Re: Shredding a removable drive (OT)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2019-01-29 at 16:20 -0800, Gordon Messmer wrote:
> On 1/28/19 2:12 AM, Patrick O'Callaghan wrote:
> > Another point: several people have mentioned using /dev/urandom. It's
> > important to note that this is a *pseudo-random* generator. It starts
> > from a random seed, but from that generates a completely deterministic
> > pattern. If you have the seed, you have everything. ...
> 
> I think that you are confusing two separate concerns.  This thread (as 
> confused and meandering as it is) is concerned with clearing the content 
> of a disk.  That is completely unrelated to the concerns about 
> generating secure encryption keys, which appears to be what you're 
> alluding to when you raise concerns about predicting the output of the 
> CSPRNG (cryptographically secure pseudorandom number generator).

I'm actually not confused, I merely made some remarks about PRNGs,
though I admit to not knowing that /dev/urandom did occasionally top up
its randomness. I guess trying to chip in something in the middle of
confusion creates more confusion ...

> Even if you could predict the entire sequence of the CSPRNG (which, to 
> be clear, you can't; Linux continues to feed entropy into the state of 
> the CSPRNG used for /dev/urandom) that wouldn't make writing 
> /dev/urandom to the disk any less secure.  Either way, the random data 
> will replace the old data, and the drive itself will never read out the 
> data that has been overwritten.  As far as reading data from the drive 
> itself is concerned, writing /dev/zero to the disk is the fastest way to 
> clear a disk, and totally effective.
> 
> The question of secure erase is largely academic.  If you are a military 
> or intelligence organization and the content of a disk might threaten 
> the lives of people in your organization, then you should do something 
> better than writing zeros to your disk.  You face one of several 
> problems including:
> 
> 1: If you have very old spinning magnetic drives, an attacker might be 
> able to use a Spin Polarized Scanning Tunneling Microscope to read 
> residual data after a disk was zeroed.
> 
> 2: Either HDD or SDD disks might mark a block bad and remap it. Such a 
> block could in theory still be read by a modified controller (or if an 
> attacker could clear the remapping data).
> 
> If you are concerned about a well-funded attacker reading your data, 
> then the preferred solution is one or both of:
> 
> 1: physically destroy the disk
> 
> 2: always encrypt your disks from the start and never write unencrypted data
> 
> In general, though, this thread has entirely too much speculation and is 
> becoming quite detached from reality.

Agreed.
> 
> For further reading on SSDs, this paper may be interesting:
> 
> https://www.usenix.org/legacy/events/fast11/tech/full_papers/Wei.pdf
> 
> 
> This AMA with a data recovery engineer might be, too.
> 
> https://www.reddit.com/r/IAmA/comments/2n02lt/iama_data_recovery_engineer_i_get_files_from/

Good references, thanks.

poc
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx



[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux