Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753802AbYHQKfB (ORCPT ); Sun, 17 Aug 2008 06:35:01 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752489AbYHQKex (ORCPT ); Sun, 17 Aug 2008 06:34:53 -0400 Received: from smtp-vbr14.xs4all.nl ([194.109.24.34]:2084 "EHLO smtp-vbr14.xs4all.nl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752454AbYHQKew (ORCPT ); Sun, 17 Aug 2008 06:34:52 -0400 Message-ID: <6746.82.95.100.23.1218969200.squirrel@webmail.xs4all.nl> Date: Sun, 17 Aug 2008 12:33:20 +0200 (CEST) Subject: Re: [malware-list] [RFC 0/5] [TALPA] Intro to alinuxinterfaceforon access scanning From: "Rob Meijer" To: david@lang.hm Cc: "Peter Dolding" , "Theodore Tso" , "Arjan van de Ven" , rmeijer@xs4all.nl, "Alan Cox" , capibara@xs4all.nl, "Eric Paris" , "Rik van Riel" , davecb@sun.com, linux-security-module@vger.kernel.org, "Adrian Bunk" , "Mihai Don??u" , linux-kernel@vger.kernel.org, malware-list@lists.printk.net, "Pavel Machek" Reply-To: rmeijer@xs4all.nl User-Agent: SquirrelMail/1.4.11 MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7BIT Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1877 Lines: 37 On Sun, August 17, 2008 10:58, david@lang.hm wrote: > On Sun, 17 Aug 2008, Peter Dolding wrote: >> Instead swap across to the shorter white list to process and sort. >> Quarantining for black list scanning so performance of machine is hit >> with the least ammount. Some areas like email, p2p for people using >> formats that should not contain macros or executable code white list >> scanning there is all that is needed before either blocking or asking >> user if black list scanning should be preformed or the file just >> deleted. Lets close the door's on these malware writers without hurt >> end users any more than we have to. What is the point of running a full >> black list across a file the user will delete because it was not what >> they thought it was. > > you are arguing with the wrong people here. we are not trying to define > the future of anti-virus technologies, we are trying to figure out how to > provide the hooks so that people and companies can go off and do the > research and experimentation and try different approaches. Given recent demonstrations that show how easy it apparently is to bypass blacklist base approaches, providing hooks to allow these blacklist approaches may I feel be rather futile. Focusing only on hooks for white list approaches in combination with hooks for least authority approaches like the powerbox would IMHO seem like a much more reasonable approach given the current state of things and knowledge concerning the blacklist technologies. Explicitly adding support for technology that is quickly becoming obsolete would seem like a waste of time and resources. Rob -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/