Review: Red Hat’s Fedora 12 Beta Operating System

Red Hat’s leading-edge Linux-based operating system, Fedora, hit a beta milestone this week on the way to its Version 12 release. As with Ubuntu Linux, which recently underwent a beta release of its own, Fedora 12 will be packed with the latest and greatest versions of popular open-source applications, such as the OpenOffice.org productivity suite, the Firefox Web browser, and up-to-date releases of the GNOME and KDE desktop environments.

Beyond these typical Linux updates, the updates that have caught my eye in this version deal with strengthening the core of the distribution and of Linux distributions in general, as Red Hat’s open-source innovations trickle downstream into other Linux-based operating systems. In particular, Fedora 12 advances the state of Linux system privilege management on multiple fronts and exhibits continued progress in virtualisation.

System Privileges

One of the first Fedora 12 enhancements to jump out at me was the distribution’s new capability for sandboxing potentially untrusted graphical applications with SELinux. The new feature, called sandbox -X, provides graphical applications with a temporary environment to run in that’s walled off from the rest of system.

For instance, on my test machine, I created a wrapper script for Adobe Reader (a frequent target of malware purveyors) that would launch the application within an SELinux sandbox. I could view my document normally (more or less, I experienced frequent Reader crashes during my tests, with or without the sandboxing), but could not browse my file system or reach the network. If I wanted to extend Internet access to my sandbox – to test a Web browser, for instance – I simply appended “-t sandbox_web_t” to my command to allow for the access.

For now, sandboxed applications launch in windows that cannot be resized, and not every application I attempted to sandbox worked properly. Firefox, for instance, launched without issue, but Google’s open-source Chromium browser crashed immediately upon launch.

Moving forward, I’ll be interested to see whether and how the Fedora project integrates sandbox -X with the rest of the distribution. If nothing else, the feature is a good example of what can be done with SELinux. For more information on sandbox -X, check out this blog post from Red Hat’s Dan Walsh.

SELinux provides Linux with a scheme for mandatory access control, where the only rights that users or processes enjoy are those explicitly granted. In Red Hat and Fedora systems, SELinux usually operates under a targeted policy, where only specific parts of the system are controlled so tightly. The rest of these systems are bound by the traditional Linux DAC (discretionary access control) system.

Page: 1 2

Jason Brooks eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

View Comments

Recent Posts

HP Sales Beat Expectations As PCs Return To Growth

HP revenues beat analysts' expectations as commercial PC sales return to growth after two-year post-pandemic…

2 hours ago

Meta Finds Facebook Propaganda Network Using Generative AI

Meta Platforms finds influence network focused on Gaza war that for first time uses generative…

2 hours ago

OpenAI Board ‘Not Aware Of ChatGPT Launch’

Former OpenAI board member gives fullest description to date of events that led to surprise…

3 hours ago

BlackRock $20bn ETF Becomes World’s Biggest Bitcoin Fund

BlackRock's iShares Bitcoin Trust dethrones decade-old Grayscale investment vehicle to become world's biggest Bitcoin fund,…

3 hours ago

Shark Tank Host Launches Crowdfunding Site For TikTok Buy

Kevin O'Leary, investor and host of reality programme Shark Tank, launches crowdfunding effort to gauge…

4 hours ago

Former FTX Executive Ryan Salame Sentenced To Seven Years

Former Bankman-Fried top lieutenant Ryan Salame given longer sentence than prosecutors had asked for over…

4 hours ago