From owner-freebsd-security Thu Nov 18 13:13:11 1999 Delivered-To: freebsd-security@freebsd.org Received: from funky.monkey.org (funky.monkey.org [63.77.239.12]) by hub.freebsd.org (Postfix) with ESMTP id 4697915480; Thu, 18 Nov 1999 13:13:05 -0800 (PST) (envelope-from dugsong@monkey.org) Received: by funky.monkey.org (Postfix, from userid 1001) id 76A611518E; Thu, 18 Nov 1999 16:10:00 -0500 (EST) Received: from localhost (localhost [127.0.0.1]) by funky.monkey.org (Postfix) with ESMTP id 52E3614A01; Thu, 18 Nov 1999 16:10:00 -0500 (EST) Date: Thu, 18 Nov 1999 16:09:59 -0500 (EST) From: Dug Song To: Jonathon McKitrick Cc: security@freebsd.org, questions@freebsd.org Subject: Re: secure filesystem wiping In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, 18 Nov 1999, Jonathon McKitrick wrote: > Why isn't it possible to read unallocated sectors and write back sectors > full of garbage, or 0xFF? this was the topic of a recent thread on comp.security.unix: http://x44.deja.com/viewthread.xp?AN=542077498&search=thread&svcclass=dncurrent&ST=PS&CONTEXT=942959294.75104298&HIT_CONTEXT=942959294.75104298&HIT_NUM=0&recnum=%3caziS3.1656$4G.29 peter gutmann's excellent paper from the 6th USENIX security symposium is probably the definitive answer: http://www.fish.com/security/secure_del.html -d. --- http://www.monkey.org/~dugsong/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message