1.7. Security, Quality Assurance, and Red Hat Network

Red Hat Network provides significant benefits to your network including security and quality assurance. All transactions made between you and Red Hat Network are encrypted, and all RPM packages are signed with Red Hat's GNU Privacy Guard (GPG) signature to ensure authenticity.

Red Hat Network incorporates the following security measures:

  1. Your System Profile available at http://rhn.redhat.com is accessible only with an RHN-verified username and password.

  2. A Digital Certificate is written to the client system after registration and is used to authenticate the system during each transaction between the client and Red Hat Network. The file is only readable by the root user on the client system.

  3. All notifications and information messages are signed by Red Hat with an electronic signature using GPG. RPM can be used to verify the authenticity of the package before it is installed.

  4. All transactions are encrypted using a Secure Sockets Layer (SSL) connection.

  5. All packages are tested and verified by the Red Hat Quality Assurance Team before they are added to the Red Hat Errata list and Red Hat Network.