[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #13912 [Core Tor/Tor]: Key Security: Zeroing Buffers Is Insufficient (AES-NI leaves keys in SSE registers)
#13912: Key Security: Zeroing Buffers Is Insufficient (AES-NI leaves keys in SSE
registers)
-------------------------------------------------+-------------------------
Reporter: teor | Owner:
Type: defect | Status: new
Priority: Medium | Milestone: Tor:
| unspecified
Component: Core Tor/Tor | Version: Tor:
| 0.2.6.1-alpha
Severity: Normal | Resolution:
Keywords: security registers aesni memwipe | Actual Points:
tor-relay |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by yawning):
Replying to [comment:11 cypherpunks]:
> What about ROP gadgets that do not provide turing complete behavior (so
no "arbitrary" code execution), but still expose the sensitive registers?
I think you've likewise effective lost at that point. Patch OpenSSL's
assembly in strategic locations if you actually care about this, though
there's a a lot of other places in the code that don't scrub "sensitive"
keying information so IMO this is a lost cause.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13912#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs