Opensuse Leap 15.1 Security Guide Opensuse Leap 15.1

Total Page:16

File Type:pdf, Size:1020Kb

Opensuse Leap 15.1 Security Guide Opensuse Leap 15.1 Security Guide openSUSE Leap 15.1 Security Guide openSUSE Leap 15.1 Introduces basic concepts of system security, covering both local and network secu- rity aspects. Shows how to use the product inherent security software like AppAr- mor or the auditing system that reliably collects information about any security-rel- evant events. Publication Date: April 21, 2020 SUSE LLC 10 Canal Park Drive Suite 200 Cambridge MA 02141 USA https://www.suse.com/documentation Copyright © 2006– 2020 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its affiliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xv Support Statement for openSUSE Leap xix • Technology Previews xx 1 Security and Confidentiality 1 1.1 Overview 1 1.2 Passwords 2 1.3 System Integrity 2 1.4 File Access 3 1.5 Networking 3 1.6 Software Vulnerabilities 4 1.7 Malware 5 1.8 Important Security Tips 6 1.9 Reporting Security Issues 6 I AUTHENTICATION 7 2 Authentication with PAM 8 2.1 What is PAM? 8 2.2 Structure of a PAM Configuration File 9 2.3 The PAM Configuration of sshd 11 2.4 Configuration of PAM Modules 14 pam_env.conf 14 • pam_mount.conf.xml 15 • limits.conf 15 2.5 Configuring PAM Using pam-config 15 2.6 Manually Configuring PAM 16 2.7 For More Information 17 iii Security Guide 3 Using NIS 18 3.1 Configuring NIS Servers 18 Configuring a NIS Master Server 18 • Configuring a NIS Slave Server 23 3.2 Configuring NIS Clients 24 4 Setting Up Authentication Clients Using YaST 26 4.1 Configuring an Authentication Client with YaST 26 4.2 SSSD 26 Checking the Status 27 • Caching 27 5 LDAP—A Directory Service 28 5.1 Structure of an LDAP Directory Tree 28 5.2 Installing the Software for 389 Directory Server 31 5.3 Manually Configuring a 389 Directory Server 31 Creating the 389 Directory Server Instance 32 • Using CA Certificates for TSL 33 • Configuring Admin Credentials for Remote/Local Access 34 • Configuring LDAP Users and Groups 35 • Setting Up SSSD 37 5.4 Setting Up a 389 Directory Server with YaST 39 Creating an 389 Directory Server Instance with YaST 39 • Configuring an LDAP Client with YaST 40 5.5 Manually Administering LDAP Data 43 5.6 For More Information 43 6 Network Authentication with Kerberos 44 6.1 Conceptual Overview 44 6.2 Kerberos Terminology 44 6.3 How Kerberos Works 46 First Contact 46 • Requesting a Service 47 • Mutual Authentication 48 • Ticket Granting—Contacting All Servers 48 iv Security Guide 6.4 User View of Kerberos 49 6.5 Installing and Administering Kerberos 50 Kerberos Network Topology 51 • Choosing the Kerberos Realms 52 • Setting Up the KDC Hardware 52 • Configuring Time Synchronization 53 • Configuring the KDC 54 • Configuring Kerberos Clients 58 • Configuring Remote Kerberos Administration 60 • Creating Kerberos Service Principals 62 • Enabling PAM Support for Kerberos 64 • Configuring SSH for Kerberos Authentication 64 • Using LDAP and Kerberos 65 6.6 Setting up Kerberos using LDAP and Kerberos Client 68 6.7 Kerberos and NFS 72 Group Membership 73 • Performance and Scalability 74 • Master KDC, Multiple Domains, and Trust Relationships 75 6.8 For More Information 76 7 Active Directory Support 77 7.1 Integrating Linux and Active Directory Environments 77 7.2 Background Information for Linux Active Directory Support 78 Domain Join 80 • Domain Login and User Homes 81 • Offline Service and Policy Support 82 7.3 Configuring a Linux Client for Active Directory 83 Choosing Which YaST Module to Use for Connecting to Active Directory 84 • Joining Active Directory Using User Logon Management 84 • Joining Active Directory Using Windows Domain Membership 89 • Checking Active Directory Connection Status 91 7.4 Logging In to an Active Directory Domain 92 GDM 92 • Console Login 92 7.5 Changing Passwords 93 v Security Guide II LOCAL SECURITY 95 8 Spectre/Meltdown Checker 96 8.1 Using spectre-meltdown-checker 96 8.2 Additional Information about Spectre/Meltdown 98 9 Configuring Security Settings with YaST 99 9.1 Security Overview 99 9.2 Predefined Security Configurations 100 9.3 Password Settings 101 9.4 Boot Settings 102 9.5 Login Settings 102 9.6 User Addition 102 9.7 Miscellaneous Settings 102 10 Authorization with PolKit 104 10.1 Conceptual Overview 104 Available Authentication Agents 104 • Structure of PolKit 104 • Available Commands 105 • Available Policies and Supported Applications 105 10.2 Authorization Types 107 Implicit Privileges 107 • Explicit Privileges 108 • Default Privileges 108 10.3 Querying Privileges 108 10.4 Modifying Configuration Files 109 Adding Action Rules 109 • Adding Authorization Rules 110 • Modifying Configuration Files for Implicit Privileges 111 10.5 Restoring the Default Privileges 112 11 Access Control Lists in Linux 114 11.1 Traditional File Permissions 114 The setuid Bit 115 • The setgid Bit 115 • The Sticky Bit 116 vi Security Guide 11.2 Advantages of ACLs 116 11.3 Definitions 116 11.4 Handling ACLs 117 ACL Entries and File Mode Permission Bits 118 • A Directory with an ACL 119 • A Directory with a Default ACL 122 • The ACL Check Algorithm 124 11.5 ACL Support in Applications 125 11.6 For More Information 125 12 Encrypting Partitions and Files 126 12.1 Setting Up an Encrypted File System with YaST 126 Creating an Encrypted Partition during Installation 127 • Creating an Encrypted Partition on a Running System 128 • Encrypting the Content of Removable Media 128 12.2 Encrypting Files with GPG 129 13 Certificate Store 130 13.1 Activating Certificate Store 130 13.2 Importing Certificates 130 14 Intrusion Detection with AIDE 132 14.1 Why Use AIDE? 132 14.2 Setting Up an AIDE Database 132 14.3 Local AIDE Checks 135 14.4 System Independent Checking 137 14.5 For More Information 138 vii Security Guide III NETWORK SECURITY 139 15 X Window System and X Authentication 140 16 SSH: Secure Network Operations 141 16.1 ssh—Secure Shell 141 Starting X Applications on a Remote Host 142 • Agent Forwarding 142 16.2 scp—Secure Copy 142 16.3 sftp—Secure File Transfer 143 Using sftp 143 • Setting Permissions for File Uploads 144 16.4 The SSH Daemon (sshd) 145 Maintaining SSH Keys 146 • Rotating Host Keys 146 16.5 SSH Authentication Mechanisms 147 Generating an SSH Key 148 • Copying an SSH Key 148 • Using the ssh- agent 149 16.6 Port Forwarding 150 16.7 Adding and Removing Public Keys on an Installed System 151 16.8 For More Information 151 17 Masquerading and Firewalls 153 17.1 Packet Filtering with iptables 153 17.2 Masquerading Basics 156 17.3 Firewalling Basics 157 17.4 firewalld 158 Configuring the Firewall on the Command Line 159 • Accessing Services Listening on Dynamic Ports 164 17.5 Migrating From SuSEfirewall2 167 17.6 For More Information 169 viii Security Guide 18 Configuring a VPN Server 170 18.1 Conceptual Overview 170 Terminology 170 • VPN Scenarios 171 18.2 Setting Up a Simple Test Scenario 173 Configuring the VPN Server 174 • Configuring the VPN Clients 175 • Testing the VPN Example Scenario 176 18.3 Setting Up Your VPN Server Using a Certificate Authority 177 Creating Certificates 177 • Configuring the VPN Server 178 • Configuring the VPN Clients 180 18.4 Setting Up a VPN Server or Client Using YaST 181 18.5 For More Information 182 IV CONFINING PRIVILEGES WITH APPARMOR 183 19 Introducing AppArmor 184 19.1 AppArmor Components 184 19.2 Background Information on AppArmor Profiling 184 20 Getting Started 186 20.1 Installing AppArmor 186 20.2 Enabling and Disabling AppArmor 187 20.3 Choosing Applications to Profile 188 20.4 Building and Modifying Profiles 188 20.5 Updating Your Profiles 190 21 Immunizing Programs 191 21.1 Introducing the AppArmor Framework 192 21.2 Determining Programs to Immunize 194 21.3 Immunizing cron Jobs 195 ix Security Guide 21.4 Immunizing Network Applications 195 Immunizing Web Applications 197 • Immunizing Network Agents 199 22 Profile Components and Syntax 200 22.1 Breaking an AppArmor Profile into Its Parts 201 22.2 Profile Types 203 Standard Profiles 203 • Unattached Profiles 204 • Local Profiles 204 • Hats 205 • Change rules 205 22.3 Include Statements 206 Abstractions 208 • Program Chunks 208 • Tunables 208 22.4 Capability Entries (POSIX.1e) 208 22.5 Network Access Control 209 22.6 Profile Names, Flags, Paths, and Globbing 210 Profile Flags 211 • Using Variables in Profiles 212 • Pattern Matching 213 • Namespaces 214 • Profile Naming and Attachment Specification 214 • Alias Rules 215 22.7 File Permission Access Modes 215 Read Mode (r) 216 • Write Mode (w) 216 • Append Mode (a) 216 • File Locking Mode (k) 216 • Link Mode (l) 217 • Link Pair 217 • Optional allow and file Rules 217 • Owner Conditional Rules 218 • Deny Rules 219 22.8 Mount Rules 219 22.9 Pivot Root Rules 221 22.10 PTrace Rules 222 22.11 Signal Rules 222 22.12 Execute Modes 223 Discrete Profile Execute Mode (Px)
Recommended publications
  • Suse Linux Enterprise Server 12 - Administration Guide Pdf, Epub, Ebook
    SUSE LINUX ENTERPRISE SERVER 12 - ADMINISTRATION GUIDE PDF, EPUB, EBOOK Admin Guide Contributors | 630 pages | 28 Apr 2016 | Samurai Media Limited | 9789888406500 | English | none SUSE Linux Enterprise Server 12 - Administration Guide PDF Book To prevent the conflicts, before starting the migration, execute the following as a super user:. PA, IA In todays service oriented IT zero downtime becomes more and more a most wanted feature. If you want to change actions for single packages, right-click a package in the package view and choose an action. When debugging a problem, you sometimes need to temporarily install a lot of -debuginfo packages which give you more information about running processes. If you are only reading the release notes of the current release, you could miss important changes. However, this can be changed through macro configuration. In this case, the oldest zswap pages are written back to disk-based swap. YaST snapshots are labeled as zypp y2base in the Description column ; Zypper snapshots are labeled zypp zypper. Global variables, or environment variables, can be accessed in all shells. If it is 0 zero the command was successful, everything else marks an error which is specific to the command. The installation medium must be inserted in the HMC. Maintaining netgroup data. This option fetches changes in repositories, but keeps the disabled repositories in the same state—disabled. The rollback snapshots are therefore automatically deleted when the set number of snapshots is reached. The visible physical entity, as it is typically mounted to a motherboard or an equivalent. When using the self-signed certificate, you need to confirm its signature before the first connection.
    [Show full text]
  • Mysql NDB Cluster 7.5.16 (And Later)
    Licensing Information User Manual MySQL NDB Cluster 7.5.16 (and later) Table of Contents Licensing Information .......................................................................................................................... 2 Licenses for Third-Party Components .................................................................................................. 3 ANTLR 3 .................................................................................................................................... 3 argparse .................................................................................................................................... 4 AWS SDK for C++ ..................................................................................................................... 5 Boost Library ............................................................................................................................ 10 Corosync .................................................................................................................................. 11 Cyrus SASL ............................................................................................................................. 11 dtoa.c ....................................................................................................................................... 12 Editline Library (libedit) ............................................................................................................. 12 Facebook Fast Checksum Patch ..............................................................................................
    [Show full text]
  • Questions for Openshift
    www.YoYoBrain.com - Accelerators for Memory and Learning Questions for OpenShift Category: Default - (402 questions) OpenShift:  2 primary tools to serve 1. container runtime - creates containers in application in OpenShift platform Linux 2. orchestration engine - manage cluster of servers running containers OpenShift:  routing layer a software load balancer, when an application is deployed in OpenShift, a DNS entry is created and added to the load balancer, which interfaces with the Kubernetes service OpenShift:  log into cluster and create oc login -u dev -p dev http://....:8443 user named dev with password dev OpenShift:  what is the default port for 8443 OpenShift cluster OpenShift:  what is a cluster's initial All All identity provider user name/password configuration allows any user and password combination to log in. OpenShift:  ____ are the fundamental projects way applications are organized OpenShift:  to create a project called oc new-project image-update image-update --display-name='My image update project' OpenShift:  how to change to project oc project myProj myProj OpenShift:  each application application source code deployment's image is created using _____ custom base image called a builder image and ____ OpenShift:  the component that build config controls the creation of your application containers is _____ OpenShift:  ____ contains all the info build config needed to build an application using its source code OpenShift:  4 things in build config 1. URL for the application source code 2. Name of builder image to use 3. Name of the application container image that is created 4.
    [Show full text]
  • Vulnerability Summary for the Week of June 5, 2017
    Vulnerability Summary for the Week of June 5, 2017 Please Note: • The vulnerabilities are categorized by their level of severity which is either High, Medium or Low. • The CVE identity number is the publicly known ID given to that particular vulnerability. Therefore, you can search the status of that particular vulnerability using that ID. • The CVSS (Common Vulnerability Scoring System) score is a standard scoring system used to determine the severity of the vulnerability. High Vulnerabilities Primary CVSS Source & Patch Vendor -- Product Description Published Score Info In Apache Hadoop 2.8.0, 3.0.0-alpha1, and 3.0.0-alpha2, the LinuxContainerExecutor runs docker commands as root with CVE-2017-7669 insufficient input validation. When the docker BID(link is feature is enabled, authenticated users can run 2017-06- external) apache -- hadoop commands as root. 04 8.5 MLIST CVE-2017-9364 Unrestricted File Upload exists in BigTree CONFIRM(link CMS through 4.2.18: if an attacker uploads an is external) bigtreecms -- 'xxx.pht' or 'xxx.phtml' file, they could bypass 2017-06- CONFIRM(link bigtree_cms a safety check and execute any code. 02 7.5 is external) CVE-2017-9435 Dolibarr ERP/CRM before 5.0.3 is vulnerable CONFIRM(link to a SQL injection in user/index.php is external) (search_supervisor and search_statut 2017-06- CONFIRM(link dolibarr -- dolibarr parameters). 05 7.5 is external) CVE-2014-9923 In NAS in all Android releases from CAF BID(link is using the Linux kernel, a Buffer Copy external) without Checking Size of Input vulnerability 2017-06- CONFIRM(link google -- android could potentially exist.
    [Show full text]
  • A U T O M at E D I N S Ta L L At
    Proceedings of LISA '99: 13th Systems Administration Conference Seattle, Washington, USA, November 7–12, 1999 A U T O M AT E D I N S TA L L AT I O N O F L I N U X S Y S T E M S U S I N G YA S T Dirk Hohndel and Fabian Herschel THE ADVANCED COMPUTING SYSTEMS ASSOCIATION © 1999 by The USENIX Association All Rights Reserved For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Automated Installation of Linux Systems Using YaST Dirk Hohndel and Fabian Herschel – SuSE Rhein/Main AG ABSTRACT The paper describes how to allow a customized automated installation of Linux. This is possible via CDRom, network or tape, using a special boot disk that describes the system that should be set up and either standard SuSE Linux CDs, customized install CDs, an appropriately configured installation server, or a tape backup of an existing machine. A control file on the boot disk and additional (optional) control files on the install medium specify which settings should be used and which packages should be installed. This includes settings like language, key table, network setup, hard disk partitioning, packages to install, etc. After giving a quick overview of the syntax and capabilities of this installation method, considerations about how to plan the automated installation at larger sites are presented.
    [Show full text]
  • (Un)Smashing the Stack
    Hello, Interwebs Hi, and thanks for reading this. As I mentioned a number of times during the talk this was one long, hard slog of a topic for me. My intent was not to duplicate existing research (Johnson and Silberman @ BHUS05, others), but to try to make this topic comprehensible for the typical security professional, who (GASP! SHOCK! HORROR!) may not necessarily grasp all the hairy internals of exploit development, but still is tasked with protecting systems. For the other 90% of us out there, our job is not to be leet, but rather not to get owned, something I hope to get a little bit better at every day. Since exploit mitigation is something that might bring us all a little bit closer to that, I wanted to explore the topic. Thanks much to BH for giving me the opportunity to do so, and to all of you for listening. Thanks also to all the amazing people working on these technologies, especially the PaX team and Hiroaki Etoh of IBM. -- shawn P.S. It’s actually Thompson that had the Phil Collins hair, not Ritchie. Sorry, Dennis. 28 75 6e 29 53 6d 61 73 68 69 6e 67 20 74 68 65 20 53 74 61 63 6b 0d 0a (un)Smashing the Stack 4f 76 65 72 66 6c 6f 77 73 2c 20 43 6f 75 6e 74 65 72 6d 65 61 73 75 72 65 73 20 61 6e 64 20 74 68 65 20 52 65 61 6c 20 57 6f 72 6c 64 Overflows, Countermeasures and the Real World Shawn Moyer :: Chief Researcher ---- SpearTip Technologies ---> blackhat [at] cipherpunx [dot] org Hey, who is this guy? ShawnM: InfoSec consultant, (quasi-) developer, husband, father, and raging paranoid with obsessive tendencies Chief Researcher at SpearTip Technologies Security Consultancy in Saint Louis, MO Forensics, Assessment, MSSP, network analysis Weddings, Funerals, Bar Mitzvahs I like unsolvable problems, so I’m mostly interested in defense.
    [Show full text]
  • Linux in Your Lap Session 9365
    Linux in Your Lap Session 9365 Rich Smrcina - Sytek Services, Inc. August 20, 2002 SHARE 99 – San Francisco GGiivviinngg CCrreeddiitt • UNIX is a registered trademark licensed exclusively through The Open Group. • LINUX is a registered trademark of Linus Torvalds & others. • Microsoft, Windows NT, Windows Millennium & MSDOS are registered trademarks of Microsoft Corporation • StarOffice Writer, Calc, & Impress are registered trademarks of Sun, Inc. • Applixware Words, Spreadsheets, Presents & Office are registered trademarks of VistaSource, Inc., a wholly-owned subsidiary of Applix, Inc. • Anyware Desktop & Anyware Realtime are registered trademarks of VistaSource, Inc. • WordPerfect Office 2000 is a registered trademark of Corel, Inc. • AbiWord & AbiSource are registered trademarks of AbiSource, Inc. • Gnumeric is copyright © 1998, 1999 by Michael de Icaza Amozurrutia • VMware is a trademark of VMware, Inc. • Wine is Copyright © 1993-2000 by the Wine Project authors. • Win4Lin is a registered trademark of NeTraverse Inc. • Satellite is a registered trademark of Toshiba Corporation. • Intel & Celeron are registered trademarks of Intel Corporation. • All other brand & product names are trademarks or registered trademarks of their respective companies Page 2 of “Linux in Your Lap”, Copyright 2002, Sytek Services, Inc. GGiivviinngg CCrreeddiitt • z/Linux &Turbolinux are registered trademarks of Turbolinux, Inc. • Red Hat is a registered trademark of Red Hat, Inc. • SuSE is a registered trademark of SuSE AG. Page 3 of “Linux in Your Lap”, Copyright 2002, Sytek Services, Inc. OOff CCoouurrssee • The Joys & Heartaches of Running Linux on a Laptop Speaker: Rich Smrcina, Sytek Services, Inc. Length: 1 hour Classification: Technical When: Tuesday 1:30pm Where: San Francisco Hilton Page 4 of “Linux in Your Lap”, Copyright 2002, Sytek Services, Inc.
    [Show full text]
  • Guide to Open Source Solutions
    White paper ___________________________ Guide to open source solutions “Guide to open source by Smile ” Page 2 PREAMBLE SMILE Smile is a company of engineers specialising in the implementing of open source solutions OM and the integrating of systems relying on open source. Smile is member of APRIL, the C . association for the promotion and defence of free software, Alliance Libre, PLOSS, and PLOSS RA, which are regional cluster associations of free software companies. OSS Smile has 600 throughout the World which makes it the largest company in Europe - specialising in open source. Since approximately 2000, Smile has been actively supervising developments in technology which enables it to discover the most promising open source products, to qualify and assess them so as to offer its clients the most accomplished, robust and sustainable products. SMILE . This approach has led to a range of white papers covering various fields of application: Content management (2004), portals (2005), business intelligence (2006), PHP frameworks (2007), virtualisation (2007), and electronic document management (2008), as well as PGIs/ERPs (2008). Among the works published in 2009, we would also cite “open source VPN’s”, “Firewall open source flow control”, and “Middleware”, within the framework of the WWW “System and Infrastructure” collection. Each of these works presents a selection of best open source solutions for the domain in question, their respective qualities as well as operational feedback. As open source solutions continue to acquire new domains, Smile will be there to help its clients benefit from these in a risk-free way. Smile is present in the European IT landscape as the integration architect of choice to support the largest companies in the adoption of the best open source solutions.
    [Show full text]
  • Linux + Windows 95 Mini-HOWTO
    Linux + Windows 95 mini−HOWTO Jonathon Katz [email protected] Joy Yokley − Converted document from HTML to DocBook 4.1 (SGML) 2001−03−01 Revision History Revision 1.1.1 2001−04−19 Revised by: DCM Corrected a typo. Revision 1.1 2001−02−28 Revised by: JEY Revision 1.0 1998−08−15 Revised by: JK Revision 0.9 1996−10−26 Revised by: JK Revision 0.8 1996−06−25 Revised by: JK This document details how to install Linux on a machine that currently runs Windows 95" Linux + Windows 95 mini−HOWTO Table of Contents 1. Introduction.....................................................................................................................................................1 2. Installation Options........................................................................................................................................2 2.1. I Have This Partition I Want to Spare!.............................................................................................2 2.2. What Is This 528M 1024th Cylinder Stuff?.....................................................................................2 3. What's Next.....................................................................................................................................................3 4. Using Your New System.................................................................................................................................4 4.1. Installing on a Drive with FAT32.....................................................................................................4
    [Show full text]
  • Red Hat Directory Server 11 Installation Guide
    Red Hat Directory Server 11 Installation Guide Instructions for installing Red Hat Directory Server Last Updated: 2021-04-23 Red Hat Directory Server 11 Installation Guide Instructions for installing Red Hat Directory Server Marc Muehlfeld Red Hat Customer Content Services [email protected] Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Red Hat Enterprise Linux 6 6.4 Release Notes
    Red Hat Enterprise Linux 6 6.4 Release Notes Release Notes for Red Hat Enterprise Linux 6.4 Edition 4 Last Updated: 2017-10-20 Red Hat Enterprise Linux 6 6.4 Release Notes Release Notes for Red Hat Enterprise Linux 6.4 Edition 4 Red Hat Engineering Content Services Legal Notice Copyright © 2012 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Debian \ Amber \ Arco-Debian \ Arc-Live \ Aslinux \ Beatrix
    Debian \ Amber \ Arco-Debian \ Arc-Live \ ASLinux \ BeatriX \ BlackRhino \ BlankON \ Bluewall \ BOSS \ Canaima \ Clonezilla Live \ Conducit \ Corel \ Xandros \ DeadCD \ Olive \ DeMuDi \ \ 64Studio (64 Studio) \ DoudouLinux \ DRBL \ Elive \ Epidemic \ Estrella Roja \ Euronode \ GALPon MiniNo \ Gibraltar \ GNUGuitarINUX \ gnuLiNex \ \ Lihuen \ grml \ Guadalinex \ Impi \ Inquisitor \ Linux Mint Debian \ LliureX \ K-DEMar \ kademar \ Knoppix \ \ B2D \ \ Bioknoppix \ \ Damn Small Linux \ \ \ Hikarunix \ \ \ DSL-N \ \ \ Damn Vulnerable Linux \ \ Danix \ \ Feather \ \ INSERT \ \ Joatha \ \ Kaella \ \ Kanotix \ \ \ Auditor Security Linux \ \ \ Backtrack \ \ \ Parsix \ \ Kurumin \ \ \ Dizinha \ \ \ \ NeoDizinha \ \ \ \ Patinho Faminto \ \ \ Kalango \ \ \ Poseidon \ \ MAX \ \ Medialinux \ \ Mediainlinux \ \ ArtistX \ \ Morphix \ \ \ Aquamorph \ \ \ Dreamlinux \ \ \ Hiwix \ \ \ Hiweed \ \ \ \ Deepin \ \ \ ZoneCD \ \ Musix \ \ ParallelKnoppix \ \ Quantian \ \ Shabdix \ \ Symphony OS \ \ Whoppix \ \ WHAX \ LEAF \ Libranet \ Librassoc \ Lindows \ Linspire \ \ Freespire \ Liquid Lemur \ Matriux \ MEPIS \ SimplyMEPIS \ \ antiX \ \ \ Swift \ Metamorphose \ miniwoody \ Bonzai \ MoLinux \ \ Tirwal \ NepaLinux \ Nova \ Omoikane (Arma) \ OpenMediaVault \ OS2005 \ Maemo \ Meego Harmattan \ PelicanHPC \ Progeny \ Progress \ Proxmox \ PureOS \ Red Ribbon \ Resulinux \ Rxart \ SalineOS \ Semplice \ sidux \ aptosid \ \ siduction \ Skolelinux \ Snowlinux \ srvRX live \ Storm \ Tails \ ThinClientOS \ Trisquel \ Tuquito \ Ubuntu \ \ A/V \ \ AV \ \ Airinux \ \ Arabian
    [Show full text]