On Mon, Feb 22, 2010 at 04:04:39PM +0200, Aram H??v??rneanu wrote:
> On Mon, Feb 22, 2010 at 3:51 PM, Aram HDvDrneanu <ara...@mgk.ro> wrote:
> > EAL4 is meaningless. The auditor is not required to view the software
> > in any way (binary or source). Any vendor with money can get its OS to
> > be certified at least at EAL 4 because all that means is that the OS
> > has some mechanisms in place for implementing security. It does not
> > guarantee that those mechanisms really work or that the OS is not full
> > of security holes.
> >
> > Security certifications are futile. At best, they can certify the
> > *model*, not the *implementation*. I seriously doubt .mil or .gov has
> > such requirements for high security networks. I see this kind of
> > nonsense in the Enterprise world.
> >
>
> Besides what's written above. EAL is meaningless unless you read the

Technically meaningless, yes, but managerially meaningful in some
cases, as there are organizations which require some level of
certification for software to be used "off-the-shelf".

Would it be useful for OpenBSD to get some sort of certification
level for this purpose? Possibly.

Is it going to happen unless somebody absolutely needs it in order
to deploy a solution? No.

Unless some benefactor is willing to come forward and deal with the
logistical headache of doing the paperwork and keeping it all as
up to date as it needs to be, it's not going to happen, even if
getting an EAL meant ponies, rainbows, and money trees for everybody.

> Protection Profile. EAL is the assurance level *against* the
> protection profile. If your PP specifies only that in your systems,
> users login using passwords you can easily get EAL7, but that would be
> so meaningless...
>
> --
> Aram HDvDrneanu

Reply via email to