You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In secrets.rs, the array which is used to store secret key data has zeroize to be erased once dropped, but that doesn't prevent OS from swapping the pages to disk unencrypted.
A possible solution to that may be to use secrets crate to wrap the secret data. That'll additionally provide the functionality zeroize already gives.
The text was updated successfully, but these errors were encountered:
secrets has a hard FFI dependency on libsodium, whereas zeroize is pure Rust.
FWIW, there's some discussion about adding various strategies (including mlock) for protecting data in-memory to the pure Rust secrecy crate, which is built on zeroize:
I'd be interested in the future if a cross-platform solution which does not pull in something large like libsodium were available to ensure pages aren't swapped.
In
secrets.rs
, the array which is used to store secret key data has zeroize to be erased once dropped, but that doesn't prevent OS from swapping the pages to disk unencrypted.A possible solution to that may be to use
secrets
crate to wrap the secret data. That'll additionally provide the functionality zeroize already gives.The text was updated successfully, but these errors were encountered: