[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20080818103535.2F4861836B2@pmx1.sophos.com>
Date: Mon, 18 Aug 2008 11:35:33 +0100
From: douglas.leeder@...hos.com
To: linux-kernel <linux-kernel@...r.kernel.org>,
linux-security-module@...r.kernel.org,
malware-list@...ts.printk.net
Subject: Re: [malware-list] scanner interface proposal was: [TALPA] Intro to a linux
interface for on access scanning
malware-list-bounces@...sg.printk.net wrote on 2008-08-18 11:15:21:
> David Lang wrote on 18/08/2008 01:58:40:
>
> > I really think that we need to avoid trying to have a single 'known
> good'
> > flag/generationnrwith the inode.
> >
> > while that will work for the TALPA use-case of a single anti-virus
> > scanner, it
> > can't cope with multiple scanners, and since there are very
> > different types of
> > scanners that are interesting (anti-virus and indexing to just name
> two), and
> > the fact that some people will want to run more then one anti-virus
> > program on
> > a machine, you don't have a 'known good' condition, you have 'known
good
>
> > according to program A/B/C' conditions, and the file should only be
> > considered
> > 'good, nothing to do' if it has a full set of flags.
>
> How does it make sense to have a 'known good' according to 'one-of'
status
> while there is a single access point ie. no relationships between access
> triggers and 'known good' authority points?
>
> Or in simpler words - A says a file is safe, B says it isn't and in your
> proposal you store both information. Then a time to access the file
comes
> and what do you do, allow or deny?
>
> Maybe I am missing something but I just don't see how this could work
and
> how single 'known good' flag per inode does not work. In the proposed
> implementation Eric posted we don't have support for multiple scanners
but
> it is quite possible to extend it with that. In which case the only
model
> that makes sense is that all of them must declare something clean in
order
> for it to be marked as clean. More into the implementation details - any
> of those scanners who wants to revoke it's decision (new malware
database
> or whatever) just needs to increment the global counter which will cause
> all inodes (but on-demand, as they are accessed) to be rescanned.
I think the case of interest is an AV scanner + an indexing scanner.
The indexing scanner marks a file when it changes, and doesn't want to
scan it
until the file changes.
The AV scanner wants to mark as unclean the file every time the AV data is
updated.
Of course the only reason you need separate caches is for performance -
when the AV
cache marker is updated, and the file is accessed you don't want to
trigger the
indexing scanner.
I guess you could have similar effects for two AV scanners:
AV1 is a white-list scanner
AV2 is a black-list scanner
AV1 only scans on execution, and only changes its mind when the user
explicitly allows an executable
AV2 is updated hourly, and can change its mind after any update
With a single cache marker: AV1 has to scan each execution after every
hourly update of AV2
With multiple cache markers: AV1 only scans new executables, or all
executions after an explicit allow
--
Douglas Leeder
Sophos Plc, The Pentagon, Abingdon Science Park, Abingdon,
OX14 3YP, United Kingdom.
Company Reg No 2096520. VAT Reg No GB 348 3873 20.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists