Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 22 Feb 2008 02:31:39 -0700
From:      Bert JW Regeer <xistence@0x58.com>
To:        Jeremy Chadwick <koitsu@FreeBSD.org>
Cc:        FreeBSD Hackers <freebsd-hackers@FreeBSD.ORG>
Subject:   Re: memory not cleared on reboot (Was: cool feature of dmesg.boot file)
Message-ID:  <689B489C-D63C-4BA4-BA13-A9429032CB8B@0x58.com>
In-Reply-To: <20080222092506.GA25704@eos.sc1.parodius.com>
References:  <200802212229.40988.gizmen@blurp.pl> <200802220828.m1M8SZkj097645@lurza.secnetix.de> <20080222092506.GA25704@eos.sc1.parodius.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--Apple-Mail-1--120283250
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed;
	delsp=yes
Content-Transfer-Encoding: 7bit


On Feb 22, 2008, at 02:25 , Jeremy Chadwick wrote:

> [...]
>
> Interesting tidbit: We have one production machine which when booted
> into single-user via serial console for a world install, retains all  
> of
> the output from that single-user session even once rebooted and  
> brought
> back into multi-user mode.  This poses a substantial security risk,
> especially during the mergemaster phase (we can discuss why if  
> anyone is
> curious).
>
> -- 
> | Jeremy Chadwick                                    jdc at  
> parodius.com |
> | Parodius Networking                           http://www.parodius.com/ 
>  |
> | UNIX Systems Administrator                      Mountain View, CA,  
> USA |
> | Making life hard for others since 1977.                  PGP:  
> 4BD6C0CB |


This is more scary:

http://www.engadget.com/2008/02/21/cold-boot-disk-encryption-attack-is-shockingly-effective/

Which is the exact effect you are seeing.

Cheerio,
Bert JW Regeer
--Apple-Mail-1--120283250--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?689B489C-D63C-4BA4-BA13-A9429032CB8B>