Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upBackup encryption passphrase is exposed to dom0 process list #1582
Comments
marmarek
added
bug
C: core
P: minor
labels
Jan 4, 2016
marmarek
added this to the Release 3.0 updates milestone
Jan 4, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment
Hide comment
marmarek
Jan 6, 2016
Member
While openssl enc can be easily fixed, openssl dgst doesn't support alternative passphrase sources.
|
While |
marmarek
modified the milestones:
Release 3.0 updates,
Release 3.1 updates
Nov 19, 2016
marmarek
referenced this issue
Apr 26, 2017
Closed
Backup: do not pass passphrases on cmd line #2777
andrewdavidwong
modified the milestones:
Release 3.1 updates,
Release 3.2 updates
May 31, 2017
marmarek
modified the milestones:
Release 4.0,
Release 3.2 updates
Jul 20, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment
Hide comment
|
Fixed in Qubes 4.0 (thanks to |
marmarek
closed this
Jul 20, 2017
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
mig5 commentedJan 4, 2016
Although user has a bigger problem if a malicious actor is watching the dom0 process list with ps or top or similar, I think it would be better to use a file descriptor (is this useful example? https://gist.github.com/morgant/9220139)
Maybe also related to #1523 and #971