Skip to content

GitLab

  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Tor Tor
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 831
    • Issues 831
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 31
    • Merge requests 31
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Repository
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • The Tor Project
  • Core
  • TorTor
  • Issues
  • #2927

Closed
Open
Created Apr 15, 2011 by George Kadianakis@asnContributor

Tor doesn't overwrite rotated keys

Tor doesn't zero out rotated onion keys, or rotated x509s and currently leaves them into memory for anyone to have fun with them.

The fact that Tor uses PFS TLS ciphersuites saves the day, but still sensitive stuff should be overwritten to be on the safe side.

Onion keys should get memsetted somewhere around the crypto_free_pk_env(lastonionkey); of rotate_onion_key()

and TLS certificates should get memsetted in: tor_tls_context_decref().

OpenSSL has functions that clean keys correctly, iirc.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking