Skip site navigation (1)Skip section navigation (2)
Date:      19 Nov 1999 11:35:17 +0100
From:      Dag-Erling Smorgrav <des@flood.ping.uio.no>
To:        Barrett Richardson <barrett@phoenix.aye.net>
Cc:        Wes Peters <wes@softweyr.com>, Kris Kennaway <kris@hub.freebsd.org>, TrouBle <trouble@netquick.net>, David G Andersen <danderse@cs.utah.edu>, freebsd-security@FreeBSD.ORG
Subject:   Re: secure filesystem wiping
Message-ID:  <xzpbt8qydju.fsf@flood.ping.uio.no>
In-Reply-To: Barrett Richardson's message of "Thu, 18 Nov 1999 23:37:34 -0500 (EST)"
References:  <Pine.BSF.4.01.9911182331400.18537-100000@phoenix.aye.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Barrett Richardson <barrett@phoenix.aye.net> writes:
> Wes Peters wrote:
> > I've tested obliterate on some rather large files (250 MB) and it exhausts
> > the system entropy pool very quickly, even on a system with a busy network.
> > Does anyone make a hardware entropy device?  ;^)
> How about pseudo-random data? Aren't the passes with random data just
> a little extra icing?

Don't use random data. Use patterns. See the previous 'secure
deletion' thread for references to a paper describing which patterns
to use (and in which order).

DES
-- 
Dag-Erling Smorgrav - des@flood.ping.uio.no


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpbt8qydju.fsf>