From 39ca45527bd0a3a39f20ed0f160f8d0043329bdf Mon Sep 17 00:00:00 2001 From: Benjamin Kaduk Date: Tue, 12 Jan 2016 04:31:02 +0000 Subject: [PATCH] Add entry on encrypted kernel crash dumps from def --- .../news/status/report-2015-10-2015-12.xml | 41 +++++++++++++++++++ 1 file changed, 41 insertions(+) diff --git a/en_US.ISO8859-1/htdocs/news/status/report-2015-10-2015-12.xml b/en_US.ISO8859-1/htdocs/news/status/report-2015-10-2015-12.xml index 6c146675fb..28dfb27e40 100644 --- a/en_US.ISO8859-1/htdocs/news/status/report-2015-10-2015-12.xml +++ b/en_US.ISO8859-1/htdocs/news/status/report-2015-10-2015-12.xml @@ -1980,4 +1980,45 @@ + + + Encrypted Kernel Crash Dumps + + + + + Konrad + Witaszczyk + + def@FreeBSD.org + + + + + Technical Details + Patch Review + + + +

Kernel crash dumps contain information about currently + running processes. This can include sensitive data, for example + passwords kept in memory by a browser when a kernel panic + occurred. An entity that can read data from a dump device or a + crash directory can also extract this information from a core + dump. In order to prevent this situation, the core dump should be + encrypted before it is stored on the dump device.

+ +

This project allows a kernel to encrypt a core dump during + a panic. A user can configure the kernel for encrypted dumps and + save the core dump after reboot using the existing tools, + dumpon(8) and savecore(8). A new tool + decryptcore(8) was added to decrypt the core files.

+ +

A patch has been uploaded to Phabricator for review. The + project is currently being updated to address the review comments, + and should be committed as soon as it is accepted. For more + technical details, please visit the FreeBSD-security mailing list + archive or see the Phabricator review.

+ +