It depends on the Common Criteria Evaluation Assurance Level (EAL)
whether the code od a product gets inspected and how intensely this is
done!

Roland

Bill Royds wrote:
> 
> Concurrent code is more difficult than linear code, but to achieve Common Criteria 
>Approval, the proxy firewall has to show the security of the TCP/IP stack and kernel 
>as well. The OS can't be trusted unless it too has CC approval (as some do).
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Bernd Eckenfels
> Sent: Friday, December 01, 2000 14:02
> To: Bill Royds
> Cc: Nguyen_Trang; '[EMAIL PROTECTED]'
> Subject: Re: Dod & CheckPoint backdoor
> 
> On Thu, Nov 30, 2000 at 09:37:10PM -0500, Bill Royds wrote:
> 
> > Since FW-1 uses stateful packet inspection rather than application proxies
> > (mostly), it should be easier to examine.
> 
> nope, it is quite complicated to verify kernel ode interrupt handlers with
> al kind of concrrency problems and undefined protection from the os.
> 
> It is much more easy to verify a 10 line user mode program which uses normal
> socket operations. Take a look at the old FWTK Papers on that Topic. Of
> course this asumes you trust the OS.
> 
> Greetings
> Bernd
> --
>   (OO)      -- [EMAIL PROTECTED] --
>  ( .. )  ecki@{inka.de,linux.de,debian.org} http://home.pages.de/~eckes/
>   o--o     *plush*  2048/93600EFD  eckes@irc  +497257930613  BE5-RIPE
> (O____O)  When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to