-
Notifications
You must be signed in to change notification settings - Fork 119
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
zero-on-drop #2
Comments
Updated link: dalek-cryptography/curve25519-dalek#11 |
I was looking at implementing zeroize for the Keypair struct. However, it will affect callers as they'd not be able to move that struct (and members) anymore. What do you suggest? Would this be a major version change? Also, for non-default resolver, the cleanest approach would be to zero memory as part of their library (similar to what Dalek does) and not at the snow layer. Ref: |
Can callers wrap that struct themselves in a |
If one of the existing impls |
@gedigi (one year later) I think that this seems like a pretty reasonable way to go, and people that want a less secure keypair struct can simply make their own and convert to snow's keypair type as needed. Maybe a good way to start that's not even a breaking change is simply to use Zeroize to clear out sensitive material that's no longer used during the transition from |
clear out sensitive key material from the stack when they're dropped
https://github.com/isislovecruft/curve25519-dalek/issues/11 for some options
The text was updated successfully, but these errors were encountered: