Whicl linux technology existd to protect file's data at run at file granularity?
Elazar Leibovich
elazarl at gmail.com
Sun Feb 24 11:34:10 IST 2019
Sounds like you want IMA+EVM, specifically IMA-appraisal. I've no
experience with that in practice.
https://sourceforge.net/p/linux-ima/wiki/Home/#ima-appraisal
https://events.linuxfoundation.org/wp-content/uploads/2017/12/LSS2018-EU-LinuxIntegrityOverview_Mimi-Zohar.pdf
As I mentioned before, judging from your previous question, *I think what
you really need is a paid professional Linux security consultancy.*
Asking security questions in a mailing list, and worse, getting answers
from none-professionals like myself is not a good path to reach a secure
system IMHO.
By all means, you're invited to mail me in private/give me a call. While I
personally cannot help you I can refer you to people who does that for
living.
Disclosure, I've no connection to security consultunts other than working
with some excellent ones, to which I can refer and they'll probably find
you a good place to get your system secure.
Remember, even world class security teams, like the ones who designed the
X-Boxes missed some details and ended up with vulnerable system. If indeed
a secure Linux is a priority, industry knows how to do that to some extent,
but IMHO you need paid professional consultant, not general question in a
public mailing list. In my view, what you're doing is akin to asking a
public forum how to design a brakes system without any context. This is
unlikely to end up well. I don't feel it's responsible from my side to just
provide my limited knowledge without mentioning the problems with the
general approach.
On Sun, Feb 24, 2019 at 10:07 AM Lev Olshvang <levonshe at yandex.com> wrote:
>
> I know at least several technologies that protect "data at rest" , such
> as dm-crypt, tomb, eCryptfs.
>
> The problem with dm-crypt or eCrypts that since file system is mounted,
> all logged users, including attackers can read files.
>
> But I did not find anything that protects data at run, i.e decrypts only
> file read request using user key.
>
> Please advise,
> Lev
> _______________________________________________
> Linux-il mailing list
> Linux-il at cs.huji.ac.il
> http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.cs.huji.ac.il/pipermail/linux-il/attachments/20190224/85427c41/attachment-0001.html>
More information about the Linux-il
mailing list