lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20070705175531.GB5179@gateway.home>
Date:	Thu, 5 Jul 2007 19:55:31 +0200
From:	Erik Mouw <mouw@...linux.org>
To:	Theodore Tso <tytso@....edu>
Cc:	alan <alan@...eserver.org>, J?rn Engel <joern@...fs.org>,
	"H. Peter Anvin" <hpa@...or.com>,
	Jack Stone <jack@...keye.stone.uk.eu.org>,
	linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org,
	akpm@...ux-foundation.org, viro@...iv.linux.org.uk
Subject: Re: Versioning file system

On Wed, Jul 04, 2007 at 04:47:59PM -0400, Theodore Tso wrote:
> On Wed, Jul 04, 2007 at 07:32:34PM +0200, Erik Mouw wrote:
> > (sorry for the late reply, just got back from holiday)
> > 
> > On Mon, Jun 18, 2007 at 01:29:56PM -0400, Theodore Tso wrote:
> > > As I mentioned in my Linux.conf.au presentation a year and a half ago,
> > > the main use of Streams in Windows to date has been for system
> > > crackers to hide trojan horse code and rootkits so that system
> > > administrators couldn't find them.  :-)
> > 
> > The only valid use of Streams in Windows I've seen was a virus checker
> > that stored a hash of the file in a separate stream. Checking a file
> > was a matter of rehashing it and comparing against the hash stored in
> > the special hash data stream for that particular file.
> 
> And even that's not a valid use.  All the virus would have to do is to
> infect the file, and then update the "special hash data stream".  Why
> is it that when programmers are told about streams as a potential
> technology choice, it makes their thinking become fuzzy?  :-)

I meant valid like "not used as malware". I agree a virus could
recompute the hash and go unnoticed.


Erik

-- 
They're all fools. Don't worry. Darwin may be slow, but he'll
eventually get them. -- Matthew Lammers in alt.sysadmin.recovery

Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ