|
From: Youren S. <she...@gm...> - 2014-03-30 15:44:28
|
Hi, Dmitry: Thank you for you reply. Sorry for so later to reply. Even in the early Linux 3.0, there is no apprised module. If the apprised module is absent, how did the IMA keep the system secure? How did the arrest module work? By integrity reporting? "This list can be examined by a (possibly remote) program to ensure that no unknown or known-vulnerable applications have been run.", said in this page[1]. *What's this program? Is it implement by user space application developer or kernel hacker?* The IMA will keep the system secure before a program execute, or when a program is execute, the IMA will keep the program secure? Thank you very much. [1]. https://lwn.net/Articles/137306/ -- Best Regards. Youren Shen. |