On Thu, Dec 21, 2006 at 03:47:07PM +0000, Darren J Moffat wrote:
> Nicolas Williams wrote:
> >James makes a good argument that this scheme won't suffice for customers
> >who need that level of assurance.  I'm inclined to agree.  For customers
> >who don't need that level of assurance then encryption ought to suffice.
> 
> Has anyone other than me actually read the current NIST guidelines on 
> this ? [ the url was in my original email message ].
> 
> The current NIST guidelines, or at least my reading of it, says that 
> even if you are using encryption and even if you are going to do 
> physical destruction you still need to do something like this.

I think it's a bit nuanced.

Pages 15-16 obliquely mention encryption in the description of
"clearing":

"... It must be resistant to keystore recovery attempts executed from
standard input devices and from data scavenging tools.  ..."

I'm not sure how to interpret that in the case of ZFS encryption.  The
actual keys used to encrypt file are not typed in by users, and data
scavenging tools could only get at them if: a) they recovered user
passwords from which master FS keys are derived, b) have access to the
media.

On page 4 (errata), it says that on 9-11-06 (version 10-06) text was
deleted that had once declared encryption insufficient.

So, altogether I would read this as allowing deletion of keys as a
method of clearing.

Since clearing is all we can hope to do in ZFS then I think this should
be sufficient.

Nico
-- 
_______________________________________________
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss

Reply via email to