Re: the cold-boot attack - a paper tiger?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--- Phil <philtickle200@xxxxxxxxx> wrote:

> 
> --- Jacob Appelbaum <jacob@xxxxxxxxxxxxx> wrote:
> > 
> > Because loop-aes *is* vulnerable to our attacks.
> > 
> > The keying material is in memory when we mount our
> > attack. We were able
> > to reliably extract keys required to decrypt the
> > data on the disk.
> > 
> 
> So I am right in saying that quitting X and
> overwriting  free memory as root with a utility such
> as smem after pulling down the loop will prevent key
> recovery?
> 
PS:  If so, why doesn't Jari just overwrite the slab
of memory containing the keys when pulling down the
loop? (I previously assumed loop-aes did this).


      

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux