using insecure memory
Chris Hilts
turtle@lynchburg.net
Fri, 15 Oct 1999 22:05:42 +0000
--HlL+5n6rz5pIUxbD
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
On Fri, Oct 15, 1999 at 07:00:47PM -0500, Derek Moeller wrote:
> As far as I know, the problem arose because a non-root user does not
> have permissions to manipulate memory in the way gnupg would need to
> in order to secure memory. Correct me if I'm wrong, but I don't
> believe there are any compile-time options available to outsmart
> system security.
Just make your binary setuid root. (as root: chmod u+s `which gpg`)
This will allow gpg to lock memory.
Chris
--=20
"#define QUESTION ((bb) || !(bb)) - Shakespeare."
--HlL+5n6rz5pIUxbD
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.0 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE4B6U1qn4IuHG5mmkRATGwAJ4qzwpWhs0g3/Yxfqukksd7dlBczwCfZuwq
gBn42rSa9ZQ26/RAkvf2Y/w=
=/1iq
-----END PGP SIGNATURE-----
--HlL+5n6rz5pIUxbD--