> Am 30.09.2022 um 13:49 schrieb Stefan Eissing via curl-library 
> <curl-library@lists.haxx.se>:
> 
> 
> 
>> Am 30.09.2022 um 13:41 schrieb Daniel Stenberg <dan...@haxx.se>:
>> 
>> On Fri, 30 Sep 2022, Stefan Eissing wrote:
>> 
>>> I know of threee patterns to solve this problem (and increase usability as 
>>> a side effect):
>> 
>> Those methods transfer the data to another process, and that is certainly 
>> even more safe since then the sensitive data is not even present in the heap 
>> of the first process.
>> 
>> But: introducing a second process or a daemon or something for this purpose, 
>> while safer, would be a significant new factor and complication that would 
>> basically prevent a huge portion of our users from using it.
>> 
>> I think a simpler first step could be to just "scramble" the data while 
>> "long-term stored" in memory.
> 
> It's certainly simpler and it makes leaking the "interesting" parts of memory 
> easier. But for cases where someone gets access to all the memory or a core 
> dump, it will not make things more secure, just obscure.
> 

makes it more *difficult*.

> One thing I have seen for memory scanning protection is to put protected 
> pages around the location where sensitive data is. So someone scanning memory 
> from above or below will run into a segfault.
> 
> -Stefan
> -- 
> Unsubscribe: https://lists.haxx.se/listinfo/curl-library
> Etiquette:   https://curl.se/mail/etiquette.html

-- 
Unsubscribe: https://lists.haxx.se/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to