From owner-freebsd-security Thu Nov 18 20:37:50 1999 Delivered-To: freebsd-security@freebsd.org Received: from newsfeed.win.net (newsfeed.win.net [216.24.27.8]) by hub.freebsd.org (Postfix) with ESMTP id 119EC154D4; Thu, 18 Nov 1999 20:37:46 -0800 (PST) (envelope-from barrett@phoenix.aye.net) Received: from phoenix.aye.net (phoenix.aye.net [198.7.192.5]) by newsfeed.win.net (8.8.8/8.6.9) with SMTP id XAA02680; Thu, 18 Nov 1999 23:37:15 -0500 (EST) Date: Thu, 18 Nov 1999 23:37:34 -0500 (EST) From: Barrett Richardson To: Wes Peters Cc: Kris Kennaway , TrouBle , David G Andersen , freebsd-security@FreeBSD.ORG Subject: Re: secure filesystem wiping In-Reply-To: <38347633.22E76DE0@softweyr.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Wes Peters wrote: > > I've tested obliterate on some rather large files (250 MB) and it exhausts > the system entropy pool very quickly, even on a system with a busy network. > Does anyone make a hardware entropy device? ;^) > How about pseudo-random data? Aren't the passes with random data just a little extra icing? Also, will my system choke if I mmap a 250 MB file on a system with 32 MB of ram? That was why I was thinking of obliterating files in strips. - Barrett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message