On Jan 2, 2007, at 6:48 AM, Darren Reed wrote:

Darren J Moffat wrote:

...
Of course. I didn't mention it because I thought it was obvious but this would NOT break the COW or the transactional integrity of ZFS.

One of the possible ways that the "to be bleached" blocks are dealt with in the face of a crash is just like everything else - they would be in the ZFS Intent Log as "things to do".


Do NIST and other specifications that come into play here dictate
what should be done in these and other situations?

From
        http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_rev1.pdf
includes the statement that
The security goal of the overwriting process is to replace written data with random data.

How we achieve this is our problem. I expect that this is a subjective analysis if we meet the goals...

Do they say how this feature must be provided or in which situations
it is required to be covered in order to meet their criteria.

They talk about "Clearing" vs "Purging" vs "Destruction"... Clearing is the lowest level and seems to be useful when repurposing storage within an organization. All of these are supposed to be "NSA/CSS Approved". I do not see the exact approval requirements in this document.

Or do they just document overwrite patterns, depending on the
security of the information?

From
        http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_rev1.pdf
it states
Studies have shown that most of today’s media can be effectively cleared by one overwrite.

Darren

_______________________________________________
security-discuss mailing list
[EMAIL PROTECTED]

_______________________________________________
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss

Reply via email to