9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
* [9fans] securing memory during password processing
@ 2002-12-30 14:54 AUSTIN WOODARD
  0 siblings, 0 replies; 2+ messages in thread
From: AUSTIN WOODARD @ 2002-12-30 14:54 UTC (permalink / raw)
  To: 9fans

Dear Rob Pike,
Hi - my name is Austin Woodard, is was reading the P9 Security paper at
the bell labs site and came across an unsolved problem of  encrytion
keys being left in memory and their being vulnerable to recovery by a
system reset using a debugger. Why not  use temporary allocated space in
memory for their use and then delete at end of use by filling that space
with all 0's or FF's. this would seem to make for more secure use of
password and key handling.  Although this process may add time to the
running of the process it would seem necessary to prevent unwanted
intrusions into ones computer. My e-mail address arwbutch@attbi.com and
would appreciate a reply if you have time. Thanks for taking the time to
consider this e-mail  --- Austin





^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [9fans] securing memory during password processing
@ 2002-12-30 15:08 David Presotto
  0 siblings, 0 replies; 2+ messages in thread
From: David Presotto @ 2002-12-30 15:08 UTC (permalink / raw)
  To: arwbutch, 9fans

The problem is that there is no `end' should the system be reset.  When
the reset button gets hit, its all over.  The next boot could be a system
specially designed by the attacker.  This is especially relevant for
plan 9, since a typical way to shut down for people with diskless
machines it to just reset the machine.

However, it would be wise to zero memory should someone hit ctl-alt-del
or ^t^tr.  That's probably the most used scenario for bringing down the
system.  Factotum itself doesn't really exit and isn't killable but
it would be nice if the kernel wipes any memory of any programs with
'private' set (i.e. those that have made themselves undebuggable by
other processes) should the program exit.


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2002-12-30 15:08 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2002-12-30 14:54 [9fans] securing memory during password processing AUSTIN WOODARD
2002-12-30 15:08 David Presotto

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).