[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Subject: RE: Proposal for a local initiative



"alkolwicz" <alkolwicz@xxxxxxxxx> Sun, 29 Feb wrote:

>> CVV cannot take on the responsibility to find the defects -- this takes big bucks... <<

All of the OS defects/vulnerabilities that I listed have already been found - they are known, indexed, publicized and admitted. It is minimal system management to patch them, and it should be minimal contract performance by Hart/InterCivic to prove before certification that for all known defects there exist issued patches, and only then sign off that all issued patches have been installed and can be verified and tested by the State certification process. The verification by CVV would not be a discovery, identification, reporting, or testing function - but rather simply to demand the proof of patch existence for each known defect before the application for certification.

"Pete Klammer" <pklammer@xxxxxxxxxxx> Sun, 29 Feb 2004 wrote:

>> How do you reconcile patching with certification? <<

This is the crux of Hart/InterCivic's problem as the vendor of a (presumably) well-intentioned system based on a fundamentally flawed and interminably patched OS: it can NEVER be certified in a reasonable (or even finite) time span. If the SOS and County election people try to claim the system is certified or certifiable, they must prove all known defects are patchable. At the moment this is impossible, because Microsoft has not caught up with issuing patches (never has, IMHO never will). The only alternative becomes a verifiable paper ballot of record, which will probably only be brought about by court order, via the ACLU with an air-tight case.

>> So any alteration, including a vendor-supplied security patch, jeopardizes the validity of the certification. Furthermore, the protocol and hygiene of vendor-directed patching breaks the seal, and creates a channel, for malicious changes. Who watches the patchers? Who vets the patch contents? <<

CVV would not watch anyone nor vet anything - CVV simply demands proof BEFORE any consideration of certification that every known defect XXX-XX-X has an available patch YYY-YY-Y. The OS will always lack a vital patch, the vendor can never prove the non-existent patch has been installed, any certification claimed is invalid and must await the final patch of the last known vulnerability. The vendors, whether M$ or InterCivic, cannot meet the burden of proof that the system has been or can be certified. As I understand it, M$ System 2003 is already scheduled for unsupported obsolescence and will never be fully patched. InterCivic's black box is doomed NEVER to be certifiable by any trustworthy process.

Lou

-----Original Message-----
From: Lou Puls [mailto:lpuls@xxxxxxxxxxxxx]
Sent: Sunday, February 29, 2004 12:19 PM
To: cvv-discuss@xxxxxxxxxxxxxxxxx
Subject: Proposal for a local initiative