Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Fri, 22 Dec 2000 14:07:57 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Fri, 22 Dec 2000 14:07:47 -0500 Received: from router-100M.swansea.linux.org.uk ([194.168.151.17]:23044 "EHLO the-village.bc.nu") by vger.kernel.org with ESMTP id ; Fri, 22 Dec 2000 14:07:42 -0500 Subject: Re: The NSA's Security-Enhanced Linux (fwd) To: sandy@storm.ca (Sandy Harris) Date: Fri, 22 Dec 2000 18:39:49 +0000 (GMT) Cc: linux-kernel@vger.kernel.org In-Reply-To: <3A439833.C64D493A@storm.ca> from "Sandy Harris" at Dec 22, 2000 01:06:43 PM X-Mailer: ELM [version 2.5 PL1] MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-Id: From: Alan Cox Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org > These folks are good at what they do and the code is GPL. > It is worth starting to consider whether this code, or code > from one of the other security-enhancement projects, should > be included in the standard kernel for 2.6 or 3.0. I think this is a good point. Its actually a nice testimonial for free software that its finally got the NSA contributing code in a way that everyone benefits from and which may help cut down computer crime beyond government. (and which of course actually is part of the NSA's real job) > > It's just code like everone else produces. > > So people looking at it may find bugs and vulnerabilities the > implementers hadn't considered. Great. Yep. Im sure all sorts of people will be finding bugs in it because they are looking for secret NSA backdoors so why discourage them 8) - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org Please read the FAQ at http://www.tux.org/lkml/