Comment #3 on issue 317 by [email protected]: Encryption Passphrase Stored Unprotected in Memory
https://code.google.com/p/vim/issues/detail?id=317

There's a function, mlock(), which does exactly this. This will prevent that section of memory from getting written to a core file, or from being written to swap. Of course you can look at it if you have access to RAM (if you're the same user, or otherwise have sufficient privileges), but the point is to not have your sensitive data sitting around on disk.

GnuPG uses this (through pinentry).

One note is that some operating systems prevent you from calling mlock() without extra privileges, because otherwise you can run a DoS attack on the machine by locking loads of memory. Others either just allow it, or allow up to a small amount, enough to keep a bunch of passwords stored. So you'd need to make sure that you reverted to the unsafe behavior if mlock() failed (or have configuration that prevented the fallback, for the paranoid).

--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
--
You received this message from the "vim_dev" maillist.
Do not top-post! Type your reply below the text you are replying to.
For more information, visit http://www.vim.org/maillist.php

--- You received this message because you are subscribed to the Google Groups "vim_dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Raspunde prin e-mail lui