Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 14 Jun 2010 10:54:44 +1000
From:      Peter Jeremy <peterjeremy@acm.org>
To:        Dag-Erling =?iso-8859-1?Q?Sm=F8rgrav?= <des@des.no>
Cc:        current@freebsd.org
Subject:   Protecting sensitive data [was Re: Cleanup for cryptographic algorithms vs. compiler optimizations]
Message-ID:  <20100614005444.GA57650@server.vk2pj.dyndns.org>

index | next in thread | raw e-mail

[-- Attachment #1 --]
On 2010-Jun-13 10:07:15 +0200, Dag-Erling Smørgrav <des@des.no> wrote:
>You always overwrite passphrases, keys etc. as soon as you're done with
>them so they don't end up in a crash dump or on a swap disk or
>something.

Which brings up an associated issue: By default, mlock(2) can only be
used by root processes.  It would be really handy if non-privileged
processes could lock small amounts of VM so they can securely handle
passwords, passphrases, keys, etc.  MAC offers the option of allowing
non-root processes access to mlock() but doesn't provide any
restrictions on the amount of memory they can lock.

-- 
Peter Jeremy

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (FreeBSD)

iEYEARECAAYFAkwVfdQACgkQ/opHv/APuIc6aACfQQy/Ezb2KMT1H/Lz78DwlADk
3ysAn2jh3RBEgsRay4ld8m69v7CCGdCt
=eIWx
-----END PGP SIGNATURE-----
help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100614005444.GA57650>