On Thu, 10 Jul 2025 12:41, Guido Trentalancia said:

> I have tested the patch and the logging functions work as I would
> expect. They might need to be initialized before early_system_init(),

That is a catch-22 - early_system_init is supposed to be the very first
thing done after main().  If you want to catch errors, use abort() or
store the the error and retrieve it after the logging has been enabled.
This would be similar to the secmem handling done in GnuPG.  It might
even be useful to do the whole thing as part of the secmem thing - this
is also a critical thing and we have quite some experience on how to get
this right over all the components.

> 2017, leaving the program vulnerable to data leaks for about 8 years !

It is not the gpg or actually gpg-agent process which leaks the data but
it is a properly of the CPU.  If you can mount such an attack on highly
sensitive data, that CPU might not be the right rig for you.  In
particular I would strongly advise not to process such secrets on a VM.

I would suggest to implement the whole stuff in the run-time loader and
provide a way to configure which processes should do this.  This way
users can decide whether it is worth to disable these CPU-(mis)features
mitigations.

> That is the real problem !!

The real problem is a over-complicated mitigation for a problem to be
solved elsewhere.


Salam-Shalom,

   Werner

-- 
The pioneers of a warless world are the youth that
refuse military service.             - A. Einstein

Attachment: openpgp-digital-signature.asc
Description: PGP signature

_______________________________________________
Gnupg-devel mailing list
Gnupg-devel@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-devel

Reply via email to