Re: [Full-disclosure] round and round they go, keys in ram are ripe for picking...
- From: coderman <coderman@xxxxxxxxx>
- Date: Fri, 22 Feb 2008 10:53:55 -0800
On Fri, Feb 22, 2008 at 10:05 AM, Michael Holstein
FIPS 140-1 [http://www.itl.nist.gov/fipspubs/fip140-1.htm] addresses this.
* The contents of the module shall be completely contained within a
tamper detection envelope...
* The module shall contain tamper response and zeroization
* The module shall either include environmental failure protection
(EFP) features or undergo environmental failure testing (EFT) ..
i'm fond of tamper resistant / evident packaging, but this is usually
applied to persistent key storage rather than working system memory.
works well for authentication tokens and such, even if these methods
can also be bypassed with some effort.
(see http://flylogic.net/ and their disassemblies at http://flylogic.net/blog )
tamper resistant cases are bit more fun, like the blackbox  pelican
padlock'ed with zeroization / panic button. however, after reading
this paper, it appears that secure overwrite of all key scrubbed
memory and other sensitive locations would be preferable to simple
power off, even if the case is a pain to open...
a fun attack, to be sure.
0. DefCon 13 black box challenge
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Prev by Date: Re: [Full-disclosure] round and round they go
- Next by Date: Re: [Full-disclosure] On Topic Off Topic: How To Behave On An Internet Forum
- Previous by thread: Re: [Full-disclosure] round and round they go, keys in ram are ripe for picking...
- Next by thread: [Full-disclosure] [ GLSA 200802-09 ] ClamAV: Multiple vulnerabilities