On Fri, Jan 05, 2018 at 08:13:33AM +0100, Willy Tarreau wrote: > I'm not fond of running the mitigations, but given that a few sysops can > connect to the machine to collect stats or counters, I think it would be > better to ensure these people can't happily play with the exploits to > dump stuff they shouldn't have access to.
So if someone exploits the "trusted" process, and then dumps all memory, you have practically lost. -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.