Subject: Re: securely erasing a hard disk
To: Steven M. Bellovin <smb@cs.columbia.edu>
From: Florian Stoehr <netbsd@wolfnode.de>
List: tech-security
Date: 10/21/2005 12:01:37
On Fri, 21 Oct 2005, Steven M. Bellovin wrote:
> In message <e14f4ca0510201735t4f23cdfeja44d3d8f3bb8993d@mail.gmail.com>, Philip
> Jensen writes:
>> I am wanting to understand the risk outlined in this paper:-
>> http://wipe.sourceforge.net/secure_del.html
>>
>> Is it widely acknowledged that a disk (or file) needs to be
>> overwritten up to 30 times in order to remove any traceable
>> information on the magnetic media for the file?
>
> I don't know of any *public* source that I'd trust on this -- the paper
> you cite is almost 10 years old, and disk technology has changed a lot
> since then. Have a look at http://dban.sourceforge.net/faq/index.html
> which quotes the author of that paper as saying
>
> "in the time since this paper was published, some people
> have treated the 35-pass overwrite technique described in
> it more as a kind of voodoo incantation to banish evil
> spirits than the result of a technical analysis of drive
> encoding techniques. As a result, they advocate applying
> the voodoo to PRML and EPRML drives even though it will
> have no more effect than a simple scrubbing with random
> data... For any modern PRML/EPRML drive, a few passes of
> random scrubbing is the best you can do". >
>
>> If so, then does the -P switch for the NetBSD rm command really
>> provide the "security" of data erasure people think they are getting?
>> Or should the man page have an addition of "If you are serious about
>> removing all traces of this file then ......."?
>>
>> Lastly, how long would it take to retrieve the contents of a disk (or
>> file) which has been overwritten with `dd if=/dev/zero of=/dev/rsd0c`?
>>
>
> Who is trying to do the retrieval? What are they wiling to spend? How
> good are they?
>
> The free product that purports to do the best job of erasing a disk
> is dban, "Darik's Boot and Nuke" -- see http://dban.sourceforge.net/.
> (Someone, probably me, should put it in pkgsrc.) But even it has its
> limits. This is from the FAQ:
>
> Q: Does DBAN wipe remapped sectors?
>
> A: No.
>
> Q: Does DBAN wipe the Host Protected Area ("HPA")?
>
> A: No.
>
> Most vendors that are using the HPA have a toggle for it
> in the BIOS setup program. Future releases of DBAN may
> override or dishonor the HPA.
>
> The author also notes that there are some other situations where it
> won't work, including a serious enemy, and says "If you are seriously
> concerned about any of these situations, then consider drilling open your
> hard disk, grinding down the platters, and melting all of the parts in a
> furnace."
>
> A better source for that paper you pointed to is the author's copy, at
> http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html (and you should
> notify the maintainer of that page). Peter's own version has an Epilogue
> that says "Looking at this from the other point of view, with the
> ever-increasing data density on disk platters and a corresponding
> reduction in feature size and use of exotic techniques to record data on
> the medium, it's unlikely that anything can be recovered from any recent
> drive except perhaps one or two levels via basic error-cancelling
> techniques."
>
I implemented the Gutmann 35-pass method for NetBSD. This is
in pkgsrc-wip as "neb-wipe".
I updated it for 64-bit platforms, but have not committed it yet
(although it worked for me on 32-bit platforms).
Can run 35-pass as well as user-defined number of random passes.
Note that this can wipe disklabel slices as well as whole
disks.
And, like dban, it will not wipe remapped sectors or hpa.
-Florian