tech-security archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Security properties of domain socket communication buffers



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Giles Lean <giles.lean%pobox.com@localhost> writes:

> My first response ignored virtualisation -- if your software will run
> within virtualised operating system instances, then you have to worry
> about whether the virtual machine manager will page guest OS memory to
> disk.  Unless that's too paranoid for your taste? :-)

That amount of paranoia is inadequate to stimulate even a single one of
my taste buds :-).  But yeah, obviously all bets are off on this sort of
thing when virtualization is in play and you don't control the host.

Thanks for your help.

- -- 
 Daniel Franke         df%dfranke.us@localhost         http://www.dfranke.us
 |----| =|\     \\\\    
 || * | -|-\---------   Man is free at the instant he wants to be. 
 -----| =|  \   ///     --Voltaire
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iF4EAREKAAYFAkoZ+kAACgkQ8tqcOcPA7qO1lQD9EtN0b3tIiI8wPTPv09tVYSjd
AEHEubLFlSl29DzUse8A/2eGSWP+4OdzcovY+Xp0frys+hNoXAU2xUOBl81sV+pV
=+ON6
-----END PGP SIGNATURE-----


Home | Main Index | Thread Index | Old Index