--- Joshua Brindle <method@xxxxxxxxxx> wrote:When I see an analysis of every line of source code on an average Linux machine then I might believe you (if you'll grant that no software can ever be installed on it afterward without being analyzed) but until then I'll stick with a centralized policy. I doubt many others will be satisfied with that limitation.
The first system I took through evaluationThats great but entirely irrelevant in this context.
(that is, independent 3rd party analysis) stored
security attributes in a file while the second
and third systems attached the attributes
directly (XFS). The 1st evaluation required
5 years, the 2nd 1 year. It is possible that
I just got a lot smarter with age, but I
ascribe a significant amount of the improvement
to the direct association of the attributes
to the file.
The patch and caps in question are not attached to the file via some
externally observable property (eg., xattr) but instead are embedded in
the source code so that it can drop caps at certain points during the
execution or before executing another app, thus unanalyzable.
Oh that. Sure, we used capability bracketing
in the code, too. That makes it easy to
determine when a capability is active. What,
you don't think that it's possible to analyze
source code? Of course it is. Refer to the
evaluation reports if you don't believe me.