Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755226AbYHSImS (ORCPT ); Tue, 19 Aug 2008 04:42:18 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753768AbYHSIl7 (ORCPT ); Tue, 19 Aug 2008 04:41:59 -0400 Received: from pmx1.sophos.com ([213.31.172.16]:52813 "EHLO pmx1.sophos.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753260AbYHSIl5 (ORCPT ); Tue, 19 Aug 2008 04:41:57 -0400 In-Reply-To: To: david@lang.hm Cc: Alan Cox , Arjan van de Ven , Adrian Bunk , capibara@xs4all.nl, Casey Schaufler , davecb@sun.com, linux-kernel , linux-security-module@vger.kernel.org, malware-list@lists.printk.net, malware-list-bounces@dmesg.printk.net, Mihai Don??u , Peter Dolding , Pavel Machek , rmeijer@xs4all.nl, Theodore Tso Subject: Re: [malware-list] scanner interface proposal was: [TALPA] Intro to a linux interface for on access scanning MIME-Version: 1.0 X-Mailer: Lotus Notes Release 7.0.2 September 26, 2006 From: tvrtko.ursulin@sophos.com Date: Tue, 19 Aug 2008 09:40:57 +0100 X-MIMETrack: S/MIME Sign by Notes Client on Tvrtko Ursulin/Dev/UK/Sophos(Release 7.0.2|September 26, 2006) at 19/08/2008 09:41:54, Serialize by Notes Client on Tvrtko Ursulin/Dev/UK/Sophos(Release 7.0.2|September 26, 2006) at 19/08/2008 09:41:54, Serialize complete at 19/08/2008 09:41:54, S/MIME Sign failed at 19/08/2008 09:41:54: The cryptographic key was not found, Serialize by Router on Mercury/Servers/Sophos(Release 7.0.3|September 26, 2007) at 19/08/2008 09:40:58, Serialize complete at 19/08/2008 09:40:58 Content-Type: text/plain; charset="US-ASCII" Message-Id: <20080819084200.EA2822FE863@pmx1.sophos.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2846 Lines: 75 david@lang.hm wrote on 18/08/2008 18:07:30: > On Mon, 18 Aug 2008, tvrtko.ursulin@sophos.com wrote: > > > Theodore Tso wrote on 18/08/2008 15:25:11: > > > >> On Mon, Aug 18, 2008 at 02:15:24PM +0100, tvrtko.ursulin@sophos.com > > wrote: > >>> Then there is still a question of who allows some binary to declare > > itself > >>> exempt. If that decision was a mistake, or it gets compromised > > security > >>> will be off. A very powerful mechanism which must not be easily > >>> accessible. With a good cache your worries go away even without a > > scheme > >>> like this. > >> > >> I have one word for you --- bittorrent. If you are downloading a very > >> large torrent (say approximately a gigabyte), and it contains many > >> pdf's that are say a few megabytes a piece, and things are coming in > >> tribbles, having either a indexing scanner or an AV scanner wake up > >> and rescan the file from scratch each time a tiny piece of the pdf > >> comes in is going to eat your machine alive.... > > > > Huh? I was never advocating re-scan after each modification and I even > > explicitly said it does not make sense for AV not only for performance but > > because it will be useless most of the time. I thought sending out > > modified notification on close makes sense because it is a natural point, > > unless someone is trying to subvert which is out of scope. Other have > > suggested time delay and lumping up. > > > > Also, just to double-check, you don't think AV scanning would read the > > whole file on every write? > > if it doesn't read the entire file and only reads the parts that change, > out-of-order writes (which bittorrent does a _lot_ of) can assemble a > virus from pieces and the scanner will never see it. No, it would catch it once it gets assembled. It doesn't read the parts that change but parts which it finds interesting. > as for Ted's issue, the scanner(s) would get notified when the file was > dirtied, they would then get notified if something scanned the file and it > was marked dirty again after that. If nothing got around to scanning the > file then all the following writes would not send any notification becouse > the file would already be dirty. This sound like a good strategy. -- Tvrtko A. Ursulin Senior Software Engineer, Sophos "Views and opinions expressed in this email are strictly those of the author. The contents has not been reviewed or approved by Sophos." Sophos Plc, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, United Kingdom. Company Reg No 2096520. VAT Reg No GB 348 3873 20. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/