Re: [saag] Algorithms/modes requested by users/customers

Randall Atkinson <rja@extremenetworks.com> Wed, 20 February 2008 15:40 UTC

Received: from fort-point-station.mit.edu (FORT-POINT-STATION.MIT.EDU [18.7.7.76]) by pch.mit.edu (8.13.6/8.12.8) with ESMTP id m1KFeWMw014306 for <saag@PCH.mit.edu>; Wed, 20 Feb 2008 10:40:32 -0500
Received: from mit.edu (W92-130-BARRACUDA-2.MIT.EDU [18.7.21.223]) by fort-point-station.mit.edu (8.13.6/8.9.2) with ESMTP id m1KFeMYo017807 for <saag@mit.edu>; Wed, 20 Feb 2008 10:40:22 -0500 (EST)
Received: from ussc-casht-p2.corp.extremenetworks.com (ussc-casht-p1.extremenetworks.com [207.179.9.62]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (No client certificate requested) by mit.edu (Spam Firewall) with ESMTP id 78297CE1F1E for <saag@mit.edu>; Wed, 20 Feb 2008 10:40:01 -0500 (EST)
Received: from USEXCHANGE.corp.extremenetworks.com ([172.168.1.2]) by ussc-casht-p2.corp.extremenetworks.com ([10.255.181.88]) with mapi; Wed, 20 Feb 2008 07:40:00 -0800
From: Randall Atkinson <rja@extremenetworks.com>
To: Santosh Chokhani <SChokhani@cygnacom.com>
Date: Wed, 20 Feb 2008 07:39:59 -0800
Thread-Topic: [saag] Algorithms/modes requested by users/customers
Thread-Index: Achzx5t1Z954WaFCTeK7vP5dTSWgTAADDiZ/AAB557AAAA5/gw==
Message-ID: <8329C86009B2F24493D76B486146769A9596B151@USEXCHANGE.corp.extremenetworks.com>
References: <20080220131048.55faab0b@cs.columbia.edu>, <E1JRpLO-0006MQ-Lc@wintermute01.cs.auckland.ac.nz> <8329C86009B2F24493D76B486146769A9596B14F@USEXCHANGE.corp.extremenetworks.com>, <FAD1CF17F2A45B43ADE04E140BA83D483C4EEB@scygexch1.cygnacom.com>
In-Reply-To: <FAD1CF17F2A45B43ADE04E140BA83D483C4EEB@scygexch1.cygnacom.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
X-Spam-Score: 0.02
X-Spam-Flag: NO
X-Scanned-By: MIMEDefang 2.42
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by pch.mit.edu id m1KFeWMw014306
Cc: "saag@mit.edu" <saag@mit.edu>
Subject: Re: [saag] Algorithms/modes requested by users/customers
X-BeenThere: saag@mit.edu
X-Mailman-Version: 2.1.6
Precedence: list
List-Id: IETF Security Area Advisory Group <saag.mit.edu>
List-Unsubscribe: <http://mailman.mit.edu/mailman/listinfo/saag>, <mailto:saag-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/saag>
List-Post: <mailto:saag@mit.edu>
List-Help: <mailto:saag-request@mit.edu?subject=help>
List-Subscribe: <http://mailman.mit.edu/mailman/listinfo/saag>, <mailto:saag-request@mit.edu?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2008 15:40:32 -0000

Earlier, Santosh Chokhani wrote:
% Orange Book was not about OS security alone.
%
% It was successfully applied to network components and DBMS systems also.

Santosh,

I was using terms precisely, not loosely.

The network evaluations were done against Red Book (TNI)
published as NCSC TG-005, and not against the Orange Book
proper.

DBMS evals were done against the Purple Book, published
as NCSC TG-021, and not against the Orange Book
proper.

(I have a full set of colouring books to hand from
a previous life.  :-)

Cheers,

Ran