Linux malware: an incident and some solutions
Linux malware: an incident and some solutions
Posted Jan 5, 2010 0:10 UTC (Tue) by zooko (guest, #2589)In reply to: Linux malware: an incident and some solutions by dlang
Parent article: Linux malware: an incident and some solutions
The basic idea is that you don't try to figure out what the code is going to do, you instead have a separate layer that has some (simple, easily verified) policy about the consequences of what the code does when you run it. In the case of GNU stow, that simple policy is that nothing gets written to outside of /usr/local . I don't understand Nix as well, but it seems like it enforces that nothing gets written outside of "/nix/store/22bharrqlcisnwa11a5qr0xazgvv64hk-firefox-3.5b4" where the big long random string is the secure hash of the actual contents of this particular version. (I'm copying this from http://lwn.net/Articles/337677/ .)
Posted Jan 5, 2010 5:47 UTC (Tue)
by dlang (guest, #313)
[Link]
Linux malware: an incident and some solutions