban.noarch 0:0.8.14-1.el5
Dependency Installed:
python-ctypes.x86_64 0:1.0.2-3.el5 python-inotify.noarch 0:0.9.1-1.el5
Complete!
Configuration fail2ban
# nano /etc/fail2ban/jail.conf
Pay attention to ssh section
service fail2ban restart
# service fail2ban restart
Stopping fail2ban: ERROR Unable to contact server. Is it running?
[FAILED]
Starting fail2ban: [ OK ]
Check fail2ban exist?
# ps ax | grep fail
4066 ? Sl 0:00 /usr/bin/python /usr/bin/fail2ban-server -b -s /var/run/fail2ban/fail2ban.sock -p /var/run/fail2ban/fail2ban.pid -x
4099 ? S 0:00 sh -c printf %b “Subject: [Fail2Ban] SSH: stopped on `uname -n`?Date: `LC_TIME=C date -u +”%a, %d %h %Y %T +0000″`?From: Fail2Ban <[email protected]>?To: [email protected]\n?Hi,\n?The jail SSH has been stopped.\n?Regards,\n?Fail2Ban” | /usr/sbin/sendmail -f [email protected] [email protected]
4103 ? S 0:00 /usr/sbin/sendmail -f [email protected] [email protected]
4173 ? Sl 0:00 /usr/bin/python /usr/bin/fail2ban-server -b -s /var/run/fail2ban/fail2ban.sock -p /var/run/fail2ban/fail2ban.pid -x
4184 ? S 0:00 sh -c printf %b “Subject: [Fail2Ban] SSH: started on `uname -n`?Date: `LC_TIME=C date -u +”%a, %d %h %Y %T +0000″`?From: Fail2Ban <[email protected]>?To: [email protected]\n?Hi,\n?The jail SSH has been started successfully.\n?Regards,\n?Fail2Ban” | /usr/sbin/sendmail -f [email protected] [email protected]
4188 ? S 0:00 /usr/sbin/sendmail -f [email protected] [email protected]
Update : June 24 2015
I just know ntsysv, an utility that useful to enable the service during boot. Neat one.
Well, I need to set sender address 🙂