Re: [malware-list] TALPA - a threat model? well sorta.

From: Theodore Tso
Date: Fri Aug 15 2008 - 13:56:26 EST


On Fri, Aug 15, 2008 at 02:18:12PM +0100, douglas.leeder@xxxxxxxxxx wrote:
> > - New infection makes it onto the machine before the signatures have
> > caught up with it. This also happens. There is an ongoing PR race
> > among AV vendors about who was faster on the draw to get out signatures
> > to detect some new malware. The fact that this race exists reflects
> > that reality that there is some window during which new malware will
> > make it onto some number of machines before the scanners catch up.

Let's go back to the threat model. The Threat Model which Eric Paris
has suggested is that we are only trying to solve the Scanning
Problem. Just Scanning.

That implies if the malware has been written to the disk, we will
catch it once AV catching is turned on and the user attempts to run or
otherwise access the file with the bad content. However, if the
malware starts running, then regardless of whether the malware is
running with user privileges, or manages to get root privileges via
some buffer overflow that wasn't caught via
LSM/SELinux/AppAmor/whatever, this is out of scope of Eric's proposal.

Are we agreed on that? There may be other components of the solution
such as LSM, SELinux, etc., that will very likely be useful in
protecting the system once the malware starts running. But I thought
Eric's proposal proposed excluding that from the Threat Model for the
purposes of the interface we are trying to solve. If that's not true,
let's deal with it now.

> Not to mention removable media - it might be old hat, but infected/malware
> files can come in on floppies, CDs or USB flash discs careless left on the
> pavement outside an office.

That's not a problem given the scanning model proposed by Eric; when
you insert removable media, it will get scanned when it is first
accessed.

- Ted
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/