"Alistair G. Crooks" <a...@netbsd.org> writes: > Module Name: src > Committed By: agc > Date: Fri May 8 06:06:39 UTC 2009 > > Modified Files: > src/crypto/external/bsd/netpgp/dist: TODO configure configure.ac > src/crypto/external/bsd/netpgp/dist/src/bin: netpgp.c > src/crypto/external/bsd/netpgp/dist/src/lib: config.h config.h.in > crypto.c misc.c netpgp.c openssl_crypto.c reader.c signature.c > signature.h version.h > > Log Message: [...] > + if setrlimit exists, set the core dump size to be 0 > (with thanks to mrg for the reference implementation) [...]
What's the threat model this is protecting against? Presumably, if a user can execute the program, and the program can read his keys, the uesr can already read his own keys, so having a core dump doesn't give the user information he didn't already have. Perry