Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 10 Aug 2018 16:08:01 +0200
From:      cpghost <cpghost@cordula.ws>
To:        freebsd-questions@freebsd.org
Subject:   Re: Erase memory on shutdown
Message-ID:  <faff1533-41c9-63a1-1c66-45c194cae140@cordula.ws>
In-Reply-To: <63033.108.68.162.197.1533484522.squirrel@cosmo.uchicago.edu>
References:  <20180805150241.1E186200349F8E@ary.qy> <4e70e969-14f7-c65d-96d2-dd1610499cd0@irk.ru> <63033.108.68.162.197.1533484522.squirrel@cosmo.uchicago.edu>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On 08/05/18 17:55, Valeri Galtsev wrote:
> Another route could be encryption of RAM on-the-fly while system runs, yet
> it is questionable where the encryption key itself is kept to be
> unaccessible for the attacker in the attack above, and boot of such system
> may require warm body present.

What about SEV?

https://developer.amd.com/amd-secure-memory-encryption-sme-amd-secure-encrypted-virtualization-sev/
https://github.com/AMDESE/AMDSEV

> Valeri

-cpghost.


[-- Attachment #2 --]
0	*H
010
	`He0	*H
000/A|

*60
	*H
010	UGB10UGreater Manchester10USalford10U
COMODO CA Limited1=0;U4COMODO RSA Client Authentication and Secure Email CA0
171220000000Z
181220235959Z0#1!0	*H
	cpghost@cordula.ws0"0
	*H
0
Wqor\Mq!%`CN5e;F_.:,θ|@GkbB1[,n@A8_<R[J+Vcy>|
t`7(>8+0QhVE-8TOڪIKǞ(7
MΞ;+H (y$e>dDӹFGyK+dϜB00U#0la|=+qH^ċ0U%Papo_@['‹6	0U0U00 U%0++10	`HB 0FU ?0=0;+10+0)+https://secure.comodo.net/CPS0ZUS0Q0OMKIhttp://crl.comodoca.com/COMODORSAClientAuthenticationandSecureEmailCA.crl0+0}0U+0Ihttp://crt.comodoca.com/COMODORSAClientAuthenticationandSecureEmailCA.crt0$+0http://ocsp.comodoca.com0U0cpghost@cordula.ws0
	*H
tW)T(tHCOCD3,bͳI^+TqA.VMuHلv%@
9N+>/ž]h(SGN[q-6B-;MmAP^0E^g_D8(J%':.jwǥ@	D-Ƽ@]-Eia[)bȻvӟ7~پ>M00Πj8;+kٸRV0
	*H
010	UGB10UGreater Manchester10USalford10U
COMODO CA Limited1+0)U"COMODO RSA Certification Authority0
130110000000Z
280109235959Z010	UGB10UGreater Manchester10USalford10U
COMODO CA Limited1=0;U4COMODO RSA Client Authentication and Secure Email CA0"0
	*H
0
W(vu@8v!P%yL}:X>1.4vلj=4HK hyt4z|e`'"2@rF5P3*UT+%4D5+
ZSu+­=7F_Zte
>)
94Fro8pNhFF#Ne6/M{UWֱmAYT"o)CI	m84$.zW4 r^M9,R$
<080U#0~=<8220Ula|=+qH^ċ0U0U00U 
00U 0LUE0C0A?=;http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q+e0c0;+0/http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$+0http://ocsp.comodoca.com0
	*H
x\(4O<_VΟV쏢kI/5@qB!fk&kn{hJd| q[Lǿᓬ?"@fCOݐrXurJH5;#68jle) )Y4’Nezyq{:kx%iچ:w#f6HLP~jo9KXnM#:!!69i\}^M;TSX7	̯3]Tc6O$voX*5!4.aKE8HIĹ7?Ar}r# R/h<סnuy<1	3mɔv#~&pvg' skMH#/ƨ$/uXqTu(|^-vM҆NKX7fA\X5sh2qP\YǟENRarpGtZp_"k7DdJVGz18040010	UGB10UGreater Manchester10USalford10U
COMODO CA Limited1=0;U4COMODO RSA Client Authentication and Secure Email CA/A|

*60
	`He[0	*H
	1	*H
0	*H
	1
180810140801Z0/	*H
	1" ^TDs
U<"$$0l	*H
	1_0]0	`He*0	`He0
*H
0*H
0
*H
@0+0
*H
(0	+710010	UGB10UGreater Manchester10USalford10U
COMODO CA Limited1=0;U4COMODO RSA Client Authentication and Secure Email CA/A|

*60*H
	1010	UGB10UGreater Manchester10USalford10U
COMODO CA Limited1=0;U4COMODO RSA Client Authentication and Secure Email CA/A|

*60
	*H
(h7s5.=m,5끷U=oPa\`*?m%#,]B38hy>D\Ibq%DS_+d_ZqlrDHbXmlڹlh;8"o
WMVAq1yܢH:2;8f%CQS9}eMH 9t*i7X[и%4WhDj#	W@̆Wq[.<NH]߹eh	,

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?faff1533-41c9-63a1-1c66-45c194cae140>