Language Selection

English French German Italian Portuguese Spanish

CentOS and Redhat, Best for the Server

Filed under
Reviews

After using CentOS the last few months I figured I'd give a small review on it and why I think it is the best linux distro for running a server. I first started with a debian server as I use Ubuntu on my home pc and thought I would be more familiar with that. I was but it turned out debian wasn't such a great server. I had many problems mainly with the ipv6 and not being able to get dos deflate to work properly on it. Also the apache setup is a nightmare with the a2enmod and a2dismod, sure it is probably designed like that for ease but it was not for me. Also about debian, same on ubuntu too, If you happen to delete some configuration files or similar no matter how many times you reinstall it will not restore them. And last, debian stable is made up of very old software and to get a half way up to date distro you have to go with the testing branch.

So I got CentOS on my last server and I like it a lot. I know it is just a Red Hat Enterprise Linux clone but that is all the better as RedHat is a hell of a distro in the enterprise department plus you are getting it for free. I doubt very seriously there is a CentOS development team, from what I hear they just rip the rpms from redhat and add them to their repos which I won't complain about that either.

The service command feature is great, just service httpd restart or whatever and you're set. Plus the apache configuration is perfect, well normal like it should be. I don't understand why debian based distros want to be an oddball in that department. Sure the rpm packaging isn't as good as apt in some areas but I always like to compile most software from source anyway.

There has been a few articles going around lately like Ubuntu is going to put RedHat and other enterprise distros out of commission, this is extremely unlikely. Ubuntu may take a good share of the desktop and workstation market but not server and enterpise. And if you run a server you will notice almost all software and security scripts are made for redhat based distros. I actually ran an ubuntu server on a vps one time and it wasn't much different then debian just a lot more updated. It is still a pain in the ass to restart your services,run apache, and monitor netstat, You will have to disable ipv6 right off, I was always afraid to then cause I thought the servers wouldn't boot back up but I know now they will. The problem with the ipv6 is that it is slower and does not display the full ip on some isps in netstat which makes it impossible to use dos deflate or even to ban an ip accurately from the firewall.

CentOS may not be around forever but I'm pretty sure Redhat will and there will most likely be another CentOS red hat clone come out if CentOS decides to call it quits. Never the less Ubuntu is not gonna push anyone out of the server and enterprise market. If anyone is thinking of getting a server hosting in the future I strongly suggest going with CentOS but if you can get RedHat free from your host too I'd get it. RedHat and CentOS are great distros for the server and make administration a breeze,

Source: www.evolution-security.com

More in Tux Machines

GNOME and Fedora

  • RFC: Integrating rsvg-rs into librsvg
    I have started an RFC to integrate rsvg-rs into librsvg. rsvg-rs is the Rust binding to librsvg. Like the gtk-rs bindings, it gets generated from a pre-built GIR file.
  • 1+ year of Fedora and GNOME hardware enablement
    A year and a couple of months ago, Christian Schaller asked me to pivot a little bit from working full time on Fleet Commander to manage a new team we were building to work on client hardware enablement for Fedora and GNOME with an emphasis on upstream. The idea was to fill the gap in the organization where nobody really owned the problem of bringing up new client hardware features vertically across the stack (from shell down to the kernel), or rather, ensure Fedora and GNOME both work great on modern laptops. Part of that deal was to take over the bootloader and start working closer to customers and hardware manufacturing parnters.
  • Fedora Atomic Workstation: Works on the beach
    My trip is getting really close, so I decided to upgrade my system to rawhide. Wait, what ? That is usually what everybody would tell you not to do. Rawhide has this reputation for frequent breakage, and who knows if my apps will work any given day. Not something you want to deal with while traveling.
  • 4 cool new projects to try in COPR for February

Why You Shouldn’t Use Firefox Forks (and Proprietary Opera)

  • Why You Shouldn’t Use Firefox Forks Like Waterfox, Pale Moon, or Basilisk
    Mozilla Firefox is an open source project, so anyone can take its code, modify it, and release a new browser. That’s what Waterfox, Pale Moon, and Basilisk are—alternative browsers based on the Firefox code. But we recommend against using any of them.
  • Opera Says Its Next Opera Release Will Have the Fastest Ad Blocker on the Block
    Opera Software promoted today its upcoming Opera 52 web browser to the beta channel claiming that it has the faster ad blocker on the market compared to previous Opera release and Google Chrome. One of the key highlights of the Opera 52 release will be the improved performance of the built-in ad blocker as Opera claims to have enhanced the string matching algorithm of the ad blocker to make it open web pages that contain ads much faster than before, and, apparently than other web browsers, such as Chrome.

Graphics: Glxinfo, ANV, SPIR-V

  • Glxinfo Gets Updated With OpenGL 4.6 Support, More vRAM Reporting
    The glxinfo utility is handy for Linux users in checking on their OpenGL driver in use by their system and related information. But it's not often that glxinfo itself gets updated, except that changed today with the release of mesa-demos-8.4.0 as the package providing this information utility. Mesa-demos is the collection of glxinfo, eglinfo, glxgears, and utilities related to Mesa. With the Mesa-demos 8.4.0 it is predominantly glxinfo updates.
  • Intel ANV Getting VK_KHR_16bit_storage Support Wrapped Up
    Igalia's Jose Maria Casanova Crespo sent out a set of patches today for fixes that allow for the enabling of the VK_KHR_16bit_storage extension within Intel's ANV Vulkan driver. The patches are here for those interested in 16-bit storage support in Vulkan. This flips on the features for storageBuffer16BitAccess, uniformAndStorageBuffer16BitAccess, storagePushConstant16 and the VK_KHR_16bit_storage extension. This support is present for Intel "Gen 8" Broadwell graphics and newer. Hopefully the work will be landing in Mesa Git soon.
  • SPIR-V Support For Gallium3D's Clover Is Closer To Reality
    It's been a busy past week for open-source GPU compute with Intel opening up their new NEO OpenCL stack, Karol Herbst at Red Hat posting the latest on Nouveau NIR support for SPIR-V compute, and now longtime Nouveau contributor Pierre Moreau has presented his latest for SPIR-V Clover support. Pierre has been spending about the past year adding SPIR-V support to Gallium3D's "Clover" OpenCL state tracker. SPIR-V, of course, is the intermediate representation used now by OpenCL and Vulkan.

Security: Updates, Tinder, FUD and KPTI Meltdown Mitigation

  • Security updates for Friday
  • Tinder vulnerability let hackers [sic] take over accounts with just a phone number

    The attack worked by exploiting two separate vulnerabilities: one in Tinder and another in Facebook’s Account Kit system, which Tinder uses to manage logins. The Account Kit vulnerability exposed users’ access tokens (also called an “aks” token), making them accessible through a simple API request with an associated phone number.

  • PSA: Improperly Secured Linux Servers Targeted with Chaos Backdoor [Ed: Drama queen once again (second time in a week almost) compares compromised GNU/Linux boxes to "back doors"]
    Hackers are using SSH brute-force attacks to take over Linux systems secured with weak passwords and are deploying a backdoor named Chaos. Attacks with this malware have been spotted since June, last year. They have been recently documented and broken down in a GoSecure report.
  • Another Potential Performance Optimization For KPTI Meltdown Mitigation
    Now that the dust is beginning to settle around the Meltdown and Spectre mitigation techniques on the major operating systems, in the weeks and months ahead we are likely to see more performance optimizations come to help offset the performance penalties incurred by mitigations like kernel page table isolation (KPTI) and Retpolines. This week a new patch series was published that may help with KPTI performance.