[lug] drive free space "wiper" recommendation

karl horlen horlenkarl at yahoo.com
Tue Oct 12 10:50:01 MDT 2010


thanks for the info

--- On Mon, 10/11/10, Anthony Foiani <tkil at scrye.com> wrote:

> From: Anthony Foiani <tkil at scrye.com>
> Subject: Re: [lug] drive free space "wiper" recommendation
> To: "Boulder (Colorado) Linux Users Group -- General Mailing List" <lug at lug.boulder.co.us>
> Date: Monday, October 11, 2010, 9:56 PM
> Paul E Condon <pecondon at mesanetworks.net>
> writes:
> 
> > Claims made at the web site where the tool is offered
> for download
> > cannot be simply trusted, IMHO. How does one test a
> disk wipe to
> > verify that it has worked correctly?
> 
> Well, at least one of the sites (Dan's Boot-n-Nuke, but I
> might be
> mis-remembering) has links to papers on the topic.
> 
> And I wasn't being blind; I read through a dozen or more
> sites to find
> the two I recommended.
> 
> > It seems to me that in the limited situation where
> there is no
> > reason to preserve any data on the HD, then dd would
> do a pretty
> > fair job, or maybe two passes of dd with ones and
> zeros. What more
> > could a 'better' tool offer? 
> 
> The history of "secure erase", so far as I know it:
> 
> * Various OS's (at least back to MS-DOS in the 1980s)
> discovered it
>   was faster to just zero out a directory entry,
> rather than zeroing
>   out every sector that held data for the given
> file.  This allowed
>   for various "undelete" utilities, but is obviously
> insecure.
> 
> * Various programmers filled the need for a secure delete
> by offering
>   tools that would first write various patterns into
> the used sectors,
>   then do the actual delete.
> 
> * Patterns are used because sufficiently-motivated labs
> (think 100k$
>   attack cost) can find traces of previous written
> values on the
>   media.  That is, if you write "10101010", and
> then later write
>   "11110000" to the same location, a trace of the
> original pattern
>   remains.  That trace can be detected with
> sufficiently advanced
>   gear.
> 
>   + This is the origin of the old "37 passes"
> approach; the idea is
>     that sufficient passes of 1s and 0s would put
> down so many
>     residual traces, the original would no longer
> be recoverable.
> 
> * Recent (2000-ish to current) hard drives don't really
> write
>   individual, identifiable bits anymore.  They
> use various coding
>   systems (much as 56k modems used more than two
> symbols: they were
>   really only 4800 baud ["symbols per second"]
> devices, but used 30+
>   symbols to provide 56 kbps throughput).  This
> means that changing
>   your "10101010" to "11110000" might only affect two
> locations, and
>   might change that location from symbol "C" to symbol
> "Q".  (As well
>   as likely causing the entire sector to be rewritten;
> I don't know
>   that detail.)
> 
> * On top of all that, hard drives have been remapping
> sectors since
>   the 1990s at the latest.  That means sensitive
> data might be left in
>   a "bad" sector, which could potentially be recovered
> if the
>   adversary spends enough effort to do so.
> 
> > (This sounds like a rhetorical question, but I really
> am just
> > asking. Security issues puzzle me because there is
> always the
> > possibility yet another level of deception.)
> 
> I strongly recommend _Practical Security_ (aka _Security
> Engineering)
> by Bruce Schneier and Neils Ferguson:
> 
>   http://www.schneier.com/book-practical.html
> 
> The most important lesson is that you need to first
> determine what
> you're protecting, then what/whom you're protecting
> against, and
> finally you need to decide how much you're willing to "pay"
> for that
> protection.
> 
> Short version: security is a trade-off between cost,
> ease-of-use, and
> many other factors.  (Would you like a shell that
> prompted for your
> password before executing every command?  That'd be
> more secure, but
> very much a P.I.T.A...)
> 
> In this case, you want to determine what level of threat
> you're
> protecting against.  In this particular case, I see:
> 
> 1. Consumer / hobbyist / low-end tech support person.
> 
>    If you're selling a drive on eBay, or
> taking your laptop in for
>    service, this is the level of
> attack.  Most likely will only be
>    attempted through standard interface, so
> remapped sectors are not
>    an issue.
> 
>    Myself, if I had anything I really
> worried about on that hard
>    drive, I'd do my best to replace it with
> a scratch drive before
>    sending in the device.  (This also
> has the advantage of eliminating
>    the hard drive or software as the
> culprit.)
> 
> 2. Local law enforcement, low-end data recovery services.
> 
>    These can likely get to the remapped
> sectors, at the very least.
> 
> 3. National law enforcement, hard drive manufacturers,
> high-end data
>    recovery services.
> 
>    These can scan the platter "manually" and
> reconstruct the primary
>    data, as well as potentially recovering
> traces of previous data.
> 
> If you're really worried about #2 and #3 ... the right
> answer is
> probably to keep the drive in your physical possession; if
> you need to
> discard it, disassemble the drive and melt the platters.
> 
> My own level of paranoia is such that I've got about 50
> drives of
> various vintages sitting in a box... (remember when a 640MB
> 'bigfoot'
> 5.25" drive was awesome?  :)
> 
> HTH,
> t.
> _______________________________________________
> Web Page:  http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
> Join us on IRC: irc.hackingsociety.org port=6667
> channel=#hackingsociety
> 


      



More information about the LUG mailing list