[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080805211445.GA28304@kroah.com>
Date: Tue, 5 Aug 2008 14:14:45 -0700
From: Greg KH <greg@...ah.com>
To: "Press, Jonathan" <Jonathan.Press@...com>
Cc: Theodore Tso <tytso@....edu>,
Arjan van de Ven <arjan@...radead.org>,
Eric Paris <eparis@...hat.com>, linux-kernel@...r.kernel.org,
malware-list@...ts.printk.net,
linux-security-module@...r.kernel.org
Subject: Re: [malware-list] [RFC 0/5] [TALPA] Intro to alinuxinterfaceforon
access scanning
On Tue, Aug 05, 2008 at 04:37:42PM -0400, Press, Jonathan wrote:
>
> [JON PRESS] I don't get the connection between what I said and your
> point about not needing blocking open() interface. If I ftp into a
> Linux machine and GET an infected file, you want FTP to go right ahead
> and read it and send it to me over the wire?
Shouldn't that be the issue of the FTP server itself not serving up
"invalid" files, and not the kernel? Why not just hook in it, I'm
pretty sure they already provide this kind of interface, right?
thanks,
greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists