All of lore.kernel.org
 help / color / mirror / Atom feed
From: Arno Wagner <arno@wagner.name>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] Possibility for safe Luks partition delete functionality
Date: Thu, 12 Dec 2013 01:49:37 +0100	[thread overview]
Message-ID: <20131212004937.GA18851@tansi.org> (raw)
In-Reply-To: <20131212002954.GA2263@citd.de>

On Thu, Dec 12, 2013 at 01:29:54 CET, Matthias Schniedermeyer wrote:
> On 12.12.2013 00:22, Sven Eschenberg wrote:
> > Well usually those SSDs don't use any ecryption key, as long as you don't
> > use a HDD password (supposedly). Of course they could possible create a
> > random key and then write 'zeros' during secure erase, which would
> > incidently result in random content.
> 
> As the Secure Erase on the SSD i tested only takes seconds, i would 
> assume they (optionaly) reset the key and mark all sectors for reuse in 
> the wear-leveling-table. And then erase the cells either in the 
> background or the next time they are used. IOW the data is not really 
> erase immediatly, only inaccessible by normal read commands.
> 
> > But judging from experience, it would be quite foolish to assume
> > manufactures do anything properly or the way you'd expect it ;-).
> 
> Excactly.
> There is no real way of verifying what actually happens and if it done 
> in a way that really is secure.
> 
> The "content"-key can be something like MD5(serial_no + generation_no). 
> Which looks random in each iteration, but would be easily cracked by the 
> manufacturer.

Indeed. Or the manufacturer has some kind of backdoor. That is why
I recommend several overwrites with zeros, followed by physical 
destruction for SSDs. Same, BTW, for "hybrid" drives.

Arno
-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@wagner.name
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
There are two ways of constructing a software design: One way is to make it
so simple that there are obviously no deficiencies, and the other way is to
make it so complicated that there are no obvious deficiencies. The first
method is far more difficult.  --Tony Hoare

  reply	other threads:[~2013-12-12  0:49 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-12-11 18:59 [dm-crypt] Possibility for safe Luks partition delete functionality tada
2013-12-11 19:16 ` Heinz Diehl
2013-12-11 19:18   ` Heinz Diehl
2013-12-11 20:21     ` Arno Wagner
2013-12-11 21:48       ` Heinz Diehl
2013-12-11 22:53         ` Arno Wagner
2013-12-12  6:11           ` Heinz Diehl
2013-12-11 20:55   ` Matthias Schniedermeyer
2013-12-11 23:22     ` Sven Eschenberg
2013-12-12  0:29       ` Matthias Schniedermeyer
2013-12-12  0:49         ` Arno Wagner [this message]
2013-12-15  2:55     ` Robert Nichols
2013-12-15 12:47       ` Arno Wagner

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20131212004937.GA18851@tansi.org \
    --to=arno@wagner.name \
    --cc=dm-crypt@saout.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.