Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261760AbVDKKgz (ORCPT ); Mon, 11 Apr 2005 06:36:55 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261766AbVDKKgz (ORCPT ); Mon, 11 Apr 2005 06:36:55 -0400 Received: from mail1.kontent.de ([81.88.34.36]:56024 "EHLO Mail1.KONTENT.De") by vger.kernel.org with ESMTP id S261760AbVDKKgo (ORCPT ); Mon, 11 Apr 2005 06:36:44 -0400 From: Oliver Neukum To: Pavel Machek Subject: Re: [PATCH] zero disk pages used by swsusp on resume Date: Mon, 11 Apr 2005 12:37:45 +0200 User-Agent: KMail/1.7.1 Cc: Andreas Steinmetz , Linux Kernel Mailinglist References: <42592697.8060909@domdv.de> <200504102203.29602.oliver@neukum.org> <20050410201455.GA21568@elf.ucw.cz> In-Reply-To: <20050410201455.GA21568@elf.ucw.cz> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-15" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200504111237.45452.oliver@neukum.org> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1605 Lines: 40 Am Sonntag, 10. April 2005 22:14 schrieb Pavel Machek: > Hi! > > > > Oliver Neukum wrote: > > > > What is the point in doing so after they've rested on the disk for ages? > > > > > > The point is not physical access to the disk but data gathering after > > > resume or reboot. > > > > After resume or reboot normal access control mechanisms will work > > again. Those who can read a swap partition under normal circumstances > > can also read /dev/kmem. It seems to me like you are putting an extra > > lock on a window on the third floor while leaving the front door open. > > Andreas is right, his patches are needed. > > Currently, if your laptop is stolen after resume, they can still data > in swsusp image. > > Zeroing the swsusp pages helps a lot here, because at least they are > not getting swsusp image data without heavy tools. [Or think root > compromise month after you used swsusp.] > > Encrypting swsusp image is of course even better, because you don't > have to write large ammounts of zeros to your disks during resume ;-). Not only is it better, it completely supercedes wiping the image. Your laptop being stolen after resume is very much a corner case. You suspend your laptop while you are not around, don't you? Additionally it helps only if you cannot trigger another swsusp, eg by running dry the batteries. Regards Oliver - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/