Windows Gets Independent Security Certification 207
linumax writes "Microsoft Corp. on Wednesday clinched Common Criteria security certification from the U.S. government's National Information Assurance Partnership for six versions of its flagship Windows OS. The products receiving CC certification include Windows XP Professional with Service Pack 2 and Windows XP Embedded with Service Pack 2. Four different versions of Windows Server 2003 also received certification. Common Criteria certification, which was ratified as an international standard in 1999, helps customers in key market segments evaluate IT products when making software purchase decisions and contribute to higher levels of consumer confidence in IT product security, Lipner said. SuSE Linux ES 9 has already achieved the certification and almost a year away from being released, Red Hat Enterprise Linux 5 is on the path toward EAL4 certification."
Hehe (Score:5, Funny)
Re:Hehe (Score:2)
It got an even higher one without networking.
In other news... (Score:4, Funny)
Soon to hit news stands (Score:5, Funny)
From Wikipedia on a previous certification: "The fact that Microsoft Windows 2000 remains an ISO 15408 certified product, without including the application of any Microsoft security vulnerability patches in its evaluated configuration, shows both the limitation and strength of an evaluated configuration."
I believe that it also shows the limitation and inherent weakness of this criteria as a "security" certification or a confidence booster for consumers. Unless, of course, anyone here reasonably believes that any completely unpatched version of Windows is secure by any stretch of the imagination. I read about a machine like that once that never needed patching... it was unplugged from the net, stripped of all peripherals, dipped in molten lead, and buried inside 10m^3 of concrete and dropped into the middle of the ocean, thus becoming the most secure PC ever. I think it ran FreeBSD, too.
Not secure enough (Score:3, Funny)
Re:Not secure enough (Score:3, Interesting)
Actually if you want to get serious about it they should use a "Trusted" OS like Trusted Solaris or similar OS that uses mandatory access controls. OpenBSD does not have support for that in the base configuration the last time I checked, although it is probably sufficient for general purpose computing.
Re:Not secure enough (Score:3, Interesting)
If you really want MAC though, TrustedBSD was merged back with FreeBSD in the 5.x branch, and is there in the latest releases. I seem to recall that Solaris 10 and Trusted Solaris now use the same codebase too, so that's another op
Re:Soon to hit news stands (Score:2)
Re:Soon to hit news stands (Score:2, Insightful)
And, a default Windows install can be connected to the net with no firewall, NAT or proxy, or any AV software for like 8 seconds before becoming infected with Skynet and its kin.
Re: (Score:2)
Re:In other news... (Score:4, Funny)
Re:In other news Want past "Warp EAL4" security? (Score:2)
BWAHAHAHAHAHAAH
There's someone that's never programmed Windows.
Perfect timing (Score:5, Interesting)
The important thing is the profile. (Score:5, Informative)
I took a security-related class not too long ago. The prof pointed out that the CC is basically worthless. The important thing is the profile. For example, he said most CC certifications are given out for a profile of a system on a friendly network that is not physically accessible to untrusted users. How useful is that?
He also said something to the effect of: You can claim that your security policy has never been breached, as long as your policy is to not check security.
The problem is that government perpetuates this by requiring people/companies to spend tons of money on this stuff to get "approved" for government use.
Re:The important thing is the profile. (Score:5, Insightful)
Re:The important thing is the profile. (Score:3, Interesting)
Re:The important thing is the profile. (Score:2)
Re:The important thing is the profile. (Score:2)
Re:The important thing is the profile. (Score:2, Informative)
2) Unless the machine has no floppy drives, USB ports, or CD-ROMs, a live CD would allow an attacker with physical access to the machine to boot, image the hard drive to an external device (like an IPOD) and decrypt it later.
There are ways around any security. Sometimes, it is just a little more tim
Re:The important thing is the profile. (Score:2)
2. Live CDs can be disabled by setting a BIOS password. Sure, an attacker could convince someone to let him reset the BIOS by disassembling the computer. That would be a masterful feat. And how does the attacker decrypt the harddrive once it is stored on the IPOD?
Re:The important thing is the profile. (Score:2, Insightful)
However, I think that organizations like the CIA, KGB, Mossad, and other big-time intelligence agencies would go through that kind of effort to socially engineer access to systems.
If you can get
Re:The important thing is the profile. (Score:3, Insightful)
I think you underestimate (or overlook entirely) the efficacy of low-tech methods of social engineering. If I have possession of your secure computer, and the information on it is valuable enough to me, I'll just fucking beat the password/token/keycard/whatever out of you.
Sadism trumps encryptio
Re:The important thing is the profile. (Score:2, Interesting)
go here and find yours today:
http://www.biosflash.com/e/bios-passwords.htm [biosflash.com]
Re:The important thing is the profile. (Score:2)
Also don't forget lead pipe cryptography...
there is no way there can be no way... (Score:3, Interesting)
But if the machine can boot itself and access that disk, then the machine itself contains all the information needed to decrypt the data on the disk. And thus someone can break into it by definition. It may be difficult, but it's certainly possible.
This is why Kerberos key granters are locked away.
then you need to not turn it off... (Score:2)
To be honest, I had thought of the same thing you did, and I tried to fix my text to cover that case. But I didn't get the edits right. Whoops. It's always most difficult to proofread your own text. I see it as saying what I meant to say instead of what it actually says.
Re:The important thing is the profile. (Score:2, Insightful)
Re:The important thing is the profile. (Score:2, Insightful)
Re:The important thing is the profile. (Score:2)
That defends against access AFTER the machine has been turned off, but with physical access to a machine while it's up, that does you no good. You can simply attach a debugger to a process that has legitimate access to the encrypted information, and dump the information returned from read(2) (assuming POSIX semantics).
"How about if there were no ways for this attacker to gain root priveliges from a local login"
Given physical access, that's almost impossible to arrange. Fo
Re:The important thing is the profile. (Score:2)
I'd like to think that.
I suspect that the reality is a Dell PC sits beside the desk, and there's a stack of music CDs piled on top of it, some of which are the new Sony rootkit installatio
Re:The important thing is the profile. (Score:2)
1) determine the smallest possible window of time when the system was broken
2) prevent an attacker from inserting messages into the system, even with root acc
Re:The important thing is the profile. (Score:3, Insightful)
Re:The important thing is the profile. (Score:2)
Fine, then yank the power cord, bust open the case and remove the drive. Pop a USB adapter on it and plug it into another machine. Now you can start working on getting the data without having to boot from the drive or without any other part of the system getting in the way.
This is where a TCPA TPM becomes useful. You can encrypt the data with a key stored in the TPM and bound to a particular boot profile. If you attach the drive to a different machine, or boot the machine off of another device, or with
Re:The important thing is the profile. (Score:2)
This is false on it's face. People have physical access to ATM machines all the time. Many of them run Windows now. There are tons of ways to secure machines from physical attack and make the game far from over. Granted it's not Windows thats doing it but it *is* Windows that is being secured.
Re:The important thing is the profile. (Score:2)
Sorry but you don't have physical access to computer inside the ATM machine. It's locked in a steel box, designed to prevent access and aleart authorties when you try to gain access.
Profile + ST (Score:2)
It is only people that fail to understand the set purpose of the CC that claim it has no value.
EAL4 is just the common level to evaluate products at, because it is internationally recognized.
The Information Assurance Technical F
Of course... (Score:5, Informative)
Amazing... (Score:3, Insightful)
Re:Amazing... (Score:4, Interesting)
Care to back that up with references? Or is this just typical Slashdot trolling?
Re:Amazing... (Score:2)
He did back it up with references. Their software collection that just got officially declared "Spiffy, +3" is demonstrably not secure, as per the link he provided (and many others just like it).
Since the OS obviously does not meet the generally accepted standards for "secure", but it was certified as such anyway, there are two possibilities:
Re: (Score:2)
I hereby announce this.. (Score:5, Funny)
Therefore, ELKS is the most secure OS in the world.
The press meeting will be at 24:01 December 31st.
From TFA (Score:5, Insightful)
I'm just mentioning this to help cut off some of the anti-MS crap that's going to get modded up as insightful.
Using Internet Explorer is still a bit like playing Russian Roulette perfect, but the security of Windows has come a long way.
Re:From TFA (Score:5, Informative)
For example, an administrator can be denied access to a file. The admin can change the ACLs by taking ownership, but doing this generates a log event. Deleting the logs generates another log event. AFAIK, it's impossible to restrict the unix superuser in this way.
Probably not important in most environments, but for government-type security it can be.
Re:From TFA (Score:5, Informative)
You're comparing an administrator user (which is a preset level of privilege on Windows) with the root user on a Un*x system, which is apples to oranges. The root user on Un*x is more properly compared to the LocalSystem account on Windows. The key difference is that the LocalSystem account never has a password so you can never log in as LocalSystem. However, many Un*x systems (e.g. Mac OS X) also have root accounts that don't have a password (and thus you cannot log in as root) or at least disallow remote root logins, giving them similar levels of account protection.
In fact, the restrictions on the default administrator account on Windows are weaker than those given to administrator accounts on Mac OS X -- a Windows admin can write to \Windows\System32 without elevated privileges, which pretty much means game over if the attacker can get the admin to execute a script (e.g. through a browser flaw) that puts DLL's into the directory. In contrast, a a Mac OS X admin needs to authenticate and temporarily gain elevated privileges to write to the equivalent location,
--Paul
Re:From TFA (Score:5, Insightful)
There is no real comparison, because the security models are fundamentally different.
In unix, if you're root, you can do anything. "Security" checks basically start with an "if (UID != 0)".
In Windows, all accounts are subject to ACLs. Some accounts have more generous ACLs than others, but there is no equivalent to the "can do anything"-ness of a unix root account.
In fact, the restrictions on the default administrator account on Windows are weaker than those given to administrator accounts on Mac OS X -- a Windows admin can write to \Windows\System32 without elevated privileges, which pretty much means game over if the attacker can get the admin to execute a script (e.g. through a browser flaw) that puts DLL's into the directory. In contrast, a a Mac OS X admin needs to authenticate and temporarily gain elevated privileges to write to the equivalent location, /System/Library.
This comparison is flawed. An "Administrator" account in OS X is a completely different thing to an "Administrator" account in Windows - not only in concept, but also in execution. An OS X admin account is more properly compared to a "Power User" in Windows - but even then the two are still very different due to the different security models. An OS X "admin" account is simply one that can sudo to root - thus giving it complete control over the entire machine, with no further permissions checks performed at all. Since Windows has no equivalent of root, it has no equivalent to an OS X "Administrator" user. A "Power User" is similar in purpose (limited administrative abilities, but can't destroy the machine wantonly), but very different in execution.
Re:From TFA (Score:3, Informative)
Re:From TFA (Score:2)
True, but the selinux and the window security models are remarkably similar on paper.
The big problem with windows security is that it has been left as an exercise for the reader, and if you document your secure windows system, you might be able to turn it is for your PhD dissertation. (I am exaggerating, but not by much.)
Selinux is slowl
Re: (Score:3, Interesting)
Re:From TFA (Score:2)
Not exactly, the root account is disabled. If it had no password you could log in with no password but by putting an '*' in the beginning of a password field in the passwd file, you disable that user account. This is the way that OS X ships. Once you remove the *, you can log in as the root user.
Re:From TFA (Score:2)
Re: (Score:2)
Re:From TFA (Score:2)
Re:From TFA (Score:2)
As for linux not being unix that's just a nitpick. Nicely done though, that's a very professional wordsmithing, something worthy of a PR firm or a paid astro turfer.
Re:From TFA (Score:2)
Re:From TFA (Score:2)
If you consider FreeBSD to be Unix, then consider chflags [freebsd.org] and securelevel [freebsd.org]. Together, they can prevent even root from having more than read-only access to a file. Same goes for OpenBSD, and I think NetBSD as well.
Comment removed (Score:5, Insightful)
Re:Infinite recursion? (Score:2)
Why would it have to be a large chunk of time? Couldn't it be a fraction of a second if you write a script to do it? My point is that if someone has "root" (I know this is Windows we're talking about) access to a machine, if they're clever enough, they can basically cover anything up.
Re:Infinite recursion? (Score:2)
Or use a kernel-level debugger to halt the log service (this happens outside the services framework and won't generate events) and edit the log there, or even redirect it's file handles elsewhere, or any number of things. There are other even more obscure things you can do, but they get progressively more difficult and awkward.
The Windows security model is powerful (m
Re:From TFA (Score:2)
I can attest to that as well. Windows is fairly secure except MSFT made IE such an integral part of Windows. You end up with a situation where Windows is secure but the most accessible and vulnerable part of it can get you right past all those defense. It's akin to putting a screen door on a vault.
Re:From TFA (Score:3, Insightful)
Bollocks. IE is normal user space code just like Firefox or Word. It can't do anything more than any other code running under that user account can.
The "integration" of IE - in and of itself - doesn't make Win
Re:From TFA (Score:2)
The problem with IE's low-level integration is that little versions of the IE rendering engine appear all over the place: in the help system, in MSN/W
Re:From TFA (Score:2)
Yes, it's come a long way from previous versions of Windows.
Doesn't mean it's any good now, especially when compared to what else is available.
Re: (Score:2)
Re:From TFA (Score:2)
Agreed. But Internet Explorer in still unremoveable from Windows.
Tiger? (Score:4, Interesting)
As a Windows user considering the switch to the Intel Mac's coming soon, I'm curious if Tiger (OS 10.4.4 or whatever) has gotten this certification? I know the argument is that you're more secure no matter what since no one writes spyware etc for the Mac, but is it certified? I'm honestly curious, so I know what I'm in for.
Mac OS X 10.3.6 is Common Criteria certified (Score:5, Informative)
Re:Tiger? (Score:3, Informative)
Re:Tiger? (Score:2)
You mean I should be asking if this certification actually means anything? Yeah, well I assume it can be taken with a grain of salt, but here on Slashdot whenever Windows security gets compared to Suse and Red Hat it can't be all bad...
Re:Tiger? (Score:2)
How did switching to macs reduce the *spam* you had incoming?
Re:Tiger? (Score:2)
Maybe he meant outgoing spam as his machines had already been taken over and were slaves to a spammer somewhere.
trusted != secure (Score:5, Informative)
Higher EAL levels do not necessarily imply "better security", they only mean that the claimed security assurance of the TOE has been more extensively validated. [wikipedia.org]
This just means that it does what they claim. I'd be more interested in seeing what the security claims were....
I'm SO tired of explaining this... (Score:2)
You have this thing called a Protection Profile (PP). It defines the kind of environment the computer/OS will be operating in: Is it networked? What kind of hardware does it have? Software? If it is networked, is the network friendly or hostile? etc.
So, what MS does is have a their OS graded on a really pussy PP (not networked, in a friendly environment, locked in a vault so there's no physical access, etc) and say "Our product is secure (what "secure" means i
Boy... (Score:3, Funny)
Does this actually mean anything? (Score:5, Insightful)
Microsoft did this with POSIX support for Windows NT; NT's Posix is next-to-useless (they don't have fork(), for example) but Microsoft got it so that they could tell the relevant people "See, NT is posix-aware."
Another example: Internet Explorer for Solaris. Probably one of the most horrible browsers out there; Microsoft only did it so companies that said "We standardize on one browser for all users" could standardize on IE. Microsoft had no real intention of supporting Solaris.
In fact, I will go so far to say that Microsoft's proposed "open document format" doesn't exist because Microsoft has any intention of opening up their format, but so that Microsoft can meet Massachusetts' requirement to have an "open" format. This is why Massachusetts should continue to tell Microsoft that they will not use Office Vista until it supports the Open Document [oasis-open.org] standard.
So this doesn't sound like a typical anti-Microsoft post, I will say that Microsoft products are far easier to learn than the Linux equivalents, and that Microsoft made some beautiful fonts [sourceforge.net] the blow away anything for Linux.
Microsoft POSIX is a sham (Score:2)
The only reason they did this POSIX sham, I understand, is because of US Government requirements for POSIX. Nobody
Re:Office Vista Document (Score:2)
Why should MA require them to use Open Document? It's not like XML transformations are all that tough as long as we've got the schemas which we should in this case. If Microsoft's public schema isn't complete, MA won't use Microsoft Office because it doesn't comply with the law.
The state seems to be interested in making sure they have perpetual access to the schema. As long as Office write
Re:Office Vista Document (Score:2)
What do you mean by Microsoft's open document format not existing?
The format exists, but it's not open per the MA definition. The fact that a schema exists and is published is far from adequate to meet the requirements.
Re:Does this actually mean anything? (Score:2)
Microsoft didn't make the fonts, they licensed them from Monotype. And IMHO they don't blow away Bitstream Vera.
Nice try though, appreciated. So this doesn't sound like a typical anti-Microsoft post, I will say that... uhm... they make nice joysticks!
What does EAL4 mean? (Score:5, Informative)
Evaluation assurance level 4 (EAL4) - methodically designed, tested, and reviewed
Objectives
EAL4 permits a developer to gain maximum assurance from positive security engineering based on good commercial development practices which, though rigorous, do not require substantial specialist knowledge, skills, and other resources. EAL4 is the highest level at which it is likely to be economically feasible to retrofit to an existing product line.
EAL4 is therefore applicable in those circumstances where developers or users require a moderate to high level of independently assured security in conventional commodity TOEs and are prepared to incur additional security-specific engineering costs.
Assurance components
EAL4 (see Table 6.5) provides assurance by an analysis of the security functions, using a functional and complete interface specification, guidance documentation, the high-level and low-level design of the TOE, and a subset of the implementation, to understand the security behaviour. Assurance is additionally gained through an informal model of the TOE security policy.
The analysis is supported by independent testing of the TOE security functions, evidence of developer testing based on the functional specification and high-level design, selective independent confirmation of the developer test results, strength of function analysis, evidence of a developer search for vulnerabilities, and an independent vulnerability analysis demonstrating resistance to penetration attackers with a low attack potential.
EAL4 also provides assurance through the use of development environment controls and additional TOE configuration management including automation, and evidence of secure delivery procedures.
This EAL represents a meaningful increase in assurance from EAL3 by requiring more design description, a subset of the implementation, and improved mechanisms and/or procedures that provide confidence that the TOE will not be tampered with during development or delivery.
Assurance class
Assurance components
Class ACM: Configuration management
ACM_AUT.1 Partial CM automation
ACM_CAP.4 Generation support and acceptance procedures
ACM_SCP.2 Problem tracking CM coverage
Class ADO: Delivery and operation
ADO_DEL.2 Detection of modification
ADO_IGS.1 Installation, generation, and start-up procedures
Class ADV: Development
ADV_FSP.2 Fully defined external interfaces
ADV_HLD.2 Security enforcing high-level design
ADV_IMP.1 Subset of the implementation of the TSF
ADV_LLD.1 Descriptive low-level design
ADV_RCR.1 Informal correspondence demonstration
ADV_SPM.1 Informal TOE security policy model
Class AGD: Guidance documents
AGD_ADM.1 Administrator guidance
AGD_USR.1 User guidance
Class ALC: Life cycle support
ALC_DVS.1 Identification of security measures
ALC_LCD.1 Developer defined life-cycle model
ALC_TAT.1 Well-defined development tools
Class ATE: Tests
ATE_COV.2 Analysis of coverage
ATE_DPT.1 Testing: high-level design
ATE_FUN.1 Functional testing
ATE_IND.2 Independent testing - sample
Class AVA: Vulnerability assessment
AVA_MSU.2 Validation of analysis
AVA_SOF.1 Strength of TOE security function evaluation
AVA_VLA.2 Independent vulnerability analysis
Re:What does EAL4 mean? (Score:2)
Does this mean that it can defeat an attack that is most likely not going to succeed?
Wow. Just wow.
Re: (Score:3, Funny)
What EAL4 means... (Score:2, Interesting)
Each of the areas that Common Criteria cares about has an extensive set of "things in this area about which we care" that is the source of the ADO_IGS.1 (&c) items above. For a software item such as an OS, think of those as "claims".
For any area, the EAL just shows t
Take long? (Score:5, Funny)
CCS = Entry Level certification; CCS profiles need (Score:5, Informative)
What's important is CCS Profiles, which allow one to tune the OS to the security level you need ("one size does not fit all"). AFAIK, MS Windows does not have profiles.
That's said, it's great that Microsoft is starting to get serious about security.
Re:CCS = Entry Level certification; CCS profiles n (Score:2)
Well, 2000 has been EAL4 certified as well for quite some time now, so when we're speaking of those certifications, I think it's only that they take some time to get, not that Microsoft has just recently started considering them.
Smiley faces for everyone !! (Score:3, Funny)
So, who sets the security requirements? Does this certification have any value, or is it the equivalent of "smiley faces for everyone"?
Windows is safe, secure, and unbreakable* (Score:2, Funny)
*Disclaimer: This post requires flexible definitions of safe, secure, security, and unbre
Audit (Score:2, Interesting)
Re:Audit (Score:2)
One might also conclude that the PRC government's move toward their very own linux distribution, Red Dragon Linux, is a result of that MS source code security audit.
While that does predate Microsoft's release of Windows XP Pro SP2, there seem to be enough other vulnerabilities in MS OSes that the PRC has not, at least publicall
EAL means nothing without PP (they've got one!) (Score:5, Informative)
EAL stands for "Evaluation Assurance Level". Your EAL level describes the degree to which you demonstrated your claims. It says almost nothing about what those claims are. It's an exaggeration to say you could get EAL 4 on a brick by claiming that it would stay put when you dropped it, but not a big one.
The claims are contained in your Security Target (ST), which is a series of claims about the Target of Evaluation (ToE). Your ST doesn't necessarily have to include many claims relevant to good security, and your ToE can exclude many subsystems and capabilities of the system being certified. To use a pre-CC example, Windows NT got an Orange Book certification by specifying that the certified system could not be connected to a network.
If you want to adhere to a standard that tries to verify that your ToE includes capabilities that make your device useful and that your ST makes claims which really mean something about the security properties of device, you demonstrate compliance with a published Protection Profile (PP). In the US, there are a series of PP's published . These PP's describe relevant capabilities and security properties for systems used in various roles (for example, a traffic filter firewall for low risk environments).
Without a PP, the only way to know what that EAL 4+ actually means is to closely read the ToE and the ST to figure out just how thin they sliced the salami.
Having said all that, a tiny bit of research confirms that Microsoft actually certified these systems against the Controlled Access PP. This is a basic robustness standard (by comparison, Red Hat Linux 5 is also certified against the Labeled Security PP and the Role Based Access Control PP, which assert more robust security capabilities), but it's quite a bit more than nothing, and quite a bit more than many companies do to get their "we do Common Criteria" marketing claim.
Color me impressed.
The "common criteria" are very weak (Score:5, Informative)
Vendors hated this process. First, the vendors didn't control the test process - the National Security Agency's Central Security Service did. NSA's policy back then was that you got two tries to pass validation. On the first try, the vendor was told of problems found, and given a chance to fix them. The second try was strictly pass/fail, and might include tests that the vendor had never seen. So it was quite possible, and common, for products to flunk and be cut out of procurements.
The Common Criteria process, on the other, hand, is conducted by third party labs paid by the vendor. So they're very "responsive" to the vendor.
The "Common Criteria" are comparable to the class C Orange Book standards. They're very weak. There was heavy lobbying by the computer industry to water down the Orange Book standards, and that lobbying was successful.
The evaluation report for Windows XP is online. [microsoft.com] It's worth reading, even though it's long.
Common Criteria (Score:3, Informative)
worthless (Score:3, Insightful)
Companies like Microsoft love standards like CC because they don't have to provide actual security, they just have to add lots of features to their operating system, and Microsoft is great at adding features.
If you want to achieve real security, your best bet is to remove as much unnecessary functionality from a system as possible, and that includes a lot of the junk that CC requires.
Primer (Score:4, Informative)
EAL4+ is a fairly high level, and not easy to reach. This was serious work and money invested for M$.
However, do keep in mind that CC is much more about assurance than about security. In fact, most (and in many cases the most difficult to meet) requirements are in the development and documentation areas.
What EAL4+ does mean is that windos isn't a quickly hacked together bundle of hogwash (even though it looks like that at times), but was systematically developed, using version control software and systematic testing as well as being extensively documented.
Usually, this goes together with a higher software quality, and high software quality usually means higher security.
Ow...Ow...Ow...Ow (Score:3, Funny)
Ouch! Oh, great. Now I have...Ouch!...monkies flying out of my butt. Ouch!
Windows is 100% secure, but not 100% safe. (Score:3, Interesting)
Failed my check (Score:2)
Starting Nmap 3.95 ( http://www.insecure.org/nmap/ [insecure.org] )
Interesting ports on windows2k:
(The 1662 ports scanned but not shown below are in state: closed)
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
Since actually using windows requires this kind of setup, and closing these ports usually breaks things like outlook and filesharing, I'd say in such cases, windows is still a security failure. At least until the netbios protocol stack gets fixed or removed which
Where to look (Score:2, Informative)
http://niap.nist.gov/cc-scheme/in_evaluation.html [nist.gov]
http://niap.nist.gov/cc-scheme/vpl/vpl_type.html [nist.gov]
Re:[OT] sig (Score:2)