Editing Security
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
− | For | + | For the project such as OpenVZ, security of the software is of paramount importance. This is how we assure that OpenVZ is secure. |
== Kernel == | == Kernel == | ||
+ | The OpenVZ kernel is based on the Linux kernel. OpenVZ team is tracking and analyzing all the security updates to the Linux kernel and applies them accordingly. | ||
− | + | Note that current stable kernel branch is based on 2.6.8 kernel, which is quite old. This is done to achieve maximum possible security and stability. By using the older kernel, we do neither add new bugs nor security holes, but the old bugs and holes are getting discovered and fixed, and the kernel matures. Big vendors such as Novell and Red Hat are doing the same for their enterprise Linux offerings: for example, Red Hat Enterprise Linux 4 is based on kernel 2.6.9. | |
− | |||
− | |||
== Audit == | == Audit == | ||
− | + | OpenVZ has undergone a thourough security audit performed by Solar Designer in winter 2005. He found a single issue in OpenVZ kernel code and a couple of issues in mainstream Linux kernel code — all of them there fixed, mainstream fixes were sent to LKML. | |
− | OpenVZ has undergone a | ||
[[Category: Security]] | [[Category: Security]] | ||
[[Category: Kernel]] | [[Category: Kernel]] |