lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2629CC4E1D22A64593B02C43E855530304AE4C15@USILMS12.ca.com>
Date:	Fri, 15 Aug 2008 14:17:23 -0400
From:	"Press, Jonathan" <Jonathan.Press@...com>
To:	<david@...g.hm>
Cc:	"Peter Zijlstra" <peterz@...radead.org>,
	"Helge Hafting" <helge.hafting@...el.hist.no>,
	<linux-kernel@...r.kernel.org>, <malware-list@...ts.printk.net>,
	<hch@...radead.org>, <andi@...stfloor.org>,
	<viro@...IV.linux.org.uk>, <alan@...rguk.ukuu.org.uk>,
	"Arjan van de Ven" <arjan@...radead.org>
Subject: RE: [malware-list] TALPA - a threat model?  well sorta.

> -----Original Message-----
> From: david@...g.hm [mailto:david@...g.hm]
> Sent: Friday, August 15, 2008 1:47 PM
> To: Press, Jonathan
> Cc: Peter Zijlstra; Helge Hafting; linux-kernel@...r.kernel.org;
malware-
> list@...ts.printk.net; hch@...radead.org; andi@...stfloor.org;
> viro@...IV.linux.org.uk; alan@...rguk.ukuu.org.uk; Arjan van de Ven
> Subject: RE: [malware-list] TALPA - a threat model? well sorta.
> 
> On Fri, 15 Aug 2008, Press, Jonathan wrote:
> > In addition, to generalize from the incorrect idea that the actions
of
> > root are not being defended against to the idea that the possible
> > impacts of an administrator's actions in configuring an application
> > should not be accounted for at all in our thinking doesn't make
sense to
> > me anyway.
> 
> questions had been raised about how this model could defend against
all
> the tricky things that root can do, the answer was that they are not
> trying to defend against root doing tricky things.
> 
> turning off the scanner, letting things get infected, and turning it
back
> on would fall in the same catagory as marking a file that the scanner
> marked as bad as sucessfully scanned.

Well, I agree that there are things you can't prevent, that's for sure.
But the point is to build the "threat model" and application
functionality around the idea that IF they happen, you want to be able
to plug the resulting holes as well as you can.  You can't simply close
your eyes to the possibility.


Jon Press
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ