Red Hat Inc. announced the official release of Red Hat Enterprise Linux (RHEL) 8 on May 7, 2019.
Red Hat Enterprise Linux 8 (RHEL 8) comes with new features and improvements as compared to the predecessor – RHEL 7. Some of the new features of RHEL 8 are as described below.
Kernel & OS
Red Hat Enterprise Linux 8.0 is based on Fedora 28 and upstream kernel 4.18. This provides users with a secure, stable and consistent foundation across hybrid cloud and Data Center deployments with tools needed to support all levels of workloads.
Storage and File systems
Stratis is the new local storage manager for RHEL 8. It provides managed file systems on top of pools of storage with additional features to the user. Stratis provides ZFS/Btrfs-style features by integrating layers Linux’s device mapper subsystem, and the XFS filesystem.
Stratis supports LUKSv2 disk encryption and Network-Bound Disk Encryption (NBDE) for more robust data security.
Pools are created from one or more storage devices, and volumes are created from a pool. The file system is created on top of a volume, hence resizing a volume automatically resize FS as well. The default file system used by Stratis is XFS.
Other notable Storage features are:
Below are the new changes in the Networking Level:
Red Hat Enterprise Linux 8 has two modes of Content distribution and will only need two repositories enabled.
Web servers, Web Tools, Web Management – Cockpit, Compilers, Languages & Databases, Software Management
Red Hat Enterprise Linux 8 includes Application Streams of multiple versions of databases, languages, compilers, and other tools available for your use.
RHEL 8 comes with Cockpit automatically installed and firewall ports required by Cockpit are automatically opened. Cockpit interface can be used to apply Policy-Based Decryption (PBD) rules to disks on managed systems.
RHEL 8 YUM package manager is now based on the DNF technology and it provides support for modular content, increased performance, and a well-designed stable API for integration with tooling. The version of RPM is 4.14.2 and it validates the whole package contents before it starts the installation.
RHEL default Desktop Environment is GNOME. The GNOME Project is supported by the GNOME Foundation. Gnome version 3.28 shipped in RHEL 8 which has automatic downloading of operating systems in Boxes. Other new features include:
Features of Wayland display server
RHEL 8 comes with support for OpenSSL 1.1.1 and TLS 1.3. This enables you to secure customer’s data with the latest standards for cryptographic protection.
RHEL 8 comes with System-wide Cryptographic Policies which helps you with the management of cryptographic compliance. No need to modify and tune specific applications.
OpenSSH has been rebased to version 7.8p1– with no support for SSH version 1 protocol, Blowfish/CAST/RC4 ciphers, hmac-ripemd160 message authentication code.
Red Hat Developer Subscriptions
Red Hat Developer members have been enjoying no-cost developer subscriptions for 3+ years now, and RHEL 8 is now automatically part of that. If your company wants developer support, there are several Red Hat Enterprise Linux Developer Subscriptions options with Red Hat support, too.
Asif Raihan May 12th, 2019
Posted In: Uncategorized
A secure environment is absolutely crucial for a virtualization server connected to the Internet. If the host is compromised, all its virtual machines are at risk and their services will be affected, learn more from these important internet safety tips and advice article.
|eRacks virtualization experts have put together a useful list of security considerations for virtualization migration planners. TIP #1. Use an open source virtualizer if possible. Open source software vulnerabilities are documented clearly, are well-known, and fixed quickly.|
|Proprietary-software bugs usually take longer to get fixed, and are even sold on black markets for illicit hacking. In fact, there are documented cases of closed source software companies purchasing security hole information of their own applications. Open source software vulnerabilities have less value on the black market, because of their shorter shelf-life.|
|TIP #2. Use open source guests wherever possible. New drivers for open source applications improve security as well as performance. Open source guests are more cooperative with the host, leaving less room for attack. Windows is inherently less secure, since a – it is closed source and updated less frequently. b – widely used and thus a big target. c – statistically has more severe vulnerabilities than open source OSes which take longer to fix.|
|TIP #3. Minimize the host footprint, making less surface area available for hackers. A small target is harder to hit than a large one. eRacks typically recommends KVM because of its small footprint, simple design, and ease of use.
The virtualization host provides services in the form of ports and packages, which should only include those required by the VMs. An effective security plan should minimize the number of open ports, narrowing the possibilities of illicit entry.
|TIP #5. Use an external physical firewall. It is also possible to use a virtualized firewall, running as a guest, but it can only protect the downstream systems, and not the host. A virtualized IP-less bridging firewall is also possible but it is more difficult to implement, and still doesn’t protect the host. The safest solution is an external firewall, such as the eRacks/TWINGUARD, a redundant 1U system, with failover, running a very secure OpenBSD.|
|TIP #6. Assess your security level, including regular port scans (Nmap), and OS fingerprinting, keeping track of any changes. A hardened system will not give out versions of running services, otherwise it would be too easy to know exactly where the vulnerabilities lie. eRacks can give you a head start by building, installing, and configuring your system for you. Your physical host server can be configured with your choice of a virtualization host, including the freely available version of VMWare or Linux-native KVM (Kernel-based Virtual Machine), as well as a large number of possible virtual operating systems and applications, including web, DNS, email, proxy and other infrastructure services.|
|virtualizer||description||complexity||level of open source|
|KVM||built into the kernel, uses the standard Linux scheduler, memory management and other services||simple, non-intrusive, very stable, easy to administrate –
KVM hypervisor about 10-12K lines of code (2007)
|released under the GNU GPL
|Xen||external hypervisor, supports both paravirtualization and full virtualization, has its own scheduler, memory manager, timer handling, and machine initialization.||specially modified kernel – has 10x more lines of code as KVM => raises the vulnerability level||released under the GNU GPL
|VMware||fully virtualizes using software techniques only, very good performance, stability.||very large and complex; more than 10x lines of code of Xen||proprietary,
player open (teaser-ware),
britta July 9th, 2008
Posted In: Uncategorized