lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1218119483.5837.112.camel@localhost.localdomain>
Date:	Thu, 07 Aug 2008 10:31:23 -0400
From:	Eric Paris <eparis@...hat.com>
To:	Peter Dolding <oiaohm@...il.com>
Cc:	Pavel Machek <pavel@...e.cz>, Rik van Riel <riel@...hat.com>,
	linux-kernel@...r.kernel.org, malware-list@...ts.printk.net,
	linux-security-module@...r.kernel.org,
	Arjan van de Ven <arjan@...radead.org>
Subject: Re: [malware-list] [RFC 0/5] [TALPA] Intro to a
	linuxinterfaceforon access scanning

On Fri, 2008-08-08 at 00:21 +1000, Peter Dolding wrote:

> Also TALPA is wrong because its a LSM.   LSM are the most powerful
> bits of the OS.   LSM are the enforcers of Linux.  They are the last
> line of defence for the OS.   You have your normal permission systems
> when they fail then its the job of a LSM to pick up the mess.

I've been trying to ignore you, but I just can't any more.  Please dear
god look at my work before spewing this crap.  My work is not an LSM.
My work doesn't care about bind mounts, it cares about inodes.  My work
is not path name based.  I'm not sure who you are trying to convince of
something here but obviously talking about something you don't know
about is not working for you.....

-Eric

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ