From owner-freebsd-fs@FreeBSD.ORG Thu Apr 28 14:02:50 2005 Return-Path: Delivered-To: freebsd-fs@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id C9D5916A4CE for ; Thu, 28 Apr 2005 14:02:50 +0000 (GMT) Received: from web41203.mail.yahoo.com (web41203.mail.yahoo.com [66.218.93.36]) by mx1.FreeBSD.org (Postfix) with SMTP id 47F8243D54 for ; Thu, 28 Apr 2005 14:02:50 +0000 (GMT) (envelope-from arne_woerner@yahoo.com) Received: (qmail 88066 invoked by uid 60001); 28 Apr 2005 14:02:49 -0000 Comment: DomainKeys? See http://antispam.yahoo.com/domainkeys DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; b=QC6Mm+1BOEKAfOQs8UJMbFUTULGLGTF7Cw074URf6mjoV5rTgqxUnamUBWGyN7t1hw5Ds/ci+HacT+LtJT4es27qzktCT5ytTNA/MSqzX/70YaCZhGIylWAd1STZLkJ4I/jNJwJXkUP8Yq8DqyJrD0blJPZTR3WDrxHW9ZSE9Hk= ; Message-ID: <20050428140249.88064.qmail@web41203.mail.yahoo.com> Received: from [83.129.189.236] by web41203.mail.yahoo.com via HTTP; Thu, 28 Apr 2005 07:02:49 PDT Date: Thu, 28 Apr 2005 07:02:49 -0700 (PDT) From: Arne "Wörner" To: Robert Krten In-Reply-To: <200504281304.JAA02215@parse.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii cc: freebsd-fs@freebsd.org Subject: Re: Background block scrubbing X-BeenThere: freebsd-fs@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Filesystems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 28 Apr 2005 14:02:50 -0000 --- Robert Krten wrote: > =?iso-8859-1?q?Dag-Erling_Sm=F8rgrav?= sez... > > "Robert Krten" writes: > > > Is there a utility that does background unused block > > > scrubbing? > > > > > > What I'm thinking of is something that looks for unused > > > blocks on the > > > disk, and then writes zeros, then random, then more > > > random, etc, to them for security applications. > > > > That's not how it's done. Here's a good explanation of how > > to do it and why it must be done that way: > > > > http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html > I think, that article dramatizes the problem a little, because: It says itself in the end, that with modern hard discs writing random data would be enough (so it is just 8 or so; I did not read the whole article and I am not so good in such things, but I do not know, why it should be possible to know, if a suspected former value of a bit should be the value the attacker is looking for (e. g. MY_DATA, RANDOM_1, RANDOM_2: since just RANDOM_2 is known in the beginning I do not see how an attacker should find MY_DATA by looking at slight variations in magnetization without knowing RANDOM_1); of course it would be necessary to chose good random data (no repetitive/periodic behaviour)). Maybe I should read that article closer... :-) > Gotcha. I wasn't aware it was *35* :-) I was thinking/hoping > more like 3 or 4 with random garbage. > (citation from the above mentioned paper:) "Modern PRML/EPRML" drives (whatever that might be; I think my hard discs both do PRML) just need some random data passes... So you should first check, which kind of drive you need a tool for. Furthermore overwriting the old data once with zeroes should protect you against most attackers... Especially when they are remote attackers, that have to use your operating system for the attack... Maybe you should analysze the kind of attacks, you want to care for: Will they get physical access to your hard disc? Or will they just read from the raw device (/dev/ad0...) with "dd" or so? -Arne __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com