[129052] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: cleartext SSH, Truecrypt, etc passwords in memory

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Sun Jul 27 10:35:16 2008

Date: Sun, 27 Jul 2008 09:44:13 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: Sherri Davidoff <alien@MIT.EDU>
Cc: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <4889F10F.3030002@mit.edu>

Sherri Davidoff <alien@MIT.EDU> writes:

> Hello all. During the past few months, I've been poking around Linux
> memory and consistently finding cleartext login, SSH, email, IM,
> Truecrypt and root passwords. I've just finished a paper which includes
> detailed location and context information for each password. Given the
> recent buzz about cold boot memory dumping, it seems the risk associated
> with cleartext passwords in memory has increased.

What the abstract doesn't make at all clear is that the process used
seems to have been (from section 2 of the paper):

Start application;
Enter password;
Take snapshot of running application's memory;

(although some passwords were apparently found in non-application-specific
memory, see section 3.7 of the paper).

In other words what's apparently being demonstrated for most of the apps
isn't an ability to recover keys still hanging around in memory at some
arbitrary later point but to recover keys from the active process memory
image.  The reason why I keep using "apparently" is that paragraphs 2 and
3 of section 2 don't make at all clear whether the application is still
active or not, although "after all programs had been launched process
memory was captured live" seems to imply it was a snapshot of a running
process.  Since many crypto applications zeroise keys after they've
been used, it seems a bit surprising that it'd be possibly to recover key
data after the app has exited, as the paper implies.

So was this a case of "recover data from an active app's memory image"
(not surprising) or "recover data after the app has exited" (surprising,
at least for the crypto apps)?

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post