[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20080819084200.EA2822FE863@pmx1.sophos.com>
Date: Tue, 19 Aug 2008 09:40:57 +0100
From: tvrtko.ursulin@...hos.com
To: david@...g.hm
Cc: Alan Cox <alan@...rguk.ukuu.org.uk>,
Arjan van de Ven <arjan@...radead.org>,
Adrian Bunk <bunk@...nel.org>, capibara@...all.nl,
Casey Schaufler <casey@...aufler-ca.com>, davecb@....com,
linux-kernel <linux-kernel@...r.kernel.org>,
linux-security-module@...r.kernel.org,
malware-list@...ts.printk.net,
malware-list-bounces@...sg.printk.net,
Mihai Don??u <mdontu@...defender.com>,
Peter Dolding <oiaohm@...il.com>, Pavel Machek <pavel@...e.cz>,
rmeijer@...all.nl, Theodore Tso <tytso@....edu>
Subject: Re: [malware-list] scanner interface proposal was: [TALPA] Intro to a linux
interface for on access scanning
david@...g.hm wrote on 18/08/2008 18:07:30:
> On Mon, 18 Aug 2008, tvrtko.ursulin@...hos.com wrote:
>
> > Theodore Tso <tytso@....edu> wrote on 18/08/2008 15:25:11:
> >
> >> On Mon, Aug 18, 2008 at 02:15:24PM +0100, tvrtko.ursulin@...hos.com
> > wrote:
> >>> Then there is still a question of who allows some binary to declare
> > itself
> >>> exempt. If that decision was a mistake, or it gets compromised
> > security
> >>> will be off. A very powerful mechanism which must not be easily
> >>> accessible. With a good cache your worries go away even without a
> > scheme
> >>> like this.
> >>
> >> I have one word for you --- bittorrent. If you are downloading a
very
> >> large torrent (say approximately a gigabyte), and it contains many
> >> pdf's that are say a few megabytes a piece, and things are coming in
> >> tribbles, having either a indexing scanner or an AV scanner wake up
> >> and rescan the file from scratch each time a tiny piece of the pdf
> >> comes in is going to eat your machine alive....
> >
> > Huh? I was never advocating re-scan after each modification and I even
> > explicitly said it does not make sense for AV not only for performance
but
> > because it will be useless most of the time. I thought sending out
> > modified notification on close makes sense because it is a natural
point,
> > unless someone is trying to subvert which is out of scope. Other have
> > suggested time delay and lumping up.
> >
> > Also, just to double-check, you don't think AV scanning would read the
> > whole file on every write?
>
> if it doesn't read the entire file and only reads the parts that change,
> out-of-order writes (which bittorrent does a _lot_ of) can assemble a
> virus from pieces and the scanner will never see it.
No, it would catch it once it gets assembled. It doesn't read the parts
that change but parts which it finds interesting.
> as for Ted's issue, the scanner(s) would get notified when the file was
> dirtied, they would then get notified if something scanned the file and
it
> was marked dirty again after that. If nothing got around to scanning the
> file then all the following writes would not send any notification
becouse
> the file would already be dirty.
This sound like a good strategy.
--
Tvrtko A. Ursulin
Senior Software Engineer, Sophos
"Views and opinions expressed in this email are strictly those of the
author.
The contents has not been reviewed or approved by Sophos."
Sophos Plc, The Pentagon, Abingdon Science Park, Abingdon,
OX14 3YP, United Kingdom.
Company Reg No 2096520. VAT Reg No GB 348 3873 20.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists