<div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr">Sounds like you want IMA+EVM, specifically IMA-appraisal. I've no experience with that in practice.<br><br><a href="https://sourceforge.net/p/linux-ima/wiki/Home/#ima-appraisal">https://sourceforge.net/p/linux-ima/wiki/Home/#ima-appraisal</a><br><a href="https://events.linuxfoundation.org/wp-content/uploads/2017/12/LSS2018-EU-LinuxIntegrityOverview_Mimi-Zohar.pdf">https://events.linuxfoundation.org/wp-content/uploads/2017/12/LSS2018-EU-LinuxIntegrityOverview_Mimi-Zohar.pdf</a><br></div><div dir="ltr"><br></div><div>As I mentioned before, judging from your previous question, <b>I think what you really need is a paid professional Linux security consultancy.</b></div><div><br></div><div>Asking security questions in a mailing list, and worse, getting answers from none-professionals like myself is not a good path to reach a secure system IMHO.</div><div><br></div><div>By all means, you're invited to mail me in private/give me a call. While I personally cannot help you I can refer you to people who does that for living.</div><div><br></div><div>Disclosure, I've no connection to security consultunts other than working with some excellent ones, to which I can refer and they'll probably find you a good place to get your system secure.</div><div><br></div><div>Remember, even world class security teams, like the ones who designed the X-Boxes missed some details and ended up with vulnerable system. If indeed a secure Linux is a priority, industry knows how to do that to some extent, but IMHO you need paid professional consultant, not general question in a public mailing list. In my view, what you're doing is akin to asking a public forum how to design a brakes system without any context. This is unlikely to end up well. I don't feel it's responsible from my side to just provide my limited knowledge without mentioning the problems with the general approach.<br></div></div></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sun, Feb 24, 2019 at 10:07 AM Lev Olshvang <<a href="mailto:levonshe@yandex.com">levonshe@yandex.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div> </div><div>I know at least several technologies that protect "data at rest" , such as dm-crypt, tomb, eCryptfs.</div><div> </div><div>The problem with dm-crypt or eCrypts that since file system is mounted, all logged users, including attackers can read files.</div><div> </div><div>But I did not find anything that protects data at run, i.e decrypts only file read request using user key.</div><div> </div><div>Please advise,</div><div>Lev</div>
_______________________________________________<br>
Linux-il mailing list<br>
<a href="mailto:Linux-il@cs.huji.ac.il" target="_blank">Linux-il@cs.huji.ac.il</a><br>
<a href="http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il" rel="noreferrer" target="_blank">http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il</a><br>
</blockquote></div>