Beefy Boxes and Bandwidth Generously Provided by pair Networks
Syntactic Confectionery Delight
 
PerlMonks  

Re^5: mod_perl2 interactive startup

by Anonymous Monk
on Aug 18, 2009 at 14:49 UTC ( #789486=note: print w/replies, xml ) Need Help??


in reply to Re^4: mod_perl2 interactive startup
in thread mod_perl2 interactive startup

That leads me to believe it is not as trivial b/c an intruder needs physical access.

It doesn't say that.

Quickly overwriting passwords in memory would minimize the risk of capture via physical access, cold boot techniques, swap space forensics or simple, live, privileged memory captures.

Replies are listed 'Best First'.
Re^6: mod_perl2 interactive startup
by d_m (Initiate) on Aug 18, 2009 at 21:29 UTC

    So are you arguing that random apache vulnerabilities are as likely to give simple, live, privileged memory access as they are to give access to the filesystem?? Assuming the system doesn't allow core dumps, this seems far-fetched.

    In its conclusion the paper doesn't argue that developers should store passwords in plaintext in configuration files (which is the insane point you seem to be arguing for). It argues that passwords should be erased from memory when they're no longer needed.

    Do you actually have anything useful to suggest?

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://789486]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others studying the Monastery: (4)
As of 2019-12-15 22:04 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found

    Notices?