Re: Unswappable memory needed is user space

christophe.leroy5@capway.com
Wed, 9 Dec 1998 10:37:06 +0100


>"A month of sundays ago christophe.leroy5@capway.com wrote:"
>>
>> I'm making a crypto program (under french law).
>> It crypts a file and then totally erase the uncrypted by filling it
>>with
>> zero.
>>
>> My problem is that if the crypting process is swapped out
>>during
>> crypting, one could be able to recover parts of uncrypted file
>> in swap partition.
>>
>> Is there a way to malloc a non swappable part of memory ?

>Why would it help you? Swap was secure anyway. It can't be
>read by user
>programs.

>Only root can read swap. And if somebody has root they can read
>/dev/kmem (or whatever) too. Are you SURE you've thought about
>this for
>more than five seconds? These statements are so naive that it
>makes
>me want to tell whoever is employing you not to be so silly!

I dont want to begin the war and I think you are a bit aggressive !!

I dont need more than 5 second to think that one can enter my
office, open my computer, activate the "clear password" switch,
turn on, turn off, unactivate "clear password" switch, turn on,
boot from A:, and physically read swap partition !

You dont have "clear password switch "? Just put CMOS battery
away, and boot.

christophe leroy

Peter

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/