Red Hat readies Enterprise Linux 4

Red Hat readies Enterprise Linux 4

Summary: Red Hat is taking on rivals such as Novell with the latest version of its Linux distribution for businesses

The next version of Red Hat's Enterprise Linux distribution is planned for release next month, and is likely to fully support the Linux 2.6 kernel and include various security features.

According to sources close to the company, the release is planned for 14 February to coincide with the LinuxWorld conference in Boston. A UK spokeswoman from Red Hat was unable to confirm the release date on Monday.

Red Hat has previously indicated that Red Hat Enterprise Linux 4 would be based on version 2.6 of the Linux Kernel. A beta version of the product, released in September 2004, was based on the Linux 2.6 kernel. The current version, Enterprise Linux 3, supports some features of the 2.6 kernel, but its kernel core is based on version 2.4.

Adding full support for the updated kernel should allow the operating system to run file systems of more than one terabyte and improve the performance of the input/output subsystem.

Rival Linux distributor Novell has already incorporated the 2.6 kernel into SuSE Linux Enterprise Server 9, which was released in August 2004.

Mark Cox of Red Hat security response team told ZDNet UK last summer that Red Hat Enterprise Linux 4 will also include security enhancements derived from the US National Security Agency's Security Enhanced Linux (SELinux) project.

Cox explained that SELinux "segments programs completely", so a bug in one application cannot be exploited to modify other applications. Users are responsible for setting up the policy files for each application. "You need to create the policies and configure them, which some people won't do," said Cox.

SELinux cannot provide any protection against flawed software that is running as a root user, according to information on Red Hat's Web site.

Topics: Apps, Software Development

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.


Log in or register to join the discussion
  • Strange, the article states states that SELinux can
  • That's right. The SELinux policy in RHEL4 is what they call a "targeted policy" which is designed to be less complicated to manage. Instead of having a "deny all" default policy (similar to default policies in firewalls), it's an "accept all" policy to which further restrictions are added. At least, that's my understanding. It's going to be difficult enough for SELinux newcomers to figure out, so it's probably best that they use a targeted policy since most sysadmins aren't SELinux gurus yet. One can, at least with the latest Fedora Core, switch to a strict (deny all) policy by changing just one line in a config file, so it's there if someone wants to turn on full enforcement.
  • > SELinux cannot provide any protection against flawed
    > software that is running as a root user, according to
    > information on Red Hat's Web site.

    should probably be:

    | RHEL4's default SELinux policy provides complete
    | protection for network-facing applications that
    | could be running as a root user.
    | RHEL4's default SELinux policy does not provide any
    | protection against arbitrary flawed software that is
    | running as a root user, according to information on Red
    | Hat's Web site.

    Russell Coker, :

    > The "targeted" policy which is in Fedora Core 3 and will
    > be in Red Hat Enterprise Linux 4 solves this. It restricts
    > only the daemons that are at most danger (network
    > facing daemons initially but as we progress we will add
    > other daemons to the list). This stops quite a number of
    > attack vectors while having no restrictions on users
    > who login to the system. Of course this means that
    > targeted policy doesn't prevent a local user from
    > attacking the system, but that is a trade-off that the
    > administrator can make for ease of use.