Date: Fri, 22 Feb 2008 02:31:39 -0700 From: Bert JW Regeer <xistence@0x58.com> To: Jeremy Chadwick <koitsu@FreeBSD.org> Cc: FreeBSD Hackers <freebsd-hackers@FreeBSD.ORG> Subject: Re: memory not cleared on reboot (Was: cool feature of dmesg.boot file) Message-ID: <689B489C-D63C-4BA4-BA13-A9429032CB8B@0x58.com> In-Reply-To: <20080222092506.GA25704@eos.sc1.parodius.com> References: <200802212229.40988.gizmen@blurp.pl> <200802220828.m1M8SZkj097645@lurza.secnetix.de> <20080222092506.GA25704@eos.sc1.parodius.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--Apple-Mail-1--120283250 Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit On Feb 22, 2008, at 02:25 , Jeremy Chadwick wrote: > [...] > > Interesting tidbit: We have one production machine which when booted > into single-user via serial console for a world install, retains all > of > the output from that single-user session even once rebooted and > brought > back into multi-user mode. This poses a substantial security risk, > especially during the mergemaster phase (we can discuss why if > anyone is > curious). > > -- > | Jeremy Chadwick jdc at > parodius.com | > | Parodius Networking http://www.parodius.com/ > | > | UNIX Systems Administrator Mountain View, CA, > USA | > | Making life hard for others since 1977. PGP: > 4BD6C0CB | This is more scary: http://www.engadget.com/2008/02/21/cold-boot-disk-encryption-attack-is-shockingly-effective/ Which is the exact effect you are seeing. Cheerio, Bert JW Regeer --Apple-Mail-1--120283250--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?689B489C-D63C-4BA4-BA13-A9429032CB8B>