Hello-

I am trying on integrating OpenSSL into a POP3 daemon that I've been
contributing to, and a security concern has come up that I hadn't
considered but has me curios. Basically, as with most POP3 daemons,
after authentication, the program forks an external process and does a
setuid to the authenticated user's UID. This behavior is fairly ubiquitous
in these types of daemons, as it helps the daemon deal with some other
security issues.

However, with SSL it allows for the possibility that a user logged
into the system could launch a debugger and hook into the fork()'d
process, and view some of the cryptographic information. Would this expose
the private key used during the key exchange to be seen by an unauthorized
user? Is it possible that we could free the memory used to store the
private key before the fork() and avoid this issue? I admit that I don't
have enough knowledge of SSL/TLS to know whether the private key is used
during renegotiation. I looked through the RFC (2246), and couldn't find a
definitive answer (although, this could be because I started getting
confused).

Please excuse my ignorance, and any help you could give be would be much
appreciated.

Thanks.
Ben
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to