As to their second objection, counting the number of vulnerabilities isn't a satisfactory way of measuring the fitness of the product. I'd ask them to look at the severity of the vulnerabilities, and the speed of the vendor response to them. They should feel free to compare MySQL with Windows XP, for instance.
Follow that up with a list of VA programs already using MySQL (I'm sure they exist) and you should be in good shape for an appeal.
Failing that, I'd recommend EnterpriseDB, which recently got Postgres Common Criteria certified. It would be hard for them to object to that.
g
On Monday, 27 February 2012 at 07:43, Union Girl wrote:
> Below is a post I made to the Government Drupal4Gov listserv. Folks
> there suggested I also give it a try to post here.
>
> The gist is, my agency has not approved MySQL for the enterprise
> (their explanation is below). Drupal is now database agnostic, so I'm
> not so worried about D7 projects. I'm worried about getting mysql
> approved in general because I have Open Atrium ready to be deployed
> and it now can't be and when the new crawlers are finally up and
> running, it's going to cause issues for our Wordpress blogs as well.
>
> So, I would really like to be able to address these issues now and get
> mysql approved. Is there anyone here who can help with suggestions?
>
> --
> You received this message because you are subscribed to the "Military Open Source Software" Google Group.
> To post to this group, send email to mil...@googlegroups.com (mailto:mil...@googlegroups.com)
> To unsubscribe from this group, send email to mil-oss+u...@googlegroups.com (mailto:mil-oss+u...@googlegroups.com)
> For more options, visit this group at http://groups.google.com/group/mil-oss?hl=en
>
> www.mil-oss.org (http://www.mil-oss.org)
+1 on switch to Enterprise DB. Between the cert level and the ACID compliance of postgresql you'll be in better shape.
The is no separate FIPS 140-2 validation for "data in transit" or "data
at rest" (at least for the Level 1 and 2 validations I'm familiar with).
�I know nothing about the "VA 6500 Handbook" or even what agency she's
with (the VA perhaps?).
My sense is that she's in a position where she is opposed by a
bureaucratic entity, possibly for completely unrelated reasons, and that
is the excuse they are using.� If so then she is pretty much S.O.L. in
the absence of a more powerful advocate, as even if she successfully
contested the specific objections her opposition would just conjure up
another.
I've seen that sort of game played too many times. The first question to
ask if the objections are due to simple innocent ignorance, or
calculated intent.� Like as not it's the latter.
The count of CVE entries is a red herring, of course -- any non-trivial
produce has many such entries. Such a count includes all reports, past
and present, substantiated or not.
Note also the reference to "Oracle MySQL", implying she's getting it
from Oracle.� If so Oracle would be the one to fight the approvals
battle, and for commercial reasons they may not have much interesting in
furthering the use of MySQL.
> be considered for �approval with constraint,� with the constraint
> being that the database can only be run on a development or testing
> environment or air-gapped environment and must never be incorporated
> into the VA Enterprise Production Network.
>
> Additionally, the product (including numerous versions) has over three
> hundred reported entries within the DHS/US-CERT National Vulnerability
> Database <http://web.nvd.nist.gov/view/vuln/search-results?
> query=MySQL&search_type=all&cves=on> and has been found to have
> vulnerabilities including those that allow remote authenticated users
> to affect confidentiality and integrity via unknown vectors, SQL
> injection vulnerabilities which may allow users to execute arbitrary
> SQL commands, etc., and potential denial of service attacks.
>
> --
> You received this message because you are subscribed to the "Military Open Source Software" Google Group.
> To post to this group, send email to mil...@googlegroups.com (mailto:mil...@googlegroups.com)
> To unsubscribe from this group, send email to mil-oss+u...@googlegroups.com (mailto:mil-oss+u...@googlegroups.com)
> For more options, visit this group at http://groups.google.com/group/mil-oss?hl=en
>
> www.mil-oss.org (http://www.mil-oss.org)
--
You received this message because you are subscribed to the "Military Open Source Software" �Google Group.
To post to this group, send email to mil...@googlegroups.com
To unsubscribe from this group, send email to mil-oss+u...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/mil-oss?hl=en
www.mil-oss.org
--
You received this message because you are subscribed to the "Military Open Source Software" Google Group.
To post to this group, send email to mil...@googlegroups.com
To unsubscribe from this group, send email to mil-oss+u...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/mil-oss?hl=en
--
You received this message because you are subscribed to the "Military Open Source Software" Google Group.
To post to this group, send email to mil...@googlegroups.com
To unsubscribe from this group, send email to mil-oss+u...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/mil-oss?hl=en
�
www.mil-oss.org
You should be able to get FIPS 140-2 compliant data at rest protection outside of MySQL by encrypting the filesystem. Red Hat, for what it's worth, will do this out of the box. That should satisfy the requirement.