Date: Fri, 19 Nov 1999 00:00:03 -0700 From: Wes Peters <wes@softweyr.com> To: Barrett Richardson <barrett@phoenix.aye.net> Cc: Kris Kennaway <kris@hub.freebsd.org>, TrouBle <trouble@netquick.net>, David G Andersen <danderse@cs.utah.edu>, freebsd-security@FreeBSD.ORG Subject: Re: secure filesystem wiping Message-ID: <3834F573.EE821665@softweyr.com> References: <Pine.BSF.4.01.9911182331400.18537-100000@phoenix.aye.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Barrett Richardson wrote: > > Wes Peters wrote: > > > > I've tested obliterate on some rather large files (250 MB) and it exhausts > > the system entropy pool very quickly, even on a system with a busy network. > > Does anyone make a hardware entropy device? ;^) > > > > How about pseudo-random data? Aren't the passes with random data just > a little extra icing? > > Also, will my system choke if I mmap a 250 MB file on a system > with 32 MB of ram? That was why I was thinking of obliterating > files in strips. Mine don't choke when I mmap 250 MB files on a system with 512MB of RAM. I guess that's not quite the same, but it does have two processes doing this at the same time; one on each processor. -- "Where am I, and what am I doing in this handbasket?" Wes Peters Softweyr LLC wes@softweyr.com http://softweyr.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3834F573.EE821665>