-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secure memory storage of private keys #107
Comments
These methods use the Linux kernel functions The error rate of RowHammer is sufficiently high that recovering the full 16kbytes of random data (referred to as a |
@BobWall23 I recommend we spin out a separate issue for rowhammer protection. I dug into this today and here are some conclusions:
I reviewed the options that Clint referenced and read the thread and then poked around man pages. Basically I think The hardest thing with this is confirming that it's working as expected. That is, how can we prove that the private keys aren't being written to swap or pushed to disk in a core dump? None of the referenced libraries have tests for this. I think we have to take it on faith. I'm open to suggestions though. |
ironoxide should, ideally, provide better in memory security measures for private keys and other sensitive data types.
Starting points for research:
The text was updated successfully, but these errors were encountered: