Hi there,
Thank you very much for your email.
As I was suspecting, I was making a mistake, after following the lead you
provided (the function rsa_ossl_mod_exp in the file crypto/rsa/rsa_ossl.c)
I started observing hits. I was basically making a mistake with the
addresses to watch.
Best regards,
On 12/04/2021 09:57, Danis Ozdemir wrote:
When I define a watchpoint for that address to verify that it has been
accessed when a new client connects to the server and make the server
continue, I can't see a hit which means this address hasn't been
accessed. *I'm attaching the s_client output
Hi all,
Just to see if I can help prompt a response... :-)
Danış is working with me to try see how hard it is to
reproduce meltdown and snarf a private key. Problem-N
of many in doing that is knowing where private key
bits are used in OpenSSL - so far gdb seems to be showing
no accesses to p,q
Hi all,
I hope all is good. My name is Danis Ozdemir, I'm a PhD student in Trinity
College (Ireland) and I'm studying computer security. I'm trying to
reproduce the meltdown attack as an effort to dive deep into the known
attack types with some specific scenarios and "trying to see whether
Meltdow