views:

465

answers:

5

There's a SecureZeroMemory() function in WinAPI that is designed for erasing the memory used for storing passwords/encryption keys/similar stuff when the buffer is no longer needed. It differs from ZeroMemory() in that its call will not be optimized out by the compiler.

Is it really so necessary to erase the memory used for storing sensitive data? Does it really make the application more secure?

I understand that data could be written into swapfile or into hibernation file and that other processes could possibly read my program's memory. But the same could happen with the data when it is still in use. Why is use, then erase better than just use?

+6  A: 

It does. Hibernation file is not encrypted, for example. And if you don't securely clear the memory, you might end up with trouble. It's just a single example, though. You should always hold secret stuff in memory only as long as needed.

Mehrdad Afshari
I understand that, but it's also possible that the password is copied into swapfile/hibernated when it is in use. What's the difference - the duration of storing it in memory?
sharptooth
Yes. you are reducing the attack surface. Remember: security is all about raising the bar. The more you raise the bar, the better.
Mehrdad Afshari
+2  A: 

Also note that it might be that some OS'es will not zero memory before giving it to an application, this means that an application might randomly request memory, scan it for possibly interesting content and do something with it.

If that application would only get zero'd memory, of course it would have a harder time trying to get interesting data.

Lennaert
I'm not aware of *any* OS'es that zero out memory before giving it to a process.
jalf
Michael Burr
+3  A: 

It exists for a reason. :) If you keep sensitive data in memory, then other processes can potentially read it.

Of course, in your application, passwords or other secure data may not be so critical that this is required. But in some applications, it's pretty essential that malicious code can't just snoop your passwords or credit card numbers or whatever other data the application uses.

jalf
Why can't it snoop the data while the data is in use? Why "use, the erase" is better than just "use"?
sharptooth
Because "use, then erase" only leaves the data in memory for, let's say, a fraction of a second -- as opposed to "maybe until the application exits, maybe longer" (see answer above about the OS not zeroing memory). Malware would have to get much less lucky to find your data if it's in memory for a long time.
Joe White
+1  A: 

SecureZeroMemory() will certainly not make your application perfectly secure. The fact that the password was already in memory is already a security hole. Using SecureZeroMemory() will definitely make it less likely that your password can be retrieved. I don't see any reason not to use it, so why not? Just remember that there are many other things you have to worry about too.

Zifre
+1  A: 

If you actually have password data or other secrets, you're also going to want to make sure that the memory they are in doesn't get swapped out, otherwise the swap file can become a problem (I think the function you want is 'VirtualLock' for a windows app). Further you'll need to detect windows going into hibrenate and wipe the data at that point too. I believe Windows will send a message to every app when it's about to hibrenate.

Michael Kohne