Re: [zfs-discuss] zfs eradication

2009-11-15 Thread Joerg Moellenkamp
> >> djm> Much better for jurisdictions that allow for that, but not all >> not knowing where something physically is at all times? > > I'm not in a position to discuss this jurisdictions requirements and > rationale on a public mailing list. All I'm saying is that data destruction > base on

Re: [zfs-discuss] zfs eradication

2009-11-12 Thread Bob Friesenhahn
On Wed, 11 Nov 2009, David Magda wrote: There seem to be 'secure erase' methods available for some SSDs: Unless the hardware and firmware of these devices has been inspected and validated by a certified third party which is well-versed in such analaysis, I would not trust such devices with s

Re: [zfs-discuss] zfs eradication

2009-11-12 Thread Darren J Moffat
Miles Nordin wrote: "djm" == Darren J Moffat writes: >> encrypted blocks is much better, even though >> encrypted blocks may be subject to freeze-spray attack if the >> whole computer is compromised the idea of crypto deletion is to use many keys to encrypt the drive, and enc

Re: [zfs-discuss] zfs eradication

2009-11-12 Thread Miles Nordin
> "djm" == Darren J Moffat writes: >> encrypted blocks is much better, even though >> encrypted blocks may be subject to freeze-spray attack if the >> whole computer is compromised the idea of crypto deletion is to use many keys to encrypt the drive, and encrypt keys with oth

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Bob Friesenhahn
On Wed, 11 Nov 2009, Darren J Moffat wrote: Zfs is absolutely useless for this if the underlying storage uses copy-on-write. Therefore, it is absolutely useless to put it in zfs. No one should even consider it. I disagree. Sure there are cases where ZFS which is copy-on-write is sitting o

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Darren J Moffat
Bob Friesenhahn wrote: On Wed, 11 Nov 2009, Darren J Moffat wrote: note that "eradication" via overwrite makes no sense if the underlying storage uses copy-on-write, because there's no guarantee that the newly written block actually will overlay the freed block. Which is why this has to be a

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread David Magda
On Nov 11, 2009, at 17:40, Bob Friesenhahn wrote: Zfs is absolutely useless for this if the underlying storage uses copy-on-write. Therefore, it is absolutely useless to put it in zfs. No one should even consider it. The use of encrypted blocks is much better, even though encrypted block

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Bob Friesenhahn
On Wed, 11 Nov 2009, Darren J Moffat wrote: note that "eradication" via overwrite makes no sense if the underlying storage uses copy-on-write, because there's no guarantee that the newly written block actually will overlay the freed block. Which is why this has to be a ZFS feature rather than

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Darren J Moffat
Bill Sommerfeld wrote: On Wed, 2009-11-11 at 10:29 -0800, Darren J Moffat wrote: Joerg Moellenkamp wrote: Hi, Well ... i think Darren should implement this as a part of zfs-crypto. Secure Delete on SSD looks like quite challenge, when wear leveling and bad block relocation kicks in ;) No I w

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Bill Sommerfeld
On Wed, 2009-11-11 at 10:29 -0800, Darren J Moffat wrote: > Joerg Moellenkamp wrote: > > Hi, > > > > Well ... i think Darren should implement this as a part of > zfs-crypto. Secure Delete on SSD looks like quite challenge, when wear > leveling and bad block relocation kicks in ;) > > No I won't b

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread David Magda
On Wed, November 11, 2009 13:29, Darren J Moffat wrote: > No I won't be doing that as part of the zfs-crypto project. As I said > some jurisdictions are happy that if the data is encrypted then > overwrite of the blocks isn't required. For those that aren't use > dd(1M) or format(1M) may be suff

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Tim Cook
On Wed, Nov 11, 2009 at 12:29 PM, Darren J Moffat wrote: > Joerg Moellenkamp wrote: > >> Hi, >> >> Well ... i think Darren should implement this as a part of zfs-crypto. >> Secure Delete on SSD looks like quite challenge, when wear leveling and bad >> block relocation kicks in ;) >> > > No I won't

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Darren J Moffat
Joerg Moellenkamp wrote: Hi, Well ... i think Darren should implement this as a part of zfs-crypto. Secure Delete on SSD looks like quite challenge, when wear leveling and bad block relocation kicks in ;) No I won't be doing that as part of the zfs-crypto project. As I said some jurisdictio

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Joerg Moellenkamp
Hi, Well ... i think Darren should implement this as a part of zfs-crypto. Secure Delete on SSD looks like quite challenge, when wear leveling and bad block relocation kicks in ;) Regards Joerg Am 11.11.2009 um 17:53 schrieb Cindy Swearingen: > This feature is described in this RFE: > > htt

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Cindy Swearingen
This feature is described in this RFE: http://bugs.opensolaris.org/bugdatabase/view_bug.do?bug_id=4930014 Secure delete option: erase blocks after they're freed cs On 11/11/09 09:17, Darren J Moffat wrote: Brian Kolaci wrote: Hi, I was discussing the common practice of disk eradication used

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Darren J Moffat
Brian Kolaci wrote: Hi, I was discussing the common practice of disk eradication used by many firms for security. I was thinking this may be a useful feature of ZFS to have an option to eradicate data as its removed, meaning after the last reference/snapshot is done and a block is freed, the

Re: [zfs-discuss] zfs eradication

2009-11-11 Thread Brian Kolaci
Thanks all, It was a government customer that I was talking too and it sounded like a good idea, however with the certification paper trails required today, I don't think it would be of such a benefit after all. It may be useful on the disk evacuation, but they're still going to need their pa

Re: [zfs-discuss] zfs eradication

2009-11-10 Thread Trevor Pretty
Excuse me for mentioning it but why not just use the format command? format(1M) analyze Run read, write, compare tests, and data purge. The data purge function implements the National Computer Security Center Guide to Understanding Data Remnance (NCSC-TG-025 version 2) Overwriting

Re: [zfs-discuss] zfs eradication

2009-11-10 Thread David Magda
On Nov 10, 2009, at 20:55, Mark A. Carlson wrote: Typically this is called "Sanitization" and could be done as part of an evacuation of data from the disk in preparation for removal. You would want to specify the patterns to write and the number of passes. See also "remanence": http:

Re: [zfs-discuss] zfs eradication

2009-11-10 Thread Mark A. Carlson
Typically this is called "Sanitization" and could be done as part of an evacuation of data from the disk in preparation for removal. You would want to specify the patterns to write and the number of passes. -- mark Brian Kolaci wrote: Hi, I was discussing the common practice of disk eradicati

[zfs-discuss] zfs eradication

2009-11-10 Thread Brian Kolaci
Hi, I was discussing the common practice of disk eradication used by many firms for security. I was thinking this may be a useful feature of ZFS to have an option to eradicate data as its removed, meaning after the last reference/snapshot is done and a block is freed, then write the eradicati