Questions about GPGME / GnuPG library
Olaf Trygve Berglihn
olafb at pvv.org
Thu Dec 7 13:50:35 CET 2000
Nils at InfoSun.FMI.Uni-Passau.De (Nils Ellmenreich) writes:
> >>>"OTB" == Olaf Trygve Berglihn <olafb at pvv.org> writes:
>
> OTB> Root is root is root is root, i.e. if you can exploit to become root,
> OTB> then you could swap the gnupg-binary, the shell-binary or
> OTB> whatever.
>
> Not quite, gpg drops root priviledges as soon as protected memory has
> been reserved. <...>
I think you're missing my point. It is not whether a setuid gnupg
drops priviledges or not. Beeing root, I could easily scan your gpg
process, read your keyboard input, or more interesting: just replace
the gnupg binary with a trojan. It would't help you a tiny bit that
you're not using a gpg (statically or dynamically linked) that was not
implemented in a more api-friendly fashion or not. So much for
"protecting the environment".
> Having said that, the best way would be to have OS support for
> secure memory in non-root applications ...
I agree.
Olaf
--
Olaf Trygve Berglihn <olafb at pvv.org>
More information about the Gnupg-devel
mailing list