Frequently Asked Questions
65
Q: How does the Red Hat Network work?
A: Each registered system has a System Profile that contains hardware and software information about
the system. RHN uses this information to alert you of security alerts, bug fixes, and package enhance-
ments from the Red Hat errata List via email notifications. The Red Hat Network Web Application
can also be used to view and download the lastest software packages.
Q: What is a System Profile and how do I create one?
A: A System Profile contains hardware and software information about a registered Red Hat Linux
system. This profile is used to send you notification about updates relevant to your system. It elimi-
nates all Red Hat errata Reports not applicable to your system. A System Profile can be created with
the Red Hat Network Registration Client or with the Red Hat Network Web Application.
Q: What are errata and who writes them?
A: The Red Hat errata list contains all security alerts, bug fixes, and package enhancements for Red
Hat Linux. Security issues and bug fixes are submitted by Red Hat engineers as well as the Linux
community around the world through Bugzilla. The tickets are then evaluated and resolved by the
Red Hat engineering. After being tested by the Red Hat quality assurance team, the package updates
are released as part of the Red Hat errata list. Notifications received from RHN include all Red Hat
errata.
Q: How secure is Red Hat Network?
A: Red Hat Network uses the following levels of security:
•
The Red Hat Network Web Application is only accessible with the correct user name and password
•
A Digital Certificate is stored on the client system (/etc/sysconfig/rhn/systemid) after registration
and is used to authenticate the system during each transaction between the client and Red Hat
Network
•
All notifications and information messages are signed by Red Hat with an electronic signature
using GNU Privacy Guard (GPG). RPM can be used to verify the authenticity of the package
before it is installed
•
All transactions are encrypted using a Secure Sockets Layer (SSL) connection
•
All packages are tested and verified by the Red Hat Quality Assurance Team before they are added
to the official Red Hat errata list and Red Hat Network
Q: Why do you need to know so much personal information about my system?
A: Red Hat makes every effort to allow our customers to define the relationship they will have with us.
We require your personal information so that we can contact you easily if issues arise affecting the
security of your information or systems. In addition, sharing this information with us makes it harder
Содержание NETWORK - USER 1.3
Страница 1: ...Red Hat Network User Reference Guide 1 3...
Страница 9: ...Section 0 2 More to Come ix rhn feedback redhat com...
Страница 10: ...x Introduction...
Страница 28: ...28 Chapter 2 Registration Figure 2 15 Text Mode Welcome Screen...
Страница 33: ...Section 3 4 Package Exceptions Settings 33 Figure 3 3 Package Exceptions Settings...
Страница 34: ...34 Chapter 3 Red Hat Update Agent Configuration...
Страница 46: ...46 Chapter 4 Red Hat Update Agent...
Страница 58: ...58 Chapter 5 Red Hat Network Web Application...
Страница 60: ...60 Chapter 6 Red Hat Network Daemon...