Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 19 Nov 1999 00:00:03 -0700
From:      Wes Peters <wes@softweyr.com>
To:        Barrett Richardson <barrett@phoenix.aye.net>
Cc:        Kris Kennaway <kris@hub.freebsd.org>, TrouBle <trouble@netquick.net>, David G Andersen <danderse@cs.utah.edu>, freebsd-security@FreeBSD.ORG
Subject:   Re: secure filesystem wiping
Message-ID:  <3834F573.EE821665@softweyr.com>
References:  <Pine.BSF.4.01.9911182331400.18537-100000@phoenix.aye.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Barrett Richardson wrote:
> 
> Wes Peters wrote:
> >
> > I've tested obliterate on some rather large files (250 MB) and it exhausts
> > the system entropy pool very quickly, even on a system with a busy network.
> > Does anyone make a hardware entropy device?  ;^)
> >
> 
> How about pseudo-random data? Aren't the passes with random data just
> a little extra icing?
> 
> Also, will my system choke if I mmap a 250 MB file on a system
> with 32 MB of ram? That was why I was thinking of obliterating
> files in strips.

Mine don't choke when I mmap 250 MB files on a system with 512MB of RAM.
I guess that's not quite the same, but it does have two processes doing
this at the same time; one on each processor.

-- 
            "Where am I, and what am I doing in this handbasket?"

Wes Peters                                                         Softweyr LLC
wes@softweyr.com                                           http://softweyr.com/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3834F573.EE821665>