Re: memory pages nulling when releasing

看板FB_security作者時間19年前 (2006/06/19 18:46), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串13/27 (看更多)
--- Dan Lukes <dan@obluda.cz> wrote: > [...] Thus, keeping sensitive informations within memory for short > time only MAY reduce the risk level. The intruder need wait for > information to appear in memory again - but it cost time. [...] > That is true - it costs time... But if a bad guy has already root access it does not really matter, (aa) if he has to wait for some minutes or hours, or (bb) if he has just a small time window or (cc) if he can immediately start with scanning for secrets in /dev/mem. I say, in that case there is no security (it might be even possible to present the old state of the system to the outside via a modified kernel, that has "very strange ideas" about the correct results of certain syscalls, and that gets activated after a spontaneous reboot due to non-further specified reasons (maybe due to a power failure or a failure in the old UPS-device or a mobile phone that somebody possibly used inside the fully air-conditioned centre?; does somebody know, what "dd if=/dev/zero of=/dev/mem" does?)...)... As far as I understood the answers so far, OpenSSH and such tools are aware of that slightly increased risk, so that they zero the memory areas that contained sensitive data as soon as they are not needed anymore... So everything is fine and alright... ;-)) :-)) -Arne __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #14be1g00 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #14be1g00 (FB_security)