-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CURVE plaintext should be placed in secure memory #3576
Comments
I think it's enough to protect the allocation of secrets - if users want to protect their payloads, they can already do so with the message APIs that take a buffer and a callback to free it |
Ok, please give that a close look once I submit a PR. But does the message API use secure memory? |
With msg_init_data the data buffer is provided by the user, so it's up to them for sending. For receiving, we'd have to allocate the buffer used by the TCP recv syscall with these API, and I don't think it's worth the trouble and performance degradation. |
Ok, then the number of allocations is not critical since the keys are only exhanged once in a session |
For additional security, unencrypted plaintext should be placed in secure memory when using CURVE security.
Points to consider:
The text was updated successfully, but these errors were encountered: