The boot loader on S/390 is ``zipl''.
ZIPL is similar in
configuration and usage to
LILO, with a few exceptions. Please
take a look at ``LINUX for S/390 Device Drivers and Installation Commands''
from IBM's developerWorks web site if you want to know more about
Your system's first boot on its own power is what electrical engineers call the ``smoke test''. Select the ``Reboot the System'' menu item which will halt the system because rebooting is not supported on S/390 in this case. You then need to IPL GNU/Linux from the DASD which you selected for the root filesystem during the first steps of the installation.
Debian should boot, and you should see the same messages as when you first booted the installation system, followed by some new messages.
After booting, you will be prompted to complete the configuration of your basic
system, and then to select what additional packages you wish to install. The
application which guides you through this process is called
base-config. If you wish to re-run the
at any point after installation is complete, as root run
You will first be prompted to configure your time zone. After selecting local vs. GMT hardware clock setting, you will select a region and then a city within that region which is in the same time zone you are. When making selections in these lists, you can type a single letter to take you to the section of the list beginning with that letter.
You will next be prompted whether to install MD5 passwords. This is an alternate method of storing passwords on your system which is more secure than the standard means (called ``crypt'').
The default is ``No'', but if you do not require NIS support and are very concerned about security on this machine, you may say ``Yes''.
Unless you said ``Yes'' to MD5 passwords, the system will ask whether you want
to enable shadow passwords. This is a system in which your GNU/Linux system is
made to be a bit more secure. In a system without shadow passwords, passwords
are stored (encrypted) in a world-readable file,
This file has to be readable to anyone who can log in because it contains vital
user information, for instance, how to map between numeric user identifiers and
login names. Therefore, someone could conceivably grab your
/etc/passwd file and run a brute force attack (i.e. run an
automated test of all possible password combinations) against it to try to
If you have shadow passwords enabled, passwords are instead stored in
/etc/shadow, which is readable and writable only by root, and
readable by group shadow. Therefore, we recommend that you enable shadow
Reconfiguration of the shadow password system can be done at any time with the
shadowconfig program. After installation, see
/usr/share/doc/passwd/README.debian.gz for more information.
The root account is also called the super-user; it is a login that bypasses all security protection on your system. The root account should only be used to perform system administration, and only used for as short a time as possible.
Any password you create should contain from 6 to 8 characters, and should contain both upper- and lower-case characters, as well as punctuation characters. Take extra care when setting your root password, since it is such a powerful account. Avoid dictionary words or use of any personal information which could be guessed.
If anyone ever tells you they need your root password, be extremely wary. You should normally never give your root account out, unless you are administering a machine with more than one system administrator.
The system will ask you whether you wish to create an ordinary user account at this point. This account should be your main personal log-in. You should not use the root account for daily use or as your personal login.
Why not? Well, one reason to avoid using root's privileges is that it is very easy to do irreparable damage as root. Another reason is that you might be tricked into running a Trojan-horse program — that is a program that takes advantage of your super-user powers to compromise the security of your system behind your back. Any good book on Unix system administration will cover this topic in more detail — consider reading one if it is new to you.
Name the user account anything you like. If your name is John Smith, you might use ``smith'', ``john'', ``jsmith'' or ``js''. You will also be prompted for the full name of the user, and, like before, a password.
If at any point after installation you would like to create another account,
You need to create a user account on S/390 if you want to login over the network using telnet. The telnet server does not allow root logins in Debian's default configuration. However, you can use ssh (Secure SHell) to remotely login as root but this is not recommended.
The main means that people use to install packages on their system is via a
apt-get, from the
apt package. APT must be configured, however,
so that it knows where to retrieve packages from. The helper application which
assists in this task is called
The next step in your configuration process is to tell APT where other Debian
packages can be found. Note that you can re-run this tool at any point after
installation by running
apt-setup, or by manually editing
If you are booting from an official CD-ROM, then that CD-ROM should automatically be configured as an apt source without prompting. You will notice this because you will see the CD-ROM being scanned, and then asked if you want to configure another CD-ROM. If you have a multiple CD-ROM set — and most people will — then you should go ahead and scan each of them one by one.
For users without an official CD-ROM, you will be offered an array of choices for how Debian packages are accessed: FTP, HTTP, CD-ROM, or a local file system. For CD-ROM users, you can get to this step by specifically asking to add another source.
You should know that it's perfectly acceptable to have a number of different
APT sources, even for the same Debian archive.
automatically pick the package with the highest version number given all the
available versions. Or, for instance, if you have both an HTTP and a CD-ROM
apt-get should automatically use the local CD-ROM when
possible, and only resort to HTTP if a newer version is available there.
However, it is not a good idea to add unnecessary APT sources, since this will
tend to slow down the process of checking the network archives for new
If you plan on installing the rest of your system via the network, the most common option is to select the ``http'' source. The ``ftp'' source is also acceptable, but tends to be a little slower making connections.
Next you will be asked whether you wish to have any non-free software. That
refers to commercial software or any other software whose licensing does not
comply with the
Debian Free Software
Guidelines. It's fine to say ``Yes'', but be careful when
installing such software, because you will need to ensure that you are using
the software in compliance with its license.
The next step during the configuration of network packages sources is to tell
apt-setup which country you live in. This configures which of the
official Debian Internet mirror network you connect to. Depending on which
country you select, you will be given a list of possible machines. Its
generally fine to pick the one on the top of the list, but any of them should
If you are installing via HTTP, you will be asked to configure your proxy server. This is sometimes required by people behind firewalls, on corporate networks, etc.
Finally, your new network package source will be tested. If all goes well, you will be prompted whether you want to do it all over again with another network source.
You will next be prompted whether you wish to install packages the simple way, or the more fine-grained, advanced way. We recommend you start with the simple way, since you can always run the more advanced way at any time.
You should know that for simple installation,
merely invoking the
tasksel program. For advanced package
dselect program is being run. Either of these
can be run at any time after installation to install more packages. If you are
looking for a specific single package, after installation is complete, simply
run apt-get install package, where package
is the name of the package you are looking for.
If you chose ``simple'' installation, you will next be thrown into the Task
tasksel). This technique offers you a number of
pre-rolled software configurations offered by Debian. You could always choose,
package by package, what you want to install on your new machine. This is the
purpose of the
dselect program, described below. But this can be
a long task with around 8100 packages available in Debian!
So, you have the ability to choose tasks first, and then add on more individual packages later. These tasks loosely represent a number of different jobs or things you want to do with your computer, such as `desktop environment', `development in C', or `file server'.
For each task, you can highlight that task and select ``Task Info'' to see more information on that task. This will show you an extended description and the list of packages which will be installed for that task. A table showing approximate sizes of the various tasks for planning purposes is in Disk Space Needed for Tasks, Section 11.4.
Once you've selected your tasks, select ``Finish''. At this point,
apt-get will install the packages you've selected. Note, if you
did not select any tasks at all, any standard, important, or required priority
packages that are not yet present on your system will be installed. This
functionality is the same as running tasksel -s at the command line, and
currently involves a download of about 37M of archives. You will be shown the
number of packages to be installed, and how many kilobytes of packages, if any,
need to be downloaded.
Of the 8100 packages available in Debian, only a small minority are covered by
tasks offered in the Task Installer. To see information on more packages,
either use apt-cache search search-string for some
given search string (see the
apt-cache(8) man page), or run
dselect as described below.
If you selected ``advanced'' package selection, you'll be dropped into the
dselect program. The
Tutorial is required reading before you run
dselect allows you to select packages to be installed on
your system. You must be the super-user (root) when you run
Each package you selected with either
dselect is unpacked and then installed in turn by the
dpkg programs. If a particular program
needs more information from the user, it will prompt you during this process.
You might also want to keep an eye on the output during the process, to watch
for any installation errors (although you will be asked to acknowledge errors
which prevented a package's installation).
After you've installed packages, you'll be presented with the login prompt. Log in using the personal login and password you selected. Your system is now ready to use.
If you are a new user, you may want to explore the documentation which is already installed on your system as you start to use it. There are currently several documentation systems, work is proceeding on integrating the different types of documentation. Here are a few starting points.
Documentation accompanying programs you have installed is in
/usr/share/doc/, under a subdirectory named after the program.
For example, the APT User's Guide for using
apt to install other
programs on your system, is located in
In addition, there are some special folders within the
/usr/share/doc/ hierarchy. Linux HOWTOs are installed in .gz
/usr/share/doc/HTML/index.html contains browse-able indexes of
documentation installed by
One easy way to view these documents is to cd /usr/share/doc/, and type lynx followed by a space and a dot (the dot stands for the current directory).
You can also type info (command) or man (command) to see documentation on most commands available at the command prompt. Typing help will display help on shell commands. And typing a command followed by --help will usually display a short summary of the command's usage. If a command's results scroll past the top of the screen, type | more after the command to cause the results to pause before scrolling past the top of the screen. To see a list of all commands available which begin with a certain letter, type the letter and then two tabs.
For a more complete introduction to Debian and GNU/Linux, see
Installing Debian GNU/Linux 3.0 For S/390version 3.0.24, 18 December, 2002