Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-12 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: > Hi, > > On Monday, 11 of April 2005 19:02, Andreas Steinmetz wrote: > >>Rafael J. Wysocki wrote: >> >>>Hi, >>> >>>On Monday, 11 of April 2005 12:37, Oliver Neukum wrote: >>> >>> Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: >Hi! > >

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-12 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: Hi, On Monday, 11 of April 2005 19:02, Andreas Steinmetz wrote: Rafael J. Wysocki wrote: Hi, On Monday, 11 of April 2005 12:37, Oliver Neukum wrote: Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: Hi! Oliver Neukum wrote: What is the point in doing

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Rafael J. Wysocki
Hi, On Monday, 11 of April 2005 19:02, Andreas Steinmetz wrote: > Rafael J. Wysocki wrote: > > Hi, > > > > On Monday, 11 of April 2005 12:37, Oliver Neukum wrote: > > > >>Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: > >> > >>>Hi! > >>> > >>> > >Oliver Neukum wrote: > > >

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: > Hi, > > On Monday, 11 of April 2005 12:37, Oliver Neukum wrote: > >>Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: >> >>>Hi! >>> >>> >Oliver Neukum wrote: > >>What is the point in doing so after they've rested on the disk for ages? > >The

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Rafael J. Wysocki
Hi, On Monday, 11 of April 2005 12:37, Oliver Neukum wrote: > Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: > > Hi! > > > > > > Oliver Neukum wrote: > > > > > What is the point in doing so after they've rested on the disk for > > > > > ages? > > > > > > > > The point is not physical

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Jan Niehusmann
> Andreas is right, his patches are needed. > > Currently, if your laptop is stolen after resume, they can still data > in swsusp image. Which shows that swsusp is a security risk if you have sensitive data in RAM. A thief stealing a running computer can get access to memory contents much more

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Oliver Neukum
Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: > Hi! > > > > Oliver Neukum wrote: > > > > What is the point in doing so after they've rested on the disk for ages? > > > > > > The point is not physical access to the disk but data gathering after > > > resume or reboot. > > > > After

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Pavel Machek
Hi! > > Encrypting swsusp image is of course even better, because you don't > > have to write large ammounts of zeros to your disks during resume ;-). > > How does zeroing help if they steal the laptop? The data is there, they > can just pull the hard disk out and mirror it before they boot. >

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Stefan Seyfried
Pavel Machek wrote: > Encrypting swsusp image is of course even better, because you don't > have to write large ammounts of zeros to your disks during resume ;-). and while we are at it: compressing before encryption will also reduce the amount of data you have to write during suspend... ;-) >

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Stefan Seyfried
Pavel Machek wrote: Encrypting swsusp image is of course even better, because you don't have to write large ammounts of zeros to your disks during resume ;-). and while we are at it: compressing before encryption will also reduce the amount of data you have to write during suspend... ;-)

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Pavel Machek
Hi! Encrypting swsusp image is of course even better, because you don't have to write large ammounts of zeros to your disks during resume ;-). How does zeroing help if they steal the laptop? The data is there, they can just pull the hard disk out and mirror it before they boot. The

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Oliver Neukum
Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: Hi! Oliver Neukum wrote: What is the point in doing so after they've rested on the disk for ages? The point is not physical access to the disk but data gathering after resume or reboot. After resume or reboot normal

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Jan Niehusmann
Andreas is right, his patches are needed. Currently, if your laptop is stolen after resume, they can still data in swsusp image. Which shows that swsusp is a security risk if you have sensitive data in RAM. A thief stealing a running computer can get access to memory contents much more easy

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Rafael J. Wysocki
Hi, On Monday, 11 of April 2005 12:37, Oliver Neukum wrote: Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: Hi! Oliver Neukum wrote: What is the point in doing so after they've rested on the disk for ages? The point is not physical access to the disk but data

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Andreas Steinmetz
Rafael J. Wysocki wrote: Hi, On Monday, 11 of April 2005 12:37, Oliver Neukum wrote: Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: Hi! Oliver Neukum wrote: What is the point in doing so after they've rested on the disk for ages? The point is not physical access to the disk but

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-11 Thread Rafael J. Wysocki
Hi, On Monday, 11 of April 2005 19:02, Andreas Steinmetz wrote: Rafael J. Wysocki wrote: Hi, On Monday, 11 of April 2005 12:37, Oliver Neukum wrote: Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: Hi! Oliver Neukum wrote: What is the point in doing so after they've

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Elladan
On Sun, Apr 10, 2005 at 10:14:55PM +0200, Pavel Machek wrote: > Hi! > > > > Oliver Neukum wrote: > > > > What is the point in doing so after they've rested on the disk for ages? > > > > > > The point is not physical access to the disk but data gathering after > > > resume or reboot. > > > >

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Pavel Machek
Hi! > > Oliver Neukum wrote: > > > What is the point in doing so after they've rested on the disk for ages? > > > > The point is not physical access to the disk but data gathering after > > resume or reboot. > > After resume or reboot normal access control mechanisms will work > again. Those

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Oliver Neukum
Am Sonntag, 10. April 2005 21:29 schrieb Andreas Steinmetz: > Oliver Neukum wrote: > > What is the point in doing so after they've rested on the disk for ages? > > The point is not physical access to the disk but data gathering after > resume or reboot. After resume or reboot normal access

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
Pavel Machek wrote: > Hi! > > >>>Hi! What about doing it right? Encrypt it with symmetric cypher >>>and store key in suspend header. That way key is removed automagically >>>while fixing signatures. No need to clear anythink. >> >>Good idea. I'll have a look though it will take a while (busy

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
Oliver Neukum wrote: > What is the point in doing so after they've rested on the disk for ages? The point is not physical access to the disk but data gathering after resume or reboot. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Pavel Machek
Hi! > > > > Hi! What about doing it right? Encrypt it with symmetric cypher > > > > and store key in suspend header. That way key is removed automagically > > > > while fixing signatures. No need to clear anythink. > > You might want to leave the key in the kernel image. You need to boot the >

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Oliver Neukum
> > > Hi! What about doing it right? Encrypt it with symmetric cypher > > > and store key in suspend header. That way key is removed automagically > > > while fixing signatures. No need to clear anythink. You might want to leave the key in the kernel image. You need to boot the same image

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Oliver Neukum
Am Sonntag, 10. April 2005 15:13 schrieb Andreas Steinmetz: > It may not be desireable to leave swsusp saved pages on disk after > resume as they may contain sensitive data that was never intended to be > stored on disk in an way (e.g. in-kernel dm-crypt keys, mlocked pages). > > The attached

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Pavel Machek
Hi! > > Hi! What about doing it right? Encrypt it with symmetric cypher > > and store key in suspend header. That way key is removed automagically > > while fixing signatures. No need to clear anythink. > > Good idea. I'll have a look though it will take a while (busy with my job). > > > OTOH

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
[reformatted] Pavel Machek wrote: > Hi! What about doing it right? Encrypt it with symmetric cypher > and store key in suspend header. That way key is removed automagically > while fixing signatures. No need to clear anythink. Good idea. I'll have a look though it will take a while (busy with my

Re:[PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Pavel Machek
Hi! What about doing it right? Encrypt it with symmetric cypher and store key in suspend header. That way key is removed automagically while fixing signatures. No need to clear anythink. OTOH we may want to dm-crypt whole swap partition. You could still store key in header... --p -- pavel.

[PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
It may not be desireable to leave swsusp saved pages on disk after resume as they may contain sensitive data that was never intended to be stored on disk in an way (e.g. in-kernel dm-crypt keys, mlocked pages). The attached simple patch against 2.6.11.2 should fix this by zeroing the swap pages

[PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
It may not be desireable to leave swsusp saved pages on disk after resume as they may contain sensitive data that was never intended to be stored on disk in an way (e.g. in-kernel dm-crypt keys, mlocked pages). The attached simple patch against 2.6.11.2 should fix this by zeroing the swap pages

Re:[PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Pavel Machek
Hi! What about doing it right? Encrypt it with symmetric cypher and store key in suspend header. That way key is removed automagically while fixing signatures. No need to clear anythink. OTOH we may want to dm-crypt whole swap partition. You could still store key in header... --p -- pavel.

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
[reformatted] Pavel Machek wrote: Hi! What about doing it right? Encrypt it with symmetric cypher and store key in suspend header. That way key is removed automagically while fixing signatures. No need to clear anythink. Good idea. I'll have a look though it will take a while (busy with my

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Pavel Machek
Hi! Hi! What about doing it right? Encrypt it with symmetric cypher and store key in suspend header. That way key is removed automagically while fixing signatures. No need to clear anythink. Good idea. I'll have a look though it will take a while (busy with my job). OTOH we may want

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Oliver Neukum
Am Sonntag, 10. April 2005 15:13 schrieb Andreas Steinmetz: It may not be desireable to leave swsusp saved pages on disk after resume as they may contain sensitive data that was never intended to be stored on disk in an way (e.g. in-kernel dm-crypt keys, mlocked pages). The attached simple

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Oliver Neukum
Hi! What about doing it right? Encrypt it with symmetric cypher and store key in suspend header. That way key is removed automagically while fixing signatures. No need to clear anythink. You might want to leave the key in the kernel image. You need to boot the same image anyway. Leaving

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Pavel Machek
Hi! Hi! What about doing it right? Encrypt it with symmetric cypher and store key in suspend header. That way key is removed automagically while fixing signatures. No need to clear anythink. You might want to leave the key in the kernel image. You need to boot the same image

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
Oliver Neukum wrote: What is the point in doing so after they've rested on the disk for ages? The point is not physical access to the disk but data gathering after resume or reboot. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list: send

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Andreas Steinmetz
Pavel Machek wrote: Hi! Hi! What about doing it right? Encrypt it with symmetric cypher and store key in suspend header. That way key is removed automagically while fixing signatures. No need to clear anythink. Good idea. I'll have a look though it will take a while (busy with my job).

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Oliver Neukum
Am Sonntag, 10. April 2005 21:29 schrieb Andreas Steinmetz: Oliver Neukum wrote: What is the point in doing so after they've rested on the disk for ages? The point is not physical access to the disk but data gathering after resume or reboot. After resume or reboot normal access control

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Pavel Machek
Hi! Oliver Neukum wrote: What is the point in doing so after they've rested on the disk for ages? The point is not physical access to the disk but data gathering after resume or reboot. After resume or reboot normal access control mechanisms will work again. Those who can read a

Re: [PATCH] zero disk pages used by swsusp on resume

2005-04-10 Thread Elladan
On Sun, Apr 10, 2005 at 10:14:55PM +0200, Pavel Machek wrote: Hi! Oliver Neukum wrote: What is the point in doing so after they've rested on the disk for ages? The point is not physical access to the disk but data gathering after resume or reboot. After resume or reboot