Re: Linux login security approaches

Barrett G. Lyon (blyon@netpr.com)
Sun, 13 Dec 1998 05:07:06 -0600


>Anyways, I know that there are some folks who want C2 -- just remember
>that the security model is more than a little different from what most
>people need in most contexts.

Corporations get the warm and fuzzys from C2 security compliance. For an
example: A new web server is needed and a large corporation buys an
HP9000/HP-UX box to do the job, the internal HP support team loads it up
with the 'C2 security patch' and management thinks that the box is secure
because of this.

It is all a learning curve that management needs to come up to.

Ohh well..

-B

--
Barrett G. Lyon                        PGP: www.netpr.com/pgpkeys
Data & Network Security Consultant     Fax: 310-737-0196
Network Presence, LLC                Email: blyon@netpr.com
--

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/