(On the Certification Thread..)

> 2. Trusted Solaris has E3/F-B1, does that make it a better firewall 
> platform?  

It does if you use it properly. (But then, I might be biased, since I use it every 
day. ;-)
  
<large sections cut>

> The Common Criteria seem to me to be the ISO-9000 of evaluations.  
> Correct me if I'm wrong, but under ITSEC and the CC doesn't the 
> evaluation team run tests specified/developed by the manufacturer? 

ITSEC evaluators do, in fact, repeat a subset of the development team's testing, but 
only to confirm that the development team was following the procedures and tests that 
they laid out in their documentation. The evaluators then do their own, completely 
seperate penetration testing, which they plan and perform themselves.

> The gulf between C2 and B2 is far and wide and includes a source
> code review of the Trusted Computing Base.

E3 ITSEC assurance does require analysis of the trusted (security enforcing) code. The 
functionality class (C2 for NT, B1 for TSOL) is only an indication of the Security 
Enforcing Features being claimed - the E<x> is what tells you the level it was tested 
and implemented to.

My favorite excerpt from the NT certification report:

////
The assumption that the network is secure is important since it effectively turns the 
network interface into an internal interface. Therefore, there are no network-based 
threats and no possibility of vulnerabilities to the TOE being introduced through the 
network components.
////

Not really the sort of assumption you want to have on a firewall...

Michael Owen
System Engineer
NET-TEL Computer Systems Ltd

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to