EAL4 is meaningless. The auditor is not required to view the software in any way (binary or source). Any vendor with money can get its OS to be certified at least at EAL 4 because all that means is that the OS has some mechanisms in place for implementing security. It does not guarantee that those mechanisms really work or that the OS is not full of security holes.
Security certifications are futile. At best, they can certify the *model*, not the *implementation*. I seriously doubt .mil or .gov has such requirements for high security networks. I see this kind of nonsense in the Enterprise world. On Mon, Feb 22, 2010 at 7:03 AM, Lori Barfield <itdirec...@gmail.com> wrote: > On Sun, Feb 21, 2010 at 8:39 PM, Darrin Chandler > <dwchand...@stilyagin.com>wrote: > >> On Sun, Feb 21, 2010 at 03:35:32PM -0800, Michael Dexter wrote: >> > Thank you Seth and Brooke for materializing and putting on a great >> > OpenBSD booth at SCaLE in Los Angeles. >> >> Seth and Brooke? I know those two! Good people. >> > > i volunteer for SCaLE and worked with a lot of the exhibitors this year, and > would like to say you guys did a nice job. > > ...lori > > -- Aram HDvDrneanu