>>>>> "kmself" == kmself <kmself@ix.netcom.com> writes:
kmself> I'd also confirmed this on another box. Though I can kmself> never remember what the [EMAIL PROTECTED]&*() mode bit is for SUID. kmself> '4577' was what I was looking for, IIRC. 4755. Though you should probably use suidregister (see /var/lib/dpkg/info/gnupg.postinst for how to do it). >> Applications with access to gnupg's memory are either running >> as root or as the user owner of the gnupg process. You must >> trust root, and I don't think that a bad process running as you >> would read gnupg's memory (strace the shell and hook exec, for >> example). >> The issue is the swap; locked pages are never swapped out, so >> the disk never seeks them. If someone could pick over your swap >> then they could pickout sectors with high-entropy and possibly >> they would be your privkey. kmself> So: the locked pages are still accessible to other root kmself> processes, but not to user-land programs, and they're not kmself> swapped to disk? The other root programs shouldn't be looking at memory other than their own, or else they'd segfault. The major thing with memory-locking is that the memory never gets written to disk. Chris -- Every child in America MUST get one of these things for Christmas or Chanukah or Kwanzaa or Atheist Children Get Presents Day. -- Dave Barry