From: Makan Pourzandi <Makan.Pourzandi@ericsson.com>
To: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org
Cc: Serue Hallyen <serue@us.ibm.com>,
Axelle Apvrille <axelle_apvrille@rc1.vip.ukl.yahoo.com>,
"'disec-devel@lists.sourceforge.net'"
<disec-devel@lists.sourceforge.net>
Subject: [ANNOUNCE] Release Digsig 1.5: kernel module for run-time authentication of binaries
Date: Fri, 21 Apr 2006 09:56:50 +0000 [thread overview]
Message-ID: <4448AC62.6090303@ericsson.com> (raw)
Hi,
Digsig development team would like to announce the release 1.5 of digsig.
This kernel module helps system administrators control Executable and
Linkable Format (ELF) binary execution and library loading based on
the presence of a valid digital signature. The main functionality is
to help system administrators distinguish applications he/she trusts
(and therefore signs) from viruses, worms (and other nuisances). It is
based on the Linux Security Module hooks.
The code is GPL and available from:
http://sourceforge.net/projects/disec/, download digsig-1.5. For
more documentation, please refer to disec.sourcefrge.net.
We hope that it'll be useful to you.
All bug reports and feature requests or general feedback are welcome
(please CC me and disec-devel@lists.sourceforge.net in your answer or
feedback to the mailing list).
Regards,
Makan Pourzandi
--
Makan Pourzandi, Open Systems Lab
Ericsson Research, Montreal, Canada
*This email does not represent or express the opinions of Ericsson Inc.*
next reply other threads:[~2006-04-21 13:56 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-04-21 9:56 Makan Pourzandi [this message]
2006-04-21 16:12 ` [ANNOUNCE] Release Digsig 1.5: kernel module for run-time authentication of binaries Stephen Smalley
2006-04-21 16:13 ` [Disec-devel] " Axelle Apvrille
2006-04-21 16:29 ` Stephen Smalley
2006-04-23 12:18 ` Arjan van de Ven
2006-04-23 16:38 ` Ulrich Drepper
2006-04-24 20:24 ` Nix
2006-04-25 20:30 ` Serge E. Hallyn
2006-04-28 15:26 ` Ulrich Drepper
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4448AC62.6090303@ericsson.com \
--to=makan.pourzandi@ericsson.com \
--cc=axelle_apvrille@rc1.vip.ukl.yahoo.com \
--cc=disec-devel@lists.sourceforge.net \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=serue@us.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox