Fedora Core 2 Test 2 - delayed

Russell Coker russell at coker.com.au
Fri Feb 27 13:09:58 UTC 2004


On Fri, 27 Feb 2004 23:54, Leonard den Ottolander <leonard at den.ottolander.nl> 
wrote:
> How well scrutinized is this NSA code actually? Everybody can see they
> won't slip in an obvious backdoor, but how about nasty little overflows,
> tucked away deep inside the code, for which they already have exploits
> in their drawer?

If you create an account on a free mail service and send in a patch to Linus 
that looks good there's a chance that it will get accepted.

If the NSA people were going to do something nasty why would they do it in 
code that's got their name on it when they could send in code from 
random_user at hotmail.com?

Also the SE Linux kernel code is written in a clearer style than most kernel 
code.  If you want to audit code for correct operation the SE Linux code will 
be easier than most.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page





More information about the fedora-devel-list mailing list