Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security

Windows 2000 Gets Common Criteria Certification 533

Qnal writes "e-Week is reporting that Microsoft Windows 2000 has been awarded Common Criteria Certification.. Read more of the propaganda here. Basically, according to the article Any user running Windows 2000 with Service Pack 3 is running exactly the same system that was evaluated. The Common Criteria certification is an internationally recognized ISO standard established for evaluating the security of infrastructure technology products. Too bad it takes 3 Service Packs..."
This discussion has been archived. No new comments can be posted.

Windows 2000 Gets Common Criteria Certification

Comments Filter:
  • by I_am_Rambi ( 536614 ) on Thursday October 31, 2002 @02:00PM (#4572343) Homepage
    Watch out for the EULA on service pack 3, its a killer.
  • by Telastyn ( 206146 ) on Thursday October 31, 2002 @02:02PM (#4572352)
    Hopefully the amount of hoops common criteria makes you jump through will be enough to 'persuade' microsoft into just keeping win2k around instead of EOLing it.
  • by MtViewGuy ( 197597 ) on Thursday October 31, 2002 @02:14PM (#4572421)
    What Linux really needs is the equivalent of Windows Update so you can get a full listing of what needs to be updated.

    With the rollout of UnitedLinux due anytime now, I hope they implement something akin to Windows Update so we don't waste valuable time chasing down manually every important software update to your Linux installation.
  • by Jim Norton ( 453484 ) on Thursday October 31, 2002 @02:15PM (#4572429)
    Just out of curiosity, but ... how does IIS run on Solaris?
  • Re:3 Service packs (Score:4, Interesting)

    by RagManX ( 258563 ) <ragmanx@@@gamerdemos...com> on Thursday October 31, 2002 @02:19PM (#4572468) Homepage Journal
    emerge rsync
    emerge -u world
    Or, if that doesn't cover everything well enough:
    emerge rsync
    emerge -u --deep world
    And I'm all up to date. Might occasionally have to rebuild the kernel, but other than that, emerge handles all my updates, and much more easily than M$ auto-crash installer. I love Gentoo.

    RagManX
  • What the CC means (Score:5, Interesting)

    by PotatoMan ( 130809 ) on Thursday October 31, 2002 @02:35PM (#4572601)
    OK. Enough with the childish flames. MS got a security rating. Good for them. Now, what does it mean?


    Read the description on the CC web site, and you'll see that the evaluation was for the development process, and that only part of the impementation was tested at all. (I wonder which part?)


    All of which, while interesting to some, is in the 'so what' category. Security is not a cert, or a product. Security is what you do.


    For example, Windows NT 3.5 was certified to the NIST 'C2' level (basically, C2 means you have separated the users and require a login). But there was no problem building a 'B2' level (mandatory access control) system with NT3.5; you just had to add some software and hardware to plug the holes.


    So these certs are of no use except to PR flaks. And trolls.

  • Re:3 Service packs (Score:2, Interesting)

    by CableModemSniper ( 556285 ) <.moc.liamg. .ta. .odlapacnagol.> on Thursday October 31, 2002 @02:43PM (#4572671) Homepage Journal
    I don't know about you, but I had to explicitly setup and install windows update notification gizmo to automatically d/l the patches. Same difference as making a a cron job, if a little prettier.
  • by hwyguy2 ( 174368 ) <cahwyguy AT cahighways DOT org> on Thursday October 31, 2002 @02:47PM (#4572707)
    Does Linux try for this certification? If so, how did they do? Is anything being done to ensure this? Does it matter?

    First and foremost, yes, it does matter. New government directives require the DoD, as well as other government agencies, to use common criteria products if they are available. Thus, if Linux doesn't have a CC evaluation, Win2K or Solaris will be used instead (or Irix, or Apple (in evaluation, check out niap.nist.gov, or any of the other unixes).

    The problem is: one has to pay for evaluation. Will any of the Linux shops do this? I don't know. I sure hope so.

    Daniel
  • by RedLeg ( 22564 ) on Thursday October 31, 2002 @02:53PM (#4572754) Journal
    Does anyone remember when Windows NT achieved C2 certification? It was:
    • An older version (3.5 or 3.51)
    • Without removable media (floppy or CDROM)
    • Without a network connection
    • Bound to the specific PC it was tested on
    • Of no real use to real users


    This certification isn't much different, in that is has no real meaning or value to end users. All it does is allow M$ to sell into markets, primarily government, where CC certification is a requirement.


    If a vulnerability is discovered in this certified version, there is nothing which forces M$ to make a correction. Further, if M$ issues Patches, HotFixes, Services Packs or whatever subsequent to this evaluation, they will NOT be certified, or even examined.


    Marcus Ranum (father of the Internet Firewall, speaking on CC evaluation of Firewalls) said it best:

    I once thought about trying to get a 10baseT hub ITSEC evaluated
    as a firewall (albeit a very permissive one) but the mountains of
    paperwork and the huge amount of time and money necessary are daunting.

    I'm sure that many on this list will be shocked to hear me say this, but the ICSA
    firewall product certification is orders of magnitude more valuable to real
    customers than ITSEC evaluation.
    Marcus' Full Quote [nfr.com]
  • by dboyles ( 65512 ) on Thursday October 31, 2002 @03:09PM (#4572902) Homepage
    Watch out for the EULA on service pack 3, its a killer.

    I see this as the main problem with closed-source software. I work at a university, and all of the professors in the department in which I work run Windows (95% are 2000 Professional). Security is a very big issue, because universities are often targeted by crackers because of our resources (bandwidth and hardware). Keeping computers secure is a difficult job when you're relying on a single vendor to (1) acknowledge security vulnerabilities and (2) provide patches for those vulnerabilities. If Microsoft doesn't want to acknowledge a flaw for fear of having egg on its proverbial face, we're SOL.

    So when they do issue patches/service packs, we're usually quick to apply them. But in the case of SP3, in order to secure our computers, we also have to accept an overly-broad EULA. A grad student geek and I were talking about this today while I was installing SP3 on a computer that had not yet had the patch applied.

    So do you give up control of your machines to Microsoft or to crackers? Right now we've chosen Microsoft, and I'm not completely convinced that the other alternative wouldn't be better.
  • Re:3 Service packs (Score:3, Interesting)

    by dboyles ( 65512 ) on Thursday October 31, 2002 @03:16PM (#4572971) Homepage
    I don't know any rational person who thinks that a patch is "bad." The problem with patches from Microsoft is that there are essentially four steps to them materializing:

    1. A vulnerability is discovered in Microsoft software
    2. Microsoft acknowledges the vulnerability
    3. Microsoft issues a patch
    4. Administrators apply the patch based on Microsoft's terms

    Ask yourself, who's in control of that entire process? Is it one entity? An entity that has an interest in profit and corporate image? Do you think those two things come before "what's best for the computing world?"

    Ideally, OSS eliminates the problems with this process. Anybody can discover a vulnerability, make it public, and issue a patch. Likewise, anybody can apply that patch in any way they see fit.

I've noticed several design suggestions in your code.

Working...