|| ||Greg KH <greg-AT-kroah.com>|
|| ||"Press, Jonathan" <Jonathan.Press-AT-ca.com>|
|| ||Re: [malware-list] [RFC 0/5] [TALPA] Intro to a
linuxinterfaceforon access scanning|
|| ||Tue, 5 Aug 2008 13:18:16 -0700|
|| ||Arjan van de Ven <arjan-AT-infradead.org>,
Eric Paris <eparis-AT-redhat.com>, linux-kernel-AT-vger.kernel.org,
On Tue, Aug 05, 2008 at 02:38:23PM -0400, Press, Jonathan wrote:
> >> I think you might be missing the point a bit here, as the traditional
> Unix model that
> >> Linux has prevents much of what the "traditional AV" products need to
> do, right?
> Is your point that Linux and Unix machines are less vulnerable to
> viruses? If so, that's not relevant to my point at all. A Unix machine
> can be a carrier, passing infections on to other vulnerable platforms
> (guess which one).
So you are going to try to force us to take something into the Linux
kernel due to the security inadiquacies of a totally different operating
system? You might want to rethink that argument :)
> An enterprise security system sees the entire enterprise as an
> integrated whole -- not just individual machines with their own
> separate attributes and no impact on each other at all.
I agree, but as others have pointed out, you don't need to do this in
the kernel, you can do it from userspace today (samba has hooks for this
for that "other" operating system already).
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to firstname.lastname@example.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
to post comments)