![]() | ![]() |
|
Remote Serial Console HOWTOGlen TurnerAustralian Academic and Research Network Mark F. Komarinskiv2.6 2003-03-31
An RS-232 serial console allows Linux to be controlled from a terminal or modem attached to an asynchronous serial port. The monitor, mouse and keyboard are no longer required for system administration. Serial consoles are useful where Linux systems are deployed at remote sites or are deployed in high-density racks. This HOWTO describes how to configure Linux to attach a serial console. DedicationGlen Turner would like to thank his family for allowing him to work on this project for the surprisingly large number of evenings which it took to write this HOWTO. Thank you Karen, Kayla and Ella.
Chapter 1. Introduction
1.1. What is a console?The console is the text output device for system administration messages. These messages come from the kernel, from the init system and from the system logger. On modern small computers the console is usually the computer's attached monitor and keyboard. On many older computers the console is an RS-232 link to a terminal such as a DEC VT100. This terminal is in a locked room and is continually observed by the minicomputer's operators. Large systems from Sun, Hewlett-Packard and IBM still use serial consoles. It is usually possible to login from the console. A login session from the console is treated by many parts of the operating system as being more trustworthy than a login session from other sources. Logging in as the root super-user from the console is the Command Line of Last Resort when faced with a misbehaving system. 1.2. Why use a serial console?For the average user a serial console has no advantage over a console offered by a directly attached keyboard and screen. Serial consoles are much slower, taking up to a second to fill a 80 column by 24 line screen. Serial consoles generally only support non-proportional ASCII text, with limited support for languages other than English. A new terminal can be more expensive than an old PC. There are some scenarios where serial consoles are useful. These are:
Unlike minicomputer systems, the IBM PC was not designed to use a serial console. This has two consequences. Firstly, Power On Self-Test messages and Basic Input/Output System (BIOS) messages are sent to the screen and received from the keyboard. This makes it difficult to use the serial port to reconfigure the BIOS and impossible to see Power On Self-Test errors. An increasing number of manufacturers of rackable server equipment are altering their BIOSs to optionally use the RS-232 port for BIOS configuration and test messages. If you are buying a machine specifically for use with serial console you should seek this feature. If you have an existing machine that definitely requires access to the BIOS from the serial port then there are hardware solutions such as PC Weasel 2000. Secondly, the RS-232 port on the IBM PC is designed for connecting to a modem. Thus a null modem cable is needed when connecting the PC's serial port to a terminal. 1.3. Alternative meanings of "console"Some authors use the word "console" to refer to the keyboard and monitor that are attached to the system unit. This is described as a "physical console" by some Linux documentation. The console where system messages appear is described as the "logical console" by that documentation. As an illustration of the difference, X Windows should start on the physical console but system messages issued by failures when starting X Windows should be written to the logical console. To avoid confusion this HOWTO uses the word "console" to describe the place where system messages are printed. This HOWTO uses the phrase "attached monitor and keyboard" rather than the confusing words "physical console". These distinctions are also made in the naming of devices. The device /dev/console is used to send messages to the console. The symbolic link /dev/systty points to the device which is used by the attached monitor and keyboard, often /dev/tty0. 1.4. Configuration overviewThere are five major steps to configuring a serial console.
Examples in this HOWTO are from Red Hat Linux versions 7.1 through to 7.3 (released 2001 through to 2002). The maintainer would appreciate updates when new versions of Red Hat Linux appear. The maintainer would very much appreciate examples for Linux distributions that are dissimilar to Red Hat Linux; particularly Debian GNU/Linux and Slackware Linux. All contributors are acknowledged in Section G.3. Chapter 2. PreparationThis chapter ensures that access the existing console can be restored should the serial console fail to start. This chapter then discusses the selection of the RS-232 port and its parameters. 2.1. Create fallback positionGood system administrators always have a viable fallback plan to cope with failures. A mistake configuring the serial console can make both the serial console and the attached monitor and keyboard unusable. A fallback plan is needed to retrieve console access. Many Linux distributions allow boot diskettes to be created. Writing a boot diskette before altering the console configuration results in a boot diskette that passes good parameters to the kernel rather than parameters that may contain an error. Under Red Hat Linux a boot diskette is created by determining the running kernel version and then using that version to create the boot diskette Under Debian GNU/Linux the boot diskette is created by determining the version of the running kernel and then using that version to write the boot diskette An alternative fallback position is have a rescue diskette with the machine. A common choice is Tom's root boot. 2.2. Select a serial port2.2.1. Serial port namesLinux names its serial ports in the UNIX tradition. The first serial port has the file name /dev/ttyS0, the second serial port has the file name /dev/ttyS1, and so on. This differs from the IBM PC tradition. The first serial port is named COM1:, the second serial port is named COM2:, and so on. Up to four serial ports can be present on a IBM PC/AT computer and its successors. Most boot loaders have yet another naming scheme. The first serial port is numbered 0, the second serial port is numbered 1, and so on. If your distribution of Linux uses the devfs device manager then the serial ports have yet another name. The first serial port is /dev/tts/0, the second serial port is /dev/tts/1, and so on. The result is that the first serial port is labeled COM1: on the chassis of the IBM PC; is known as /dev/ttyS0 to Linux; is known as /dev/tts/0 to Linux when configured with devfs; and is known as port 0 to many boot loaders. The examples in this HOWTO use this first serial port, as that is the serial port which most readers will wish to use. 2.2.2. Cannot share interrupt used for console's serial portWhen used for a console the serial port cannot share an interrupt with another device. The IBM PC devices are usually installed as shown in Table 2-2. If you use the serial port /dev/ttyS0 for the console then you should avoid sharing interrupt 4 by not installing a serial port /dev/ttyS2 in your PC. If /dev/ttyS2 cannot be physically removed then disable it using the setserial command, as shown in Figure 2-1. Table 2-2. Interrupts used for IBM PC/AT RS-232 ports
Figure 2-1. Using the setserial command in /etc/rc.serialto disable the serial port /dev/ttyS2
Reading the source code suggests that the interrupt-sharing constraint applies to all computer architectures, not just Intel Architecture-32. 2.3. Select a serial speed and parametersThis HOWTO does not discuss the RS-232 standard, which is formally known as ANSI/TIA/EIA-232-F-1997 Interface Between Data Terminal Equipment and Data Circuit-Terminating Equipment Employing Serial Data Interchange. For an explanation of "bits per second", "start bits", "data bits", "parity", "stop bits" and "flow control" refer to the Serial-HOWTO and the Modem-HOWTO. The description of the command syntax for setting the serial parameters in the kernel, boot loaders and login applications uses the following variables which describe RS-232 parameters.
At present the RS-232 status lines are ignored by the kernel. A kernel message will be printed even if Data Carrier Detect and Data Set Ready are not asserted. This leads to the kernel messages being sent to a modem which is idle and in command mode. The console's slack interpretation of CTS, DSR and DCD makes it impossible to connect a serial console to an RS-232 multi-drop circuit. Multi-drop circuits have more than two computers on the circuit; they are traditionally four-wire, satelite or wireless services. The Linux kernel uses the syntax in Figure 2-7 to describe the serial parameters. Many boot loaders use a variation of the syntax used by the Linux kernel. Figure 2-7. Syntax for kernel serial parameters, in extended Backus-Naur form <mode> ::= <speed><parity><data><flow_control> Note that <mode> does not include <stop>. The kernel assumes the number of stop bits to be one. This shortcoming needs to be considered when deploying long RS-232 cables. Most boot loaders default to 9600n8. A common default found on older terminals is 9600e7. Use 9600n8 if possible, as this is the default for most Linux software and modern devices. This HOWTO always configures the serial speed and parameters, even where not strictly necessary. This is so that people configuring parameters other than the recommended and common default value 9600n8 will know what to alter. 2.4. Configure the modem or the null-modem cableIf a modem is used, configure it to be a dumb modem at the port speed selected in Section 2.3. If the modem accepts Hayes AT commands see Chapter 12 to dumb-down the modem. Alternatively if a terminal and a null-modem cable are used see Section 11.3, which discusses the pinout of the null modem cable. 2.5. Configure the terminal or the terminal emulatorConfigure the terminal to match the serial parameters. The data bits, parity bits and stop bits must match. If a modern "smart" modem is used then the bit speeds need not match. If a dumb modem or a null modem cable is used then the bit speeds must match. Set CTS/RTS handshaking on, DTR/DSR handshaking off and XON/XOFF handshaking off. Your equipment may call CTS/RTS handshaking or DTR/DSR handshaking "hardware handshaking" and may call XON/XOFF handshaking "software handshaking". Set automatic line wrapping on. This allows all of a long console message to be read. Set the received end of line characters to CR LF (carriage return then line feed). Set the transmitted end of line characters to just CR (carriage return). If you are using a terminal emulator then it is best to choose to emulate the popular DEC VT100 or VT102 terminal. Later terminals in the DEC VT range are compatible with the VT100. If this terminal is not available then try to emulate another terminal that implements ANSI X3.64-1979 Additional Controls for Use with American National Standard Code for Information Interchange (or its successor ISO/IEC 6429:1992 ISO Information technology — Control functions for coded character sets). For example, many emulators have a terminal called ANSI BBS which uses the IBM PC character set, the 16 IBM PC colors, a 80 column by 25 line screen and a selection of X3.64-1979 control sequences. See the Text-Terminal-HOWTO for much more information on configuring terminals. Chapter 3. Optionally configure the BIOSSome BIOSs provide support for serial consoles. If your computer's BIOS is one of these you should investigate the extent of the support provided. Depending upon the extent of serial console support you may not need to explicitly configure the boot loader to use the serial port. The contributors to this HOWTO have encountered the following styles of BIOS support for serial consoles.
If you need to configure the boot loader to use the serial port then continue to Chapter 4. Otherwise go directly to Chapter 5 to configure the kernel; this is done by configuring the boot loader to pass boot parameters to the Linux kernel. Chapter 4. Configure the boot loaderWhen a PC boots the CPU it runs code from Read-Only Memory. This code is the Basic Input/Output System, or BIOS. The BIOS then loads a boot loader from the Master Boot Record of the first hard disk.[4] In turn, the boot loader reads the operating system into memory and then runs it.[5] Neither the BIOS nor the boot loader are strictly necessary. For example, there are versions of Linux that run directly from the flash memory which usually contains the BIOS. Linux was originally designed to run without an interactive boot loader, by placing the kernel at particular sectors of the disk. The benefits of using a boot loader are:
For these reasons systems administrators want to be able to interactively control the boot loader from the serial console. LILO, GRUB and SYSLINUX are popular boot loaders for IBM PCs. Find which of these boot loaders your Linux installation uses and then follow the instructions for your boot loader in the following section. 4.1. Configure the LILO boot loaderLILO is the Linux Boot Loader used on Intel machines. Other boot loaders for Intel machines exist, common alternatives are GRUB and SYSLINUX. Equivalents to LILO exist for other processor architectures, their names are usually some play upon "LILO". LILO is documented in the lilo(8) and lilo.conf(5) manual pages; the LILO Generic boot loader for Linux … User's Guide found in the file /usr/share/doc/lilo…/doc/User_Guide.ps; and the LILO mini-HOWTO. The LILO configuration is kept in the file /etc/lilo.conf. The first part of the file applies to all images. The following parts are image descriptions for each kernel. Set LILO to use the serial port. The syntax of the serial line parameters follows that used by the kernel. Where the variables are the same as used by the kernel (shown in Figure 2-7) and: Our examples use /dev/ttyS0, which LILO knows as port 0. Figure 4-3. LILO boot loader sample configuration
The parameters restricted and password are used to avoid someone dialing in, booting the machine, and stepping around the Linux access permissions by typing: The password should be good, as it can be used to gain root access. The LILO password is stored in plain text in the configuration file, so it should never be the same as any other password. The permissions on the configuration file should be set so that only root can read /etc/lilo.conf. LILO has an option to display a boot message. This does not work with serial consoles. Remove any lines like: LILO is now configured to use the serial console. The kernels booted from LILO are yet to be configured to use the serial console. 4.2. Configure the GRUB boot loaderGRUB is a boot loader designed to boot a wide range of operating systems from a wide range of filesystems. GRUB is becoming popular due to the increasing number of possible root filesystems that can Linux can reside upon. GRUB is documented in a GNU info file. Type info grub to view the documentation. The GRUB configuration file is /boot/grub/menu.lst. Some distributions use another configuration file; for example, Red Hat Linux uses the file /boot/grub/grub.conf. GRUB configuration files are interpreted. Syntax errors will not be detected until the machine is rebooted, so take care not to make typing errors. Edit the GRUB configuration file and remove any splashimage entries. If these entries are not removed GRUB 0.90 behaves very oddly, transferring control between the serial console and the attached monitor and keyboard. If there is not already a password command in the GRUB configuration file then create a hashed password, see Figure 4-4. The password should be good, as it can be used to gain root access. Figure 4-4. Using md5crypt to create a hashed password for GRUB
Use that hashed password in the GRUB configuration file, this is shown in Figure 4-5. Define the serial port and configure GRUB to use the serial port, as shown in Figure 4-6. Figure 4-6. GRUB configuration for serial console
--unit is the number of the serial port, counting from zero, unit 0 being COM1. Note that the values of --parity are spelt out in full: no, even and odd. The common abbreviations n, e and o are not accepted. If there is mysteriously no output on the serial port then suspect a syntax error in the serial or terminal commands. If you also want to use and attached monitor and keyboard as well as the serial port to control the GRUB boot loader then use the alternative configuration in Figure 4-7. Figure 4-7. GRUB configuration for serial console and attached monitor and keybaord console
When both the serial port and the attached monitor and keyboard are configured they will both ask for a key to be pressed until the timeout expires. If a key is pressed then the boot menu is displayed to that device. Disconcertingly, the other device sees nothing. If no key is pressed then the boot menu is displayed on the whichever of serial or console is listed first in the terminal command. After the timeout set by the timeout the default option set by default is booted. Figure 4-8. GRUB output to default device when configured for serial and attached monior output
If you are not using a VT100 terminal then the cursor keys may not work to select a GRUB menu item. The instructions shown in Figure 4-8 are literally correct: Use the ^ and v keys means that the caret key (Shift-6) moves the cursor up and letter vee key (V) moves the cursor down. Note when configuring GRUB that there are two timeouts involved. Press any key to continue is printed for terminal --timeout=10 seconds, waiting for someone on the keyboard or terminal to press a key to get the input focus. Then the menu is displayed for timeout 10 seconds before the default boot option is taken. If the terminal attached to the serial port is not a real or emulated VT100, then force GRUB to use it's command line interface. This interface is much more difficult to use than GRUB's menu interface; however, the command line interface does not assume the VT100's terminal language. Figure 4-9. GRUB configuration for command line interface for terminals other than VT100
This HOWTO does not discuss the use of GRUB's command line. It is far too complex and error-prone to recommend for use on production machines. Wizards will know to consult GRUB's info manual for the commands required to boot the kernel. GRUB's menu's can be edited interactively after P is pressed and the password supplied. A better approach is to add menu items to boot the machine into alternative run levels. A sample configuration showing a menu entry for the default run level and an alternative menu entry for single user mode (run level s) is shown in Figure 4-10. Remember to use the lock command to require a password for single user mode, as single user mode does not ask for a Linux password. Figure 4-10. Adding a single user mode option to the GRUB menu
File names in the kernel and initrd commands are relative to the GRUB installation directory, which is usually /boot/grub. So /vmlinuz-2.4.9-21 is actually the file /boot/grub/vmlinuz-2.4.9-21. GRUB is now configured to use the serial console. The kernels booted from GRUB are yet to be configured to use the serial console. 4.3. Configure the SYSLINUX boot loaderSYSLINUX is a boot loader that is installed on a MS-DOS floppy disk. As directed by it's configuration file \SYSLINUX.CFG it will load one of the files from the floppy disk as a Linux kernel. SYSLINUX presents a simple text interface that can be used to select between canned configurations defined in the configuration file and can be used to add parameters to the kernel. ISOLINUX and PXELINUX are variants of SYSLINUX for CD-ROMs and Intel's Preboot Execution Environment. SYSLINUX supports a variety of serial port speeds, but it only supports eight data bits, no parity and one stop bit. SYSLINUX supports the serial ports COM1: through to COM4:, as with most boot loaders these are written as port 0 through to port 3. For SYSLINUX to support a serial console add a new first line to \SYSLINUX.CFG: Figure 4-11. Syntax of SYSLINUX serial command, in EBNF serial <space> <serial_port> [ <space> <speed> [ <space> <syslinux_flow_control> ] ] The variables are the same as used by syntax descriptions in Figure 2-7 and Figure 4-2 plus those in Figure 4-12. Figure 4-12. SYSLINUX serial EBNF variables <space> ::= ‘ ’ The <syslinux_flow_control> variable controlling the RS-232 status and flow control signals is optional. If your null-modem cable does not present any status or handshaking signals then do not use it. The value of <syslinux_flow_control> is calculated by adding the hexadecimal values for the desired flow control behaviours listed in Table 4-1. The behaviours for a correctly-wired null-modem cable or a correctly configured modem are marked "Required for full RS-232 compliance" in the table. The sum of these values is 0xab3. Table 4-1. SYSLINUX flow control bitmap
Our preferred configuration of 9600bps, port 0, full RS-232 status signals and CTS/RTS flow control is written as:
If you have a null modem cable with no RS-232 status signals and no flow control then use: Remember that the serial command must be the first line in \SYSLINUX.CFG. Chapter 5. Configure Linux kernelThe Linux kernel is configured to select the console by passing it the console parameter. The console parameter can be given repeatedly, but the parameter can only be given once for each console technology. So console=tty0 console=lp0 console=ttyS0 is acceptable but console=ttyS0 console=ttyS1 will not work. When multiple consoles are listed output is sent to all consoles and input is taken from the last listed console. The last console is the one Linux uses as the /dev/console device. The syntax of the console parameter is given in Figure 5-1. Figure 5-1. Kernel console syntax, in EBNF console=ttyS<serial_port>[,<mode>] <serial_port> is the number of the serial port. This is defined in Figure 4-2 and discussed in Section 2.2. The examples in this HOWTO use the first serial port, giving <serial_port> the value 0, which in turn gives kernel parameter console=ttyS0. If you are using the devfs device filesystem with your Linux installation the kernel parameter for the first serial port is still ttyS0, even though the first serial device is no longer known as /dev/ttyS0 but as /dev/ttys/0. <mode> is defined in Figure 2-7 and is discussed in Section 2.3. The examples in this HOWTO use 9600 bits per second, one start bit, eight data bits, no parity, one stop bit, and no CTS/RTS flow control giving <mode> the value of 9600n8. When the current kernel flow control bugs are corrected this HOWTO will once again recommend the value 9600n8r. <usb_port> can specify the address of a USB dongle containing a serial port to be used as a serial console.[6] For example, the serial port console=ttyS0,9600n8 when moved to a USB serial dongle would be written as console=ttyUSB0,9600n8. The USB subsystem is started rather late in the boot process, console messages printed during boot before the USB subsystem is loaded will be lost. With no console parameter the kernel will use the first virtual terminal, which is /dev/tty0. A user at the keyboard uses this virtual terminal by pressing Ctrl-Alt-F1. If your computer contains a video card then we suggest that you also configure it as a console. This is done with the kernel parameter console=tty0. For computers with both a video card and a serial console in the port marked "COM1:" this HOWTO suggests the kernel parameters: Kernel messages will appear on both the first virtual terminal and the serial port. Messages from the init system and the system logger will appear only on the first serial port. This can be slightly confusing when looking at the attached monitor: the machine will appear to boot and then hang. Don't panic, the init system has started but is now printing messages to the serial port but is printing nothing to the screen. If a getty has been configured then a login: prompt will eventually appear on the attached monitor. For PCs without a video card, this HOWTO suggests the kernel parameters: These parameters are passed to the booting kernel by the boot loader. Next we will configure the boot loader used by your Linux installation to pass the console parameters to the kernel. 5.1. Configure Linux kernel using LILOFor each image entry in /etc/lilo.conf add the line: Figure 5-4. Recommended kernel parameters, LILO configuration
Sometimes the append line will already exist. For example In this case, the existing append line is modified to pass all the parameters. The result is: As a complete example, a typical /etc/lilo.conf configuration from Red Hat Linux 7.1 is: Example 5-1. Complete LILO configuration, as installed by vendor
This is modified to Example 5-2. Complete LILO configuration, modified for serial console
Now that we have finished configuring LILO, use the lilo command to install the new boot record onto the disk: 5.2. Configure Linux kernel using GRUBFind each title entry in the GRUB configuration file. It will be followed by a kernel line. For example
Modify each of the kernel lines to append the parameters that inform the kernel to use a serial console. Figure 5-5. Recommened kernel parameters, GRUB configuration
As a complete example, Example 5-3 is a typical GRUB configuration from Red Hat Linux 7.2. Example 5-3. Complete GRUB configuration, as installed by vendor
The modified configuration file is shown in Example 5-4. Example 5-4. Complete GRUB configuration, modified for serial console
5.3. Configure Linux kernel using SYSLINUXEdit each LABEL entry to add an APPEND line containing the serial console parameter to pass to the Linux kernel. Like LILO, if a kernel already has parameters, then add our parameters to the list after APPEND. For example: Figure 5-6. Recommended kernel parameters, SYSLINUX configuration
There are some traps for beginners in the differences between LILO and SYSLINUX. LILO uses append=, whereas SYSLINUX uses just append. lilo needs to be run after each change to /etc/lilo.conf, whereas syslinux does not need to be run after changing \SYSLINUX.CFG. Chapter 6. Configure gettygetty monitors serial lines, waiting for a connection. It then configures the serial link, sends the contents of /etc/issue, and asks the person connecting for their login name. getty then starts login and login asks the person for their password. If the user does nothing, getty or login hang up and getty goes back to waiting. The getty command has been re-implemented numerous times. There is a wide selection of getty clones, each with slight differences in behavior and syntax. We will describe the traditional getty, and then some popular alternatives. One of the jobs of a getty is to set the TERM environment variable to indicate the make and model of the terminal which is connecting. In this HOWTO we set the terminal to the commonly emulated DEC VT100. If you occassionally connect using a different terminal emulation then you can interactively change your choice of terminal by setting TERM to the appropiate terminal listed in /etc/termcap. Figure 6-1. Interactively altering the connecting terminal's make and model
A getty is also responsible for setting the time zone when a permanently-connected remote terminal is located beyond the machine's default time zone. The getty overrides the default timezone by setting the TZ environment variable. As with the TERM environment variable, a user connecting from a modem can interactively override the default time zone. Figure 6-2. Interactively altering the connecting terminal's time zone
If you do not know your time zone name, run the tzselect utility to generate the appropiate contents for TZ. But first, let's see how getty gets started in the first place. 6.1. init systemThe file /etc/inittab contains the background programs that used to keep the system running. One of these programs is one getty process per serial port. Figure 6-3. getty is started by init, based upon an entry in /etc/inittab
Each field in inittab is separated by a colon and contains:
After changing /etc/inittab restart init with An alternative is to send the hangup signal to init with the command kill -HUP 1. This is not recommended: if you make a typing mistake and actually kill init then your system will suddenly halt.
6.2. Traditional gettyTraditional getty implementations include uugetty and getty_ps. The traditional getty is listed in /etc/inittab with the name of a section in /etc/gettydefs to use for its configuration. Our example in Figure 6-3 used the section CON9600. There is no CON9600 in the standard gettydefs. This is deliberate, as serial consoles sometimes require slight tweaking. Copy the DT9600 entry and use it as your model. Figure 6-4. Define CON9600 in gettydefs
Separate each line with a blank line. Each configuration line has the syntax: Figure 6-5. Syntax of entries in /etc/gettydefs, in EBNF <label># <initial_flags> # <final_flags> #<login_prompt>#<next_label> The <label> is referred to on the getty command line. The <next_label> is the definition used if a RS-232 Break is sent. As the console is always 9600bps, this points back to the original label. See Section 9.9 if you ever intend to have more one line for CON9600 in gettydefs. <initial_flags> are the serial line parameters used by getty. These are modeled on the stty(1) and termios(3) options and the full list varies depending upon your getty variant. The parameters in Figure 6-4 ensure that a line at 9600bps with eight data bits and no parity is configured. <final_flags> are the serial line parameters set by getty before it calls login. You will usually want to set a 9600bps line, SANE terminal handling, eight data bits, no parity and to hang up the modem when the login session is finished. The <login_prompt> for serial lines is traditionally the name of the machine, followed by the serial port, followed by login: and a space. The macro that inserts the name of the machine and the serial port varies, see the documentation for your getty. 6.3. agettyagetty is an "alternative getty". It takes all of its parameters on the command line, with no use of /etc/gettydefs or any other configuration file. agetty is documented in the manual page agetty(8). Figure 6-6 shows how to invoke agetty for use with a serial console. ttyS0 refers to the serial device /dev/ttyS0. 9600 is the bits per second of the serial link. agetty will support multiple values, using the modem's CONNECT message or the RS-232 Break signal to select between them. Only use one value, as serial consoles only have only one data rate. vt102 sets the TERM environment variable to indicate that a VT100 terminal is connecting. -h activates CTS/RTS handshaking. -t 60 allows 60 seconds for someone to attempt to log in before the modem is hung up. You should test this feature to ensure that init is not restarting agetty every 60 seconds when the link is idle. Look for a continually changing process identifier for agetty. agetty uses escape sequences in /etc/issue to insert information. For example, \n.\o \l will appear as remote.example.edu.au ttyS0. When you log out agetty does not appear to lower the Data Terminal Ready signal to force the modme to hang up. If having people automatically disconnected at the end of their login session matters to you then you might consider mgetty instead. 6.4. mgettymgetty is a modem-aware getty. It supports modems with the Hayes AT command set and is especially designed for supporting modems that are used to send faxes and to dial out as well as dial in. These features are not required for a serial console. mgetty does not require the traditional /etc/gettydefs file. As a result mgetty is invoked from /etc/inittab without supplying an entry in /etc/gettydefs. mgetty is configured using the file /etc/mgetty+sendfax/mgetty.config. It should contain an entry for the port used by the serial console. Figure 6-8. mgetty configuration file mgetty.config
All the options are documented in the PostScript file /usr/share/doc/mgetty…/mgetty.ps. We set direct, data-only, need-dsr and toggle-dtr so that the RS-232 control lines are used correctly for a dumb modem. port-owner, port-group and port-mode set the serial device to be accessible only by the root user. Modem applications, which normally use the uucp group, cannot now accidentally use the serial console. login-prompt shows the machine (@) and serial port (\P) being used. The text \040 is simply the octal code for a space after login:. term vt102 gives the make and model of the terminal most likely to dial in. This sets the TERM environment variable, which you can change if you are dialling in from another terminal type. The remaining configuration files, /etc/mgetty+sendfax/dialin.config and /etc/mgetty+sendfax/login.config, do not need to be altered. If you wish to alter the suggested configuration then note that mgetty's blocking and toggle-dtr parameters do not co-exist well. If you have difficulties, activate debugging by adding debug 8 to mgetty.config. mgetty's actions are then visible in the file /var/log/mgetty.log.ttyS0. 6.5. mingettymingetty is designed to be a minimal getty for the virtual terminals on the the workstation's monitor and keyboard. It has no support for serial lines. You must not use mingetty for the serial line in /etc/inittab, but the current mingetty entries for the virtual terminals can remain. Each virtual terminal uses about 8KB of kernel memory. If this matters, it is easy to allocate fewer virtual terminals. In the Linux 2.4 kernel virtual terminals are created on demand, so not starting mingetty on the virtual terminal will not create the virtual terminal. If the machine does not have a video card then remove all the mingetty entries from /etc/inittab. Figure 6-9. Fewer virtual terminals. Removing mingetty entries from /etc/inittab
After restarting init it would be wise to remove the unused device files. 6.6. No gettyIf you are using serial console simply to print console messages then do not run a getty process on the serial port. getty follows a locking convention that prevents other serial port applications from using the serial port. Since we do not want other processes to use the serial port, but are not running getty, manually create the lock file. Create a file /var/lock/LCK..ttyS0 to contain the text 1. This lets other potential serial port applications know that process 1 has the serial port in use. Process 1 is always the init process, and init is always running, so the serial port is always locked. The file is created upon each system boot, as lock files are often cleared when the system boots. A convenient place to create the lock file is from /etc/rc.serial. It should contain: Chapter 7. Configure incidentalsA surprising number of other configuration files need small modifications before the serial console works well. The configuration of many items depends upon your security requirements, especially depending upon the level of trust and corresponding need for security at the remote site. By assuming a high need for security at the remote site this HOWTO can illustrate a large number of configuration items. 7.1. Allow root to login from serial consoleThe file /etc/securetty controls the devices that the root user can log in upon. It is usually desirable to have root be able to log in from the console, so add the basename of the serial console device to /etc/securetty. Almost anyone can now dial into the modem and attempt to guess the root password. Normally we do not allow root to log in from a remote site, rather we have a normal user log in and then use su or sudo to become root. This gives some traceability. Unfortunately, the root user needs to be able to log in from the console to fix a full disk. Disk subsystems typically reserve 5% of their space for root's exclusive use.[7] This is enough space for the root user to log in and start deleting the files that filled the disk.
7.2. Change init level to textualThere is little point in running the X Window System on a server with no screen. Edit /etc/inittab finding the line containing initdefault, such as Alter the default from run level 5 (multiuser with X Window System) to run level 3 (multiuser). The startx command can be used if an occassional X Windows session is required upon an attached keyboard and monitor.
7.2.1. Continuing to run XSometimes a computer with a serial console and no attached monitor still needs to run the X Window System. For example, the computer might host a number of X terminals. In this case the computer should remain in run level 5, but should not run a X server for any attached monitors. Alter /etc/X11/xdm/Xservers and remove any lines starting with a colon (which indicates an X server on the local machine). Figure 7-2 shows an unaltered Xservers file. If the operating system uses GNOME's gdm then alter its configuration file /etc/X11/gdm/gdm.conf, removing any entries for local X servers from the [servers] section. Figure 7-3shows an unaltered [servers] section. 7.3. Remove saved console settingsThe file /etc/ioctl.save contains the serial and terminal parameters to use in single user mode. The serial and terminal parameters are usually set by getty — during single user mode no getty runs and the contents of /etc/ioctl.save are used to set the serial and terminal parameters. As we are changing consoles, the saved settings are no longer correct. Figure 7-4. Removal of ioctl.save containing the saved console parameters
We re-create this file once we can log in from the serial console. 7.4. Serial console is not /dev/modemIn many Linux distributions the file /dev/modem is a symbolic link to the serial port containing a modem which is available for use. Although the serial console is a serial port with a modem, we certainly don't want it used to place an outgoing call. Check that /dev/modem does not point to the serial port being used for the console, say /dev/ttyS0. If it does, then remove the symbolic link. 7.5. Alter target of /dev/systtyIn many Linux distributions the file /dev/systty is a symbolic link to the device which is used as the by the attached monitor and keyboard. See Section 1.3 for a fuller description. If there is no attached keyboard and monitor or no wish to give the attached keyboard and monitor greater capabilities then a text terminal, then alter /dev/systty to point to the serial console. Rather than directly altering this symbolic link, it is better to modify the configuration file used by MAKEDEV, which is then run to recreate the symbolic link. The configuration file is in the directory /etc/makedev.d. The default configuration will point to the first virtual terminal, as shown in Figure 7-6. Modify this to point to the serial port being used by the console, as shown in Figure 7-7. Figure 7-7. Alter value of /dev/systty in MAKEDEV configuration file
Now re-create /dev/systty using its new definition, as shown in Figure 7-8. 7.6. Configure Pluggable Authentication ModulesThe Pluggable Authentication Module system can be used to give special privileges to users that logged in through the console. It is used to make devices like the floppy disk mountable by the console's user; usually they would need to become the super-user to mount a disk. The PAM configuration file /etc/security/console.perms contains the <console> variable. For Red Hat Linux 7.1 <console> is the regular expression: Figure 7-9. Default <console> in console.perms refers to attached keyboard and screen
Later in the file the <console> user is granted permission to use some devices. This is done by altering the devices' permissions upon login and logout. Figure 7-10. Default device listing in console.perms
There are two types of devices listed above: those devices required by someone connecting from an attached keyboard and monitor and those devices that allow convenient access to devices. The configuration file fails to make the distionction between logical and physical console noted in Section 1.3. The configuration file is modified to create that distinction. Figure 7-11. Devices in console.perms required for attached keyboard and screen
The remaining devices should be altered to give control only to people attaching from the serial console. For example, we don't want an unprivileged user at a co-location site mounting a floppy disk. Define a new console type for the serial console, say <sconsole>. Now modify the remaining entries from <console> to <sconsole>. Figure 7-13. Remaining devices in console.perms altered to refer to serial console
7.7. Configure Red Hat LinuxRed Hat Linux stores parameters concerning system start up in the file /etc/sysconfig/init. Alter the parameter BOOTUP to use terminal-independent commands to write the OK, PASSED and FAILED messages. These messages will no longer appear in green, yellow or red. The comments in /etc/sysconfig/init suggest that any value other than color will do, but it seems that BOOTUP must be set to serial. Alter the PROMPT parameter to disallow interactive start up. Allowing an unauthenticated keystroke to stop system services is not robust against line noise and allows anyone that dials in during system boot to deny services. Red Hat Linux runs a hardware discoverer, named kudzu. When attempting to identify a serial port Kudzu resets the serial port. This stops the serial console. Kudzu is configured from the file /etc/sysconfig/kudzu. Kudzu can be prevented from resetting hardware by setting the configuration parameter SAFE to yes. Chapter 8. Reboot and test8.1. Verify console operationIf possible, plug an RS-232 breakout box into the serial port. During reboot the Data Terminal Ready line should become active and then the Transmit Data lights should flash as console messages appear. Attach a modem, or a null modem cable and a terminal. Configure them to match the serial parameters used by the serial console port. If using a modem, dial in to it from a terminal emulator. Configure the terminal or terminal emulator to match the serial parameters used by the serial console. If using a modern Hayes AT-style modem then the speed need not match. If using a directly-attached terminal then the speed must match. Reboot the computer. During reboot the terminal should see the usual boot loader text, and then the default kernel booting, then the init output, and finally the contents of /etc/issue and getty asking you to login.
If you do not see the login: message then press Return or Enter. 8.2. Re-create saved console settingsLog in as root from the serial console and send the console into single user mode. The modem may hang up whilst doing this and you may need to re-connect. Without a /etc/ioctl.save containing the saved terminal settings, init assumes a directly attached terminal running at 9600bps with 8 data bits, no parity, 1 stop bit and no flow control. Configure your terminal with these settings.
As you use stty to alter the Linux's terminal settings remember to also alter the settings of the attached terminal. Exiting from single user mode back to the default run level will save the serial console termnial configuration into /etc/ioctl.save. The terminal settings saved in /etc/ioctl.save will be used if the machine boots into single user mode for any reason. If your attached terminal or modem cannot alter speed to 9600bps then the above procedure cannot be followed. ioctlsave has been written for this special case. It saves the current terminal settings to a file in the same format as ioctl.save. The procedure is shown in Figure 8-1. 8.3. Test the consoleDial in from a machine, perhaps using Minicom. Example 8-1. Dialing into a serial console
Interestingly the stty -a command, used to display the terminal settings, reports that the link from the modem to the serial console is 9600bps. The CONNECT message reports that link between the two modems operates at 33600bps. The constant speed modem-computer link is a very useful feature of the Hayes AT-style modems: the calling computer need not know in advance the line speed of the called serial console. 8.4. Where to next from here?The serial console is now configured. Check the security pointers given in Chapter 9 to complete the job. Chapter 9. SecurityUsing a serial console with a modem gives anyone the opportunity to connect to the console port. This connection is not mediated by firewalls or intrusion detection sniffers. It is important to prevent the misuse of the serial console by unauthorized people. The resurgence of the BBS-era technique of "war dialling" is described in @Stake's Wardialling Brief and reported upon by The Register, see an extract in Figure 9-1. Figure 9-1. Extract from Crackers favour war dialling and weak passwords
Crackers favour war dialling and weak passwords 9.1. Use good passwordsAnyone that can guess the BIOS password, the boot loader password, or the root password can get full control of the machine. These should be different, unrelated, excellent passwords. Random text and digits are by far the best choice. You should never use a password that you think would return a hit from a search engine.[8] Guessing a user's password is only slightly less severe, as a hacker can obtain root access simply by waiting. The hacker waits for a "local exploit" for a flaw in the operating system to appear and uses that exploit before the machine is patched. Severely limit the number of users on the machine. Ensure that only good passwords are chosen by using a fascist password checker such as a cracklib-based PAM module. You should write down the BIOS password, the boot loader password and the root password. Now you don't need to remember them, so there is no reason for them not to be totally random, unrelated, excellent passwords. Fold the page, put it in an envelope and seal it. Now we have turned a computer security problem into a physical security problem. We know how to solve those problems: locks, keys, alarms, safes, guards, regular inspections. If your site has staffed security then a good option is to leave the envelope in the care of the guard post with instructions to treat the envelope with the same procedures used for the site's master keys. Smaller sites can use a safe, a cash box or a locked drawer. A thief forcing a locked drawer still leaves shows more apparent signs of entry and more clues to their identity than is left by a hacker behind a modem. These three passwords are an important corporate asset. If the machine is secure then forgetting the major passwords for the machine should result in a machine whose configuration cannot be altered by actions short of disassembly. You should have written procedures controlling the generation, storage, lifetime and use of major passwords. 9.2. Obey Data Terminal Ready and Data Carrier DetectThe RS-232 Data Terminal Ready signal is lowered when the computer wishes the modem to hang up. The computer wishes to hang up when people have ended their login session ends or when they fail to respond to the login: prompt. Using a modem cable that has DTR wired and a modem that is configured to obey DTR is essential to prevent denial of service attacks upon the access to the console. Without DTR a caller can simply hold the modem line open, denying system administrators access to the console. The RS-232 Data Carrier Detect signal is lowered when the user hangs up. Using a modem cable that has DCD wired and a modem that is configured to assert DCD is essential to prevent people dialling in after a user has hang up and from carrying on their session. Without DCD the session is not cleared when an accidental disconnection occurs. This allows any subsequent caller to resume the previous session. The machine is totally compromised if the previous user was root. 9.3. Use or configure a dumb modemMost modems use the Hayes AT command set. The modem's attention is gained by sending +++ surrounded by some idle time. Commands are then sent prefixed by AT. Unfortunately, if the modem sees +++ during a call it may revert to command mode. The modem can then be configured by the caller. For example, the modem could be set to permit incoming calls only from the number "0", this would deny the system administrators access to the modem. The attention command can be removed using AT S2=255. Of course once that is done no more AT commands can be given to the modem, so any other configuration of the modem needs to be done prior to that command. Unfortunately, when power to the modem is applied the modem starts in command mode. So a carefully chosen console message could disable the modem. The best solution is to select a modem that has a "dumb" or "select profile" DIP switch or jumper. These switches disable command mode and load the modem's saved configuration when they start. 9.4. Restrict console messages9.4.1. Restrict console messages from the system logGenerating a stready stream of console messages can easily overwhelm a 9600bps link. Although displaying all syslog messages on the console appears to be a good idea, this actually provides the unprivileged user a simple method to deny effective use of the remote console. Configure system log messages to the console to the bare minimum. Look in /etc/syslog.conf for lines ending with /dev/console. Consider sending all log messages to another machine for recording and analysis. Figure 9-2 shows the standard /etc/syslog.conf from Red Hat Linux 7.2 modified to record log messages to a log server. Each line of syslog.conf has been repeated to send a copy of the message to the log server. The log server has the DNS alias loghost.example.edu.au; using a DNS alias allows the log server to be moved without updating the configuration of all the remote machines. The local copy of the log message is no longer the only means of determining the cause of a system failure, so we can gain some performance advantage by disabling synchronous file writes, although this increases the odds of an inconsistent filesystem (an issue with filesystems that do not do journalling). Placing a - before the filename disables synchronous file writes. Figure 9-2. /etc/syslog.conf modified to copy log messages to a log server
A log server is configured using the standard /etc/syslog.conf configured to allow the reception of remote syslog messages. This configuration for Red Hat Linux is shown in Figure 9-3. In addition to configuring the system log daemon, also prevent denial of service attacks by configuring IP Tables to restrict the sources of the syslog messages; and also improve performance by checking that nscd is running to cache reverse DNS lookups. Figure 9-3. Allowing remote log messages by setting options in /etc/sysconfig/syslog
Figure 9-4. Restrict syslog messages to remote.example.edu.au
9.4.2. Restrict broadcast messages to the consoleUsers that are logged into the serial console should not accept broadcast messages. Add new files to /etc/profile.d to do this. Figure 9-6 shows a file for use by the Bourne shell. Figure 9-6. Restrict sending of messages to console user
As this file is run frequently, we use a faster but less readable version of Figure 9-6, shown in Figure 9-7. Figure 9-7. Restrict sending of messages to console user, /etc/profile.d/mesg.sh
We also need a C shell version, shown in Figure 9-8. Figure 9-8. Restrict sending of messages to console user, /etc/profile.d/mesg.csh
Although mesg.sh and mesg.csh are included by the parent shell rather than executed, the files need the execute permission set. The procedure in Figure 9-9 installs the files and sets the permissions. 9.5. Modem features to restrict usageMost modems support the addition of a password. This is not particularly useful as it has the same strengths and weaknesses of all other password authentication schemes. We already have password authentication in the BIOS, in the boot loader and in login. Many modems support call-back. The modem is called and a few seconds after hang-up it calls a pre-configured number. This limits the locations that can gain access to the console. Many modems support checking the calling line identification (CLI) against a predefined list. If the calling number is not on the list then the call is cleared. The phone line to the modem must be configured to send CLI, this may incur an additional charge from the phone company. Not all calling phones can send CLI and some valid callers may have asked their phone company to suppress the sending of CLI. Many modems can be configured to log the calling line identification. This is useful when tracing misuse. Many modems support encryption. Some modems allow multiple keys. This gives a neat solution: only authorized modems can dial in, but they can do so from any location. The modems usually need to be of the same make, and perhaps of the same model.
Many telephone services or PBX lines can be set to allow only incoming calls. This is useful as it prevents misuse of the modem should the computer be compromised. A "demon dialler" can call many numbers seeking an answering modem and the cost of these calls can be significant. 9.6. BIOS featuresMost BIOSs can be configured with a "configuration password". This should set and tested. Some motherboards will require a jumper to be set to allow the password to take effect. Some BIOSs have well-known "master passwords", use a search engine to ensure that your BIOS is not one of these. The password should not be the same as the boot loader or root passwords. The BIOS configuration will have a "boot order" setting. It should be set to boot from the hard disk before any other media. This prevents someone inserting a rescue diskette, booting the machine, and gaining access to the filesystems as root. 9.7. Use a boot loader passwordConfigure the boot loader to request a password when booting a non-default image or when supplying parameters from the command line. This prevents someone from dialing in during the boot sequence and booting the kernel with options to take control of the machine, as in Example 4-1. The password should not be the same as the BIOS or root passwords. 9.8. Non-interactive boot sequenceRed Hat Linux has an "interactive boot" option that can be used to prevent services from being started. This may not be pleasant if the purpose of the machine is web serving and the HTTP daemon is interactively prevented from starting by an unauthenticated person. Edit /etc/sysconfig/init to contain the line 9.9. Magic SysRq keyThe "magic SysRq key" is a key sequence that allows some basic commands to be passed directly to the kernel. Kernel software developers use this interface to debug their software. Under most circumstances it can also be used to uncleanly reboot the computer, something that is otherwise difficult or expensive to do remotely. For computers that are not used for kernel software development the magic SysRq key makes an ideal denial of service device. A few unauthenticated keystrokes and the computer is dead in the water. The console, serial or otherwise, must be in an area with access limited to trusted people. The serial console uses the RS-232 break function as the "magic SysRq key". A "break" is a period of no transmission on the serial line, on traditional terminals it is activated by pressing a key labeled Break. Anyone can dial into a modem and send a break, so if the serial console is attached to a modem we need to disable the magic SysRq key . If the serial console is attached to a terminal server which asks for authentication, or is attached directly to another terminal using a null modem cable then you may decide to activate the magic SysRq key. The magic SysRq key can be disabled by setting a kernel variable or by not compiling support for the key. Writing a 0 into /proc/sys/kernel/sysrq will disable the magic SysRq key. The command sysctl can also be used: Your Linux distribution may have a file /etc/sysctl.conf which is used to run sysctl during the boot of the machine. Add the lines: Figure 9-11. Configuring /etc/sysctl.conf to defeat the magic SysRq key
Even when setting the magic SysRq key off in /etc/sysctl.conf there is a period of vulnerability after the kernel boots but before contents of the file are applied. It is much better to compile your own kernel and set the following configuration parameter: Figure 9-12. Kernel make menuconfig showing disabled SysRq key
This should place the following configuration parameter in /usr/src/linux/.config. 9.10. Adjust behaviour of Ctrl-Alt-DeleteThe IBM PC used Ctrl-Alt-Delete to launch a reboot of the computer. Linux traps this key chord and makes it available to the init system. This is done by sending the init process a SIGINT signal (although ctrlaltdel hard can undo this trap and make the key chord reboot the comptuer immediately). The init system uses /etc/inittab to determine how to handle the signal generated by the Ctrl-Alt-Delete key chord. Most distributions cleanly reboot the system, mimicing the behaviour that most users expect. Figure 9-14 shows how this is done. Figure 9-14. Default handling of Ctrl-Alt-Delete in /etc/inittab
Depending upon each individual site you may wish to disable Ctrl-Alt-Delete. This is shown in Figure 9-15. Figure 9-15. Ignoring Ctrl-Alt-Delete in /etc/inittab
Alternatively, you may wish to cleanly shut down the computer. This is very easy to explain to operators and instructions can be displayed on the monitor using /etc/issue or a Post-it Note. If the computer uses Advanced Power Management (or APM) then shutting down the computer will also remove the power. 9.11. Log attempted accessLook in the system logs for the output of getty. Add the monitoring of these messages to your log-watching procedures. 9.12. Countering interception of telephony linksModems calls over telephones can be intercepted. This can be an issue if you do not trust a telecommunications carrier in your call's path, or if you do not trust the law enforcement agencies that may request interception facilities from that carrier. International calls are particularly exposed. Calls which are routed across satellite or wireless links can be intercepted by readily-available radio receivers. Calls routed across undersea links are much more expensive to intercept, so this is probably limited to national governments, such as those using the Echelon system. If you do not pass sensitive data over the link, then the major exposure is typing in your user name and password. Look into S/KEY or look into OPIE and its related An OPIE for PAM. These one-time password systems have flaws, a good summary of these is Vulnerabilities in the S/KEY one time password system by Peiter ‘mudge’ Zatko. Chapter 10. Configuring a kernel to support serial consoleMost Linux kernels shipped by distributors are configured to allow the serial console to be enabled. However system administrators will almost certainly encounter some problems best solved by recompiling a kernel. In these cases configure the kernel to support the serial console. The usual virtual terminal console is also configured, as we normally want console messages to go a monitor as well as the serial port. 10.1. Linux kernel version 2.5Kernel version 2.5 is under active development, so this section may be out of date. Version 2.5 includes support for the console to a serial port attached to a USB dongle. The -dj patch to the version 2.5 kernel has a rewritten console layer; it is not known if the rewritten layer effects the user-space use of the serial console. When configuring the kernel set the following configuration parameters: Figure 10-1. Kernel configuration for serial console using make menuconfig
This should set the following configuration parameters in /usr/src/linux/.config. Figure 10-2. Kernel configuration for serial console using .config
If you also want to use a serial port attached to a USB bus, then in addition to the usual USB configuration, configure the kernel to load the USB console driver and one of the USB serial dongles (our example uses the generic serial dongle). Figure 10-3. Kernel configuration for USB dongle serial console using make menuconfig
This should set the following configuration parameters in /usr/src/linux/.config Figure 10-4. Kernel configuration for USB dongle serial console using .config
You should also configure the kernel without the magic SysRq key, as described in Section 9.9. 10.2. Linux kernel version 2.4When configuring the kernel set the following configuration parameters: Figure 10-5. Kernel configuration for serial console using make menuconfig
This should set the following configuration parameters in /usr/src/linux/.config. Figure 10-6. Kernel configuration for serial console using .config
You should also configure the kernel without the magic SysRq key, as described in Section 9.9. 10.3. Linux kernel version 2.2The later Linux 2.2 kernels use the same build parameters and parameter syntax as the Linux version 2.4 kernels. For earlier kernels see the article by Francesco Conti in issue 36 of Linux Journal published in April 1997. This article included some patches for the kernel, which have been extended in the notes below to use a broader range of serial port speeds. Choose to use the serial console by adding a couple of #defines at the start of /usr/src/linux/drivers/char/console.c: Alternatively, to use ttyS1 use these lines: The kernel assumes a serial link speed of 9600bps. If you are using a differing bit rate then find these two lines: and change 0x0c to one of the values in Table 10-1. Chapter 11. Serial cabling11.1. JargonRS-232 cables were originally intended to link terminals to modems. The terminal is formally named a Data Terminal Equipment, abbreviated to DTE. The modem is formally named a Data Communications Equipment, abbreviated to DCE. A standard RS-232 cable has a 25-pin D-type socket, which connects to the DTE, and a 25-pin D-type plug, which connects to the DCE. All 25 pins are connected, with pin 1 on the plug wired to pin 1 on the socket, pin 2 on the plug wired to pin 2 on the socket, and so on. The shielding of the cable is attached to the metallic cover on the socket. RS-232 signaling is much more robust than the signalling of many other communications standards. Pins can be shorted, not connected or drive more than one output. Signals are named from the point of view of the Data Terminal Equipment. So Transmit Data on the DTE is connected to Transmit Data on the DCE. The Transmit Data pin on the DTE actually transmits data, whereas Transmit Data pin on the DCE actually recieves data. 11.2. Cable from console port to modemThe RS-232 standard defines the interconnection of computers and modems, so there is little to go wrong here by simply purchasing a pre-assembled cable. There are two types of cable: cables with connectors for a standard 25-pin D connector on the computer; and cables with connectors for a proprietary 9-pin D connector used on the IBM PC/AT and many other computers. The cables have titles like RS-232 25-pin computer (DTE) to 25-pin modem (DCE) or RS-232 9-pin IBM PC/AT computer (DTE) to 25-pin modem (DCE). Most modems are packaged with a suitable cable. If you need to manufacture your own cables, see the Serial-HOWTO for the RS-232 pinout for your computer. Connect Transmit Data on the computer to Transmit Data on the modem, Receive Data on the computer to Receive Data on the modem, and so on for Signal Ground, Clear to Send, Ready to Send, Data Set Ready, Data Terminal Ready and Data Carrier Detect. For professional computer room installations consider routing the serial cable through an RJ-45 patch panel. There are two common pinouts on used on the RJ-45 connector: Yost and Cisco 2500-series. If you create your own pinout for unshielded twisted pair cable then be sure that your pinout twists a Signal Ground wire with the Transmit Data wire and another Signal Ground wire with the Receive Data wire. Although the RS-232 signals are not balanced, this twist will result in the least amount of signal degradation and noise pickup. 11.3. Cable from console port to terminal (or another PC)The RS-232 standard allows for, but does not specify, the interconnection of two computers without intervening modems. A special cable is required, called a "null modem" cable. The wiring within the null modem cable depends upon the handshaking and control signals that are needed. Differing manufacturers have differing views on this topic, so don't buy a null modem cable that does not come with a wiring diagram. Linux needs all of the flow control and modem control signals to be correctly wired. The correct wiring of a null modem cable is shown in Figure 11-1 with an alternative shown in Figure 11-2. Linux uses CTS and RTS to do handshaking, preventing the computer from overrunning the terminal and preventing the terminal from overrunning the computer. If you are connecting two computers together, then you will not get reliable file transfers without CTS/RTS handshaking. Linux uses DSR and DCD to sense that a terminal is connected. It will then request a login. If a session is established and DCD falls then Linux will log out the user. Linux uses DTR to force the link to be cleared. It does this after a user logs off to free up the communications channel. Either of the null modem designs in Figure 11-1 or Figure 11-2 meets the requirements of the Linux kernel. Figure 11-2 may be marginally better when both computers are remotely located, as the differing states of DSR and DCD can be used to determine which end of the null modem cable has become faulty. All null modem designs have a common flaw. Computers interconnected with real modems modem will drop Data Set Ready for some time after the local modem is reset by the local computer dropping Data Terminal Ready. Most software is designed to accomodate this slight difference between modem links and null modem links. Major security exposures and significant loss of reliability can occur with incorrectly wired null modem cables, including the cables in Figure 11-3, Figure 11-4 and Figure 11-5. Figure 11-1. Null modem cable with full status and handshaking
Figure 11-2. Variation on null modem cable with full status and handshaking
Unfortunately not all Linux boot loaders support the control signals required by the Linux operating system. This odd state of affairs may force you to do away with control signals and handshaking if you need to issue commands to the boot loader. There are two ways of defeating the RS-232 handshaking: software and hardware. If you have a modem then by far the best technique is to disable the control signals and handshaking by using AT commands to configure the modem's software. This allows the handshaking to be restored when the boot loader authors correct their support for serial connections. For a null modem cable the best approach is to disable handshaking in your terminal emulation software. In the worst case for a null modem you will need a cable that falsifies the handshaking and control signals. Try not to use these cables in a production environment. Figure 11-3. Null modem cable with falsified status and handshaking
If you are happy with a quick hack, perhaps just to use a serial console to grab a kernel oops message, then you can configure some getty programs to ignore the RS-232 status signals. For example, mgetty has the direct option in mgetty.conf. In this case only a three-wire or two-wire RS-232 null modem cable is needed. Figure 11-4. Null modem cable with no status or handshaking
Figure 11-5. One-way null modem cable with no status or handshaking
Don't use these cables in a production environment. 11.4. Lengths of serial cablesThe RS-232 standard 9600bps port will drive 15 metres of shielded cable. More precisely, an RS-232 line driver will operate against a capacitance of up to 2500 picoFarad with low enough skew to allow a 9600bps signal to be recovered. If you select a cable with lower capacitance you can drive further distances. For example, ANSI/TIA/EIA-568-A unshielded twisted pair category 5 cable has a maximum capacitiance of 55pF per metre, so this popular "UTP cat 5" cable can be safely driven up to 45m. Beyond that you should check the cable manufacturers specifications for the actual "shunt capacitance" (a common figure is 47.5 pF/m, giving a maximum cable length of about 50m). However long runs of unshielded cable will pick up noise easily, as the RS-232 signals are not balanced. Some cable manufacturers offer shielded low capacitance cables which can be driven up to 100m. Similarly, if you select a lower data rate you can drive further distances. Table 11-1 shows the maximum distances over standard shielded cable at differing data rates. Table 11-1. Data rates and the maximum distances recommended in RS-232
If you are comfortable in working beyond specifications then you might note that the experience of enterprise network operators has been that structured cabling layout in buildings is limited by the 100m distance limitation of fast ethernet over category 5 cable, not by the practical distances achieved by RS-232 asynchronous signals at 9600bps over category 5 cable. For longer distances use an RS-232 line driver; these will typically drive up to 2000 meters over category 3 UTP cable. For greater distances consider using fiber optical modems, the global telephony system, the mobile telephony system, satellite or radio. 11.5. Making serial cablesIf you use a serial console for densely-racked computers you will end up making a lot of null-modem serial cables. This section has some hints on making serial cables. If you are making more than ten cables and live in a city you will probably find it economic to have the cables made by a specialty cabling firm. Attempt to minimise noise in your cabling design. Many BIOSs and boot loaders will wait forever if they receive a single character of line noise. You might choose to use shielded UTP cables (these require special RJ-45 plugs but use standard RJ-45 sockets). If the environment has a lot of radio frequency noise then use traditional shielded cable and metal RS-232 connector shells. Connect the shield in the cable to the computer at one end. This can be done by connecting the drain wire of the shield it to the Protective Ground (if present) or by soldering the drain wire to the shell of the connector. If there is a substantial amount of noise also place a ferrite core over the shielded cable at both ends of the cable. Follow the usual good practices of making the cable to the correct length and screwing home the D connectors into the chassis. If you are making one of these cables and have some soldering skill, you can easily do the jumpering of the signal wires within the backshell of the DB9 or DB25 connector. If you are making a large number of cables then crimping systems are much faster than soldering. Again, pin jumpering can be done within the backshell. No matter what system is adopted, use the Resistance setting of a multimeter to check for dead and shorted pins. A minute here can save hours later. For structured cabling systems, space is tight within DB9/RJ-45 backshells, so the jumpering is better done behind the patch panel. The DB9/RJ-45 connectors present the IBM PC pinout at the DB9 connector and present the Yost or Cisco pinout at the RJ-45 connector. Chapter 12. Modem configuration12.1. Using Minicom to give commands to a modemMinicom is a full-screen serial terminal emulation package, very much like the classic Telix terminal emulator for MS-DOS. Firstly, start Minicom in configuration mode with the command: The following menu appears:
Select Serial port setup and set
Now save the configuration and exit Minicom. To configure a modem use the command minicom -o console to start Minicom without sending an initialization string to the modem. Now issue the AT commands to configure the modem. When finished use the Quit option to leave Minicom without sending a reset string to the modem; this option is Alt-Q. Sometimes Minicom will use Ctrl-A rather than Alt to access the menu system, look for a hint in Minicom's start up message: 12.2. Configure dumb modemLinux, like most UNIX-like operating systems, expects a serial console to be connected to a dumb modem. Dumb modems are not seen much these days, perhaps only on exotic hardware such as ISDN terminal adapters or satellite ground terminals. A dumb modem is configured using hardware. Figure 12-1 shows the front panel of a fanciful dumb modem. In reality the speed and mode settings are likely to be done using jumpers or DIP switches. Figure 12-1. Front panel of a dumb modem
The modem's speed is set to the desired bit rate, in our case 9600bps. The modem's mode is set to Answer, that is, to wait for incoming calls and to answer them. If the RS-232 control line Data Terminal Ready is low, the modem will not answer a call. The computer is off or the computer's serial interface is not yet initialized. Once DTR is high the modem will answer incoming calls. Once an incoming call is established the modem raises the Data Carrier Detect control line. Only when DCD is high is received data valid (data receieved from a dumb modem when DCD is not asserted is probably line noise). Only when DCD is high is transmitted data passed through the link. getty on the Linux computer has been waiting for DCD to come high, and getty welcomes the user and requests them to log in. Whilst the user is logged in and data is flowing, Clear to Send and Ready to Send are used between the modem and the computer to prevent data being sent too soon. The computer lowers Ready to Send when it is too busy to receive a character. The modem lowers Clear to Send when it is too busy to receive a character. When the user hangs up, Data Carrier Detect falls and the hang up signal is sent to all processes associated with the dial in session. Alternatively, the user can log out. When the shell dies, the computer pulls Data Terminal Ready low, causing the modem to hang up. When the getty brings Data Terminal Ready high again, the modem will accept more incoming calls. We have not yet described Data Set Ready. This line is low if the modem is off or if the modem has not yet initialized. When DSR is low all other signals from the modem are undefined. For example, if DSR is low but DCD "floats" to the high voltage then software should behave as if DCD is not asserted. 12.3. Configure modem with AT commandsMost modems today are smart modems based upon the Hayes modems and their command sets. But as discussed above, the Linux serial console is designed to operate with a dumb modem. Thus the smart modem is dumbed-down until it resembles a dumb modem. Some expensive modems will have a DIP switch or board jumper to put them into dumb mode. It is essential to have a manual for the modem which describes that modem's AT commands. Although most modems agree on the more popular AT commands, they differ in the more technical commands. 12.3.1. Configure port speedHayes AT-style modems can maintain a static speed between the computer and the modem, no matter what speed the dialing modem uses. For most modems this is set automatically based upon the speed of the first characters sent after power-on. Power cycle the modem and connect to it with the command minicom -o console. Press Enter a few times. The modem should now be running at the same bit rate used by Minicom, which we set to the speed of the serial console in Section 12.1. You can check the port speed by asking the modem to generate some output. Figure 12-2. Testing the modem's port speed
Some modems have an AT command to re-establish the port speed, look in your modem's manual for the AT&B1 command. Some modems have a command to explicitly set the port speed, look in you modem's manual for the ATB command. 12.3.2. Configure answer modeThe modem will answer an incoming call on the second ring using the command ATS0=2. Don't answer the phone on the first ring as this may invalidate the certification of the modem in some telephony jurisdictions. 12.3.3. Configure CTS/RTS handshakingCTS/RTS handshaking prevents lost characters. The AT command is AT&K3. 12.3.4. Configure Data Carrier DetectData Carrier Detect should follow the presence or absence of a calling modem. The AT command is AT&C1. 12.3.5. Configure Data Terminal ReadyData Terminal Ready should control the modem. If DTR is high the modem is ready to receive calls. If DTR is low the modem should not receive any more calls and should hang up any existing call. The AT command is AT&D2. 12.3.6. Configure no CONNECT messagesA Hayes AT-style modem usually outputs a message when a call is received. For example: The modem has a "quiet mode" that disables these messages. The AT command is ATQ1. There will be no OK printed in response to this command. 12.3.7. Configure no echo of commandsEchoing commands can confuse the console, so turn off command echoing. The AT command is ATE0. 12.3.8. Optionally, configure silent connectionMost modems have a speaker. By default this is connected whilst a modem is connecting and negotiating a common protocol and speed. This is very useful for a dialing modem, as it prevents a human being accidentally repeatedly called. The speaker can be annoying on answering modems. If a quieter computer room is desirable, use the ATM0 command to turn off the speaker. 12.3.9. Optionally, configure DTR delayData Terminal Ready drops when the semiconductor that supports the RS-232 link is reset. This then hangs up the modem. This can be annoying. If the getty supports a parameter similar to mgetty's toggle-dtr-waittime then it is possible to extend the time that the modem will ignore DTR. The time that getty holds DTR low to force a hang up is extended beyond the modem's setting. The result is that resetting the semiconductor does not hang up the modem, but getty can still hang up the modem at the end of a login session. Check your modem's documentation. Our example modem uses S-register 25 to contain the threshold for noticing a change in DTR. The value is in one-hundreds of a second. By setting the modem with ATS25=150 (1.5 seconds) and setting mgetty with toggle-dtr-waittime 2000 (2 seconds) we ignore small blips in DTR. 12.3.10. Configure no attention sequenceOnce the modem is correctly configured and works well, disable the +++ sequence that gives access to the modem's command mode. The AT command is ATS2=255. If this command is accidentally given see Section 12.3.12 to reset the modem to its factory default parameters and start again. 12.3.12. Resetting the modemIf you need to issue more AT commands to the modem then power cycle the modem. This should place the modem into command mode. Now issue the following commands to restore the modem's factory configuration. Figure 12-4. Resetting a Hayes AT-style modem
If this fails then you will need to clear the modem's configuration memory. The procedure for this varies by manufacturer, and probably requires the disassembly of the modem. 12.4. Internal modemsAn internal modem is basically an external modem and serial port mounted upon a PC bus card. These are cheaper than external modems as they do not require a power supply or a chassis. Internal modems work fine for remote serial console applications. They are especially attractive for computers at co-location sites, as those sites charge according to space and power consumption. Check that your internal modem preserves its setting across a power cycle. Ensure that the interrupt line and port address space used by the internal modem's serial port do not conflict with that used by any other pre-existing serial ports. Alternatively, ensure that the internal serial port can be disabled, freeing its interrupt line and port address space for use by the internal modem. Be careful not to confuse an internal modem with a WinModem. An internal modem does not need a special device driver, but appears to Linux as a stardard serial port. 12.5. WinModemsIf you look at a modem, with it's small central processing unit and special-purpose digital signal processor, and then look at a modern PC, with it's large CPU and general-purpose DSP on the sound card, you may wonder if the hardware duplication of an external modem is necessary. A "WinModem" incorporates the CPU and DSP of the modem into the slightly-enhanced fabric of a PC. They are called "WinModems" because they originally only shipped with Microsoft Windows device drivers. These device drivers presented the illusion of a serial port attached to a Hayes AT-style modem. For a long time only Windows versions of these drivers where available. Some manufacturers now provide Linux versions of their device drivers as well, these modems are jokingly called "LinModems". It is probably possible to use a LinModem as a Linux console. At the most this would require altering the source code to dumb-down the AT command emulation of the modem and recompiling the kernel. Boot loaders, however, work in a very confined software environment and struggle to support a simple serial chip. Considering that some boot loaders do not even handle interrupts, handling the complex DSP of a LinModem is well beyond what is practical. Appendix A. Bugs and annoyancesA.1. Flow control in Linux kernelThe Linux kernel can be asked to do CTS/RTS flow control using the r option on the console= parameter. For example, a serial link at 9600bps with 8 data bits, no parity and CTS/RTS flow control is configured as shown in Figure A-1. Because the Linux kernel only ever sends data, CTS/RTS flow control is implemented by checking that Clear to Send is not asserted. The code which does is found in /usr/src/linux/drivers/char/serial.c, the relevant portion can be seen in Figure A-2. Figure A-2. Kernel source code for console CTS/RTS flow control
The loop driven by the tmout value of 1000000 results in a wait of about one second for the CTS line to become asserted. This code ignores the status of the RS-232 Data Set Ready and Data Carrier Detect status lines. This has a number of consequences.
As a result of these bugs this HOWTO no longer recommends the use of kernel-level flow control. The author has a kernel patch which fixes all current-reported bugs and is attempting to get that patch integrated into the mainline kernel. Once the kernel bugs are corrected this HOWTO will once again recommend kernel-level flow control. A.2. Red Hat Linux 7.1 and SysVinitThe System V init system shipped with Red Hat Linux 7.1 does not support serial console correctly in single user mode. See Red Hat advisory RHBA-2001:085-02 New SysVinit package to fix hangs on serial console. The advisory announces an update to the package SysVinit-2.78-15.i386.rpm that is shipped on the Red Hat Linux 7.1 CD. A.3. BIOSs, keyboards and video cardsSome BIOSs will not boot if the keyboard is not installed. Most BIOSs have settings that will allow them to boot without a keybaord. Some odd BIOSs will not boot if no video card is installed. A.4. Modem hangs up upon rebootDuring reboot the serial controller is reset. This drops the modem control line Data Terminal Ready. This in turn instructs the modem to hang up. Avoid the temptation to configure the modem to ignore DTR. This leads to a worse bug, where the telephone line does not clear down correctly, the modem is engaged, and there is no way to clear it. Ignoring DTR also gives no way to clear hostile callers from the line. You may wish to record the amount of time that the computer takes from Restarting system to the boot loader prompt. The modem may also hang up during the boot process (as the serial chip is reset) or when the init run level is changed (as getty is restarted). A.5. init and syslog output does not display on secondary consolesThe kernel can be configured to output messages to the serial port and to the attached monitor. However messages from init and syslog only appear on the last-listed console device, in our case the serial port. This can confuse someone looking at the attached monitor, as the messages on the monitor suggest that the machine has hung just before starting init. Eventually the machine will finish booting and getty will display a login: request. A Post-it Note on the monitor may reassure the impatient. A.6. The console is unresponsive after connectingThe terminal's screen may be blank after connecting to the machine. Pressing Enter will usually bring up a login: request. If no characters appear upon the screen after pressing Enter do not panic. The machine must have power and the operating system must have booted: for our call to be answered by the modem Data Terminal Ready must be active. The most likely thing is that the machine booted and is running a fsck filesystem check. These checks can take some considerable time, all with no or very little output. It will help your peace of mind considerably to record in the system log book the time fsck takes to check each filesystem. If you see garbled text after pressing Enter then there are mismatched bit rates or parity parameters. Correct your terminal emulator's configuration. A.7. Modem hangs up during initializationUsing setserial will reset the serial port. This will hang up the modem. setserial is sometimes used during the boot process, resulting in the output seen in Figure A-3. Look into the file /etc/rc.serial and remove any references to the port which is being used as the serial console. A.8. Boot loader has no flow controlMost boot loaders do not support CTS/RTS flow control. This can cause some data loss where large speed mis-matches exist, as is often the case with a modern modem connected into a 9600bps fixed-speed port. SYSLINUX 1.66 supports flow control. A.9. Boot loaders are vulnerable to line noiseMost boot loaders will sit at their prompt forever after receiving a single character of line noise. Some modems will let the RS-232 signals "float", sending noise when there is no caller. Because the modem is not asserting Data Carrier Detect it expects the receiver to discard the noise characters. The combination of an unfortunate boot loader with an unfortunate modem can result in a machine that will regularly hang during booting. If you cannot configure your boot loader to obey DCD then be careful to test any modem you intend to purchase to ensure that it does not generate characters when their is no caller. At the present only SYSLINUX implements full RS-232 status signals. A.10. Advanced Power ManagementAPM allows control of the power from software. This can be a blessing and a curse. The blessing is that the machine can be cleanly and totally shut down remotely. You may want to do this if the remote site is maintaining their power supply. The curse is that once powered down the machine will not start up again until the Power button is physically pressed. Some machines have a BIOS or motherboard setting to defeat this unhelpful behaviour.
If you are serious about remote site computing then you should investigate remote power switches from companies like Western Telematic, Server Technology and many others. Some models include built-in terminal servers, built-in modems and RS-232 lines to simulate a UPS input power failure (and thus shut the Linux system down cleanly before removing power). A.11. Modems and overseas telecommunications requirementsThere is no world-wide approval processes to certify that a modem is suitable for connection to the telephone network. This is despite the presence of a common set of technical standards that modems must meet for use on the global switched telephone network. There is little or no recognition of one nation's approvals by other national regulators. There are national technical requirements concerning the use of modems. Common requirements are to set the modem and its software to answer after the second ring and never to dial the same engaged or faulty number more than five times in a row.
Privacy laws may control what can be done with calling line identification records. Do not assume that Touch Tone dialling is globally available. There is no common standard for decadic dialling: some countries have the longest sequence for zero, other countries have the shortest sequence for zero. There is little coordination of national numbering plans. Be careful not to call a national emergency services number when intending to dial the international access code. Common emergency services numbers are: 112, 911, 000. International access codes vary by country. Intelligent network features such as toll-free numbers are usually not available to calls originating from abroad. International calls may be routed through fiber optical submarine cable, satelite or High Frequency radio. The possible bit rates vary considerably between these options. Expect the maximum throughput with no errors from fiber optical submarine cable. Expect 1200bps to 2400bps with some errors from satelite. Expect 75bps to 300bps with many errors from HF radio. There will be considerable latency depending upon the distance. If the latency becomes greater than the modem's error correction window then you will get better Zmodem file transfer performance if you disable the HDLC-based error correction in the modems. International calls may have their signal altered considerably. Traditionally, international calls are placed through analogue conditioning circuits to minimise echo. This conditioning limits the maximum bit rate a modem can achieve, probably to less than 9600bps. You may be able to program a guard tone to disable analogue conditioning, this will vary by carrier and the commands to send the guard tone vary by modem. On some modern international circuits, particularly those accessed by international calling cards, digital voice compression is used. No reliable modem connection can be established over these digitally-compressed circuits. The best current tactic for identifying these digitally compressed circuits is to listen to the background noise — when no-one is speaking the real background noise will be replaced by a synthesized background noise (a compression technique called silence suppression). Appendix B. Uploading files from a serial consoleThere are many scenarios where the machine is dead in the water and you need to upload a file to correct that. In many of these scenarios the only way to upload the file is via the serial port being used as the console. Moving files about over serial links has a long history in microcomputing and this section goes back in time to uncover the tools commonly used in the pre-Internet age of the Bulletin Board System. B.1. Disable logging to consoleBefore attempting to upload or download files it is a good idea to prevent messages from appearing on the console. These messages will corrupt files moved using cat and will cause Xmodem and similar protocols to take much, much longer. Alter your system's configuration to give klogd the -c 1 parameter, inhibiting the display of kernel messages directly to the console. Kernel messages will still go to the system logger. Figure B-1. Supressing kernel messages to the console in Red Hat Linux
Also modify the system logger's configuration not to send messages to the console. Edit /etc/syslog.conf, altering lines sending output to /dev/console. Send this output to a file instead. B.2. ASCII upload and catcat is available on every UNIX-like system. It copies the data received from the keyboard to a file. Minicom and other terminal emulators have an "ASCII upload" facility that will send a file up the serial link as though it had been typed.
Wait for upload to complete…
Without hardware flow control ASCII upload will drop the occassional character. To upload binary files encode them into ASCII, upload them, and then decode them into binary again.
Wait for upload to complete…
You can detect transmission errors by using a checksum program such as sum, cksum or md5sum. Print the ckecksum of the file before it is sent from the local machine and after it is recieved upon the remote machine.
There are a number of checksumming programs. The sum command should be used with caution, as there are versions for BSD and System V UNIX which give differing results. cksum is the attempt by the POSIX standards developers to correct that mess: it gives the same result for the same file on all POSIX machines. If the checksums of the original and uploaded files do not match then the file will have to be uploaded again. If the link is noisy and the file is big then you may never get a successful upload. What is needed in this case is to divide the file into many small parts, upload a part, check its checksum, and if it is fine proceed to the next part. This sounds like something that should be automated. Entering from stage left is Xmodem. B.3. Xmodem, Ymodem and ZmodemXmodem sends 128 bytes and a checksum, waits for a Acknowledgment to say all is well and sends the next block. If a negative acknowledgement is received or if no ACK or NAK ever appears then the block is sent again. Xmodem is a simple protocol, as you would expect of a program written for 8-bit computers running CP/M. It has lots of inefficiencies and minor problems, such as rounding up the file size to the next 128 byte boundary. These deficiencies lead to an evolution of the protocol with revisions of Xmodem, then Ymodem and finishing with Zmodem. Zmodem is substantially faster than Xmodem and has no niggling problems. The Zmodem protocol is substantially more complex than the Xmodem protocol, but since we only seek to at most compile the code, that complexity need not concern us.
If an upload fails and you are left with rz waiting to recieve a file then typing Ctrl-X a number of times will return you to the command prompt. This also works for Xmodem's rx and Ymodem's ry. Useful Zmodem abilities are resuming failed uploads and sending multiple files in a single upload session. An implementation of Xmodem, Ymodem and Zmodem for POSIX computers is available from http://www.ohse.de/uwe/software/lrzsz.html. Red Hat Linux distribute this in the lrzsz RPM package. lrzsz is a enhanced free software branch of the public domain version of rzsz from Omen Technology. B.4. KermitKermit is a terminal emulator and file transfer program delevoped by Columbia University. It's popularity springs from the large range of computers that Kermit could be used to access, from IBM mainframes to MS-DOS PCs. A Kermit variant named G-Kermit was released under the GNU Public License. This is available in most Linux distributions. The recent Kermit and Zmodem protocols are built upon the same technologies. Zmodem has better performance in calls with high error rates. Kermit has been ported to more host platforms. Appendix C. Upgrading Red Hat Linux from a serial consoleUpgrades to Linux distributions are frequently released. A machine is not remotely manageable unless these upgrades can be installed without needing to physically touch the machine. This section examines the remote installation and remote upgrade of Red Hat Linux. Red Hat Linux can be installed over the network from a HTTP server using an install diskette. We modify this diskette to use the serial console. If we can control whether to boot from this diskette or from the hard disk then we can remotely upgrade the Red Hat Linux distribution from the serial port. If a blank diskette is placed in the drive when the machine is deployed then no on-site intervention is needed to upgrade the operating system. If you have upgrade procedures for other Linux distributions please contribute them to the HOWTO maintainer. C.1. Select boot diskThe key to a remote upgrade is to be able to boot from floppy disk to perform the upgrade, and then to reboot from the hard disk. The possibilities are:
C.2. Configure the BIOS to use the serial portMany servers allow the BIOS to be configured from the serial port, especially on systems designed for rack mounting. At the moment few machines designed to be used as desktop systems allow the BIOS to be accessed from the serial port. Refer to your vendor's documentation to set the BIOS to use the serial port. Some vendors call this feature "console redirection". Unfortunately, the meaning of this term varies by vendor. Some vendors use it to mean the redirection of the VGA output and keyboard to a remote PC using a proprietary serial protocol. This feature can only be used in conjunction with the Linux serial console if the BIOS can be instructed to disable the serial redirection after booting. As an example of the confusion, Dell uses "console redirection" when describing the Dell 2400 and the Dell 2450. The Dell 2450 BIOS can be configured from the serial port. The Dell 2400's "console redirection" is additional hardware that remotely replicates the computer's VGA monitor and keyboard. An example of a BIOS configuration is given in Figure C-1. Figure C-1. Configuring BIOS to use serial link
Many BIOSs will enter their configuration dialogs if a particular terminal key is pressed during the BIOS boot. This can be a problem if the modem link is noisy. For normal operation, set the boot order to attempt to boot from the hard disk first. C.3. Configure modem to ignore DTR and assert DCDThe computer reboots a few times during the upgrade. These reboots hang up the modem. Having to dial in a number of times during the upgrade can become annoying. Altering the modem's configuration to ignore Data Terminal Ready will cause the modem not to hang up when the computer is rebooted. To ignore DTR send the command AT&D0 to the modem. We may also wish to disconnect during the install to reduce transmission charges. Configuring the modem to hold Data Carrier Detect on will prevent any disconnection and reconnection from being apparent to the installer. Use the command AT&C0 to always hold DCD high. Apply these changes using the procedure in Section 12.3, retaining all of the other AT commands. C.4. Prepare a network install floppy disketteThe Red Hat Linux web site has a floppy diskette image for a network installation. For Red Hat Linux 7.1 the image is ftp://ftp.redhat.com/pub/redhat/linux/7.1/en/os/i386/images/bootnet.img. Install this image on a floppy disk.
Now mount the diskette and check that the installer files are present.
This floppy disk uses the SYSLINUX boot loader which was discussed in Section 4.3 and in Section 5.3. Firstly, we alter the boot loader configuration file /mnt/floppy/syslinux.cfg to use the serial port. If you are going to use the vi editor to alter this file, use the -n option to avoid writing a swap file to the floppy disk. Secondly we add a new boot option. This is modeled upon the other boot options in the file. Our variant passes the serial console parameters to the kernel, the same parameters that we pass during normal operation when using serial console. "serial" seems an appropriate name for the boot option.
text, serial and expert are parameters to the Red Hat anaconda installer. Specifying text ensures that the graphical installer does not start. Specifying serial prevents scans for possibly non-existent video hardware. You will need to run Xconfigurator manually if you do have a video card. Specifying expert allows all the configuration options to be seen, giving one floppy image that can be used for all purposes. Thirdly, we make this new configuration start automatically. As there is no-one at the site, there's no need to issue a boot: prompt. Fourthy, we write the new configuration to diskette. Check that the diskette boots. If it does not then write a new boot sector by downloading and running the most recent SYSLINUX. Finally, create a new boot image for copying to the computers to be upgraded. If you test the new boot floppy on a machine with a serial console you should briefly see SYSLINUX booting and then presenting the boot.msg file and then the Linux kernel should be loaded and run. Next the init system flashes by
before the installation application, called anaconda, is started
There does not seem to be a way to access the function keys, fortunately the user interface does not require their use. Now that the floppy has been tested, eject the disk and reboot the machine into normal operation. C.5. Prepare HTTP serverIt is best if the web server runs the version of Red Hat Linux as is being upgraded to. If it runs an earlier version, then do not rebuild the operating system on this machine and install anaconda-runtime from the later operating system. Copy the Linux distribution to a local web server using a mirroring utility like wget. Alternatively the files can be copied from the distribution CDs to the web server.
It's best to use a mirror site in place of Red Hat's FTP site used in the example above. It is very important not to gain files along the way. Delete any files generated by FTP servers, web servers and CD-ROMs.
We now need to add the latest updates to the distributed software. This is done to avoid the machine being compromised immediately following the upgrade. Adding the updates is essential for Red Hat Linux 7.1, see Section A.2. Collect together the updates RPMs from ftp://ftp.redhat.com/pub/updates/7.1/en/os/ in the subdirectories i386, i486, i586 i686, images and noarch. Merge these updates into the copy of the distribution. For each updated RPM file, remove the original RPM file then replace it with the updated RPM file. For example:
Merge the RPMs from the updates subdirectories i386, i686 and noarch into /var/www/html/redhat/linux/7.1/en/os/i386/RedHat/RPMS. Merge the files from the directory /var/www/html/redhat/updates/7.1/en/os/images into the directory /var/www/html/redhat/linux/7.1/en/os/i386/images. The file /var/www/html/redhat/linux/7.1/en/os/i386/RedHat/base/hdlist and hdlist2 contain the list of the RPMs to install. This needs to be modified to contain the names of the updated RPMs. Install the anaconda-runtime RPM on the HTTP server. This RPM should be the same version as the Red Hat Linux being upgraded to. Now create a new hdlist with the commands:
The distribution plus the updates can now be used for a network install. They cannot be used for a CD install, but that doesn't concern us. As the distribution plus the updates is different from the original distribution, we should not use the version number of the original distribution. Appending the date to which the updates have been applied seems best. C.6. Record network configurationIf the machine does not use the Dynamic Host Configuration Protocol then record the current network configuration. This is used to complete the installer's Configure TCP/IP screen. Example C-1. Displaying the Internet Protocol configuration
C.7. Record LILO configurationRecord the current value of append=, boot= and linear in /etc/lilo.conf. Example C-2. Displaying the LILO configuration
If the boot= parameter points to a hard disk then LILO is installed in the master boot record, or MBR. It can also point to a partition. If the linear parameter is present then the hard disk that is booted from uses linear block addressing, or LBA. C.8. Upgrade Red Hat distributionIn this section it all comes together. We will walk through an entire serial console upgrade, not that it differs much from a standard text mode upgrade. Configure BIOS to boot from floppy or insert the floppy disk. Now reboot the machine.
Because we have booted into expert mode, the menus differ slightly from the standard upgrade. For example, you probably don't have a driver disk.
The upgrade then continues in the usual fashion.
Select HTTP to upgrade from the web server we prepared previously.
Here we supply the network details recorded in Example C-1. If your network supports Dynamic Host Configuration Protocol or the Bootstrap Protocol then these work fine too.
Provide the name of the pre-prepared web server. Note that the response to Red Hat directory must start with a /.
The following status messages then fly by before the welcome screen appears.
Select Upgrade Existing Installation, although this procedure works fine for installations as well.
The upgrade continues. When the LILO Configuration screen appears insert the kernel parameters recorded from Example C-2. These parameters should include console=ttyS….
The upgrade continues. As installing the packages may take a few hours, you can disconnect.
If you disconnected, then when reconnecting it is best to press Tab rather than pressing Return. Pressing Return on the Bootdisk screen writes a boot disk. This will overwrite the upgrade disk. You may wish to deliberately create a boot disk if you cannot alter the BIOS parameters to boot from the hard disk, or if you cannot wait for someone to eject the floppy disk before rebooting.
When the Complete screen appears prepare to reboot into Linux. If you have a serial BIOS be prepared to alter the BIOS parameters to boot from the hard disk first. If you do not have a serial BIOS ask someone to eject the floppy disk.
C.9. Create boot disk for serial consoleOnce the upgrade has been sucessfully done create a boot floppy which has serial console support. This is most simply done by creating a boot disk, as done by the anaconda installer or as described in Section 2.1; modifying the configuration file \SYSLINUX.CFG to configure the boot loader to use the serial console, as described in Section 4.3; and finally configuring the kernel to use the serial console, as described in Section 5.3. An alternative is to create your own mkbootdisk RPM package containing a modified copy of the shell script /sbin/mkbootdisk. The \SYSLINUX.CFG file on the boot floppy is written by mkbootdisk using the code in Figure C-3. We alter this code to use the serial console; the result is shown in Figure C-4. Figure C-3. Extract from Red Hat Linux 7.2 mkbootdisk which creates SYSLINUX.CFG
Figure C-4. Altered extract from mkbootdisk, which creates a SYSLINUX.CFG that uses a serial console
Created boot floppies will now use the serial console. By far the best alternative would be the addition of parameters to mkbootdisk to allow the kernel parameters and serial port, speed and flow control to be given when the boot floppy is created. For this enhancement request see Red Hat Bugzilla entry 59351. C.10. Further referencesSometimes the kernel on the installation CD won't boot on the machine to be upgraded, or the filesystem requires modules that are not present. In this case you will need to build a new kernel and rebuild the installation disk to use the new kernel. This is documented in the RedHat7 CDs mini-HowTo. This is an informal HOWTO not available through the Linux Documentation Project. An older document that more fully describes an older Red Hat distribution build process is Burning a RedHat CD HOWTO. Appendix D. Upgrading Debian GNU/Linux from a serial consoleMake a boot disk and a root disk. Boot the boot disk with the parameter console=ttyS0,9600. Start the install program. Appendix E. Terminal server configurationTerminal servers were originally designed for connecting terminals to minicomputers. Each terminal would have an RS-232 port. The connection to the minicomputer usually used an ethernet port. Connecting terminals would be connected to a command line interface where they could select from a list of predefined machines. A Telnet session would then be started to that machine. Over time terminal servers gained more features. For example, modems could be connected. These initially allowed people to dial in to the minicomputer but grew in features until most terminal servers became routers with a great number of serial ports. As well as allowing the connection of many console to a single terminal, the terminal server can be configured with user accounts and passwords, preventing unauthenticated access to the console whilst still allowing the console to be reached from any modem. This remainder of this section lists the considerations when purchasing terminal servers and the cabling pinouts and basic software configuration needed for differing types of terminal servers. Further contributions are welcome and should be e-mailed to the maintainer of this HOWTO. E.1. Considerations when buying second-hand terminal serversInternet Service Providers have been large users of terminal servers in the past. Each modem would be connected to a terminal server port and incoming users would be permitted to send IP packets anywhere, not just to some predefined minicomputer. Manufacturers renamed the equipment to "access servers" or "modem servers" to reflect this new use. These access servers have been superseded by a new generation which allows telephone trunks to be plugged directly into the ISP's router. There are no discrete modems; the modem tones are decoded by digital signal processing chips within the router. As a result terminal servers are currently readily available on the second-hand market. When purchasing a second-hand terminal server ensure that you are also buying the rights to the software. Some companies license their software and have contract terms which state that the license cannot be resold, but has to be repurchased from the company if the terminal server changes hands. Many vendors require a current maintenance contract to obtain software updates. These maintenance agreements can be expensive, a common figure is 15% per annum of the manufacturer's retail price. You may be able to source a cheaper software updates from a third-party maintenance supplier. Many older terminal servers are no longer sold or supported by their vendors. Search the vendor's web site for "end of life". Vendor support can be a particular issue when the most-recently available software does not fit within the RAM or flash memory contraints of the terminal server you have purchased. You should check this before purchasing a seond-hand terminal server. Upgrading flash memory can be particularly difficult, as the ROM on the motherboard may also need to be replaced with one aware of the new flash memory's characteristics.[9] Third-party parts suppliers such as Kingston or MemoryX can usually provide dynamic RAM and flash memory. They cannot usually supply ROMs or static RAM. Most old terminal servers will not support Secure Shell. In this is the case accessing the terminal server by its ethernet port is a poor idea: when you login to the console you password will travel across the Internet in clear text. Either dial in to the terminal server or use a one-time password system such as the RADIUS protocol with S/KEY authentication. An alternative to using a terminal server is to use a multiport serial card in another Linux system. E.2. Cisco 2511The basic configuration for a Cisco 2511 access server is shown in Figure E-1. A similar configuration will work for other Cisco access servers. Cisco has excellent documentation at its web site; start by finding the correct Configuration guide. A current maintenance contract with Cisco or a reseller is required to download software updates. This contract also includes the provision of ROMs required for flash memory upgrades. In most jurisdictions Cisco software licenses are not transferrable, so if you purcashed the access server on the second-hand market you will need to purchase a software license from Cisco or a reseller. Figure E-1. Basic configuration for Cisco 2511 terminal server to Linux PC
There is a port of Linux to the Cisco 2500 series of routers. At the time of writing it did did not support the asycnhronous ports on the Cisco 2511. The attractiveness of running Linux instead of running Cisco's IOS is that Linux can support SSH. At the time of writing Cisco were yet to release SSH on the Cisco 2500 series of routers, although a unofficial beta version has been seen. E.3. Xyplex/iTouch MAXserver 1600A good site for information on Xyplex terminal servers is http://www.gno.org/~gdr/xyplex/. Cabling is discussed at http://www.conserver.com/consoles/xyplexcons.html. The Xyplex terminal servers are now manufacturered by iTouch Communications. A current maintenance contract with iTouch is required to download software updates. E.4. Xylogics/Bay/Nortel AnnexA good site for information on Annex terminal servers is http://www.ofb.net/~jheiss/annex/. E.5. Livingston/Lucent PortmasterFirstly configure the terminal server, as shown in Figure E-2. This figure uses the system name example, with IP address 10.1.2.3, address mask 255.255.255.0, gateway address 10.1.2.254, and DNS server address 10.1.1.1. Replace these addresses with the addresses used in your network. Figure E-2. Portmaster unit configuration
Now configure each serial port of the terminal server, as shown in Figure E-3. Figure E-3. Portmaster port configuration
To connect to serial port 0 enter the command telnet example 2000. Use the associated TCP port number to connect to telnet to the other serial devices. Appendix F. Gratuitous advice for developersF.1. Advice for boot loader authorsSerial console support in a boot loader is very useful. Thank you for supporting it. The boot loader should support the 8250A UART and its programming-compatible 82510, 16450, 16550 and 16750 descendants. The serial chip used in the IBM PC/XT, the 8250 (no A), and its 8250B descendant need not be supported. The 8250A data sheet is 82C50A CMOS Asynchronous Communications Element and is updated by Intel's errata 82510 PC Software Compatibility. The 16550 data sheet is PC16550D Universal Asynchronous Receiver/Transmitter with FIFOs. To set the serial port and serial parameters, most Linux boot loaders use a syntax modeled upon the kernel's console parameter. It would be nice to retain this consistency, since the user needs to learn the kernel syntax in any case. The default value should be 9600bps, 8 data bits, no parity, 1 stop bit and CTS/RTS flow control. This gives the maximum interoperability with the other programs that use the serial console. Please do not ignore the lower speeds, as remote serial console is at its most valuable when the computer is located three days walk up a mountain in the New Guinea highlands. It is difficult to get more than 75bps from HF radio under adverse sky conditions. Be conservative in your use of the modem status lines. Even if you are ignoring incoming status (DSR, DCD) and handshaking lines (RTS) at least assert the outgoing status (DTR) and handshaking (CTS) lines. Correctly configured modems will not receive calls with DTR low, and dropping DTR will cause the modem to hang up. Consider that the BIOS may have already initialised the UART and provide a configuration option to allow the boot loader to be informed of that. When the boot loader initialises the UART, DTR will fall and the line will hang up. In some scenarios each hang up requires the satelite circuit to be re-booked before another call can be placed. Cater for line noise. Imagine the boot loader starting and then being sent nonsensical characters every few seconds. Although this is certainly wrong, a fault in a modem is difficult to remotely diagnose and correct if the machine is left stranded at the boot loader prompt. A solution is to boot the default image upon the expiry of a timer; the boot occurring even if the user (or line noise) has started to type. For example the boot loader configuration could say:
The default should be no life timer. The timer is also useful in high availability applications: when a machine is used in environments with an planned availability of 99.999% the lifetime value should be configured to three minutes or less. Check information read from the BIOS for reasonablness. For example, if the BIOS's Extended Data Area suggests 0x000 as the address for the serial port's registers then don't try to initialise the registers. F.2. Advice for BIOS authorsThank you for adding support for remote operations to your BIOS. A few points will maximize the benefits of that support, most of them are listed in Section F.1.
Appendix G. About this HOWTOG.1. CopyrightThe first edition of this document is copyright © 2001 Mark F. Komarinski and is distributed under the terms of the Linux Documentation Project (LDP) License, see Section G.1.1. The revisions to this document for the second edition are copyright © AARNet Pty Ltd (Australian Company Number 084 540 518), 2001-2003. These parts were written by Glen Turner. He asserts his moral rights to be identified as one of the authors of this work under the Copyright Act 1968 (Commonwealth of Australia). The Australian Academic and Research Network and Glen Turner distribute these parts under the terms of the Linux Documentation Project (LDP) License, see Section G.1.1. This license meets the Debian Free Software Guidelines, so you should find this HOWTO in the Debian package doc-linux-html. G.1.1. Linux Documentation Project LicenseUnless otherwise stated, Linux HOWTO documents are copyrighted by their respective authors. Linux HOWTO documents may be reproduced and distributed in whole or in part, in any medium physical or electronic, as long as this copyright notice is retained on all copies. Commercial redistribution is allowed and encouraged; however, the author would like to be notified of any such distributions. All translations, derivative works, or aggregate works incorporating any Linux HOWTO documents must be covered under this copyright notice. That is, you may not produce a derivative work from a HOWTO and impose additional restrictions on its distribution. Exceptions to these rules may be granted under certain conditions; please contact the Linux HOWTO coordinator at the address given below. In short, we wish to promote dissemination of this information through as many channels as possible. However, we do wish to retain copyright on the HOWTO documents, and would like to be notified of any plans to redistribute the HOWTOs. If you have any questions, please contact <linux-howto@metalab.unc.edu>. G.2. DisclaimerNo liability for the contents of this documents can be accepted. Use the concepts, examples and other content at your own risk. As this is a new edition of this document, there may be errors and inaccuracies, that may of course be damaging to your system. Proceed with caution, and although this is highly unlikely, the author(s) do not take any responsibility for that. All copyrights are held by their by their respective owners, unless specifically noted otherwise. Use of a term in this document should not be regarded as affecting the validity of any trademark or service mark. Naming of particular products or brands should not be seen as endorsements. You are strongly recommended to take a backup of your system before major installation and backups at regular intervals. G.3. AcknowledgmentsThe first edition of this HOWTO was written by Mark Komarinski. It was based upon /usr/src/linux/Documentation/serial-console.txt, which was written by Miquel van Smoorenburg. The second edition of this HOWTO was written by the staff of the Australian Academic and Research Network, mainly Glen Turner and David Vu. The following people have contributed to this HOWTO. They are listed in no particular order.
G.4. Comments and correctionsThe current maintainer of this HOWTO is Glen Turner. Please send corrections, additions, comments and criticisms to <glen.turner+howto@aarnet.edu.au>. The maintainer would also appreciate e-mails from people that have sucessfully used this HOWTO to configure serial consoles on their machines. Please state the version of the HOWTO you used (see the cover page), your Linux distribution and its version, and the number of machines involved. This information allows the maintainer to show his employer sufficient public benefit for his work on this HOWTO to continue and will not be used for any other purpose. Linux is continually improving, so please send those small alterations required for the latest version of your Linux distribution. The HOWTO's maintainer is not a professional writer. If you find some parts of this HOWTO difficult to comprehend then let the maintainer know. Notes
|