[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080815201742.GD22395@mit.edu>
Date: Fri, 15 Aug 2008 16:17:42 -0400
From: Theodore Tso <tytso@....edu>
To: Valdis.Kletnieks@...edu
Cc: david@...g.hm, "Press, Jonathan" <Jonathan.Press@...com>,
Peter Zijlstra <peterz@...radead.org>,
Helge Hafting <helge.hafting@...el.hist.no>,
linux-kernel@...r.kernel.org, malware-list@...ts.printk.net,
hch@...radead.org, andi@...stfloor.org, viro@...IV.linux.org.uk,
alan@...rguk.ukuu.org.uk, Arjan van de Ven <arjan@...radead.org>
Subject: Re: [malware-list] TALPA - a threat model? well sorta.
On Fri, Aug 15, 2008 at 02:06:47PM -0400, Valdis.Kletnieks@...edu wrote:
> This problem is actually identical to "new file scanned, but you don't have
> the signature available yet so malware isn't detected".
>
> Those of us who have seen large mail servers pile up queues in the 10s of
> millions in the 45 minutes between when the worm went critical-mass and when
> we got a signature might disagree on it not being a big problem in practice.
For a mail server, I really think something specialized like ClamAV is
a much better solution than something in userspace, which will
probably decide it has to rescan every single file that gets written,
including your mail server logs. :-)
A specialized solution for a mail server is *always* going to be able
to a more efficient, more practical, and be able to do
application-specialized things (such as refusing the e-mail while the
connection is still open, so you don't have to worry about being RFC
compliant about sending bounce mails when the SMTP return-path is most
likely bogus).
- Ted
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists