Just a quick question on the following rule: 2. Trusted user, untrusted path = User is able to run the executable 1. Untrusted path contains untrusted code 2. Trusted user has higher priviledges than untrusted 3. Finally an untrusted user places an untrusted file into an untrusted path, and what you get is an untrusted application (Trojan) to be executed by a trusted user! Quoting Niki Rahimi <narahimiat_private>: > > > > > Hello Everyone, > I have finally finished up the new LSM for Trusted Path Execution > (TPE) and would like to submit the patch for your consideration. It is > attached below. Please feel free to contact me regarding the module. I am > eager to hear back from you all. > > Regards, > Niki > > > (See attached file: tpe.diff) > > > Niki A. Rahimi > LTC Security Development > narahimiat_private > (512)838-5399 --------------------------------------------------------- Demetrios Lambrou http://crazylinux.net You can always get my public key block from http://crazylinux.net/public.asc Fingerprint: C7B3 A112 3704 7202 2B33 6B28 5418 78DD 774A 7BCB _______________________________________________ linux-security-module mailing list linux-security-moduleat_private http://mail.wirex.com/mailman/listinfo/linux-security-module
This archive was generated by hypermail 2b30 : Wed May 14 2003 - 11:11:47 PDT