[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080806035255.GC24801@one.firstfloor.org>
Date: Wed, 6 Aug 2008 05:52:55 +0200
From: Andi Kleen <andi@...stfloor.org>
To: Eric Paris <eparis@...hat.com>
Cc: Andi Kleen <andi@...stfloor.org>, malware-list@...ts.printk.net,
linux-kernel@...r.kernel.org
Subject: Re: [RFC 0/5] [TALPA] Intro to a linux interface for on access scanning
> I didn't consider it. Most likely at the end of the day the finding
> will be, "if you can write directly to the block device you already won
> since there as so many other things you can do to subvert the system."
This means your scheme is not generally supposed to protect against root?
I assume yes (since I can think of lots of other holes for
root), but you should state that explicitely in the spec since it
is a major limitation.
On the other hand it will also allow you to optimize significantly:
In particularly it also means that you can trust the permissions
and don't need to check any files which cannot be written by users
you don't control.
-Andi
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists