SUSE Linux Receives EAL3 Certification 143
prostoalex writes "Reporters from CNet News.com learned that SUSE Linux Enterprise Server received EAL3 certification, which allows it to compete with such certified operating systems as Windows (from Microsoft), Solaris (from Sun), HP-UX (from HP) and AIX (from IBM). Albeit all of the aforementioned OSs have EAL4 certification, Evaluation Assurance Level 3 allows SUSE Linux to be considered for a range of government and military tenders. Red Hat Linux is expected to receive EAL2 certification any time now."
Windows 2000 is EAL4, but... (Score:5, Interesting)
But I'm still waiting for a certificate for some SELinux version. Since EAL4 is the highest level where it's still feasible to build the demanded security into it, hardly any normal "customer" operating system will achieve a higher level. But SELinux has been designed for security since the very beginning, and should be able to reach at least EAL5.
Re:Windows 2000 is EAL4, but... (Score:5, Informative)
"you're only allowed to install a certain version of Windows 2000, with servicepacks up to a certain number, and one hotfix. No other servicepacks or hotfixes are allowed"
And it's the same with SuSE. If you look at the SuSE press release [suse.co.uk] you will see that the certidication is limited to "SUSE LINUX Enterprise Server 8 with Service Pack 3". Next service pack arrives it will need recertified.
Also there's no way of knowing (that I can see) what extra software was installed. Sendmail? Apache? Or are we just talking a basic kernel and networking?
Re:Windows 2000 is EAL4, but... (Score:2, Informative)
I don't know much about the EAL standard, but after a quick look at the previous certification [bsi.bund.de](EAL 2), I think it probably includes all of the software.
Re:Windows 2000 is EAL4, but... (Score:2, Informative)
Generally it's a shell, filesystem, a few g* programs (but note no compiler), encryption libs, mailx, curses, openssl & openssl, perl (although no version), sys*, telnet, textutils, vim, vsftpd, w3m, wget and yast stuff.
No apache, no sendmail, nothing fun :)
Re:Windows 2000 is EAL4, but... (Score:5, Informative)
Re:Windows 2000 is EAL4, but... (Score:2)
Re:Windows 2000 is EAL4, but... (Score:2)
>My hard drive is just a 5th-level cache between the CPU and the Internet.
5th?
CPU
L1 cache (1st level)
L2 cache (2nd level)
RAM (3rd level)
Harddrive (4th level)
Internet
What am I missing?
Re:Windows 2000 is EAL4, but... (Score:2)
Re:Windows 2000 is EAL4, but... (Score:2)
Re:Windows 2000 is EAL4, but... (Score:2)
The harddrive cache is PART of the harddrive. It's not like you can remove it or anything (unless you have some really weird/expensive/exotic/old harddrive).
Re:Windows 2000 is EAL4, but... (Score:1)
(My apologies for continuing this wildly off-topic discussion.
Re:Windows 2000 is EAL4, but... (Score:2)
didn't bother to correct myself, though, this being da intarwaep and all
Re:Windows 2000 is EAL4, but... (Score:2)
Re:Windows 2000 is EAL4, but... (Score:2)
Re:Windows 2000 is EAL4, but... (Score:4, Insightful)
And, of course, it has to be that way. quigonn, if a product had a certification that claims it's secure no matter what changes you subsequently make, how much faith would you have in that certification?
Re:Windows 2000 is EAL4, but... (Score:1, Informative)
http://www.suse.de/de/security/certification/in d ex
As you can see, the certified system does not run a webserver, but it runs SSH, Postfix, and FTP!
Also, the "+" in the EAL3+ certification means that at least minor bugfixes can be applied to the system without losing the certification status, because the processes of how these fixes are developed, distributed and applied have also been certified.
Re:Windows 2000 is EAL4, but... (Score:2, Informative)
The same is true of EAL4 Solaris, and presumably also of SuSE. It wouldn't make sense to certify all versions and configurations of a particular OS, including service packs/patches that haven't yet been written. Take a look at how to set up EAL4 certified solaris [sun.com] [sun.com] to
see how specific the certification is.
I
Re:Windows 2000 is EAL4, but... (Score:1)
Re:Windows 2000 is EAL4, but... (Score:2)
Re:Windows 2000 is EAL4, but... (Score:1)
Re:Windows 2000 is EAL4 "Augmented" not EAL 4 (Score:2)
Yeah, right. (Score:5, Funny)
Re:Yeah, right. (Score:1)
Re:Yeah, right. (Score:2)
Re:Yeah, right. (Score:1)
SCO also had a B3 certified product (called "SCO CMW+", IIRC). It sucked rocks, rather unstable, but at the lime I beleive it was the only B-level system available on x86 hardware.
Re:Yeah, right. (Score:2)
See, Darl *OWNS* all secure Linux. Maybe he'll sue the NSA over SELinux?
I'm not impressed... (Score:4, Funny)
Re:I'm not impressed... (Score:1)
Re:I'm not impressed... (Score:1)
But, I guess it should be firewalled anyway...
Re:I'm not impressed... (Score:1)
Re:I'm not impressed... (Score:1)
Actually it means SUSE is getting better at handshakes and butt kissing business dealings. Something the Linux community is soarly lacking.
Reputation is everything for people and products!
EAL 1-4 Descriptions (Score:5, Informative)
EAL1 provides a basic level of assurance by an analysis of the security functions using a functional and interface specification and guidance documentation, to understand the security behaviour.
Evaluation assurance level 2 (EAL2) - structurally tested
EAL2 provides assurance by an analysis of the security functions, using a functional and interface specification, guidance documentation and the high-level design of the TOE, to understand the security behaviour.
Evaluation assurance level 3 (EAL3) - methodically tested and checked
EAL3 provides assurance by an analysis of the security functions, using a functional and interface specification, guidance documentation, and the high-level design of the TOE, to understand the security behaviour.
Evaluation assurance level 4 (EAL4) - methodically designed, tested, and reviewed
EAL4 provides assurance by an analysis of the security functions, using a functional and complete interface specification, guidance documentation, the high-level and low-level design of the TOE, and a subset of the implementation, to understand the security behaviour. Assurance is additionally gained through an informal model of the TOE security policy.
Re:EAL 1-4 Descriptions (Score:2)
Best to stick to something where the security model is open to inspection, such as OpenBSD.
In any case, was the particular Win 2000 configuration which was tested not subsequently found to have s
Re:EAL 1-4 Descriptions (Score:1)
The Open Source Problem (Score:5, Interesting)
Hence all the hard work of the kernel developers, who provide their services for free in many cases, cannot be directly recognised. Instead some huge corperation has to come along and sponsor such certification. This just isn't right, IMO.
There's a much bigger issue here though, a threat from the future called Digital Rights Management and NGSCB. Who wants an operating system that will be unable to access secure web services because Microsoft introduces a protocol that requires a DRM-aware application running on a DRM-booted computer? Open source GPL'd Linux will never be able to obtain such certificates without massive corperate sponsorship from IBM, Novell, Redhat or whoever.
Even if it does, changing one line in my kernel and recompiling would invalidate it, locking me out of my legally purchased music and movies, and even things like my e-mail eventually (we're already seeing this with the restrictions that a sender can put on an e-mail in Office 2003. Imagine when this is part of the operating system and not easily circumvented).
Bullshit efforts certification efforts like EAL and NGSCB undermine and threaten open source and play right in to the hands of the major corperations. In today's world, the most important corperation producing operating systems is, you've guessed it: Microsoft!
This sort of thing plays right in to their hands. They're undermining the free work of all the thousands of Linux and BSD developers effectively through the back door: by making open source software an unviable solution under the guise of security. Fuck them.
Re:The Open Source Problem (Score:3, Insightful)
Re:The Open Source Problem (Score:2)
Re:The Open Source Problem (Score:1)
Re:The Open Source Problem (Score:2)
Certificates like this are going to become a real problem for open source software. There's no way a small distribution could get a certificate that costs many thousands of dollars to buy.
So perhaps the powers that be in OSS should come up with their own certification (secure software?), with their own test regimen. It would be just as meaningful as any other cert.
Re:The Open Source Problem (Score:1)
A valuable result of the certification process is assurance. The software security certification process is capable of providing a reasonable, varying degree of assurance to a software platform snapshot. The OSS community is capable of creating and performing security evaluations of OSS targets. It's a matter of motivation I suppose.
= jombee
Re:The Open Source Problem (Score:2)
There's gotta be some sort of certification guidelines for these certifications. I mean, companies aren't just going to fly in there blind and see what's wrong with their products -- that's wasteful. They'll likely get tons of documentation on
Do security holes reduce EAL levels? (Score:4, Insightful)
Re:Do security holes reduce EAL levels? (Score:5, Insightful)
So in reality certified OSes are less secure than an up-to-date system. But whatever, it's certified.
Re:Do security holes reduce EAL levels? (Score:2)
Re:Do security holes reduce EAL levels? (Score:1)
Any moron of a sysadmin can take a very secure system and turn it into one full of holes. Conversely, the best sysadmin in the world can't make a poorly designed system secure. A certification gives you, a non-moron of a sysadmin, some hope t
That's great (Score:2, Interesting)
But just 1 year ago, weren't we criticizing Windows for achieving EAL 4: [slashdot.org]
Re:That's great (Score:2, Interesting)
Re:That's great (Score:5, Informative)
Companies have to jump through hoops to get some of these contracts; the requirements may be rediculous, but achieving the requirements to compete for contracts is still important none-the-less.
Re:That's great (Score:5, Interesting)
My company does a lot of professional services with DOD and some other agencies, and it's been a huge pain for me that linux wasn't certified under Common Criteria. If I set up something to demo to DOD that was running on a linux box, because it's easier and works better, it was immediately shot down because it didn't meet their standards. End of discussion. Once you get the certification you can play ball, but until that time you can't do squat. So now that we are in the game, you better believe the introduction of linux in the federal government is going to be a flood. I know of a couple of civillian agencies ready to take the plunge (more often than not replacing Solaris with linux, but some dumping of MS as well), and some DOD R&D has been with linux but not much production stuff is in place -- yet. The three letter agencies are interested, and EAL3 is going to make a big difference there.
SuSE probably hasn't "increased" security to make this happen at all, but simply paid the money and took the time to have one of the evaluating companies perform the certification tests. It described the installation method, the packages to be installed and the way the system would be managed, and the evaluating company ran the battery of tests for level 3 and certified that it passed those tests. Heck, given enough time and money SLES will comply with level 5, and the only thing keeping this from happening is the amount of investment SuSE, Novell and IBM are willing to make for this.
EAL really says nothing about the security of linux based systems, but is says a ton about how receptive governments will be to employing it. This is indeed good news.
Re:That's great (Score:2)
So I'm curious if, after the demos of EAL'd systems to government buyers, they allow the system to be modified - upgraded kernels, adding apache, etc.?
I'm just wondering if the bureaucratic hurdle is a "one time, just to prove you can be certified" or whether it's an ongoing PITA?
Re:That's great (Score:2)
Now I'm not all that involved in this, but my take is that EAL3 will make a difference in being able to get your foot in the door. Once it's in, it's
Re:That's great (Score:1)
In a way comparing military security requirements to corprate security requirements is like comparing Apples to Oranges. They have much more control
Re:That's great (Score:2)
One thing that I think is interesting to note is that a _company_ providing a specific _distro_ of Linux is being certified here, not Linux proper. The company and specific distro thing is important because it shows the viability of making $$ off of open source software. Anyone can get all of the sam
Re:That's great (Score:1)
Most importantly, the EAL tells only half the story. There are 2 components, the PP (Protection Profile), which specifies what security features you're trying to provide, and the EAL (Evaluation Assurance Level) which tells you how certain the people evaluating it are that it meets the profile. Windows 2000 was certified against CAPP (the Controlled Access Protection Profile) to EAL4, The CAPP is, well, hopelessly
Wow, great news (Score:1, Offtopic)
Re:Money? (Score:2, Funny)
"you pay us money and the ghosts will leave your body"/"you pay us money and you are considered secure
...except scientology doesnt make you pay again if you get your hair cut or clip your toenails
Re:Money? (Score:1)
novell (Score:5, Interesting)
Re:novell (Score:2)
More likely would be further IBM involvement as a company well placed to benefit from being able to sell more hardware deeper into government.
EAL4 evaluation tells you nothing (Score:4, Informative)
Intersting Document on EL [jhu.edu]
Things will really get heated up (Score:5, Funny)
Summary Misleading (Score:5, Informative)
Re:Summary Misleading (Score:1)
What protection profile? (Score:5, Informative)
EAL-rating only indicates how sure you are the product meets the profile (a set of security requirements). Saying it gets "EAL3 Certification" is like saying "We're now quite sure it does... eh... something"
For example, the Win2000 EAL4 certification was CAPP/EAL4 (Controlled Access Protection Profile). Its description:
It should be obvious that while CAPP is nice to have, it does not mean the system is "secure", even if you'd get EAL7. :-)
I guess this is just one of those "they have - we need it too!" things.
Re:What protection profile? (Score:2)
Re:What protection profile? (Score:1)
terminology slip-up :-)
indeed, SuSE's certification (EAL2) of July last year was for a "Product specific Security Target", no protection profile. Assuming it's still the case this year, it means comparing its EAL-rating to Common Criteria certifications of other products (with different security targets) is completely bogus.
The problem is people seem to think "EAL3" is the certification by itself, while the security targe
Re:What protection profile? (Score:2)
Re:What protection profile? (Score:2)
The common criteria are a framework for specifying and evaluating security properties of a product.
They provide a big list of "security functional requirements" that a product might adhere to. Examples:
Re:What protection profile? (Score:5, Informative)
A college degree only indicates how sure you are the person meets the profile (a set of learning and skill requirements). Saying it gets "A college degree" is like saying "We're now quite sure the person is... eh... able to learn something".
Trust me, there are many a bozo out there with a college degree, and there are, ahem, less than secure and robust OSes with EAL certification, but try to get a job where it says "College degree required" or install an OS where it says "EAL3 or higher required" and there is not that level of certification.
On an aside, college degrees are pretty worthless nowadays. At least a generic 4 year degree. I often see on job listings something like "College degree in XXX required or equivalent work experience". This is not as true with higher degrees or professional degrees. Sometimes I think about how much money I would be making now if I had _worked_ instead of going to school and racking up about $30,000 in college loans. Actually, I have seen data that says that the "Stay in school" programs are completly irrational. Supposedly, a HS dropout that goes to work will be making much more $$ immediately and in the future (because of experience and seniority) than a HS graduate. Kinda makes me wonder what the governmental/societal push is for going to school.
Re:What protection profile? (Score:1)
EAL just indicates how sure you are... you could get something EAL3-certified to be totally insecure.
(note that I don't mean to say the certification is meaningless, just that its presentation in the article is. also, that comparisons like "but Win2000 has EAL4!" are bogus)
A company that knows how the Common Criteria work won't require "EAL3", but actual
Re:What protection profile? (Score:2)
I agree with that completely. I'm a university dropout, and I work at a gas station. The Lead Hand at my gas station (basically, she's one step down from being the boss) is a Highschool dropout. The only reason she's ahead of me, is because she has a few
Re:What protection profile? (Score:1)
This specifically precludes internet usage (unless you consider connecting to the internet to be non-hostile, in which case your paranoia badge is revoked).
It DOES however open a door to let competitors into a contr
Nerds unite! (Score:1)
Every decent computer nerd should have those words flowing through their veins...
Re:Nerds unite! (Score:1)
USELESS (Score:3, Insightful)
...you're only allowed to install a certain version of Windows 2000, with servicepacks up to a certain number, and one hotfix.
This should tell you how extremely useless the common criteria is for actually verifying the security of a product for real world use. Sure it might have some merit in high security government use, but that's about it.Also, you know how much it costs to get your product evaluated at EAL2 (yes, you have to pay for it) -- about $250k. EAL4 is about $1mil+.
We had someone who works at NIST on the CC come to my school last semester. He said there were less than 100 products that have been evaluated under the CC (can't remember exact number, but around 80).
It boils down to this: if you want to sell your software to the U.S. government, you gotta get it certified at EAL2 at least. Other than that, your EAL level X means nothing.
Windows *from Microsoft*, huh? (Score:3, Funny)
You mean like Lindows? (Score:1, Funny)
Re:You mean like Lindows? (Score:1)
Other OS'S? (Score:1)
See (Score:2)
This is why I don't like certifications. They don't actually say anything about how Linux can compete with any other operating system, but they make people like you think they do.
If the church gives you a piece of paper that says you are going to heaven do you actually believe that you will go to heaven?
If a University gives you a degree does that degre
automated certification (Score:1)
Huh? (Score:1)
Re:certifications (Score:2, Informative)
And as an utter nobody in the field of cyber-security, I can tell you that you'll have to start dropping the prefix "cyber" in order to be taken seriously.
Re:Certifications in current Job market. (Score:2, Informative)
But the EAL certifications cover the security of the system itself. Those certifications are applied to computer system products, not to people...
There's a description of the EAL certification levels in the at the NIST site which is linked to from the top-level article. The point about this certification from Linux's point of view is that it allows it to be cinsidered for various sorts of Government deployment, which
Re:Certifications in current Job market. (Score:1, Insightful)
which often require EAL certification to a certain level
your comment "to a certain level" is slightly misguided. DoD sales often require certification, but the level is not specified in any case that I am aware of.
Re:Certifications in current Job market. (Score:2)
Besides, this comment doesn't even make any real sense -- you can be evaluated at EAL 1, which is merely functional testing and offers no assurance at all.
Re:Does This mean anything to anybody? (Score:3, Informative)
It means something to me (I work with the Common Criteria daily), but you do have a point: the certificates don't mean much to the general public beyond being a license to sell to the U.S. government.
I'd just like to point out that, while the Common Criteria (CC) is based on the U.S. Trusted Computer System Evaluation Criteria - the TCSEC, a.k.a. the Orange Book - it's also based on the European ITSEC and the Canadian CTCPEC... It's an international standard, and a common language for the world's security