Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755661AbYHMPT7 (ORCPT ); Wed, 13 Aug 2008 11:19:59 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752978AbYHMPTu (ORCPT ); Wed, 13 Aug 2008 11:19:50 -0400 Received: from pmx1.sophos.com ([213.31.172.16]:46359 "EHLO pmx1.sophos.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752202AbYHMPTt (ORCPT ); Wed, 13 Aug 2008 11:19:49 -0400 In-Reply-To: <20080813072859.752a4819@infradead.org> To: Arjan van de Ven Cc: "Adrian Bunk" , davecb@sun.com, "Greg KH" , "Press, Jonathan" , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, malware-list@lists.printk.net, "Mihai Don??u" , "Pavel Machek" Subject: Re: [malware-list] [RFC 0/5] [TALPA] Intro to a linuxinterfaceforon access scanning MIME-Version: 1.0 X-Mailer: Lotus Notes Release 7.0.2 September 26, 2006 From: tvrtko.ursulin@sophos.com Date: Wed, 13 Aug 2008 16:19:45 +0100 X-MIMETrack: S/MIME Sign by Notes Client on Tvrtko Ursulin/Dev/UK/Sophos(Release 7.0.2|September 26, 2006) at 13/08/2008 16:19:45, Serialize by Notes Client on Tvrtko Ursulin/Dev/UK/Sophos(Release 7.0.2|September 26, 2006) at 13/08/2008 16:19:45, Serialize complete at 13/08/2008 16:19:45, S/MIME Sign failed at 13/08/2008 16:19:45: The cryptographic key was not found, Serialize by Router on Mercury/Servers/Sophos(Release 7.0.3|September 26, 2007) at 13/08/2008 16:19:47, Serialize complete at 13/08/2008 16:19:47 Content-Type: text/plain; charset="US-ASCII" Message-Id: <20080813151952.5D9A13764DF@pmx1.sophos.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3921 Lines: 90 Arjan van de Ven wrote on 13/08/2008 15:28:59: > On Wed, 13 Aug 2008 15:16:12 +0100 > tvrtko.ursulin@sophos.com wrote: > > > Arjan van de Ven wrote on 13/08/2008 14:54:01: > > > > > > I am not sure what you are suggesting, and I may have missed the > > > > libmalware proposal (I don't see any mention of that specific > > > > idea in any other message). However, just to be clear... At no > > > > point did we suggest that the kernel would do any scanning. What > > > > we have been interested in is a mechanism that can allow a > > > > scanning application to be notified by the kernel of specific i/o > > > > events, for those events to be blocked by the kernel until a > > > > user-space scan is done, and then the user-space scan sends back > > > > allow or deny, at which point the i/o event returns to the caller > > > > -- either success or error. This is the only way that malware > > > > can be guaranteed of being detected when it is used (for local > > > > application purposes or for transmission to another platform) or > > > > created. > > > > > > this is a very broad statement that ignores the LD_PRELOAD approach, > > > and thus not true. > > > > LD_PRELOAD does not solve at least knfsd and suid binaries. But we > > are going in circles. :) > > > > > > Also, a solution that requires applications to be modified will > > > > not work, because there is no way that we would be able to get ALL > > > > applications on the machines to be modified in the required > > > > ways. If ANY applications are not so modified, then you have an > > > > unacceptable > > > > > > you don't need to modify applications to make them use a library... > > > > Same is true for a kernel solution. Plus, it also works for those who > > make system calls directly, knfsd and suid binaries, and we can have > > cheap and ultra-efficient caching. Not much kernel code, even less > > complex kernel code and unmeasurable impact when not used and > > compiled in. What are the big technical objections to that? > > > > the biggest objection is the lack of security model description. > STILL nobody has answered Ted's questions. > > And still the AV side of the argument keeps making circular arguments. > > > I'm not saying the kernel shouldn't be involved at all. > I can totally see a solution where we have a > sys_virus_scan(int fd) > that glibc calls at appropriate places (say every read() and mmap()) > and that on the kernel side uses a cache to store which virus signature > version it was last scanned with, and if not new enough.. punts to some > userspace scanner for vetting. > > but first someone needs to answer Ted's very basic questions or the > TALPA side really does look like a donkey in this argument. I think that the english saying is "It takes two to tangle". As much as I am "guilty" for stepping out on Pavel's dejavu comments while at this stage I agree we should be making a more coherent and systematic threat model, you also haven't really contributed anything new and constructive by jumping into my (or was it Jonathans?) reply to him. So I disagree that "AV side" is the only side making circular argument and looking as a donkey (thanks), especially in todays exchange. So lets finish this thread now and hopefully we will have something real to discuss soon. -- Tvrtko A. Ursulin Senior Software Engineer, Sophos "Views and opinions expressed in this email are strictly those of the author. The contents has not been reviewed or approved by Sophos." Sophos Plc, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, United Kingdom. Company Reg No 2096520. VAT Reg No GB 348 3873 20. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/