Dan Fandrich via curl-library wrote:
> However, if the attacker somehow only has access to the memory and not the 
> rest
> of the process' assets (case 2.), then use of a hardware security device can 
> protect the
> keys from directly being stolen, But, there will be some times that curl needs
> the raw secrets in order to pass them to other dependencies or write them into
> buffers, and when they're in memory, the attacker can still get them. And if
> they're in memory, then can end up on disk in a core or hibernation file where
> the attacker can read them.
> 
> The 3. case is the most interesting one that this proposal could help 
> mitigate.
> A Heartbleed-style bug that gives arbitrary memory to an attacker could return
> memory containing a secret. If secrets are not stored in plaintext in RAM, 
> then
> it becomes much harder to obtain those secrets. But it's still not perfect.
> 
> Here are some possible mitigations we could implement in curl:

Store sensitive keys in a dedicated mmap'd region, mprotect the region to remove
read access whenever the key isn't actively being used.

-- 
  -- Howard Chu
  CTO, Symas Corp.           http://www.symas.com
  Director, Highland Sun     http://highlandsun.com/hyc/
  Chief Architect, OpenLDAP  http://www.openldap.org/project/
-- 
Unsubscribe: https://lists.haxx.se/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to