[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2629CC4E1D22A64593B02C43E855530304AE4BE3@USILMS12.ca.com>
Date: Thu, 14 Aug 2008 14:37:27 -0400
From: "Press, Jonathan" <Jonathan.Press@...com>
To: "Pavel Machek" <pavel@...e.cz>, <tvrtko.ursulin@...hos.com>
Cc: "Arjan van de Ven" <arjan@...radead.org>,
"Adrian Bunk" <bunk@...nel.org>, <davecb@....com>,
"Greg KH" <greg@...ah.com>, <linux-kernel@...r.kernel.org>,
<linux-security-module@...r.kernel.org>,
<malware-list@...ts.printk.net>,
"Mihai Don??u" <mdontu@...defender.com>
Subject: RE: [malware-list] [RFC 0/5] [TALPA] Intro to alinuxinterfaceforon access scanning
> -----Original Message-----
> From: Pavel Machek [mailto:pavel@...e.cz]
> Sent: Thursday, August 14, 2008 8:54 AM
> To: tvrtko.ursulin@...hos.com
> Cc: Arjan van de Ven; Adrian Bunk; davecb@....com; Greg KH; Press,
Jonathan;
> linux-kernel@...r.kernel.org; linux-security-module@...r.kernel.org;
malware-
> list@...ts.printk.net; Mihai Don??u
> Subject: Re: [malware-list] [RFC 0/5] [TALPA] Intro to
alinuxinterfaceforon access
> scanning
>
> Hi!
>
> Okay, so goal of libmalware.so is to "not allow data in the black list
> to pass through Linux server". Threat model is windows machines trying
> to copy infected files through the server.
That's only part of the threat model.
> Viruses are not expected to have shell access to either root or normal
> users on the server.
That's a big exception.
> it actually _works_, 100% of time, for apps using it.
Again that's a big condition.
Jon Press
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists