Date: 19 Nov 1999 11:35:17 +0100 From: Dag-Erling Smorgrav <des@flood.ping.uio.no> To: Barrett Richardson <barrett@phoenix.aye.net> Cc: Wes Peters <wes@softweyr.com>, Kris Kennaway <kris@hub.freebsd.org>, TrouBle <trouble@netquick.net>, David G Andersen <danderse@cs.utah.edu>, freebsd-security@FreeBSD.ORG Subject: Re: secure filesystem wiping Message-ID: <xzpbt8qydju.fsf@flood.ping.uio.no> In-Reply-To: Barrett Richardson's message of "Thu, 18 Nov 1999 23:37:34 -0500 (EST)" References: <Pine.BSF.4.01.9911182331400.18537-100000@phoenix.aye.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Barrett Richardson <barrett@phoenix.aye.net> writes: > Wes Peters wrote: > > I've tested obliterate on some rather large files (250 MB) and it exhausts > > the system entropy pool very quickly, even on a system with a busy network. > > Does anyone make a hardware entropy device? ;^) > How about pseudo-random data? Aren't the passes with random data just > a little extra icing? Don't use random data. Use patterns. See the previous 'secure deletion' thread for references to a paper describing which patterns to use (and in which order). DES -- Dag-Erling Smorgrav - des@flood.ping.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpbt8qydju.fsf>