>
> Thats a good question. I see three options:
> 1. Dump the core plaintext. (sucks but convenient for users).
> 2. In the core, zero the pages that would be encrypted when swapped out.
> On some policies where only things like keys are encrypted, the core
> will be usable. On others it won't. (Not sure its really an option).
> 3. If the core contains pages that should be encrypted, dump it encrypted
> with some system-wide (or per-uid) key generated on the first core
> dump. The key will be available to the user via some /proc interface.
> Its up to the user to be smart and take the core to another host and
> decrypt_core(1) it there (or just decrypt_core(1) it to an encrypted
> filesystem). In any case, the decrypted core or the system-wide key
> are never written to disk.
> 4. Refuse to dump core of a process that has pages that should be
> encrypted.
>
> Do you see more options ?
> Anyway, it should probably be policy controlled.
These are all very good options, ofcourse things get hairy don't they :)
Perhaps in the beginning either 1, 2 and 4 as per a system wide dump
policy. May be even a setrlimit extension and use that as a jump point to
make a per user policy?
Cheers,
Ahmed.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/