Questions about GPGME / GnuPG library

Olaf Trygve Berglihn olafb at pvv.org
Thu Dec 7 13:50:35 CET 2000


Nils at InfoSun.FMI.Uni-Passau.De (Nils Ellmenreich) writes:

> >>>"OTB" == Olaf Trygve Berglihn <olafb at pvv.org> writes:
> 
>  OTB> Root is root is root is root, i.e. if you can exploit to become root,
>  OTB> then you could swap the gnupg-binary, the shell-binary or
>  OTB> whatever.
> 
> Not quite, gpg drops root priviledges as soon as protected memory has
> been reserved. <...>

I think you're missing my point. It is not whether a setuid gnupg
drops priviledges or not. Beeing root, I could easily scan your gpg
process, read your keyboard input, or more interesting: just replace
the gnupg binary with a trojan. It would't help you a tiny bit that
you're not using a gpg (statically or dynamically linked) that was not
implemented in a more api-friendly fashion or not. So much for
"protecting the environment".

> Having said that, the best way would be to have OS support for
> secure memory in non-root applications ...

I agree.

Olaf
-- 
Olaf Trygve Berglihn <olafb at pvv.org>



More information about the Gnupg-devel mailing list