Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 18 Nov 1999 23:37:34 -0500 (EST)
From:      Barrett Richardson <barrett@phoenix.aye.net>
To:        Wes Peters <wes@softweyr.com>
Cc:        Kris Kennaway <kris@hub.freebsd.org>, TrouBle <trouble@netquick.net>, David G Andersen <danderse@cs.utah.edu>, freebsd-security@FreeBSD.ORG
Subject:   Re: secure filesystem wiping
Message-ID:  <Pine.BSF.4.01.9911182331400.18537-100000@phoenix.aye.net>
In-Reply-To: <38347633.22E76DE0@softweyr.com>

next in thread | previous in thread | raw e-mail | index | archive | help


Wes Peters wrote:
>
> I've tested obliterate on some rather large files (250 MB) and it exhausts
> the system entropy pool very quickly, even on a system with a busy network.
> Does anyone make a hardware entropy device?  ;^)
> 

How about pseudo-random data? Aren't the passes with random data just
a little extra icing?

Also, will my system choke if I mmap a 250 MB file on a system
with 32 MB of ram? That was why I was thinking of obliterating
files in strips.

-

Barrett



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.01.9911182331400.18537-100000>