The paper you mentioned has some info on possible countermeasures. The
best (IMO) is physically securing your RAM. This seems to fit in best
with OpenBSD's philosophy, which has never been to put much time into
thwarting attacks that require physical access to the box -- if you
have that, there are MANY avenues of attack, most of which don't
benefit much from immersing components in liquid N_2.

Marti

On Thu, Feb 21, 2008 at 3:55 PM,  <[EMAIL PROTECTED]> wrote:
> Little blog:
>  http://citp.princeton.edu/memory/
>
>  Paper:
>  http://citp.princeton.edu.nyud.net/pub/coldboot.pdf
>
>  Well some months ago I asked (not here.. more directly) if it would be
>  possible to may overwrite memory serval times in case the Box has nothing
>  to do. Back then there was like no interest because it was no risk not to
>  do it.
>
>  It's no bashing thread. I just wanna bring this to the broad attention
>  that simply turning OFF the PC wont magicaly kill all your PWs wich lay
>  around in the RAM. :-)
>
>  My suggestion is to overwrite memory like 3 times if a programm free's the
>  memory or if a reboot is commanded via the shell. Of course this harms
>  "old" boxes but it's still btter then loosing your SSH-Key or whatever
>  resists in your ram.
>
>  Furthermore OpenBSD may could overwrite periodicaly unused ram to ensure
>  such data gets removed.
>
>  The only place where this may could happen is in the Kernel.
>  Also a modified lib* may help (f.e. modified free()?)?
>
>  I'm no developer but I would be happy to read about solutions, concepts or
>  ideas even none gets implemented. :-)
>
>  Kind regards,
>  Sebastian
>
>



-- 
Systems Programmer, Principal
Electrical & Computer Engineering
The University of Arizona
[EMAIL PROTECTED]

Reply via email to