From owner-freebsd-hackers Thu Aug 20 07:05:22 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA18893 for freebsd-hackers-outgoing; Thu, 20 Aug 1998 07:05:22 -0700 (PDT) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from firebat.wolfepub.com (firebat.wolfepub.com [206.250.193.44]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA18888 for ; Thu, 20 Aug 1998 07:05:21 -0700 (PDT) (envelope-from matthew@wolfepub.com) Received: from ricecake.fastnet0.net (grxa8-ppp1.triton.net [209.172.4.1]) by firebat.wolfepub.com (8.9.0/8.9.0) with SMTP id KAA26557 for ; Thu, 20 Aug 1998 10:03:55 -0400 (EDT) Message-Id: <3.0.3.32.19980820101150.006c0da8@wolfepub.com> X-Sender: matthew@wolfepub.com X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.3 (32) Date: Thu, 20 Aug 1998 10:11:50 -0400 To: freebsd-hackers@FreeBSD.ORG From: Matthew Hagerty Subject: Trapping memory Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Greetings, Is there some way to trap or detect when some other program is trying to read memory used by another program? For example, I have an encryption/decryption daemon that holds its key in memory. I have been told that there is really no way to protect the memory used by the daemon in the case of a root compromise. However, if I could somehow detect another program trying to access my daemon's memory space, then I could have the daemon dump the key and shutdown. Any insight would be greatly appreciated. Thanks, Matthew To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message