lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <g7fr0c$f1h$1@taverner.cs.berkeley.edu>
Date:	Thu, 7 Aug 2008 21:55:24 +0000 (UTC)
From:	daw@...berkeley.edu (David Wagner)
To:	linux-kernel@...r.kernel.org
Subject: Re: [malware-list] [RFC 0/5] [TALPA] Intro to a linux interface
	for on access scanning

Eric Paris  wrote:
>Absolutely, I think that our solution needs worry much less about an
>actively attacking root process than Windows. [...]
>
>1) fileserver with no active attack on system
>2) actively attacking non-root processes (run some process that tries to
>screw people)
>3) accidentally attacking, non-root process. (open a malicious
>openoffice file)
>4) accidentally attacking, properly functioning, root processes (my
>thought on this would be a properly functioning non-exploited yum
>program getting data from a bad repo)
>
>For the purposes of this e-mail discussion can we only discuss #1?

OK, focusing on the case of a Linux fileserver that is serving files
to Windows clients (scenario #1) makes sense to me.  That seems like
progress, because it helps define the problem space better.

Seems like Ted Tso has already responded to that one with his comments
on SMB/NFS, where he suggests that there are good technical solutions to
the case of a Linux Samba fileserver, and argues that this is the case
that matters.  It seems to me the ball is now in your court to respond
to that on a technical level.

>I believe this to be a reasonable goal as it reduces the attack area for
>a number of attacks against linux programs (pdf rendering flaws, jpg
>rendering flaws, etc).  Browser downloads bad pdf, evince tries to open
>that which the browser just downloaded, BLOCKED.

I guess this is scenario #2 which you suggest we should not discuss, so
perhaps I shouldn't respond, but here goes: The weakness is that this
does not really reduce the attack area.  This can filter out exploits
but cannot fix vulnerabilities.  For any one vulnerability there are
likely to be gazillions of ways to exploit the vulnerability, and it is
unlikely that an A/V scanner will be able to detect all of those exploits.
So we can't really say that surface area is closed off.

There are other ways to mitigate this particular example threat (e.g.,
SELinux, Systrace, plash, etc.), so if we wanted to consider this kind
of attack scenario, we should probably also look at those as well.
But since you suggested we focus on scenario #1, not on this scenario,
I won't belabor that point any further.

>I don't see myself wasting time going down the
>GLIBC path since I believe that making systems inhospitable to 'bad'
>data is something that should be done (if reasonably possible) both
>client and server side.

"Making systems inhospitable to 'bad' data" is a slogan, not a
well-defined technical problem.  The slogan sounds full of motherhood
and apple-pie goodness on the surface, but when it comes down to details,
what exactly is meant by the slogan isn't so clear to me (what's the
definition of 'bad'? what's the threat model? is this really the best
approach?).  I guess I agree with others who have suggested focusing
on a well-defined technical problem, and that's going to take more
than slogans.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ