Date: Fri, 19 Nov 1999 00:00:03 -0700 From: Wes Peters <wes@softweyr.com> To: Barrett Richardson <barrett@phoenix.aye.net> Cc: Kris Kennaway <kris@hub.freebsd.org>, TrouBle <trouble@netquick.net>, David G Andersen <danderse@cs.utah.edu>, freebsd-security@FreeBSD.ORG Subject: Re: secure filesystem wiping Message-ID: <3834F573.EE821665@softweyr.com> References: <Pine.BSF.4.01.9911182331400.18537-100000@phoenix.aye.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Barrett Richardson wrote:
>
> Wes Peters wrote:
> >
> > I've tested obliterate on some rather large files (250 MB) and it exhausts
> > the system entropy pool very quickly, even on a system with a busy network.
> > Does anyone make a hardware entropy device? ;^)
> >
>
> How about pseudo-random data? Aren't the passes with random data just
> a little extra icing?
>
> Also, will my system choke if I mmap a 250 MB file on a system
> with 32 MB of ram? That was why I was thinking of obliterating
> files in strips.
Mine don't choke when I mmap 250 MB files on a system with 512MB of RAM.
I guess that's not quite the same, but it does have two processes doing
this at the same time; one on each processor.
--
"Where am I, and what am I doing in this handbasket?"
Wes Peters Softweyr LLC
wes@softweyr.com http://softweyr.com/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3834F573.EE821665>
