[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2629CC4E1D22A64593B02C43E855530304AE4BC1@USILMS12.ca.com>
Date: Wed, 13 Aug 2008 17:15:17 -0400
From: "Press, Jonathan" <Jonathan.Press@...com>
To: "Theodore Tso" <tytso@....edu>, "Eric Paris" <eparis@...hat.com>
Cc: <peterz@...radead.org>, <linux-kernel@...r.kernel.org>,
<malware-list@...ts.printk.net>, <hch@...radead.org>,
<andi@...stfloor.org>, <viro@...IV.linux.org.uk>,
<alan@...rguk.ukuu.org.uk>,
"Arjan van de Ven" <arjan@...radead.org>
Subject: RE: [malware-list] TALPA - a threat model? well sorta.
> -----Original Message-----
> From: malware-list-bounces@...sg.printk.net [mailto:malware-list-
> bounces@...sg.printk.net] On Behalf Of Theodore Tso
> Sent: Wednesday, August 13, 2008 3:29 PM
> To: Eric Paris
> Cc: peterz@...radead.org; linux-kernel@...r.kernel.org; malware-
> list@...ts.printk.net; hch@...radead.org; andi@...stfloor.org;
> viro@...IV.linux.org.uk; alan@...rguk.ukuu.org.uk; Arjan van de Ven
> Subject: Re: [malware-list] TALPA - a threat model? well sorta.
>
> Also something else that is needed is support for multiple clients.
> (i.e., what happens if the user runs two virus checkers, or a virus
> checker plus a hierarchical storage manager driving a tape robot, or
> all of the above plus trackerd --- where some clients need to block
> open(2) access, and some do not need block open(2) --- and in the case
> of HSM, ordering becomes important; you want to retrieve the file from
> the tape robot first, *then* scan it using the virus checker. :-)
The issue of multiple clients does need to be accounted for. However, I
will mention that it is unusual (at least in my experience) to actually
run two AV products at the same time in "realtime" mode. We strongly
recommend that anyone who installs our product should remove any other
AV product on the system -- for technical reasons, not financial --
since they've already paid for ours by the time they get to this point.
I am not aware of anyone objecting to that idea.
> I'm just arguing that there should be absolutely *no* support in the
> kernel for solving this particular problem, since the question of
> whether a file has been scanned with a particular version of the virus
> DB is purely a userspace problem.
Caching of previous results can be done in either user space or kernel
space. We have seen it both ways. Wherever it is done, I would say
that rather than record AV signature file version numbers, there should
be a mechanism for the application to invalidate or flush the cache
whenever a signature update is done. There are other circumstances
where that would also be useful -- such as if the user changes a
scanning option in a way that increases the strictness of the scan. In
other words, a file that was marked as clean based on one level of
strictness may not be clean under a stricter scan. You wouldn't want
the cache to prevent it from being scanned under such circumstances.
Jon Press
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists