*BSD News Article 63186


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!newsroom.utas.edu.au!munnari.OZ.AU!news.ecn.uoknor.edu!news.ysu.edu!usenet.ins.cwru.edu!pravda.aa.msen.com!nntp.coast.net!news.kei.com!newsfeed.internetmci.com!news.ac.net!pacifier!rainrgnews0!news.aracnet.com!news
From: beattie@coyote.aracnet.com (Brian Beattie)
Newsgroups: comp.os.linux.development.system,comp.os.linux.misc,comp.os.linux.networking,comp.unix.bsd.freebsd.misc,comp.unix.bsd.netbsd.misc,comp.unix.bsd.bsdi.misc
Subject: Re: need secure OS to entrust millions to
Date: 10 Mar 1996 05:57:14 GMT
Organization: aracnet.com -- Portland's loudest electrons
Lines: 53
Message-ID: <4htqvq$d5o@cobweb.aracnet.com>
References: <4gi6t6$3h9@lace.colorado.edu> <31304401.3341@pinsight.com> <4gq2j9$2g48@babyhuey.cs.utexas.edu> <nhammond.3.00AE67CD@mindspring.com>
NNTP-Posting-Host: ppp-t31.aracnet.com
X-Newsreader: knews 0.9.3
Xref: euryale.cc.adfa.oz.au comp.os.linux.development.system:19005 comp.os.linux.misc:90734 comp.os.linux.networking:31154 comp.unix.bsd.freebsd.misc:15179 comp.unix.bsd.netbsd.misc:2424 comp.unix.bsd.bsdi.misc:2596

In article <nhammond.3.00AE67CD@mindspring.com>,
	nhammond@mindspring.com (Nicolas Hammond) writes:
>In article <4gq2j9$2g48@babyhuey.cs.utexas.edu> dhs@cs.utexas.edu (Douglas H. Steves) writes:
>>From: dhs@cs.utexas.edu (Douglas H. Steves)
>>Subject: Re: need secure OS to entrust millions to
>>Date: 25 Feb 1996 10:26:17 -0600
>
>>In article <31304401.3341@pinsight.com>,
>>Roy A. Gilmore <royg@pinsight.com> wrote:
>>>Banks need B1-B2 level security.  
>>No. Most of the functional differences at B1+ are related
>>to mandatory [sic] access controls, which is a DoD-ish
>>policy/fetish that doesn't apply to commercial environments.
>>A lot of the remainder are miscontrived and misconstrued 
>>software engineering fallacies that have nothing to do with
>>real security.
>
>I used to work at SecureWare (I now have my own consulting company)
>and was the one responsible for setting up the "secure" machine for
>Security First Network Bank (www.sfnb.com), the world's first
>on-line bank. I also helped with the design of the entire security 
>architecture .I have also set-up other banks, including the first bank offering
>on-line services in Central America. I have also set-up commercial Web
>sites that "protect millions" (usually data, but data critical to some
>fortune-100 companies).

I also used to work at SecureWare, although not as long as Nick, although
I had been working with with Trusted Computing for almost as long as
SecureWare had been around.  I must agree with most of the points that the 
Doug made.  That is most of the Rainbow series is either irrelavent or
wrong for commercial concerns.  I also have a lot of problems with most
implementations of DoD type security but that is another matter. 

Nick has a very good point and I agree with it that having a system with a
defined level of assurance.  One that has been reviewed and tested by an 
independent authority.  One that includes detailed documentation on the  
"correct" operation is important.  Other than that no DoD level is better
than standard UNIX security for "most" commercial applications.

That said the assurance issue is a major one and for that reason alone
I would steer clear of Free unixes, for applications requireing high
assurance, unless you want to do the work required to have that assuracne.

The rest of what Nick say about levels is pure gospel according to NCSEC
and pretty much smoke and mirrors.  That is to say if your security can
be breached at one level, it can probably be breached at any level.

-- 
Brian Beattie       | [From an MIT job ad] "Applicants must also have
                    | extensive knowledge of UNIX, although they should
beattie@aracnet.com | have sufficently good programming taste to not
Fax (503)331-8186   | consider this an achievement."