[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <48A3260F.4000702@zytor.com>
Date: Wed, 13 Aug 2008 11:21:03 -0700
From: "H. Peter Anvin" <hpa@...or.com>
To: Andi Kleen <andi@...stfloor.org>
CC: Eric Paris <eparis@...hat.com>, linux-kernel@...r.kernel.org,
malware-list@...ts.printk.net, riel@...hat.com, greg@...ah.com,
tytso@....edu, viro@...IV.linux.org.uk, arjan@...radead.org,
alan@...rguk.ukuu.org.uk, peterz@...radead.org, hch@...radead.org
Subject: Re: TALPA - a threat model? well sorta.
Andi Kleen wrote:
>
> This means you need significant LSM components simply to protect
> the integrity of the file scanner against root. It's even
> unclear it's possible in the general case (e.g. X server doing
> arbitary DMA and no IOMMU -- how do you protect the file scanner?)
>
Without Treacherous Computing, it isn't possible, even in kernel space.
In Treacherous Computing you can put it in the hypervisor, which of
course just means the hypervisor is now much bigger and likely to
contain security holes.
-hpa
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists