[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #7003 [Core Tor/Tor]: Wipe relay key material from memory on common crash conditions



#7003: Wipe relay key material from memory on common crash conditions
-------------------------------------------------+-------------------------
 Reporter:  mikeperry                            |          Owner:
     Type:  enhancement                          |         Status:  new
 Priority:  High                                 |      Milestone:  Tor:
                                                 |  unspecified
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  small-feature, tor-relay, intro,     |  Actual Points:
  tor-03-unspecified-201612                      |
Parent ID:  #5456                                |         Points:  medium
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by cypherpunks):

 How much sensitive material is there? Just a shot in the dark, but perhaps
 the material could be encrypted in order to keep the amount of time it's
 decrypted very short, so all it takes is wiping the master key from memory
 to make the rest of the encrypted sensitive material in memory unreadable.
 When the process is in an undefined state (according to POSIX, `SIGSEGV`
 not induced by `raise(3)` or `kill(2)` puts a process in such a state), it
 would be much easier for it to wipe a single page than it would be to find
 and wipe a time-varying amount of memory in multiple locations.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7003#comment:13>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs