[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2629CC4E1D22A64593B02C43E855530304807436@USILMS12.ca.com>
Date: Tue, 5 Aug 2008 12:37:45 -0400
From: "Press, Jonathan" <Jonathan.Press@...com>
To: "Eric Paris" <eparis@...hat.com>
Cc: "Greg KH" <greg@...ah.com>, <linux-kernel@...r.kernel.org>,
<malware-list@...ts.printk.net>
Subject: RE: [malware-list] [RFC 0/5] [TALPA] Intro to a linux interfaceforon access scanning
Regarding self-exclusion... We are doing write-time scanning, or more
accurately close-time scanning. We don't block the close, but we do
scan the file afterwards, and if it is infected, we perform any one of
several actions -- such as report to user, rename, quarantine, delete,
etc. I would not want a self-excluded executable to be able to write
something that I don't get to scan.
Regarding exclusion by name, etc... You are right. I am accustomed to
thinking about our current architecture, which does not involve a
published interface. I have to adjust my thinking. Putting such a
feature into the kernel would not be a good idea. We can handle it in
user space.
Jon
-----Original Message-----
From: Eric Paris [mailto:eparis@...hat.com]
Sent: Tuesday, August 05, 2008 10:57 AM
To: Press, Jonathan
Cc: Greg KH; linux-kernel@...r.kernel.org; malware-list@...ts.printk.net
Subject: RE: [malware-list] [RFC 0/5] [TALPA] Intro to a linux
interfaceforon access scanning
On Tue, 2008-08-05 at 10:41 -0400, Press, Jonathan wrote:
> I share the concern here. The idea that a piece of malware can
exclude
> itself seems nasty to me. I am not an expert on writing malware, but
it
> intuitively seems to me to be a huge opportunity for creativity. The
> argument that it's ok because anything that the malware writes will
> eventually be scanned anyway does not reassure me.
You aren't doing write time scanning anyway. This exclusion means that
an 'excluded' process can OPEN things that would normally be called
malware. The model here doesn't talk about adding files with bad
information to the system it talks about stopping that bad information
from being opened and propagated further. Thread exclusions as they are
written in the patch only weaken security to those processes which
actively choose to read malware, it in no way weakens the security of
the system as a whole...
>
> Also... I was one of the people who brought up the idea of a process
> exclusion when the requirements list was being developed. I intended
it
> as a way that an AV application could exclude specific OTHER processes
> by name (as selected by the AV user) -- not as a way that a process
> would exclude itself. I don't think that the implementation here
> reflects this goal, which still seems to me to be a requirement.
Wait wit, you'd rather have a 'privileged' process be allowed to exclude
every other process on a system than have a it only be allowed to
exclude itself? and somehow that is safer?
"by name" is right out the window. You are never going to win 'by name'
on anything to do with the kernel :) Maybe you can get me to
eventually buy into 'by pid' or something like that, but setting flags
on other running processes is always going to be racy and scary for me.
Can you show me some code on how to do this cleanly? And why it needs
to be done in kernel?
What is the goal you are trying to achieve? A performance win for the
application in question or is this a security aware application that
needs to be able to access 'sensitive' data?
-Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists